<?xml version="1.0" encoding="UTF-8"?><!-- generator="wordpress/MustLive Edition" -->
<rss version="2.0" 
	xmlns:content="http://purl.org/rss/1.0/modules/content/">
<channel>
	<title>Коментарі для запису: Добірка уразливостей</title>
	<link>http://websecurity.com.ua/992/</link>
	<description></description>
	<pubDate>Sat, 11 Apr 2026 09:19:28 +0000</pubDate>
	<generator>http://wordpress.org/?v=MustLive Edition</generator>

	<item>
		<title>від: MustLive</title>
		<link>http://websecurity.com.ua/992/#comment-30612</link>
		<pubDate>Sat, 02 Jun 2007 11:42:03 +0000</pubDate>
		<guid>http://websecurity.com.ua/992/#comment-30612</guid>
					<description>&lt;strong&gt;Claroline team&lt;/strong&gt;, also I want to tell you about your eLearning and eWorking platform.

Like a slightly look at your site some minutes ago, I found a vulnerability at your system (in Claroline 1.8.4). So you guys need to attend to security of yours web sites and web applications and to security-audit.

I will write about this hole in Claroline in my news (and inform you) somewhere after 3-4 months (as minimum). After I'll write about a lot of other holes in thousands of sites from all the Internet (which are in my list and I am working in chronological order).</description>
		<content:encoded><![CDATA[<p><strong>Claroline team</strong>, also I want to tell you about your eLearning and eWorking platform.</p>
<p>Like a slightly look at your site some minutes ago, I found a vulnerability at your system (in Claroline 1.8.4). So you guys need to attend to security of yours web sites and web applications and to security-audit.</p>
<p>I will write about this hole in Claroline in my news (and inform you) somewhere after 3-4 months (as minimum). After I&#8217;ll write about a lot of other holes in thousands of sites from all the Internet (which are in my list and I am working in chronological order).
</p>
]]></content:encoded>
				</item>
	<item>
		<title>від: MustLive</title>
		<link>http://websecurity.com.ua/992/#comment-30611</link>
		<pubDate>Sat, 02 Jun 2007 10:43:59 +0000</pubDate>
		<guid>http://websecurity.com.ua/992/#comment-30611</guid>
					<description>&lt;strong&gt;Claroline team&lt;/strong&gt;

Oh, really. I know that is a little old (published at source 18.09.2006), but it seems that it is much older vulnerability. So securitylab has a delay in their posts and I have a delay in my own posts and in result we have a hole patched more than 1 year ago in fresh post :-).

Thanks for informing guys.</description>
		<content:encoded><![CDATA[<p><strong>Claroline team</strong></p>
<p>Oh, really. I know that is a little old (published at source 18.09.2006), but it seems that it is much older vulnerability. So securitylab has a delay in their posts and I have a delay in my own posts and in result we have a hole patched more than 1 year ago in fresh post <img src='http://websecurity.com.ua/wp-includes/images/smilies/icon_smile.gif' alt=':-)' class='wp-smiley' /> .</p>
<p>Thanks for informing guys.
</p>
]]></content:encoded>
				</item>
	<item>
		<title>від: Claroline team</title>
		<link>http://websecurity.com.ua/992/#comment-30162</link>
		<pubDate>Fri, 01 Jun 2007 23:27:31 +0000</pubDate>
		<guid>http://websecurity.com.ua/992/#comment-30162</guid>
					<description># PHP remote file inclusion vulnerability in Claroline (деталі)
Ouch its a very old vulnerability , patched since more than 1 year :!:</description>
		<content:encoded><![CDATA[<p># PHP remote file inclusion vulnerability in Claroline (деталі)<br />
Ouch its a very old vulnerability , patched since more than 1 year  <img src='http://websecurity.com.ua/wp-includes/images/smilies/icon_exclaim.gif' alt=':!:' class='wp-smiley' />
</p>
]]></content:encoded>
				</item>
</channel>
</rss>
