.
On Thu, Sep 29, 2016 at 11:50 AM, Mike Kienenberger <mkien...@gmail.com> wrote:
> CVE-2016-5019 Apache MyFaces Trinidad information disclosure vulnerability
>
> Severity: Important
>
> Vendor:
> The Apache Software Foundation
>
> Versions Affected:
> Trinidad from 1.0.
unsubscribe
-Original Message-
From: nob...@cisco.com [mailto:nob...@cisco.com] On Behalf Of Cisco Systems
Product Security Incident Response Team
Sent: Wednesday, March 30, 2016 9:18 AM
To: bugtraq@securityfocus.com
Cc: ps...@cisco.com
Subject: Cisco Security Advisory: Cisco Firepower
acknowledge your contributions.
The scope of this program is limited to Expedia-owned Web applications,
including Hotels.com, Hotwire.com, Expedia CruiseShipCenters, Venere.com,
Egencia.com, and VIA.com.
Thank you,
Mike Sheward
Enterprise Information Security
Director,
Security Operations Center
PoC confirmed to work with Safari 8.0.3 on OSx 10.10.2
Good find!
On 16/02/2015 16:15, Ricardo Iramar dos Santos rira...@gmail.com wrote:
Oren Hafif reported a new kind of attack called Reflected File
Download
(https://www.blackhat.com/eu-14/briefings.html#reflected-file-download-a-n
as
something else.
2. Advisory information
- - Public Release Date: 4/8/2014
- - Vendor notified: Yes 30/7/2014
- - CVE¹s: requested 1/8/2014
- - Last Revised: 4/7/2014
- - Researchers: Mike Antcliffe and Ed Tredgett
- - Research Organisation: Logically Secure Ltd
- - Research Organisation Website
# Exploit Title: Pro Chat Rooms v8.2.0 - Multiple Vulnerabilities
# Google Dork: intitle:Powered by Pro Chat Rooms
# Date: 5 August 2014
# Exploit Author: Mike Manzotti @ Dionach Ltd
# Vendor Homepage: http://prochatrooms.com
# Software Link: http://prochatrooms.com/software.php
# Version
off, go for a walk (down to the pub if that helps), and come back with a focus
more on the technical question at hand rather than the emotional response that
has been rising to the top.
Thanks,
Mike
Software: yaws-wiki
version affected: 1.88-1
platform: Erlang
homepage:http://yaws.hyber.org/
Researcher: Michael Brooks
Original Advisory:https://sitewat.ch/en/Advisory/4
Install instructions for Ubuntu:
sudo apt-get install yaws-wiki
Edit:/etc/yaws/conf.d/yaws-wiki.conf
#add this:
I agree, this is a configuration issue not an issue with Wordpress.
Wordpress SHOULD NOT fix this issue because it will make it more difficult to
write wordpress modules.
All production systems should have this configuration:
display_errors=off
On 3/23/11 9:46 AM, J. Oquendo wrote:
How about we reflect reality?
We can't honestly do that, we all only have our perception. It's funny
how we can get stuck in a trap of 0 and 1.
My perception is we'll always disagree on disclosure technique, or at
least nitpick some minor detail into
This is fake for usre. I have tested prestashop before and I posted real xss
that affected prestashop to bugtraq and it was filtered. Why wasn't this
filtered
Original Advisory: https://sitewat.ch/en/Advisory/View/1
Credit: Michael Brooks (https://sitewat.ch)
Vulnerability: Directory Traversal
Software: Majordomo2
Identifier:CVE-2011-0049
Vendor: http://www.mj2.org/
Affected Build: 20110121 and prior
Special thanks to Dave Miller, Reed Loden
Credit: Michael Brooks
Bug Fix in 1.1.2:
http://www.pligg.com/blog/1174/pligg-cms-1-1-2-release/
Special thanks to Eric Heikkinen for patching these quickly.
Blind SQL Injection
http://host/pligg_1.1.2/search.php?adv=1status=
'and+sleep(9)or+sleep(9)or+1%3D' search=onadvancesearch= Search
this was a documented feature -- even if it was
.5-ass'ed put together by the Java devs.
snip /
Thanks Roberto.
Mike Duncan
Dep. ISSO, Application Security Specialist
National Climatic Data Center, NOAA
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.15 (GNU/Linux)
Comment: Using GnuPG
is not exactly an unused class in Java. It is
everywhere and used in a lot of applications.
Good luck.
Mike Duncan
Dep. ISSO, Application Security Specialist
National Climatic Data Center, NOAA
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.15 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http
.
This should show the firmware/router manufactures the need for more real
world testing before deployment as well as allowing for patching via the
ISP or at least allow the user to update the firmware easily.
Thanks for all the hard work, YGN Ethical Hacker Group. Good job and
keep it up.
Mike Duncan
Original
Advisory:http://blog.sitewat.ch/2010/05/phpvidz-administrative-password.html
Affecting: phpvidz 0.9.5
Vulnerability: Administrative Password Disclosure
Vendor's Homepage: http://sourceforge.net/projects/phpvidz/
Date: May 15th 2010
Researcher: Michael Brooks
phpvidz does not use a
:46:b1:75:c8:ec:
1d:8f:1e:7a:94:f1:aa:53:78:a2:45:ae:54:ea:d1:9e:74:c8:
76:67
Mike Duncan
ISSO, Application Security Specialist
Government Contractor with STG, Inc.
NOAA :: National Climatic Data Center
On 03/19/2010 04:22 PM, Francis Litterio wrote:
In Firefox 3.6 for Windows
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
You mention the issues had been resolved and provide a link, but the
link seems dead now. Could you please update with a proper reference to
Adobe if possible with information on how these issues were resolved.
Thanks.
Mike Duncan
ISSO, Application
Once someone has physical access all bets are off, there's a lot the
can do.
1) steal it
2) boot off cd and reset/enable admin acct
3) boot off cd and grab all hashes
4) pour a perfectly good frappucino on the keyboard
5) cover it with smiley face stickers
You get the idea. This is non
blood coming in all
the time and issues like this being brought back up are good to ensure that
something as simple as this is not missed because it is assumed that we all
know it.
Thanks,
_
Mike Wilson
-Original Message-
From: Bob Fiero [mailto:i...@mentalfloss.net
,
_
Mike Wilson
-Original Message-
From: Susan Bradley [mailto:sbrad...@pacbell.net]
Sent: Thursday, May 14, 2009 2:39 PM
To: my.security.li...@gmail.com
Cc: MustLive; bugtraq@securityfocus.com
Subject: Re: Insufficient Authentication vulnerability in Asus notebook
We're talking XP Home here
to crash. A more stable platform should be used (such as Silverlight)
You can choose a different player within the preferences of Firefox.
What is the problem again?
- --
Mike Duncan
ISSO, Application Security Specialist
Government Contractor with STG, Inc.
NOAA :: National Climatic Data Center
Vulnerability Affecting FireGPG Passphrase and Cleartext Recovery
10/20/2008
Abstract
FireGPG is a Firefox extension that provides a front-end to GPG,
allowing webmail users to conveniently exchange GPG messages from
v5.0.0.176
Internet Explorer 7 on Vista 32-bit (no CSA)
Thanks,
Mike Pruett
-Original Message-
From: Jan van Niekerk [mailto:[EMAIL PROTECTED]
Sent: Monday, September 29, 2008 10:37 PM
To: [EMAIL PROTECTED]
Cc: bugtraq@securityfocus.com
Subject: Re: MS Internet Explorer 7 Denial
the results
or are we going on the assumption that is a very large number?
Mike Duncan
ISSO, Application Security Specialist
Government Contractor with STG, Inc.
NOAA :: National Climatic Data Center
[EMAIL PROTECTED]
Rotem Kerner wrote:
| this successfully freezed my chrome on both Vista XP
://site.com/interface/Login.php?user_name=XSS
Google Dork: TimeTrex Time and Attendance - Secure Login
Reference:
http://www.hackerscenter.com/index.php?/HSC-Research-Group/Advisories/HSC-TimeTrex-Time-and-Attendance-Cookie-Theft.html
--
Mike ([EMAIL PROTECTED])
The attached is a signed version of the security advisory for Symantec Storage
Foundation for Windows 5.x that was released today. If we can get the
signature to verify, please post to bugtraq
Regards
SYM08-015_ SFW_SecurityUpdateBypass.txt
He's basically saying that if you create a popup small enough
width-wise, then you can hide everything before the # so that unless
the user actually goes into the address bar and scrolls left, all they
will see is what you put after the #. Here's a screenshot so you can
see what he's talking
])
- --
Mike Duncan
ISSO, Application Security Specialist
Government Contractor with STG, Inc.
NOAA :: National Climatic Data Center
151 Patton Ave.
Asheville, NC 28801-5001
[EMAIL PROTECTED]
828.271.4289
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla
' cookie. After this, close your gmail tab, and then visit
http://mail.google.com. You will still be authenticated.
--
Mike Perry
Mad Computer Scientist
fscked.org evil labs
pgpxh2XwlYPq7.pgp
Description: PGP signature
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Nope. Ran this one against Mozilla/5.0 (X11; U; Linux i686; en-US;
rv:1.8.1.2) Gecko/20061023 SUSE/2.0.0.2-1.1 Firefox/2.0.0.2, and it
didn't even flinch. No OOM-killing here.
On the other hand, Konqueror 3.5.5 release 45.4 churned swap madly for
Well, Just a warning b4 running the proof of concept... Make sure to close and
save useful stuff. It indeed works on xp sp2 and it will reboot your machiene.
I have to say, This would be trick to exploit another programs messagebox, and
wha joy could you possibly get out of restarting someone
The program committee welcomes original contributions not previously
presented at any other conference or workshop on the following topics:
1. Compliance / Audit
2. Physical Security
3. Infrastructure
4. Information Security
5. Forensics
6. SCADA
SYM06-023
Nov 28, 2006
Symantec NetBackup PureDisk: PHP update to Address Reported Security
Vulnerability
Reference: http://www.securityfocus.com/bid/20879/
Revision History
none
Severity
High (configuration dependent)
Remote Yes
Local No
Authentication Required Yes (to network)
Exploit
This flaw reported by Mozilla
http://www.mozilla.org/security/announce/2006/mfsa2006-59.html
is still unfixed in the latest Firefox 2.0 final.
This exploit works in Firefox 2.0 Final: http://lcamtuf.coredump.cx/ffoxdie.html
Jonathan Watt and Michal Zalewski independently reported timing
Permanant Link : http://www.whitedust.net/speaks/3043/
- Advisory for OneOrZero Helpdesk -
- OneOrZero Helpdesk -
AFFECTED PRODUCTS
=
OneOrZero
http://lcamtuf.coredump.cx/ffoxdie.html
this exploit still works with the latest Firefox 2.0 RC3
http://lcamtuf.coredump.cx/ffoxdie.html
this exploit still works with the latest Firefox 1.5.0.7 and Firefox 2.0 RC1
this wrong.
~mike~
Yannick von Arx wrote:
It seems so that the attacker needs a ARD enabled user plus vnc
password to access the client.
Then he can send an install command over Manage Send UNIX Command
We're talking about ARD 3.0 so we've got the new feature to lock
client's screen
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Symantec Security Advisory
SYM06-015
16 August 2006
Symantec NetBackup PureDisk: Non-Privileged User Authentication Bypass
Elevation of Privilege
Revision History
None
Severity
Medium (highly dependent on network configuration)
Remote
Does anyone use this email client? I have to say It would be in your best
intrest to turn off html messages until I speak with tech support at Lan-Aces.
If they do not respond within 24 hours I will post a huge security bypass
exploit that works for all html scripting blocking mechanisim. With
as an LSP.
Regards,
Mike Healan
www.spywareinfo.com
Juha-Matti Laurio wrote:
It appears that there is a new type of PowerPoint 0-day Trojan spreading,
more details at this write-up:
http://www.symantec.com/enterprise/security_response/writeup.jsp?docid=2
006-071812-3213-99
What the technical
Nothing happens on IE7 Beta3. No crash
:Sun says it is jabber, which is why I put it quotes. Since they have not
:replicated in lab, they are jumping to conclusions. Yes, I agree,
:it is very specific and the backline engineer usage appears 'stretching things'
Most Sun adapters have an actual jabber counter that netstat -k will
spew
Doug,
: :ping another device with interpacket delay of 0 and a count
...
: Define what you mean by interpacket delay. Are you referring to an
...
:cisco router. extending ping. 0 delay.
:I was speaking of cisco ping.
:I should have said 'timeout'. mea culpa.
A between your using the
:single CPU Sun microsystems system running solaris7, 8, or 9
:(haven't tested on 10). E.g. netra.
:
:if you telnet to a local router, disable nagle (on purpose
:or by accident or whatever - if nagle is turned off), and then
TCP_NODELAY by any other name, I assume.
:ping another device with
might be
subject to similar issues.
- Steve
Mike
.
--Mike
If you have a 20,000 bot botnet and each bot has 2 defined recursive dns
servers that it is allowed to use and these bots are on the local subnet
(ie
BCP38 is implimented at the gateway but not at every router) then how
exactly is locking down recursive servers so you can only use yours going
deserve the
consequences.
Mike
i admit, i posted this bug just a short while ago, but since its an
anoyance more then a vuln.. i dont really care.. be glad i didnt demo it
here :) (for evolution users anyway)
so the issue is with text based file attachments with the
Content-Disposition set to inline.. if this text file
a comment like /* The following code is here at
the behest of No Such Agency. Do not remove from future versions. */ I
might start to consider the possibility of some dark conspiricy. As it
stands, it just looks to me like Yet Another Dumb Screwup by Microsoft
(YADSM).
Cheers,
Mike Ely
you.
Best regards,
--
Mike
- -Mike-
- --
- --
| |||| | Mike Caudill [EMAIL PROTECTED] |
| |||| | PSIRT Incident Manager |
| | DSS PGP: 0xEBBD5271
:July 31, 2003
Risk:Critical; Allows writing of a file to any
location on the victim's system.
Author: Mike Kristovich, Security Researcher
ThreeZee Technology, Inc.
http://www.ThreeZee.com
From the Realm HOW-TO on the Tomcat 4.0/4.1 documentation pages:
For each of the standard Realm implementations, the user's password (by
default) is stored in clear text. In many environments, this is
undesireable because casual observers of the authentication data can
collect enough
Welkyn Security Advisory SA-2003060400
Synopsis: SSH from= and [EMAIL PROTECTED] restrictions spoofable via
reverse DNS for numerically specified IP addresses.
Issue Date: June 4, 2003
Software Affected: OpenSSH 3.6.1 and earlier
Vendor notified: May 24, 2003.
Vendor response: See
purposes
you would have to have enough access to edit b2config.php.
Mike
Mike Kristovich, PivX Security Advisory MK#002A
Date:January 10, 2003
Application: Intuit TurboTax
Version: All versions up to current.
Bug: Information in saved Tax Returns discloses Social Security
On Tue, Mar 11, 2003 at 08:30:17AM -0800, Mike Schiffman wrote:
12) It is a bit misleading to say djbdns has no security
vulnerabilities. While it is true that the component programs that
make up djbdns have not had a known vulnerability, the design of djbdns
relies on external services
in lines of code for 8.2
was a result of integration of code from external parties (Intel,
Checkpoint, and NAI to name three). Clearly, given the number of lines
of code doubled, the maturity of the code base was reset.
--
Mike Schiffman, CISSP
http://www.packetfactory.net/schiffman.html
/DNS/
Comments are welcomed; off-list is preferable and I will post a summary.
Thanks.
--
Mike Schiffman, CISSP
http://www.packetfactory.net/schiffman.html
/707/sec_incident_response.shtml#Problems
Thank you,
- -Mike-
Hi there,
attached you may find the exploit for the Cisco IOS bug ID CSCdp58462. The bug
is long fixed, so if you still run OSPF on a old version of IOS, now is a good
time to give your routers some attention.
FX
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
RTS CryptoBuddy Multiple Encryption Implementation Vulnerabilities
__
Advisory Information
__
Mike Kristovich, PivX Security Advisory MK#001
Date:November 26, 2002
Released:January 16, 2002
Application: Battlefield 1942 (Server and Dedicated Server)
America's Army
the directory contents prior to updating from 2.80.
Mike
-Original Message-
From: David Howe [SMTP:[EMAIL PROTECTED]]
Sent: Thursday, December 19, 2002 9:49 AM
To: Email List: BugTraq
Subject: Re: Foundstone Research Labs Advisory - Multiple Exploitable
Buffer Overflows
From Webshots (confirmed):
-Original Message-
From: [EMAIL PROTECTED] [SMTP:[EMAIL PROTECTED]]
Sent: Wednesday, December 18, 2002 9:33 AM
To: Shutters, Mike
Subject:Re: Password Hole Found In Webshots [T200212130039]
Hello Mike,
Thank you for contacting Webshots
Hey guys,
A while back there was that directory traversal exploit for the Zeroo
webserver. (http://lonerunner.cfxweb.net)
Here is a proof of concept code, enjoy.
/*
* zeroo httpd remote directory traversal exploit
* proof of concept
* hehe, just a copy and paste from my other directory
be a
legacy item on the P550, which is discontinued and stuck at 4.3.5 version
software.
We'd ask others to check whether this (minor, but nevertheless real) issue
is present in newer revisions as well.
-Mike
--
Michael Scher | Director, Neohapsis Labs
[EMAIL PROTECTED
; )
-Mike
/td/doc/product/webscale/css/css_sca/sca_320/v320b20.htm#xtocid13
- -Mike-
Product : Cisco SCA 11000 Series Secure Content Accelerator
Product URL : http://www.cisco.com/warp/customer/cc/pd/cxsr/ps2083/
CVE : CAN-2002-0656
Software release: All current releases
, or to
truncate an existing file, as follows:
$ show process/privs
25-SEP-2002 10:47:35.02 User: MIKE Process ID:
013F
Node: VAX Process name:
_TNA21:_1
Authorized
===
Outlook S/MIME Vulnerability 09/02/02
Mike Benham [EMAIL PROTECTED]
http://www.thoughtcrime.org
===
Abstract
Outlook's S/MIME implementation is vulnerable
. It performs undetected
hijacking/sniffing of IE SSL sessions, even on a switched network.
It can be found at http://www.thoughtcrime.org/ie.html
Still no word from Microsoft.
- Mike
--
http://www.thoughtcrime.org
should be reported directly to [EMAIL PROTECTED]
or [EMAIL PROTECTED]. At the very least we can assist with the
verification of the vulnerability.
- -Mike-
-BEGIN PGP SIGNATURE-
Version: PGP 6.5.2
iQA/AwUBPVLsHZPS/wbyNnWcEQJ53gCfY9MIBnFXDk6yVbpMVMSv3oVr6FIAn0Dc
On Wed, 7 Aug 2002, Alex Loots wrote:
Hi Mike,
I visited your demo at https://www.thoughtcrime.org. It appears that Thawte is
the TTP instead of Verisign. Does this make any difference for example the
certificate extensions?
First of all, https://www.thoughtcrime.org is NOT the demo site
Hi,
I just read the article at News.com
(http://news.com.com/2100-1023-947325.html?tag=fd_top) about the
controversy between HP and Snosoft. It seems that HP is upset that
details of a dangerous security hole in the HP Tru64 operating system
were published by Phased, a security researcher
paper seems to be:
http://www.counterpane.com/yarrow.html.
Mike
via TFTP on the device and you desire
to use the workaround of adding an alias to the filename, you will have to
add an alias on each entry. Any tftp-server entry without an alias on a
device running an affected version of Cisco IOS would be sufficient to be
vulnerable to a device reset.
- -Mike
and learning to reduce flooding of
unicast packets.
- -Mike-
-BEGIN PGP SIGNATURE-
Version: PGP 6.5.2
iQEVAwUBPQ7TSg/VLJ+budTTAQEFwQf/bcgthaSiZUaiIotY5rX1OpNESjLntd3t
5NENyWstoIi3EfFbyaifAjFXlQz7wdRmbPk94UTgx54SVyOh9+gbdinZBMX6PUqI
rqkIEb/dGoVwS
for qpopper this file is not accessed.
You can use the -d parameter to view the debug output to verify this.
Mike
UNIX Systems Administrator at Wake Forest University.
==
J. Mike Rollins [EMAIL PROTECTED
Hi,
Just tested with CF 4.5 5.0 Enterprise on NT4 using Apache. It is not
vulnerable. You receive a 403 - Forbidden when you try to access
nul/con.cfm/dbm with no path disclosure.
Sincerely,
Mike Fetherston.
Problem:
Requests for certain DOS-devices are parsed by the isapi
On 3 Apr 2002, Tekno pHReak wrote:
[...]
Their exist a flaw within the talkd which allows anyone masquerade as
anyone else either remotely or within the confines of the system. This
is due to the lack of user validation by the talkd for incoming
talk requests. This may be a catalyist for
higher-end
Cisco's (i.e. 7500's)
- Original Message -
From: Mike Lewinski [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Thursday, July 19, 2001 1:00 PM
Subject: Code Red - Router Memory depletion?
We've seen two routers experiencing problems this AM that appear to be
related to client
? If that is the case, the number should be increasing
fast in the near future, right?
I'll come back with a report in a week or so.
m'name be mike brockman! jeeh!
_ooh,_und_dunt_feed_my_eskimoes_
-bit version which is not installed by default on 32-bit systems.
Mike
, and that you weren't just posting to be
clever at our expense.
Mike
(not on bugtraq, please cc: on replies)
the patch from the time I notified them. No notification (as far as
I know) ever went out to the customers. I do believe that a notice went to
this list regarding the fix, but that was all.
--Mike
3.00 and 3.01 only.
To fix this problem upgrade to 3.10.
Thank you for reporting this problem.
- Mike McEwen
mentioned recently (March 16) on BUGTRAQ.
Mike Gleason
NcFTP Software
http://www.NcFTP.com
(I apologize in advance if this message does not display correctly - I
disabled HTML mail format in Microsoft Outlook so hopefully there will
be no problems.)
smime.p7s
enjoyed a terrific security track record since
the initial release in 1997.
Mike Gleason
NcFTP Software
http://www.NcFTP.com
Only with Public Access non-NDPS printers as far as I have been able to
determine.
Mike
-Original Message-
From: Derek Wilson [SMTP:[EMAIL PROTECTED]]
Sent: 09 2001 18:49
To: [EMAIL PROTECTED]
Subject: Re: [BUGTRAQ] Vulnerability in Novell Netware
Tested the Exploit
It looks more like the application is GETTING data rather than sending it.
If you look at the page http://204.176.10.168/GCSE/Messages/todolist04.tag
In a regular browser, It's actually commented as to what it does.
It looks like it's some way for the application to import dynamic banners or
:
[kerouac:mg:~]m4 -G %x
m4: 80499d9: Datei oder Verzeichnis nicht gefunden
[kerouac:mg:~]cat /etc/redhat-release
Red Hat Linux release 7.0 (Guinness)
[kerouac:mg:~]rpm -q m4
m4-1.4.1-3
--
mike gerber
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Having tested it, it works on Win95 as well.
- -Original Message-
From: Zoa_Chien [EMAIL PROTECTED]
To: [EMAIL PROTECTED] [EMAIL PROTECTED]
Date: April 22, 2000 3:11 AM
Subject: Securax Security Advisory: Windows98 contains a serious
buffer
or not to address this,
but for now my response has been to make sure the box is not acessible
over the network and I hope others will do likewise.
--
Mike Ireton
Senior Systems Engineer
Bay Office Net - http://www.bayoffice.net
Voice (415) 643-8700"Where do you
Beta 15' from August of 1999.
I see Netgear has some newer model ISDN routers available. Is Netgear
even supporting these routers any more?
---
Mike Wade ([EMAIL PROTECTED])
Director of Systems Administration
CDC Internet, Inc.
With the re-occurrence of this unused TCP flags fiasco, I am getting off my
ass and releasing a tool to stress test IP stacks, firewall rulesets,
firewall resilience and IDS implementations.
ISIC - 0.05 (IP Stack Integrity Check)
Crafts random packets and launches them. Can fix or randomize
Vulnerable Apps/Platforms:
-So far, surfCONTROL SuperScout 2.6.1.6, Only version
tested, with rules blocking based on web site category.
Complete No Access rules still successfully block.
-Possibly all previous versions.
-This vulnerability voids the ability to block users based
on category.
1 - 100 of 117 matches
Mail list logo