mailing list archives
Re: Shareaza Remote Vulnerability
From: Ryan Smith <whatstheaddress () gmail com>
Date: Thu, 26 Jan 2006 23:07:21 -0600
Thanks Todd, the correct link is
I believe what you mean is that I completed 20% of a job, and the job was
correct. I am sorry you feel my work was incomplete; do you still feel like
you recieved a deliverable that matches the dollar amount you spent on the
On 1/26/06, ad () heapoverflow com <ad () heapoverflow com> wrote:
-----BEGIN PGP SIGNED MESSAGE-----
where is your proof then that the remote execution is possible, the
shareaza maker wont probably care until you add a proof on what do you
claim as exploitable..
You just made like 20% of a correct job ...
Ryan Smith wrote:
There is a vulnerability in the current version of Shareaza, a P2P
file sharing product. It results in remote code execution. Please
see the advisory for more details. There is no patch.
Credit: These vulnerabilities were discovered and researched by
Contact: WhatsTheAddress () gmail com
<mailto:WhatsTheAddress () gmail com>
_______________________________________________ Full-Disclosure -
We believe in it. Charter:
http://lists.grok.org.uk/full-disclosure-charter.html Hosted and
sponsored by Secunia - http://secunia.com/
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (MingW32)
-----END PGP SIGNATURE-----
Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia - http://secunia.com/