I think that any ability of the (l)users to expose executables as web
services threatens the security of the web server machine, irrespective of
programming language. (But I don't see how it threatens the internet --
they can already connect their own misconfigured machine to the net
On 21 Jun 2006 03:39:09 -, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:
Details:
Vulnerability can be exploited by using a large value in a href tag to create
an out-of-bounds memory access.
Proof Of Concept DoS exploit:
http://www.critical.lt/research/opera_die_happy.html
Interesting
Discovered By: CrAzY CrAcKeR
Site:www.alshmokh.com
I want to thank my friend:-
nono225-mHOn-rageh-Lover Hacker-Brh
BoNy_m-Rootshill-LiNuX_rOOt-Sw33t h4ck3r
Example:-
/newthread.php?boardid=[SQL]
Steven M. Christey [EMAIL PROTECTED] wrote:
* Advisories:
* http://www.microsoft.com/technet/security/advisory/921365.mspx
* http://www.securityfocus.com/bid/18422/
There are at least three separate Excel issues that were published in
the past week. These references suggest that it's the
Softbiz Dating 1.0
http://www.softbizscripts.com
-
-
SQL injection
-
http://target.xx/search_results.php?country=1[SQL]
http://target.xx/search_results.php?pg=2sort_by=1[SQL]
http://target.xx/featured_photos.php?browse=1[SQL]
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hello -
The Cisco PSIRT has posted a public response to a vulnerability made
public by a researcher on multiple public mailing lists.
This is the Cisco PSIRT response to the statements made by Darren
Bounds in his advisory: Cisco Secure ACS Weak