|
Prev week |
Colapse all |
Post message
Re: vBulletin V3.6.8 XSS Password Md5 Hash 2007-08-17 scott-REMOVE vbulletin com I can't reproduce a single one of these, I've tested on our own internal boards as well as some random customer boards just to make sure. It looks like your trying to inject into the session hash entry but that always comes from the database. $this->vars['sessionurl'] = 's=' . $this->vars['dbsessi [ more ] [ reply ] Re: COSEINC Linux Advisory #1: Linux Kernel Parent Process Death Signal Vulnerability 2007-08-17 Glynn Clements (glynn gclements plus com) Dan Yefimov wrote: > > However, the bug in question allows sending signals which cannot be > > blocked or ignored (SIGKILL, SIGSTOP). Moreover, the cause (PDEATHSIG) > > cannot be disabled > > Really? An what if we fork right after startup and perform operations as a > child? That would work, b [ more ] [ reply ] Re: Re: COSEINC Linux Advisory #1: Linux Kernel Parent Process Death Signal Vulnerability 2007-08-16 x82_ bk ru Re: COSEINC Linux Advisory #1: Linux Kernel Parent Process Death Signal Vulnerability 2007-08-17 Dan Yefimov (dan ns15 lightwave net ru) On Fri, 17 Aug 2007, Glynn Clements wrote: > > Really? An what if we fork right after startup and perform operations as a > > child? > > That would work, but might have undesirable consequences of its own. > > In particular, it prevents a non-malicious caller from using PDEATHSIG > to send e.g. [ more ] [ reply ] Olate Download 3.4.1~environment.php.php~Code Execution 2007-08-17 imei Addmimistrator (addmimistrator gmail com) VISITE ORIGINAL ADVISORY FOR MORE DETAILES http://myimei.com/security/2007-08-17/olate-download-341-environmentphpp hp-code-execution.html VISITE ORIGINAL ADVISORY FOR MORE DETAILES â??â??â??â??â??â??-Summaryâ??â??â??â??â??- Software: Olate Download Sowtware's Web Site: http://www.olate.co.uk/ Versi [ more ] [ reply ] vBulletin V3.6.8 XSS Password Md5 Hash 2007-08-17 RaeD BsdMail Com #Discovred By : Hasadya Raed ---------------- #Contact : RaeD (at) BsdMail (dot) Cpm [email concealed] ---------------- #Script: vBulletin V3.6.8ulletin V3.6.8 ---------------- #Dork: vBulletin V3.6.8ulletin V3.6.8 ---------------- #Exploit : http://www.Victim.com/vBulletin V3.6.8ulletin V3.6.8/faq.php?s=&do=search&q=%22%3E%3C [ more ] [ reply ] Re: Guidance Software response to iSEC report on EnCase 2007-08-16 luke cleverley gmail com Guidance, in its response to ISEC report, stated on more than one occasion:- "Also, by corrupting the NTFS partitions, the perpetrator would likely render his file system dysfunctional, which calls into question both the likelihood and feasibility of such a tactic. Thus, the chances of this specific [ more ] [ reply ] Re: COSEINC Linux Advisory #1: Linux Kernel Parent Process Death Signal Vulnerability 2007-08-17 Dan Yefimov (dan ns15 lightwave net ru) On Thu, 16 Aug 2007, Glynn Clements wrote: > However, the bug in question allows sending signals which cannot be > blocked or ignored (SIGKILL, SIGSTOP). Moreover, the cause (PDEATHSIG) > cannot be disabled > Really? An what if we fork right after startup and perform operations as a child? > SIG [ more ] [ reply ] Release of Pass-The-Hash Toolkit for Windows v1.0 2007-08-15 Hernan Ochoa (hernan gmail com) Hi!, I'm releasing Pass-The-Hash Toolkit v1.0, you can find it here: http://oss.coresecurity.com/projects/pshtoolkit.htm. source code: http://oss.coresecurity.com/pshtoolkit/release/1.0/pshtoolkit_src_v1.0.t gz binaries: http://oss.coresecurity.com/pshtoolkit/release/1.0/pshtoolkit_v1.0.tgz For t [ more ] [ reply ] iDefense Security Advisory 08.16.07: IBM DB2 Universal Database Multiple Untrusted Search Path Vulnerabilities 2007-08-16 iDefense Labs (labs-no-reply idefense com) IBM DB2 Universal Database Multiple Untrusted Search Path Vulnerabilities iDefense Security Advisory 08.16.07 http://labs.idefense.com/intelligence/vulnerabilities/ Aug 16, 2007 I. BACKGROUND IBM Corp.'s DB2 Universal Database product is a large database server product commonly used for high end [ more ] [ reply ] iDefense Security Advisory 08.16.07: IBM DB2 Universal Database buildDasPaths Buffer Overflow Vulnerability 2007-08-16 iDefense Labs (labs-no-reply idefense com) IBM DB2 Universal Database buildDasPaths Buffer Overflow Vulnerability iDefense Security Advisory 08.16.07 http://labs.idefense.com/intelligence/vulnerabilities/ Aug 16, 2007 I. BACKGROUND IBM Corp.'s DB2 Universal Database product is a large database server product commonly used for high end dat [ more ] [ reply ] iDefense Security Advisory 08.16.07: IBM DB2 Universal Database Directory Traversal Vulnerability 2007-08-16 iDefense Labs (labs-no-reply idefense com) IBM DB2 Universal Database Directory Traversal Vulnerability iDefense Security Advisory 08.16.07 http://labs.idefense.com/intelligence/vulnerabilities/ Aug 16, 2007 I. BACKGROUND IBM Corp.'s DB2 Universal Database product is a large database server product commonly used for high end databases. Fo [ more ] [ reply ] [USN-499-1] Apache vulnerabilities 2007-08-17 Kees Cook (kees ubuntu com) =========================================================== Ubuntu Security Notice USN-499-1 August 16, 2007 apache2 vulnerabilities CVE-2006-5752, CVE-2007-1863, CVE-2007-3304 =========================================================== A security issue affects the following Ubuntu rele [ more ] [ reply ] Re: Re: Safari for windows remote arbitry file upload 2007-08-16 laurent gaffie gmail com "Firefox will do the same if it's configured that.Is this the default behavior with Safari?" yes it's a default setting . "I don't see that this is a bug. Could you explain a little more fully?" well configured like this by default,it's a security hole . it's a perfect hole for a virus, trojan, e [ more ] [ reply ] ToorCon 9 CFP 2007-08-17 David Hulton (0x31337 gmail com) Hey guys, Just thought I'd shoot this out to you all and let you know that we're doing our first round of speaker selection on Sunday the 19th. Otherwise, we'll be accepting submissions until September 9th. Thanks! -David --snip-- TOORCON 9 CFP Papers and presentations are being accepted for T [ more ] [ reply ] rPSA-2007-0164-1 kernel 2007-08-16 rPath Update Announcements (announce-noreply rpath com) rPath Security Advisory: 2007-0164-1 Published: 2007-08-16 Products: rPath Linux 1 Rating: Severe Exposure Level Classification: Local Root Deterministic Privilege Escalation Updated Versions: kernel=/conary.rpath.com@rpl:devel//1/2.6.22.3-0.1-1 References: http://cve.mitre.org/cgi-bin/ [ more ] [ reply ] [ GLSA 200708-10 ] MySQL: Denial of Service and information leakage 2007-08-16 Raphael Marichez (falco gentoo org) Local privilege escalation vulnerability in Cisco VPN client 2007-08-16 NGSSoftware Insight Security Research (nisr ngssoftware com) ======= Summary ======= Name: Permissively-ACLed cvpnd.exe allows interactive users to run arbitrary binaries with Local System Privileges Release Date: 16 August 2007 Reference: NGS00503 Discover: Dominic Beecher <dominic (at) ngssoftware (dot) com [email concealed]> Vendor: Cisco Vendor Reference: cisco-sa-20070815-vpnclient [ more ] [ reply ] [ GLSA 200708-12 ] Wireshark: Multiple vulnerabilities 2007-08-16 Raphael Marichez (falco gentoo org) Re: COSEINC Linux Advisory #1: Linux Kernel Parent Process Death Signal Vulnerability 2007-08-16 Glynn Clements (glynn gclements plus com) Dan Yefimov wrote: > > > The signal in question in the given situation is issued by PRIVILEGED process, > > > no matter how. > > > > And that's the bug, > > The case we consider is of course a bug. But generally privileged process > sending a signal to another privileged process is of course n [ more ] [ reply ] [ GLSA 200708-11 ] Lighttpd: Multiple vulnerabilities 2007-08-16 Raphael Marichez (falco gentoo org) Re: COSEINC Linux Advisory #1: Linux Kernel Parent Process Death Signal Vulnerability 2007-08-16 Glynn Clements (glynn gclements plus com) Dan Yefimov wrote: > > > If setuid program just > > > trusts the environment in that it doesn't properly handle or block signals > > > whose default action is terminating the process and doesn't perform it's > > > actions in a fail-safe manner, it is certainly broken. Setuid program must > > > [ more ] [ reply ] Re: Vulnerability in multiple "now playing" scripts for various IRC clients 2007-08-16 Wouter Coekaerts (wouter coekaerts be) On Wednesday 15 August 2007 18:27, v9 (at) fakehalo (dot) us [email concealed] wrote: > I may be rusty with knowledge about mirc (say almost 10 years out of > date)...but, in what situation would the pipe ('|') ever be processed from > a variable, even if it was read from a mp3 ID3? It gets processed before it ends up in an mi [ more ] [ reply ] TS-2007-003-0: BlueCat Networks Adonis CLI root privilege escalation 2007-08-16 anonymous.c7ffa4057a (anonymous c7ffa4057a anonymousspeech com) Template Security Security Advisory ----------------------------------- BlueCat Networks Adonis CLI root privilege escalation Date: 2007-08-16 Advisory ID: TS-2007-003-0 Vendor: BlueCat Networks, http://www.bluecatnetworks.com/ Revision: 0 Contents -------- Summary Software Version [ more ] [ reply ] Re: COSEINC Linux Advisory #1: Linux Kernel Parent Process Death Signal Vulnerability 2007-08-16 Dan Yefimov (dan ns15 lightwave net ru) On Thu, 16 Aug 2007, Glynn Clements wrote: > > The signal in question in the given situation is issued by PRIVILEGED process, > > no matter how. > > And that's the bug, The case we consider is of course a bug. But generally privileged process sending a signal to another privileged process is of [ more ] [ reply ] FLEA-2007-0046-1 cups 2007-08-16 Foresight Linux Essential Announcement Service (foresight-security-noreply foresightlinux org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Foresight Linux Essential Advisory: 2007-0046-1 Published: 2007-08-14 Rating: Major Updated Versions: cups=/conary.rpath.com@rpl:devel//foresight.rpath.org@fl:1-devel//1/1.2. 12-0.2-1 group-dist=/foresight.rpath.org@fl:1-devel//1/1.3.2-0.8-2 R [ more ] [ reply ] Another Oracle Forensics Paper... 2007-08-16 David Litchfield (davidl ngssoftware com) Hey all, For anyone that's interested I've just posted another paper entitled "Oracle Forensics Part 6: Examining Undo Segments, Flashback and the Oracle Recycle Bin". You can get this and other papers on Oracle forensics from http://www.databasesecurity.com/oracle-forensics.htm Cheers, David Lit [ more ] [ reply ] Olate Download 3.4.1 ~ admin.php ~ Admin authentication bypassing 2007-08-16 imei Addmimistrator (addmimistrator gmail com) VISIT ORIGINAL LINK FOR MORE DETAILES http://myimei.com/security/2007-08-16/olate-download-341adminphpauthenti cation-bypassing.html VISIT ORIGINAL LINK FOR MORE DETAILES oftware: Olate Download Sowtware's Web Site: http://www.olate.co.uk/ Versions: 3.4.1 Status: Unpatched Exploit: Available So [ more ] [ reply ] Re: Trackeur v.1 Remote File İnclude Bug 2007-08-16 the tiger100 gmail com sorry man but its not exploit u forgot something include("track_config.php"); and this code in the begining of ur file that contain the exploit and the config file have value for $header track_config.php //Design $header="c_header.php"; $footer="c_footer.php"; so it CAAAAAANT BE INCLUSION it al [ more ] [ reply ] |
|
Privacy Statement |
On SecurityLab.ru forum an exploit code was published by an anonymous user.
Reportedly it must have caused Skype massive disconnections today.
The PoC uses standard Skype client to call to a specific number. This call
causes denial of service of current Skype server and forces Skype
[ more ] [ reply ]