[Full-disclosure] NSOADV-2010-001: Panda Security Local Privilege Escalation

2010-01-09 Thread NSO Research
_ Security Advisory NSOADV-2010-001 _ _ Title: Panda Security Local Privilege Escalation Severity: Medium Advisory ID:

[Full-disclosure] [CORELAN-10-001] Audiotran 1.4.1 buffer overflow

2010-01-09 Thread Security
|--| | __ __ | | _ / /___ _ / / _ ___ | | / ___/ __ \/ ___/ _ \/ / __ `/ __ \ / __/ _ \/ __ `/ __ `__ \ | | / /__/ /_/ / / /

[Full-disclosure] CCCCC

2010-01-09 Thread Kingcope
sha1sum.exe C df2e3c64366d2dc79f2fc6a06c6a2bfdd82218b0 *C ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

[Full-disclosure] Multiple D-Link Routers Vulnerable to Authentication Bypass

2010-01-09 Thread Full Disclosure
Multiple D­-Link routers suffer from insecure implementations of the Home Network Administration Protocol which allow un­authenticated and/or un­privileged users to view and configure administrative settings on the router. Further, the mere existence of HNAP allows attackers to completely bypass

[Full-disclosure] JunOS malformed TCP options vulnerability

2010-01-09 Thread Jeremy L. Gaddis
This works for me: $ cat junos-crash.pl #!/usr/bin/perl my $host = shift; my $port = shift; use Net::Packet qw($Env); use Net::Packet::IPv4; my $ip =Net::Packet::IPv4-new(dst = $host); use Net::Packet::TCP; my $tcp =