Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Wed, 06 Jan 2010 11:38:09 +0100
From: Giuseppe Iuculano <iuculano@...ian.org>
To: oss-security@...ts.openwall.com
Subject: CVE request - uzbl remote code execution

Hi,

uzbl upstream reported a remote code execution vulnerability:
http://www.uzbl.org/news.php?id=22

References:
http://lists.uzbl.org/pipermail/uzbl-dev-uzbl.org/2010-January/000586.html
http://users.edpnet.be/dieter/exploit.html

Cheers,
Giuseppe.


[ CONTENT OF TYPE application/pgp-signature SKIPPED ]

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ