info
discussion
exploit
solution
references
Comodo Firewall Flawed Component Control Cryptographic Hash Vulnerability
References:
Comodo Homepage
(Comodo)
Comodo DLL injection via weak hash function exploitation Vulnerability
(Matousec - Transparent security Research
)
Comodo DLL injection via weak hash function exploitation Vulnerability
(Matousec Transparent Security)
Privacy Statement
Copyright 2010, SecurityFocus