|
Colapse all |
Post message
XSSing the Lan 3 (web trojans.. not a new idea) 2006-08-08 pdp (architect) (pdp gnucitizen googlemail com) Re: linksys WRT54g authentication bypass 2006-08-08 guant a (guant hackermail com) (1 replies) > I'm having some trouble believing this hasn't been reported before. If you > have a linksys router handy, please check to see whether it is vulnerable to > this attack. It's possible that all of the linksys router web UIs have the > same bug. Hopefully the problem is isolated to one particular [ more ] [ reply ] Bypassing script filters with variable-width encodings 2006-08-08 Cheng Peng Su (applesoup gmail com) Bypassing script filters with variable-width encodings Author: Cheng Peng Su (applesoup_at_gmail.com) Date: August 7, 2006 We've all known that the main problem of constructing XSS attacks is how to obfuscate malicious code. In the following paragraphs I will attempt to explain the concept of by [ more ] [ reply ] Re: [Full-disclosure] Attacking the local LAN via XSS 2006-08-07 Nikolay Kubarelov (admin gramophon com) On Friday 04 August 2006 16:06, pdp (architect) wrote: > IMHO, if you want to do stuff on lower level, you need to think of > something else. JavaScript, Flash and Java Applets are technologies > that are designed to run on the WEB. This is why, IMHO, they are quite > good platform for performing WE [ more ] [ reply ] Re: Re: Cisco VPN Concentrator IKE resource exhaustion DoS Advisory 2006-08-07 henry sieff gmail com Cisco recommends a workaround which essentially sets a limit on the number of outstanding SA's and drops new SA requests if they exceed that limit (outlined in http://www.cisco.com/en/US/products/sw/iosswrel/ps5207/products_feature_ guide09186a0080229125.html) It seems to me that this will not acc [ more ] [ reply ] RE: [Full-disclosure] RE: when will AV vendors fix this??? 2006-08-07 Thomas D. (whistl0r googlemail com) > -----Original Message----- > From: Dude VanWinkle > Sent: Monday, August 07, 2006 8:49 PM > > So I might be able hide something, but I can't do anything. > > Well, there would be an access denied message for most AV scanners > when it hit the file in question and couldnt even get a read. > As I [ more ] [ reply ] Dragonfly CMS 9.0.6.1 and prior XSS 2006-08-09 HeLiOsZ RooT (heliosz_time hotmail com) ## HeLiOsZ - Dark End Team - Internet Security Team ## Dragonfly CMS 9.0.6.1 and prior XSS ## IRC: darkend.sytes.net #darkend , http://darkend.sytes.net & http://www.darkend.org ## Rish : Medium ## Type : web applet ## Creator: http://www.cpgnuke.com/ ## Exploit: - The vuln is in the search sect [ more ] [ reply ] CGI Script Source Code Disclosure Vulnerability in Apache for Windows 2006-08-09 susam pal gmail com ADVISORY NAME: CGI Script Source Code Disclosure Vulnerability in Apache for Windows VULNERABLE SYSTEMS: The vulnerability has been verified on Apache 2.2.2 running on Microsoft Windows XP, Version 2002, Service Pack 2. FOUND BY: Susam Pal FOUND ON: 8th August, 2007 VULNERABILITY TYP [ more ] [ reply ] myBloggie <= 2.1.3 (mybloggie_root_path) Remote File Inclusion Vulnerability 2006-08-09 sh3ll sh3ll ir ------------------------------------------------------------------------ ----------------- myBloggie 2.1.3 mybloggie_root_path Remote File Inclusion ------------------------------------------------------------------------ ----------------- Author : Sh3ll Date : 2006/04/29 Location : Iran - [ more ] [ reply ] InfanView 3.98 (with plugins) - Access violation at processing images ANI files 2006-08-09 sehato yandex ru Example (in Delphi): ===============ani.dpr=============== program ani; {$APPTYPE CONSOLE} const FileName='file.ani'; Len=113; Buf=#$52#$49#$46#$46#$00#$00#$00#$00#$41#$43#$4F#$4E#$00#$00#$00#$00#$24 #$00+ #$00#$00#$24#$00#$00#$00#$00#$00#$00#$00#$00#$00#$00#$00#$00#$00#$00#$00 #$00+ [ more ] [ reply ] Netgear FVG318 is vunerable to DOS attack 2006-08-10 root localhost com The Netgear FVG318 (http://www.netgear.com/Products/VPNandSSL/WirelessVPNFirewallRouters/FV G318.aspx) is vunerable to a Denial of Service attack where a flood of bad checksum TCP packets will lock the router up, forcing a hard reset. This can be acheived with a program such as fragrouter or even [ more ] [ reply ] Mambo/Joomla Component Remository v3.25 (mosConfig_absolute_path) Remote File Inclusion Vulnerability 2006-08-10 camino sexmagnet com Mafia Moblog <= 6 (pathtotemplate) Remote File Inclusion Vulnerability 2006-08-10 sh3ll sh3ll ir ------------------------------------------------------------------------ ------------------- Mafia Moblog pathtotemplate Remote File Inclusion ------------------------------------------------------------------------ ------------------- Author : Sh3ll Date : 2006/04/30 HomePage : http://www. [ more ] [ reply ] [ GLSA 200608-18 ] Net::Server: Format string vulnerability 2006-08-10 Sune Kloppenborg Jeppesen (jaervosz gentoo org) |
|
Privacy Statement |
http://www.gnucitizen.org/blog/xssing-the-lan-3
In my previous posts I mentioned that in order to compromise LAN
device from the Internet the attacker needs to exploit XSS
vulnerability in the device firmware. The limitations of this kind of
attack are quite obvious.
[ more ] [ reply ]