|
Colapse all |
Post message
ARES 2007: Call for workshop proposals, deadline Sept 10, 2006 2006-08-03 Manh Tho (manhthovn gmail com) Dear colleague, As you may know, in conjunction with the "Second International Conference on Availability, Reliability and Security (AReS) - ARES 2007 conference, a number of workshops will be organised. It is my pleasure to invite you to submit workshop proposals. Workshop proposals should includ [ more ] [ reply ] TSRT-06-05: Computer Associates eTrust AntiVirus WebScan Automatic Update Code Execution Vulnerability 2006-08-07 TSRT 3Com com TSRT-06-05: Computer Associates eTrust AntiVirus WebScan Automatic Update Code Execution Vulnerability http://www.tippingpoint.com/security/advisories/TSRT-06-05.html August 7, 2006 -- CVE ID: CVE-2006-3976 CVE-2006-3977 -- Affected Vendor: Computer Associates -- Affected Products: e [ more ] [ reply ] TSRT-06-06: Computer Associates eTrust AntiVirus WebScan Manifest Processing Buffer Overflow Vulnerability 2006-08-07 TSRT 3com com TSRT-06-06: Computer Associates eTrust AntiVirus WebScan Manifest Processing Buffer Overflow Vulnerability http://www.tippingpoint.com/security/advisories/TSRT-06-06.html August 7, 2006 -- CVE ID: CVE-2006-3975 -- Affected Vendor: Computer Associates -- Affected Products: eTrust Anti [ more ] [ reply ] Re[2]: [Full-disclosure] Attacking the local LAN via XSS 2006-08-04 Thierry Zoller (Thierry Zoller lu) Dear pdp (architect), pa> BTW, there are quite a lot cisco devices that have http open on local pa> LAN vulnerable to IOS HTTP Authorization Vulnerability. That's my point, I have done an ehaustive amount of pentest, I have never come accross a router with accessible HTTP port. Maybe that's relate [ more ] [ reply ] Re: Re[2]: [Full-disclosure] Attacking the local LAN via XSS 2006-08-04 pdp (architect) (pdp gnucitizen googlemail com) I agree with you. Sometimes routers do not have http enabled although I believe that most administrators enable this service to perform easy/remote administration tasks. However, it is quite common to find http enabled devices. :) printers, wireless printers, cameras... you name it. Attacking these [ more ] [ reply ] simplog 0.9.3 and prior XSS 2006-08-06 piiiiiii pppiiiiiiii (heliosz_time hotmail com) ## HeLiOsZ - Dark End Team - Internet Security Team ## simplog 0.9.3 and prior XSS ## IRC: darkend.sytes.net #darkend , http://darkend.sytes.net & http://www.darkend.org ## Rish : Medium ## Type : web applet ## Creator: http://www.simplog.org/ ## Exploit: - The vuln is in the search section,it d [ more ] [ reply ] [ GLSA 200608-12 ] x11vnc: Authentication bypass in included LibVNCServer code 2006-08-07 Sune Kloppenborg Jeppesen (jaervosz gentoo org) [SECURITY] [DSA 1144-1] New chmlib packages fix denial of service 2006-08-07 Moritz Muehlenhoff (jmm debian org) linksys WRT54g authentication bypass 2006-08-05 Ginsu Rabbit (ginsurabbit hotmail com) (1 replies) I'm having some trouble believing this hasn't been reported before. If you have a linksys router handy, please check to see whether it is vulnerable to this attack. It's possible that all of the linksys router web UIs have the same bug. Hopefully the problem is isolated to one particular model [ more ] [ reply ] Re: Vanilla CMS <= 1.0.1 (RootDirectory) Remote file inclusion Vuln. 2006-08-05 dinoboff hotmail com From Mark O'Sullivan, on http://lussumo.com/community/: "Here is the code in question: $WorkingDirectory = str_replace('\\', '/', getcwd()).'/'; $RootDirectory = str_replace('setup/', '', $WorkingDirectory); // ... // Include the old settings file if it is present (it just contains consta [ more ] [ reply ] Will Microsoft patch remarkable old Msjet40.dll issue? 2006-08-04 Juha-Matti Laurio (juha-matti laurio netti fi) Microsoft informs about ten existing Windows flaws and two Office flaws at http://www.microsoft.com/technet/security/bulletin/advance.mspx Some of the upcoming security bulletins have Critical severity. Maybe it's time to release a fix to remarkable old Msjet40.dll issue reported by HexView as ear [ more ] [ reply ] [vuln.sg] Lhaz LHA Long Filename Buffer Overflow Vulnerability 2006-08-07 vulnpost-remove vuln sg [vuln.sg] Vulnerability Research Advisory Lhaz LHA Long Filename Buffer Overflow Vulnerability by Tan Chew Keong Release Date: 2006-08-06 Summary ------- Some vulnerabilities have been found in Lhaz. When exploited, the vulnerabilities allow execution of arbitrary code when the user extr [ more ] [ reply ] [ GLSA 200608-11 ] Webmin, Usermin: File Disclosure 2006-08-06 Sune Kloppenborg Jeppesen (jaervosz gentoo org) [ GLSA 200608-10 ] pike: SQL injection vulnerability 2006-08-06 Sune Kloppenborg Jeppesen (jaervosz gentoo org) Multiple vulnerabilities in DConnect Daemon 0.7.0 (CVS 30 Jul 2006) 2006-08-06 Luigi Auriemma (aluigi autistici org) IMENDIO PLANNER REMOTE FILENAME FORMAT STRING VULNERABILITY 2006-08-07 king_purba yahoo co uk By : LoneEagle E-mail : king_purba (at) yahoo.co (dot) uk [email concealed] http://kandangjamur.net Affected : IMENDIO PLANNER 0.13 PROJECT MANAGEMENT FEDORA 4. Impact : System Acces From : Remote Severity : Moderately Critical Description: ------------ Imendio planner was failed when opening file name format stri [ more ] [ reply ] php local buffer underflow could lead to arbitary code execution 2006-08-04 heintz hotmail com Affected versions: php 5.1.4 and older, 4.4.3 and possibly older Cause: when php-s sscanf functions format argument contains argument swap and extra arguments are given like. sscanf('foo ','$1s',$bar) then it reads an pointer to pointer to zval structure past the end of argument array [ more ] [ reply ] PHP: Zend_Hash_Del_Key_Or_Index Vulnerability 2006-08-06 Stefan Esser (sesser hardened-php net) Hello, word about this vulnerability is out for several weeks (or months). Because of this I spare you the advisory and only point you to my little article describing what exactly this vulnerability is, that I disclosed to the PHP project 6 months ago: The rating for this vulnerability should be: [ more ] [ reply ] blur6ex 0.3 Comment title HTML inyection vuln. 2006-08-06 piiiiiii pppiiiiiiii (heliosz_time hotmail com) ## HeLiOsZ - Dark End Team - Internet Security Team ## blur6ex 0.3 Comment title HTML inyection vuln. ## IRC: darkend.sytes.net #darkend , http://darkend.sytes.net & http://www.darkend.org ## Rish : Medium ## Type : web applet ## Creator: http://www.blursoft.com ## Exploit: - To exploit this vul [ more ] [ reply ] NEWSolved Lite v1.9.2 (abs_path) Remote File Inclusion 2006-08-06 philipp niedziela gmx de +-------------------------------------------------------------------- + + NEWSolved Lite v1.9.2 (abs_path) Remote File Inclusion + +-------------------------------------------------------------------- + + Affected Software .: NEWSolved Lite v1.9.2 (maybe above) + Venedor ...........: http://w [ more ] [ reply ] SolpotCrew Advisory #6 - phpCC - Beta 4.2 (base_dir) Remote File Inclusion 2006-08-06 chris_hasibuan yahoo com 0-day XP SP2 wmf exploit 2006-08-06 cyanid-E (biz4rre gmail com) Description: yet another 'windows meta file' (WMF) denial of service exploit. System affected: + Windows XP SP2, + Windows 2003 SP1, + Windows XP SP1, + Windows XP + Windows 2003 Tech info: page fault in gdi32!CreateBrushIndirect() because invalid pointer access. Incorrect (short) to (void*) s [ more ] [ reply ] |
|
Privacy Statement |
http://www.gnucitizen.org/blog/xssing-the-lan
I didn't go to BlackHat but since a lot of people are getting really
interested in XSS attacks, right now when it is sort of blooming, I
will try to put in theory how border routers/gateways can be trivially
compromised (over t
[ more ] [ reply ]