Back to list
*Note: Email address will appear as "user domain ext" to prevent harvesting.
RE: Advisory 23/2005: vTiger multiple vulnerabilities
Nov 25 2005 09:38PM
Bug Traq Lists (bug traq mail gmail com)
As to #4, restricting access to vtigercrm*.log is not enough. You must
restrict access to vtigercrm*.log* or even *.log*, as vTiger rotates its
logs such as vtigercrm.log.1, etc...
> Since there is currently no fixed version available, you should
[ more ]
Copyright 2010, SecurityFocus