Hello cobalt-developers, Is that solved? "Cobalt's RAQ 4 server has three remote vulnerabilities. The service.cgi script has a cross site scripting vulnerability because it incorrectly parses the incoming searches and includes HTML tags and Javascript in the result. A directory traversal vulnerability allows attackers to read restricted files or passwords and profiles the users. In addition, a very long URL string will crash the service." http://packetstorm.mirror.widexs.nl/filedesc/Colbalt-RAQ-v4.txt.html
And zlib? http://www.theregister.co.uk/content/5/24387.html -- Regards, Ilmars Knipshis Hermitage Solutions +371 7325553 +371 7214458 mailto:[EMAIL PROTECTED] _______________________________________________ cobalt-developers mailing list [EMAIL PROTECTED] http://list.cobalt.com/mailman/listinfo/cobalt-developers
