|
Colapse all |
Post message
Re: Integer overflow in OpenBSD kernel 2003-09-10 blexim (blexim hush com) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 I forgot to attach the programs to reproduce the condition in the previous post, they are attached to this mail. blexim -----BEGIN PGP SIGNATURE----- Note: This signature can be verified at https://www.hushtools.com/verify Charset: UTF8 Version: Hush 2 [ more ] [ reply ] Re: XSS vulnerability in phpBB (an other ;-) 2003-09-09 keupon_ps2 yahoo fr In-Reply-To: <20030909171006.23428.qmail (at) sf-www1-symnsj.securityfocus (dot) com [email concealed]> Excuse me, i've made a little error in my example. This will not work: [url=www.google.fr" onclick="alert('Hello')]text[/url] but this will work (on phbb 2.0.6): [url=http://www.google.fr" onclick="alert('Hello')]text[/u [ more ] [ reply ] Denial of Service Vulnerability in NFS XDR decoding Update 2003-09-09 SGI Security Coordinator (agent99 sgi com) RE: 11 years of inetd default insecurity? 2003-09-09 bjornar bjorgum larsen ementor no Dan Stromberg wrote: > So DJB's program basically has a large listen queue, and goes > into queue-only mode after 40 concurrent connections? tcpserver -c n ... where n is the number of simultaneous connections. Defaults to 40. > If that's the case, then there's still a DOS > - just fill the liste [ more ] [ reply ] Administrivia: [Important] Community Involvement in the Future of Bugtraq 2003-09-09 Dave Ahmad (da securityfocus com) Good day, We here at SecurityFocus value the community and would like to involve you, the Bugtraq subscribers, in its operation. As part of that effort, we are considering implementing a more democratic process for making important decisions on the future of Bugtraq and the Security Focus website [ more ] [ reply ] Re: XSS vulnerability in phpBB (an other ;-) 2003-09-09 John Smith (sgaesux Phreaker net) (1 replies) Hello, You xss didnt work to me, but this "variant" did: [url=http://www.izhal.com" onclick=alert("bug");"]test[/url] thanks for pointing the bug :) asphixia ---------- Hello, i've just found a new xss vulnerability in phpBB 2.0.6 (i'm not sure but i don't think that others versions are vulne [ more ] [ reply ] Re: XSS vulnerability in phpBB (an other ;-) 2003-09-09 omere hushmail com In-Reply-To: <19084321117.20030909100957 (at) mail (dot) ru [email concealed]> >Tuesday, September 9, 2003, 1:43:59 AM, you wrote: > >kyf> Hello, i've just found a new xss vulnerability in phpBB 2.0.6 (i'm not >kyf> sure but i don't think that others versions are vulnerable). >kyf> This vulnerability is located in the [u [ more ] [ reply ] RE: BAD NEWS: Microsoft Security Bulletin MS03-032 2003-09-08 Thor Larholm (thor pivx com) Updated antivirus will only catch specific instances of POC code, not any actual reallife exploitation which easily differ significantly in footprint and signature. It's been a constant nuisance the last few years that whenever you release any kind of POC the AV vendors will label it as a virus and [ more ] [ reply ] RE: Winamp 2.91 lets code execution through MIDI files 2003-09-08 Thor Larholm (thor pivx com) As was the case with Windows Media Player, when you install Winamp the registry settings for MIDI files are set to automatically open the file in the associated program. As such, this is also automatically exploitable through webpages and HTML mail. Regards Thor Larholm PivX Solutions, LLC - Seni [ more ] [ reply ] RE: Microsoft security update broken? 2003-09-08 Thor Larholm (thor pivx com) Windows 98 no longer receive any security updates, so the behavior of using WindowsUpdate under Windows 98 is undefined at best. http://msgs.securepoint.com/cgi-bin/get/bugtraq0309/70.html Regards Thor Larholm PivX Solutions, LLC - Senior Security Researcher -----Original Message----- From: Gu [ more ] [ reply ] Escapade Scripting Engine XSS Vulnerability and Path Disclosure 2003-09-09 Bahaa Naamneh (b_naamneh hotmail com) XSS vulnerability in phpBB (an other ;-) 2003-09-08 keupon_ps2 yahoo fr (1 replies) Hello, i've just found a new xss vulnerability in phpBB 2.0.6 (i'm not sure but i don't think that others versions are vulnerable). This vulnerability is located in the [url][/url] bbcode. You can insert javascript by doing a thing like that: [url=www.google.fr" onclick=alert('Hello')]text[/u [ more ] [ reply ] Re: Microsoft security update broken? 2003-09-08 Cody Hatch (cody hatch-house net) > The microsoft security update for MS03-023 downloaded via the windows update web site appears to be broken. Either the patch does not properly install or is not able to be detected by the web based update scan after install. > > Symptoms: running the update-scan at www.windowsupdate.com after [ more ] [ reply ] |
|
Privacy Statement |
Hello,
We have implemented an instant windows password cracker named RainbowCrack.
It is based on Philippe Oechslin's faster time-memory trade-off technique.
(http://lasecwww.epfl.ch/php_code/publications/search.php?ref=Oech03)
This tool is an specialized LanManager hash cracker. On an 666MH
[ more ] [ reply ]