BugTraq Mode:
(Page 422 of 1747)  < Prev  417 418 419 420 421 422 423 424 425 426 427  Next >
RE: [Full-disclosure] COM Server-Based Binary Planting ProofOfConcept 2011-06-02
Mitja Kolsek (mitja kolsek acros si)

Thor, the "Online Proof of Concept" section of the blog post points you to a *remote*
exploit (without any warning) but let me repeat the link here:

http://www.binaryplanting.com/demo/XP_2-click/test.html

Visit this with IE8 on 32-bit Windows XP.

Please find further information here:

http://blo

[ more ]  [ reply ]
RE: [Full-disclosure] COM Server-Based Binary Planting ProofOfConcept 2011-06-02
Mitja Kolsek (mitja kolsek acros si)

Thor, the "Online Proof of Concept" section of the blog post points you to a *remote*
exploit (without any warning) but let me repeat the link here:

http://www.binaryplanting.com/demo/XP_2-click/test.html

Visit this with IE8 on 32-bit Windows XP.

Please find further information here:

http://blo

[ more ]  [ reply ]
RE: [Full-disclosure] COM Server-Based Binary Planting ProofOfConcept 2011-06-02
Thor (Hammer of God) (thor hammerofgod com)
But it *is* worth mentioning that you have to create the malicious dll file, copy it to the system, create folders etc, and all the other mumbo jumbo to "exploit" this in the "default configuration." So, the answer to Dan's question is actually, "no, you can't." Which brings into question the act

[ more ]  [ reply ]
RE: [Full-disclosure] COM Server-Based Binary Planting Proof OfConcept 2011-06-02
ACROS Security Lists (lists acros si)
It would hardly be worth mentioning otherwise.

Cheers,
Mitja

> -----Original Message-----
> From: full-disclosure-bounces (at) lists.grok.org (dot) uk [email concealed]
> [mailto:full-disclosure-bounces (at) lists.grok.org (dot) uk [email concealed]] On Behalf
> Of Dan Kaminsky
> Sent: Thursday, June 02, 2011 5:36 PM
> To: security (at) acrossecurity (dot) com [email concealed]
>

[ more ]  [ reply ]
Re: [Full-disclosure] COM Server-Based Binary Planting Proof Of Concept 2011-06-02
Dan Kaminsky (dan doxpara com)
Does this run code without prompting, on a reasonably default configuration?

On Thu, Jun 2, 2011 at 7:52 AM, ACROS Security Lists <lists (at) acros (dot) si [email concealed]> wrote:
>
> We published a remote/local proof of concept for the COM Server-Based Binary Planting
> exploit presented at the Hack in the Box conference i

[ more ]  [ reply ]
COM Server-Based Binary Planting Proof Of Concept 2011-06-02
ACROS Security Lists (lists acros si)

We published a remote/local proof of concept for the COM Server-Based Binary Planting
exploit presented at the Hack in the Box conference in Amsterdam.

Feel free to try it out online if WebDAV works through your firewall, or download it
and test it in your local network or simply on your computer.

[ more ]  [ reply ]
[SECURITY] [DSA 2251-1] subversion security update 2011-06-02
Thijs Kinkhorst (thijs debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-2251-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Thijs Kinkhorst
June 02, 2011

[ more ]  [ reply ]
International PHP Conference - Call for Papers 2011-06-02
Carsten Eilers (ceilers-lists gmx de)
SEE ENGLISH VERSION BELOW

Auf der Zielgeraden zur IPC Spring möchten wir Euch schon jetzt
einladen, Eure Themen, Ideen, Vorschläge für die International PHP
Conference im Oktober einzureichen. Die International PHP Conference
findet vom 9. bis 12. Oktober 2011 in der Rheingoldhalle in Mainz statt
u

[ more ]  [ reply ]
Re: Ra-Guard evasion (new Internet-Drafts) 2011-06-01
Fernando Gont (fernando gont com ar)
Hi, Mark,

On 06/01/2011 07:57 AM, Marc Heuse wrote:
> this surprised me for two things.
>
> First: Cisco was not aware.

I mentioned this issue to at least one guy @ PSIRT.

Nevertheless, it has to tell what it takes for a vendor to be aware. I
have had some experience in the past in which I noti

[ more ]  [ reply ]
Cross-Site Scripting vulnerability in Nagios 2011-06-01
sschurtz t-online de
Advisory: Cross-Site Scripting vulnerability in Nagios
Advisory ID: SSCHADV2011-006
Author: Stefan Schurtz
Affected Software: Successfully tested on: nagios 3.2.3
Vendor URL: http://www.nagios.org
Vendor Status: informed
CVE-ID: -

=============

[ more ]  [ reply ]
Cisco Security Advisory: Multiple Vulnerabilities in Cisco AnyConnect Secure Mobility Client 2011-06-01
Cisco Systems Product Security Incident Response Team (psirt cisco com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Cisco Security Advisory: Multiple Vulnerabilities in Cisco AnyConnect
Secure Mobility Client

Advisory ID: cisco-sa-20110601-ac

Revision 1.0

For Public Release 2011 June 01 1600 UTC (GMT)
+------------------------------------------------------------

[ more ]  [ reply ]
Cisco Security Advisory: Default Credentials for root Account on the Cisco Media Experience Engine 5600 2011-06-01
Cisco Systems Product Security Incident Response Team (psirt cisco com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Cisco Security Advisory: Default Credentials for root Account on the
Cisco Media Experience Engine 5600

Advisory ID: cisco-sa-20110601-mxe

Revision 1.0

For Public Release 2011 June 01 1600 UTC (GMT)

+-----------------------------------------------

[ more ]  [ reply ]
Cross-Site Scripting vulnerability in Icinga 2011-06-01
sschurtz t-online de
Advisory: Cross-Site Scripting vulnerability in Icinga

Advisory ID: SSCHADV2011-005

Author: Stefan Schurtz

Affected Software: Successfully tested on: icinga-1.3.0 / icinga-1.4.0

Vendor URL: http://www.icinga.org

Vendor Status: Resolved

CVE-ID:

[ more ]  [ reply ]
Cisco Security Advisory: Multiple Vulnerabilities in Cisco Unified IP Phones 7900 Series 2011-06-01
Cisco Systems Product Security Incident Response Team (psirt cisco com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Cisco Security Advisory: Multiple Vulnerabilities in Cisco Unified IP
Phones 7900 Series

Advisory ID: cisco-sa-20110601-phone

Revision 1.0

For Public Release 2011 June 1 1600 UTC (GMT)

+-------------------------------------------------------------

[ more ]  [ reply ]
Cisco Security Advisory: Default Credentials Vulnerability in Cisco Network Registrar 2011-06-01
Cisco Systems Product Security Incident Response Team (psirt cisco com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Cisco Security Advisory: Default Credentials Vulnerability in Cisco
Network Registrar

Advisory ID: cisco-sa-20110601-cnr

Revision 1.0

For Public Release 2011 June 01 1600 UTC (GMT)

+-----------------------------------------------------------------

[ more ]  [ reply ]
[ MDVSA-2011:105 ] wireshark 2011-06-01
security mandriva com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2011:105
http://www.mandriva.com/security/
______________________________________________________________________

[ more ]  [ reply ]
[ MDVSA-2011:104 ] bind 2011-06-01
security mandriva com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2011:104
http://www.mandriva.com/security/
______________________________________________________________________

[ more ]  [ reply ]
HTB22997: XSS in A Really Simple Chat (ARSC) 2011-06-01
advisory htbridge ch
Vulnerability ID: HTB22997
Reference: http://www.htbridge.ch/advisory/xss_in_a_really_simple_chat_arsc.html
Product: A Really Simple Chat (ARSC)
Vendor: http://www.reallysimplechat.org/ ( http://www.reallysimplechat.org/ )
Vulnerable Version: 3.3-rc2
Vendor Notification: 12 May 2011
Vulnerability

[ more ]  [ reply ]
HTB22999: Multiple SQL Injections in A Really Simple Chat (ARSC) 2011-06-01
advisory htbridge ch
Vulnerability ID: HTB22999
Reference: http://www.htbridge.ch/advisory/multiple_sql_injections_in_a_really_simp
le_chat_arsc.html
Product: A Really Simple Chat (ARSC)
Vendor: http://www.reallysimplechat.org/ ( http://www.reallysimplechat.org/ )
Vulnerable Version: 3.3-rc2
Vendor Notification: 12 May

[ more ]  [ reply ]
Re: Ra-Guard evasion (new Internet-Drafts) 2011-06-01
Marc Heuse (mh mh-sec de)
Hi Fernando,

to quote from your drafts:

> As part of the project "Security Assessment of the Internet Protocol
> version 6 (IPv6)" [CPNI-IPv6], we devised a number of techniques for
> circumventing the RA-Guard protection, which are described in the
> following sections of this document. These te

[ more ]  [ reply ]
Post Revolution 0.8.0c Multiple Remote Vulnerabilities 2011-06-01
Javier Bassi (javierbassi gmail com)
info
???????????
Name : Post Revolution 0.8.0c Multiple Remote Vulnerabilities
Class: Design Error && Input Validation Error
CVE: CVE-2011-1952, CVE-2011-1953, CVE-2011-1954
Remote: Yes
Local: No
Credit : Javier Bassi <javierbassi [at] gmail [dot] com>
Vulnerable : All versions prior to and inclu

[ more ]  [ reply ]
CodeMeter WebAdmin Cross-site Scripting (XSS) Vulnerability 2011-05-31
robkraus solutionary com
Vulnerability title: CodeMeter WebAdmin Cross-site Scripting (XSS) Vulnerability

CVSS Risk Rating: 3.9 (Low)

Product: CodeMeter WebAdmin

Application Vendor: Wibu-Systems

Vendor URL: http://www.codemeter.de

Public disclosure date: 5/30/2011

Discovered by: Rob Kraus and the Solutiona

[ more ]  [ reply ]
[SECURITY] [DSA 2249-1] jabberd14 security update 2011-05-31
Nico Golde (nion debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-2249-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Nico Golde
March 31, 2011

[ more ]  [ reply ]
IPv6 RA-Guard evasion (and neighbor discovery monitoring) vulnerabilities 2011-05-31
Fernando Gont (fernando gont gmail com)
Folks,

I've just published two new IETF Internet-Drafts, that document the
problem of RA-Guard evasion, and propose mitigations.

They are two Internet-Drafts:

* "IPv6 Router Advertisement Guard (RA-Guard) Evasion", available at:
http://tools.ietf.org/id/draft-gont-v6ops-ra-guard-evasion-00.txt

*

[ more ]  [ reply ]
[SECURITY] [DSA 2250-1] citadel security update 2011-05-31
Nico Golde (nion debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-2250-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Nico Golde
March 31, 2011

[ more ]  [ reply ]
[SECURITY] [DSA 2248-1] ejabberd security update 2011-05-31
Nico Golde (nion debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-2248-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Nico Golde
March 31, 2011

[ more ]  [ reply ]
ZDI-11-169: IBM Tivoli Endpoint lcfd.exe opts Argument Remote Code Execution Vulnerability 2011-05-31
ZDI Disclosures (zdi-disclosures tippingpoint com)
ZDI-11-169: IBM Tivoli Endpoint lcfd.exe opts Argument Remote Code Execution Vulnerability

http://www.zerodayinitiative.com/advisories/ZDI-11-169

May 31, 2011

-- CVE ID:
CVE-2011-1220

-- CVSS:
10, (AV:N/AC:L/Au:N/C:C/I:C/A:C)

-- Affected Vendors:
IBM

-- Affected Products:
IBM Tivoli Endpoint

[ more ]  [ reply ]
[SECURITY] [DSA 2247-1] rails security update 2011-05-31
Thijs Kinkhorst (thijs debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-2247-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Thijs Kinkhorst
May 31, 2011

[ more ]  [ reply ]
Cross-Site Scripting vulnerability in Serendipity Plugin "serendipity_event_freetag" 2011-05-31
sschurtz t-online de
Advisory: Cross-Site Scripting vulnerability in Serendipity Plugin "serendipity_event_freetag"

Advisory ID: SSCHADV2011-004

Author: Stefan Schurtz

Affected Software: Successfully tested on: Serendipity 1.5.5 with serendipity_event_freetag - version 3.21

[ more ]  [ reply ]
Paranoia 2011: Call for papers 2011-05-30
paranoia watchcom no
Call for papers for Paranoia 2011, November 10th.

Link: http://paranoia.watchcom.no/index.php?page=40

Potential speakers are invited to submit topics and summary abstracts for the 6th annual PARANOIA conference in Oslo, Norway.

This one-day event attracts 600+ attendees and vendors providing opp

[ more ]  [ reply ]
(Page 422 of 1747)  < Prev  417 418 419 420 421 422 423 424 425 426 427  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus