BugTraq Mode:
(Page 1081 of 1748)  < Prev  1076 1077 1078 1079 1080 1081 1082 1083 1084 1085 1086  Next >
XSSing the Lan 3 (web trojans.. not a new idea) 2006-08-08
pdp (architect) (pdp gnucitizen googlemail com)
i hope it is not getting boring
http://www.gnucitizen.org/blog/xssing-the-lan-3

In my previous posts I mentioned that in order to compromise LAN
device from the Internet the attacker needs to exploit XSS
vulnerability in the device firmware. The limitations of this kind of
attack are quite obvious.

[ more ]  [ reply ]
Re: linksys WRT54g authentication bypass 2006-08-08
guant a (guant hackermail com) (1 replies)
> I'm having some trouble believing this hasn't been reported before. If you
> have a linksys router handy, please check to see whether it is vulnerable to
> this attack. It's possible that all of the linksys router web UIs have the
> same bug. Hopefully the problem is isolated to one particular

[ more ]  [ reply ]
Re: linksys WRT54g authentication bypass 2006-08-08
Ginsu Rabbit (ginsurabbit hotmail com)
Bypassing script filters with variable-width encodings 2006-08-08
Cheng Peng Su (applesoup gmail com)
Bypassing script filters with variable-width encodings

Author: Cheng Peng Su (applesoup_at_gmail.com)
Date: August 7, 2006

We've all known that the main problem of constructing XSS attacks is
how to obfuscate malicious code. In the following paragraphs I will

attempt to explain the concept of by

[ more ]  [ reply ]
Re: [Full-disclosure] Attacking the local LAN via XSS 2006-08-07
Nikolay Kubarelov (admin gramophon com)
On Friday 04 August 2006 16:06, pdp (architect) wrote:
> IMHO, if you want to do stuff on lower level, you need to think of
> something else. JavaScript, Flash and Java Applets are technologies
> that are designed to run on the WEB. This is why, IMHO, they are quite
> good platform for performing WE

[ more ]  [ reply ]
Re: Re: Cisco VPN Concentrator IKE resource exhaustion DoS Advisory 2006-08-07
henry sieff gmail com
Cisco recommends a workaround which essentially sets a limit on the number of outstanding SA's and drops new SA requests if they exceed that limit (outlined in http://www.cisco.com/en/US/products/sw/iosswrel/ps5207/products_feature_
guide09186a0080229125.html)

It seems to me that this will not acc

[ more ]  [ reply ]
RE: [Full-disclosure] RE: when will AV vendors fix this??? 2006-08-07
Thomas D. (whistl0r googlemail com)
> -----Original Message-----
> From: Dude VanWinkle
> Sent: Monday, August 07, 2006 8:49 PM
> > So I might be able hide something, but I can't do anything.
>
> Well, there would be an access denied message for most AV scanners
> when it hit the file in question and couldnt even get a read.
>

As I

[ more ]  [ reply ]
Security Contact 2006-08-07
Sean Warnock (swarnock warnocksolutions com)
Does anyone know of the correct security contact for PayPal? I have
contacted them via their customer service/security contact and only
received the normal electronic response that they received my message.

Sean

[ more ]  [ reply ]
Dragonfly CMS 9.0.6.1 and prior XSS 2006-08-09
HeLiOsZ RooT (heliosz_time hotmail com)
## HeLiOsZ - Dark End Team - Internet Security Team
## Dragonfly CMS 9.0.6.1 and prior XSS

## IRC: darkend.sytes.net #darkend , http://darkend.sytes.net &
http://www.darkend.org
## Rish : Medium
## Type : web applet

## Creator: http://www.cpgnuke.com/

## Exploit:
- The vuln is in the search sect

[ more ]  [ reply ]
Simple one-file GuestBook 1.0 2006-08-09
omnipresent email it
.:. Simple one-file guestbook 1.0 .:.

Date:

-----

August 08, 2006

Vendor:

-------

http://www.xeroxer.com/index.php?page=3

Description:

------------

This is my simple one-file guestbook.

It's made of one .php file (the script) and one .txt file (the entrystorage file).

It uses

[ more ]  [ reply ]
CGI Script Source Code Disclosure Vulnerability in Apache for Windows 2006-08-09
susam pal gmail com
ADVISORY NAME:

CGI Script Source Code Disclosure Vulnerability in Apache for Windows

VULNERABLE SYSTEMS:

The vulnerability has been verified on Apache 2.2.2 running on Microsoft Windows XP, Version 2002, Service Pack 2.

FOUND BY:

Susam Pal

FOUND ON:

8th August, 2007

VULNERABILITY TYP

[ more ]  [ reply ]
XennoBB <= "avatar gallery" Directory Transversal 2006-08-09
c boulton mybboard com
--------------------- SUMMARY ---------------------

Name:

XennoBB "avatar gallery" directory transversal (10/8/2006)

Vendor / Product:

XennoBB Group

http://www.xennobb.com/

Description:

The world's most revolutionary and easy to use bulletin board.

Revo

[ more ]  [ reply ]
Virtual War v1.5.0 <= Sql Injection vuln. 2006-08-09
mfoxhacker gmail com
Vendor : www.vwar.de

Vuln. Ver. : 1.5.0 and lower

Dork : "Powered by : Virtual War v1.5.0"

intext:"www.vwar.de"

-------------------------------------------

Author : MFox

Homepage : Www.HackerZ.iR

Www.H4ckerZ.Com

Iran HackerZ Security Team

----------------------------------

[ more ]  [ reply ]
Compersus ASP shopping cart <= DataBase Downloading vuln. 2006-08-09
mfoxhacker gmail com
ComerSus ASP Shopping Cart

Vendor : Www.Compersus.Com

Credits : MFox

HomePage : Www.HackerZ.ir

Remote DataBase Getting !

Proof of Concept :

Http://[Target]/[Path]/database/comersus.mdb

[ more ]  [ reply ]
myBloggie <= 2.1.3 (mybloggie_root_path) Remote File Inclusion Vulnerability 2006-08-09
sh3ll sh3ll ir
------------------------------------------------------------------------
-----------------

myBloggie 2.1.3 mybloggie_root_path Remote File Inclusion

------------------------------------------------------------------------
-----------------

Author : Sh3ll

Date : 2006/04/29

Location : Iran -

[ more ]  [ reply ]
InfanView 3.98 (with plugins) - Access violation at processing images ANI files 2006-08-09
sehato yandex ru
Example (in Delphi):

===============ani.dpr===============

program ani;

{$APPTYPE CONSOLE}

const

FileName='file.ani';

Len=113;

Buf=#$52#$49#$46#$46#$00#$00#$00#$00#$41#$43#$4F#$4E#$00#$00#$00#$00#$24
#$00+

#$00#$00#$24#$00#$00#$00#$00#$00#$00#$00#$00#$00#$00#$00#$00#$00#$00#$00
#$00+

[ more ]  [ reply ]
Netgear FVG318 is vunerable to DOS attack 2006-08-10
root localhost com
The Netgear FVG318 (http://www.netgear.com/Products/VPNandSSL/WirelessVPNFirewallRouters/FV
G318.aspx) is vunerable to a Denial of Service attack where a flood of bad checksum TCP packets will lock the router up, forcing a hard reset.

This can be acheived with a program such as fragrouter or even

[ more ]  [ reply ]
Mambo/Joomla Component Remository v3.25 (mosConfig_absolute_path) Remote File Inclusion Vulnerability 2006-08-10
camino sexmagnet com


.:[ insecurity research team ]:.

.__..____.:.______.____.:.____ .

.:. | |/ \:/ ___// __ \:/ _\.:.

: | | | \\____\\ ___/\ /__ :. .

..: |__|___| /____ >\___ >\___ >.:

.:.. .. .\/ .:\/:. .\/. .:\/:

. ...:. .advisory. .:...

:...........

[ more ]  [ reply ]
Mafia Moblog <= 6 (pathtotemplate) Remote File Inclusion Vulnerability 2006-08-10
sh3ll sh3ll ir
------------------------------------------------------------------------
-------------------

Mafia Moblog pathtotemplate Remote File Inclusion

------------------------------------------------------------------------
-------------------

Author : Sh3ll

Date : 2006/04/30

HomePage : http://www.

[ more ]  [ reply ]
[ GLSA 200608-18 ] Net::Server: Format string vulnerability 2006-08-10
Sune Kloppenborg Jeppesen (jaervosz gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200608-18
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -

[ more ]  [ reply ]
(Page 1081 of 1748)  < Prev  1076 1077 1078 1079 1080 1081 1082 1083 1084 1085 1086  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus