Re: CVE-2016-5019: MyFaces Trinidad view state deserialization security vulnerability

2016-09-29 Thread Mike Kienenberger
. On Thu, Sep 29, 2016 at 11:50 AM, Mike Kienenberger <mkien...@gmail.com> wrote: > CVE-2016-5019 Apache MyFaces Trinidad information disclosure vulnerability > > Severity: Important > > Vendor: > The Apache Software Foundation > > Versions Affected: > Trinidad from 1.0.

RE: Cisco Security Advisory: Cisco Firepower Malware Block Bypass Vulnerability

2016-03-30 Thread Murray, Mike
unsubscribe -Original Message- From: nob...@cisco.com [mailto:nob...@cisco.com] On Behalf Of Cisco Systems Product Security Incident Response Team Sent: Wednesday, March 30, 2016 9:18 AM To: bugtraq@securityfocus.com Cc: ps...@cisco.com Subject: Cisco Security Advisory: Cisco Firepower

Expedia Product Security Advisory: Cruise Ship Centers Information Disclosure

2015-06-08 Thread Mike Sheward
acknowledge your contributions. The scope of this program is limited to Expedia-owned Web applications, including Hotels.com, Hotwire.com, Expedia CruiseShipCenters, Venere.com, Egencia.com, and VIA.com. Thank you, Mike Sheward Enterprise Information Security Director, Security Operations Center

Re: Reflected File Download in AOL Search Website

2015-02-16 Thread Mike Antcliffe
PoC confirmed to work with Safari 8.0.3 on OSx 10.10.2 Good find! On 16/02/2015 16:15, Ricardo Iramar dos Santos rira...@gmail.com wrote: Oren Hafif reported a new kind of attack called Reflected File Download (https://www.blackhat.com/eu-14/briefings.html#reflected-file-download-a-n

[CVE- Requested][Vembu Storegrid - Multiple Critical Vulnerabilities]

2014-08-05 Thread Mike Antcliffe
as something else. 2. Advisory information - - Public Release Date: 4/8/2014 - - Vendor notified: Yes 30/7/2014 - - CVE¹s: requested 1/8/2014 - - Last Revised: 4/7/2014 - - Researchers: Mike Antcliffe and Ed Tredgett - - Research Organisation: Logically Secure Ltd - - Research Organisation Website

Pro Chat Rooms v8.2.0 - Multiple Vulnerabilities

2014-08-05 Thread mike . manzotti
# Exploit Title: Pro Chat Rooms v8.2.0 - Multiple Vulnerabilities # Google Dork: intitle:Powered by Pro Chat Rooms # Date: 5 August 2014 # Exploit Author: Mike Manzotti @ Dionach Ltd # Vendor Homepage: http://prochatrooms.com # Software Link: http://prochatrooms.com/software.php # Version

Re: [Full-disclosure] Apache suEXEC privilege elevation / information disclosure

2013-08-13 Thread Mike Ely
off, go for a walk (down to the pub if that helps), and come back with a focus more on the technical question at hand rather than the emotional response that has been rising to the top. Thanks, Mike

Stored and Reflective XSS in Yaws-Wiki 1.88-1 (Erlang)

2011-04-04 Thread mike
Software: yaws-wiki version affected: 1.88-1 platform: Erlang homepage:http://yaws.hyber.org/ Researcher: Michael Brooks Original Advisory:https://sitewat.ch/en/Advisory/4 Install instructions for Ubuntu: sudo apt-get install yaws-wiki Edit:/etc/yaws/conf.d/yaws-wiki.conf #add this:

Re: Re: HTB22905: Path disclosure in Wordpress

2011-03-31 Thread mike
I agree, this is a configuration issue not an issue with Wordpress. Wordpress SHOULD NOT fix this issue because it will make it more difficult to write wordpress modules. All production systems should have this configuration: display_errors=off

Re: Vulnerabilities in some SCADA server softwares

2011-03-23 Thread Mike Hoskins
On 3/23/11 9:46 AM, J. Oquendo wrote: How about we reflect reality? We can't honestly do that, we all only have our perception. It's funny how we can get stuck in a trap of 0 and 1. My perception is we'll always disagree on disclosure technique, or at least nitpick some minor detail into

Re: Prestashop Cartium 1.3.3 Multiple Cross Site Scripting (XSS)

2011-03-03 Thread mike
This is fake for usre. I have tested prestashop before and I posted real xss that affected prestashop to bugtraq and it was filtered. Why wasn't this filtered

Majordomo2 - Directory Traversal (SMTP/HTTP)

2011-02-03 Thread mike
Original Advisory: https://sitewat.ch/en/Advisory/View/1 Credit: Michael Brooks (https://sitewat.ch) Vulnerability: Directory Traversal Software: Majordomo2 Identifier:CVE-2011-0049 Vendor: http://www.mj2.org/ Affected Build: 20110121 and prior Special thanks to Dave Miller, Reed Loden

Pligg XSS and SQL Injection

2010-12-27 Thread mike
Credit: Michael Brooks Bug Fix in 1.1.2: http://www.pligg.com/blog/1174/pligg-cms-1-1-2-release/ Special thanks to Eric Heikkinen for patching these quickly. Blind SQL Injection http://host/pligg_1.1.2/search.php?adv=1status= 'and+sleep(9)or+sleep(9)or+1%3D' search=onadvancesearch= Search

Re: Security-Assessment.com Advisory: Oracle JRE - java.net.URLConnection class - Same-of-Origin (SOP) Policy Bypass

2010-10-21 Thread Mike Duncan
this was a documented feature -- even if it was .5-ass'ed put together by the Java devs. snip / Thanks Roberto. Mike Duncan Dep. ISSO, Application Security Specialist National Climatic Data Center, NOAA -BEGIN PGP SIGNATURE- Version: GnuPG v2.0.15 (GNU/Linux) Comment: Using GnuPG

Re: Security-Assessment.com Advisory: Oracle JRE - java.net.URLConnection class - Same-of-Origin (SOP) Policy Bypass

2010-10-20 Thread Mike Duncan
is not exactly an unused class in Java. It is everywhere and used in a lot of applications. Good luck. Mike Duncan Dep. ISSO, Application Security Specialist National Climatic Data Center, NOAA -BEGIN PGP SIGNATURE- Version: GnuPG v2.0.15 (GNU/Linux) Comment: Using GnuPG with Mozilla - http

Re: 2Wire Broadband Router Session Hijacking Vulnerability

2010-08-24 Thread Mike Duncan
. This should show the firmware/router manufactures the need for more real world testing before deployment as well as allowing for patching via the ISP or at least allow the user to update the firmware easily. Thanks for all the hard work, YGN Ethical Hacker Group. Good job and keep it up. Mike Duncan

phpvidz Administrative Password Disclosure

2010-05-17 Thread mike
Original Advisory:http://blog.sitewat.ch/2010/05/phpvidz-administrative-password.html Affecting: phpvidz 0.9.5 Vulnerability: Administrative Password Disclosure Vendor's Homepage: http://sourceforge.net/projects/phpvidz/ Date: May 15th 2010 Researcher: Michael Brooks phpvidz does not use a

Re: Firefox 3.6 for Windows includes a forged CA cert

2010-03-23 Thread Mike Duncan
:46:b1:75:c8:ec: 1d:8f:1e:7a:94:f1:aa:53:78:a2:45:ae:54:ea:d1:9e:74:c8: 76:67 Mike Duncan ISSO, Application Security Specialist Government Contractor with STG, Inc. NOAA :: National Climatic Data Center On 03/19/2010 04:22 PM, Francis Litterio wrote: In Firefox 3.6 for Windows

Re: [DSECRG-09-022] Adobe Coldfusion 8 Multiple Linked XSS Vulnerabilies

2009-08-18 Thread Mike Duncan
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 You mention the issues had been resolved and provide a link, but the link seems dead now. Could you please update with a proper reference to Adobe if possible with information on how these issues were resolved. Thanks. Mike Duncan ISSO, Application

Re: Insufficient Authentication vulnerability in Asus notebook

2009-05-14 Thread Mike Vasquez
Once someone has physical access all bets are off, there's a lot the can do. 1) steal it 2) boot off cd and reset/enable admin acct 3) boot off cd and grab all hashes 4) pour a perfectly good frappucino on the keyboard 5) cover it with smiley face stickers You get the idea. This is non

RE: Insufficient Authentication vulnerability in Asus notebook

2009-05-14 Thread Mike Wilson
blood coming in all the time and issues like this being brought back up are good to ensure that something as simple as this is not missed because it is assumed that we all know it. Thanks, _ Mike Wilson -Original Message- From: Bob Fiero [mailto:i...@mentalfloss.net

RE: Insufficient Authentication vulnerability in Asus notebook

2009-05-14 Thread Mike Wilson
, _ Mike Wilson -Original Message- From: Susan Bradley [mailto:sbrad...@pacbell.net] Sent: Thursday, May 14, 2009 2:39 PM To: my.security.li...@gmail.com Cc: MustLive; bugtraq@securityfocus.com Subject: Re: Insufficient Authentication vulnerability in Asus notebook We're talking XP Home here

Re: Denial of Service using Partial GET Request in Mozilla Firefox 3.06

2009-02-13 Thread Mike Duncan
to crash. A more stable platform should be used (such as Silverlight) You can choose a different player within the preferences of Firefox. What is the problem again? - -- Mike Duncan ISSO, Application Security Specialist Government Contractor with STG, Inc. NOAA :: National Climatic Data Center

FireGPG Passphrase And Cleartext Vulnerability

2008-10-20 Thread Mike Benham
Vulnerability Affecting FireGPG Passphrase and Cleartext Recovery 10/20/2008 Abstract FireGPG is a Firefox extension that provides a front-end to GPG, allowing webmail users to conveniently exchange GPG messages from

Re: MS Internet Explorer 7 Denial Of Service Exploit

2008-10-02 Thread Pruett, Mike
v5.0.0.176 Internet Explorer 7 on Vista 32-bit (no CSA) Thanks, Mike Pruett -Original Message- From: Jan van Niekerk [mailto:[EMAIL PROTECTED] Sent: Monday, September 29, 2008 10:37 PM To: [EMAIL PROTECTED] Cc: bugtraq@securityfocus.com Subject: Re: MS Internet Explorer 7 Denial

Re: Chrome(0.2.149.27) title(not the tag) Denial of Service(Freeze) exploit

2008-09-09 Thread Mike Duncan
the results or are we going on the assumption that is a very large number? Mike Duncan ISSO, Application Security Specialist Government Contractor with STG, Inc. NOAA :: National Climatic Data Center [EMAIL PROTECTED] Rotem Kerner wrote: | this successfully freezed my chrome on both Vista XP

Re: TimeTrex Time and Attendance Cookie Theft

2008-08-23 Thread Mike
://site.com/interface/Login.php?user_name=XSS Google Dork: TimeTrex Time and Attendance - Secure Login Reference: http://www.hackerscenter.com/index.php?/HSC-Research-Group/Advisories/HSC-TimeTrex-Time-and-Attendance-Cookie-Theft.html -- Mike ([EMAIL PROTECTED])

SYM08-015_SFW_SecurityUpdateBypass

2008-08-14 Thread Mike Prosser
The attached is a signed version of the security advisory for Symantec Storage Foundation for Windows 5.x that was released today. If we can get the signature to verify, please post to bugtraq Regards SYM08-015_ SFW_SecurityUpdateBypass.txt

RE: Internet explorer 7.0 spoofing

2008-04-02 Thread Mike Diaz
He's basically saying that if you create a popup small enough width-wise, then you can hide everything before the # so that unless the user actually goes into the address bar and scrolls left, all they will see is what you put after the #. Here's a screenshot so you can see what he's talking

Re: Smf 1.1.4 Remote File Inclusion Vulnerabilities

2008-03-28 Thread Mike Duncan
]) - -- Mike Duncan ISSO, Application Security Specialist Government Contractor with STG, Inc. NOAA :: National Climatic Data Center 151 Patton Ave. Asheville, NC 28801-5001 [EMAIL PROTECTED] 828.271.4289 -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.6 (GNU/Linux) Comment: Using GnuPG with Mozilla

Active Gmail Sidejacking - https is NOT ENOUGH

2007-08-06 Thread Mike Perry
' cookie. After this, close your gmail tab, and then visit http://mail.google.com. You will still be authenticated. -- Mike Perry Mad Computer Scientist fscked.org evil labs pgpxh2XwlYPq7.pgp Description: PGP signature

Re: Internet Explorer Crash

2007-04-18 Thread Mike Ely
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Nope. Ran this one against Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.8.1.2) Gecko/20061023 SUSE/2.0.0.2-1.1 Firefox/2.0.0.2, and it didn't even flinch. No OOM-killing here. On the other hand, Konqueror 3.5.5 release 45.4 churned swap madly for

Re: Re: [Full-disclosure] Microsoft Windows XP/2003/Vista memory corruption 0day

2006-12-22 Thread Mike
Well, Just a warning b4 running the proof of concept... Make sure to close and save useful stuff. It indeed works on xp sp2 and it will reboot your machiene. I have to say, This would be trick to exploit another programs messagebox, and wha joy could you possibly get out of restarting someone

Call for papers and presenters - Dec. 15th deadline

2006-12-14 Thread Mike Allgeier
The program committee welcomes original contributions not previously presented at any other conference or workshop on the following topics: 1. Compliance / Audit 2. Physical Security 3. Infrastructure 4. Information Security 5. Forensics 6. SCADA

SYM06-023, Symantec NetBackup PureDisk: PHP update to Address Reported Security Vulnerability

2006-11-29 Thread Mike Prosser
SYM06-023 Nov 28, 2006 Symantec NetBackup PureDisk: PHP update to Address Reported Security Vulnerability Reference: http://www.securityfocus.com/bid/20879/ Revision History none Severity High (configuration dependent) Remote Yes Local No Authentication Required Yes (to network) Exploit

Flaw in Firefox 2.0 Final

2006-10-23 Thread mike
This flaw reported by Mozilla http://www.mozilla.org/security/announce/2006/mfsa2006-59.html is still unfixed in the latest Firefox 2.0 final. This exploit works in Firefox 2.0 Final: http://lcamtuf.coredump.cx/ffoxdie.html Jonathan Watt and Michal Zalewski independently reported timing

Advisory for Oneorzero helpdesk

2006-10-20 Thread Mike Klingler
Permanant Link : http://www.whitedust.net/speaks/3043/ - Advisory for OneOrZero Helpdesk - - OneOrZero Helpdesk - AFFECTED PRODUCTS = OneOrZero

Flaw in Firefox 2.0 RC2

2006-10-17 Thread Mike
http://lcamtuf.coredump.cx/ffoxdie.html this exploit still works with the latest Firefox 2.0 RC3

Re: Concurrency-related vulnerabilities in browsers - expect problems

2006-10-05 Thread Mike
http://lcamtuf.coredump.cx/ffoxdie.html this exploit still works with the latest Firefox 1.5.0.7 and Firefox 2.0 RC1

Re: Apple Remote Desktop root vulneravility

2006-09-22 Thread Mike Kuriger
this wrong. ~mike~ Yannick von Arx wrote: It seems so that the attacker needs a ARD enabled user plus vnc password to access the client. Then he can send an install command over Manage Send UNIX Command We're talking about ARD 3.0 so we've got the new feature to lock client's screen

SYM06-16 Symantec NetBackup PureDisk Remote Office Edition Elevation of Privilege

2006-08-16 Thread Mike Prosser
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Symantec Security Advisory SYM06-015 16 August 2006 Symantec NetBackup PureDisk: Non-Privileged User Authentication Bypass Elevation of Privilege Revision History None Severity Medium (highly dependent on network configuration) Remote

Lan-Aces Office Logic

2006-07-28 Thread Mike
Does anyone use this email client? I have to say It would be in your best intrest to turn off html messages until I speak with tech support at Lan-Aces. If they do not respond within 24 hours I will post a huge security bypass exploit that works for all html scripting blocking mechanisim. With

Re: New PowerPoint Trojan installs itself as LSP

2006-07-22 Thread Mike Healan
as an LSP. Regards, Mike Healan www.spywareinfo.com Juha-Matti Laurio wrote: It appears that there is a new type of PowerPoint 0-day Trojan spreading, more details at this write-up: http://www.symantec.com/enterprise/security_response/writeup.jsp?docid=2 006-071812-3213-99 What the technical

Re: Msie 7.0 beta Crash

2006-07-01 Thread mike
Nothing happens on IE7 Beta3. No crash

Re: Sun single-CPU DOS

2006-05-26 Thread Mike O'Connor
:Sun says it is jabber, which is why I put it quotes. Since they have not :replicated in lab, they are jumping to conclusions. Yes, I agree, :it is very specific and the backline engineer usage appears 'stretching things' Most Sun adapters have an actual jabber counter that netstat -k will spew

Re: Sun single-CPU DOS

2006-05-24 Thread Mike O'Connor
Doug, : :ping another device with interpacket delay of 0 and a count ... : Define what you mean by interpacket delay. Are you referring to an ... :cisco router. extending ping. 0 delay. :I was speaking of cisco ping. :I should have said 'timeout'. mea culpa. A between your using the

Re: Sun single-CPU DOS

2006-05-22 Thread Mike O'Connor
:single CPU Sun microsystems system running solaris7, 8, or 9 :(haven't tested on 10). E.g. netra. : :if you telnet to a local router, disable nagle (on purpose :or by accident or whatever - if nagle is turned off), and then TCP_NODELAY by any other name, I assume. :ping another device with

RE: Invision Vulnerabilities, including remote code execution

2006-04-29 Thread Mike Weller
might be subject to similar issues. - Steve Mike

Re: Strengthen OpenSSH security?

2006-04-20 Thread Mike Hoskins
. --Mike

Re: recursive DNS servers DDoS as a growing DDoS problem

2006-03-30 Thread mike davis
If you have a 20,000 bot botnet and each bot has 2 defined recursive dns servers that it is allowed to use and these bots are on the local subnet (ie BCP38 is implimented at the gateway but not at every router) then how exactly is locking down recursive servers so you can only use yours going

Re: Evil side of Firefox extensions

2006-03-01 Thread Mike Owen
deserve the consequences. Mike

gnome evolution mail client inline text file DoS issue

2006-01-30 Thread Mike Davis
i admit, i posted this bug just a short while ago, but since its an anoyance more then a vuln.. i dont really care.. be glad i didnt demo it here :) (for evolution users anyway) so the issue is with text based file attachments with the Content-Disposition set to inline.. if this text file

Re: WMF vulnerability was a deliberate backdoor?

2006-01-16 Thread Mike Ely
a comment like /* The following code is here at the behest of No Such Agency. Do not remove from future versions. */ I might start to consider the possibility of some dark conspiricy. As it stands, it just looks to me like Yet Another Dumb Screwup by Microsoft (YADSM). Cheers, Mike Ely

Re: Countering Trusting Trust through Diverse Double-Compiling

2005-12-15 Thread Mike Lisanke
you. Best regards, -- Mike

Re: - Cisco IOS HTTP Server code injection/execution vulnerability-

2005-12-02 Thread Mike Caudill
- -Mike- - -- - -- | |||| | Mike Caudill [EMAIL PROTECTED] | | |||| | PSIRT Incident Manager | | | DSS PGP: 0xEBBD5271

GameSpy Arcade Arbitrary File Writing Vulnerability

2003-07-30 Thread Mike Kristovich
:July 31, 2003 Risk:Critical; Allows writing of a file to any location on the victim's system. Author: Mike Kristovich, Security Researcher ThreeZee Technology, Inc. http://www.ThreeZee.com

Tomcat Dangerous Documentation/Tomcat Default Plaintext Password Storage

2003-07-09 Thread Mike Bommarito
From the Realm HOW-TO on the Tomcat 4.0/4.1 documentation pages: For each of the standard Realm implementations, the user's password (by default) is stored in clear text. In many environments, this is undesireable because casual observers of the authentication data can collect enough

OpenSSH remote clent address restriction circumvention

2003-06-06 Thread Mike Harding
Welkyn Security Advisory SA-2003060400 Synopsis: SSH from= and [EMAIL PROTECTED] restrictions spoofable via reverse DNS for numerically specified IP addresses. Issue Date: June 4, 2003 Software Affected: OpenSSH 3.6.1 and earlier Vendor notified: May 24, 2003. Vendor response: See

Re: b2 cafelog 0.6.1 remote command execution.

2003-06-02 Thread mike little
purposes you would have to have enough access to edit b2config.php. Mike

PivX Advisory MK002A Intuit TurboTax Information Disclosure Vulnerability

2003-03-13 Thread Mike Kristovich
Mike Kristovich, PivX Security Advisory MK#002A Date:January 10, 2003 Application: Intuit TurboTax Version: All versions up to current. Bug: Information in saved Tax Returns discloses Social Security

Re: [Summary of Responses] Bound by Tradition: A sampling of the security posture of the Internet's DNS servers

2003-03-12 Thread Mike Bell
On Tue, Mar 11, 2003 at 08:30:17AM -0800, Mike Schiffman wrote: 12) It is a bit misleading to say djbdns has no security vulnerabilities. While it is true that the component programs that make up djbdns have not had a known vulnerability, the design of djbdns relies on external services

[Summary of Responses] Bound by Tradition: A sampling of the security posture of the Internet's DNS servers

2003-03-11 Thread Mike Schiffman
in lines of code for 8.2 was a result of integration of code from external parties (Intel, Checkpoint, and NAI to name three). Clearly, given the number of lines of code doubled, the maturity of the code base was reset. -- Mike Schiffman, CISSP http://www.packetfactory.net/schiffman.html

[New Research Paper] Bound by Tradition: A sampling of the security posture of the Internet's DNS servers

2003-03-06 Thread Mike Schiffman
/DNS/ Comments are welcomed; off-list is preferable and I will post a summary. Thanks. -- Mike Schiffman, CISSP http://www.packetfactory.net/schiffman.html

Re: Cisco IOS OSPF exploit

2003-02-21 Thread Mike Caudill
/707/sec_incident_response.shtml#Problems Thank you, - -Mike- Hi there, attached you may find the exploit for the Cisco IOS bug ID CSCdp58462. The bug is long fixed, so if you still run OSPF on a old version of IOS, now is a good time to give your routers some attention. FX

RTS CryptoBuddy Multiple Encryption Implementation Vulnerabilities

2003-02-10 Thread Mike
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 RTS CryptoBuddy Multiple Encryption Implementation Vulnerabilities __ Advisory Information __

PivX Multi-Vendor Game Server dDoS Advisory

2003-01-21 Thread Mike Kristovich
Mike Kristovich, PivX Security Advisory MK#001 Date:November 26, 2002 Released:January 16, 2002 Application: Battlefield 1942 (Server and Dedicated Server) America's Army

RE: Foundstone Research Labs Advisory - Multiple Exploitable Buffer Overflows in Winamp (fwd)

2002-12-20 Thread Shutters, Mike
the directory contents prior to updating from 2.80. Mike -Original Message- From: David Howe [SMTP:[EMAIL PROTECTED]] Sent: Thursday, December 19, 2002 9:49 AM To: Email List: BugTraq Subject: Re: Foundstone Research Labs Advisory - Multiple Exploitable Buffer Overflows

RE: Password Hole Found In Webshots - (Webshots Confirmed)

2002-12-19 Thread Shutters, Mike
From Webshots (confirmed): -Original Message- From: [EMAIL PROTECTED] [SMTP:[EMAIL PROTECTED]] Sent: Wednesday, December 18, 2002 9:33 AM To: Shutters, Mike Subject:Re: Password Hole Found In Webshots [T200212130039] Hello Mike, Thank you for contacting Webshots

Zeroo Webserver remote directory traversal exploit

2002-12-03 Thread Mike Cramp
Hey guys, A while back there was that directory traversal exploit for the Zeroo webserver. (http://lonerunner.cfxweb.net) Here is a proof of concept code, enjoy. /* * zeroo httpd remote directory traversal exploit * proof of concept * hehe, just a copy and paste from my other directory

Re: Undocumented account vulnerability in Avaya P550R/P580/P880/P882switches

2002-10-16 Thread Mike Scher
be a legacy item on the P550, which is discontinued and stuck at 4.3.5 version software. We'd ask others to check whether this (minor, but nevertheless real) issue is present in newer revisions as well. -Mike -- Michael Scher | Director, Neohapsis Labs [EMAIL PROTECTED

Re: Kill a Unisys Clearpath with nmap port scan

2002-10-05 Thread Mike Shaw
; ) -Mike

Re: Cisco Secure Content Accelerator vulnerable to SSL worm

2002-10-04 Thread Mike Caudill
/td/doc/product/webscale/css/css_sca/sca_320/v320b20.htm#xtocid13 - -Mike- Product : Cisco SCA 11000 Series Secure Content Accelerator Product URL : http://www.cisco.com/warp/customer/cc/pd/cxsr/ps2083/ CVE : CAN-2002-0656 Software release: All current releases

OpenVMS POP server local vulnerability

2002-09-25 Thread Mike Riley
, or to truncate an existing file, as follows: $ show process/privs 25-SEP-2002 10:47:35.02 User: MIKE Process ID: 013F Node: VAX Process name: _TNA21:_1 Authorized

Outlook S/MIME Vulnerability

2002-09-02 Thread Mike Benham
=== Outlook S/MIME Vulnerability 09/02/02 Mike Benham [EMAIL PROTECTED] http://www.thoughtcrime.org === Abstract Outlook's S/MIME implementation is vulnerable

IE SSL Exploit

2002-08-12 Thread Mike Benham
. It performs undetected hijacking/sniffing of IE SSL sessions, even on a switched network. It can be found at http://www.thoughtcrime.org/ie.html Still no word from Microsoft. - Mike -- http://www.thoughtcrime.org

Re: [VulnWatch] iDEFENSE Security Advisory: iSCSI Default Configuration File Settings

2002-08-09 Thread Mike Caudill
should be reported directly to [EMAIL PROTECTED] or [EMAIL PROTECTED]. At the very least we can assist with the verification of the vulnerability. - -Mike- -BEGIN PGP SIGNATURE- Version: PGP 6.5.2 iQA/AwUBPVLsHZPS/wbyNnWcEQJ53gCfY9MIBnFXDk6yVbpMVMSv3oVr6FIAn0Dc

Re: IE SSL Vulnerability

2002-08-09 Thread Mike Benham
On Wed, 7 Aug 2002, Alex Loots wrote: Hi Mike, I visited your demo at https://www.thoughtcrime.org. It appears that Thawte is the TTP instead of Verisign. Does this make any difference for example the certificate extensions? First of all, https://www.thoughtcrime.org is NOT the demo site

Re: It takes two to tango

2002-07-31 Thread Mike Forrester
Hi, I just read the article at News.com (http://news.com.com/2100-1023-947325.html?tag=fd_top) about the controversy between HP and Snosoft. It seems that HP is upset that details of a dangerous security hole in the HP Tru64 operating system were published by Phased, a security researcher

Re: VNC authentication weakness

2002-07-30 Thread Mike Porter
paper seems to be: http://www.counterpane.com/yarrow.html. Mike

Re: Phenoelit Advisory, 0815 ++ * - Cisco_tftp

2002-07-28 Thread Mike Caudill
via TFTP on the device and you desire to use the workaround of adding an alias to the filename, you will have to add an alias on each entry. Any tftp-server entry without an alias on a device running an affected version of Cisco IOS would be sufficient to be vulnerable to a device reset. - -Mike

Re: Catalyst 4000 - Cisco's Response

2002-06-18 Thread Mike Caudill
and learning to reduce flooding of unicast packets. - -Mike- -BEGIN PGP SIGNATURE- Version: PGP 6.5.2 iQEVAwUBPQ7TSg/VLJ+budTTAQEFwQf/bcgthaSiZUaiIotY5rX1OpNESjLntd3t 5NENyWstoIi3EfFbyaifAjFXlQz7wdRmbPk94UTgx54SVyOh9+gbdinZBMX6PUqI rqkIEb/dGoVwS

Re: QPopper 4.0.4 buffer overflow

2002-04-30 Thread J Mike Rollins
for qpopper this file is not accessed. You can use the -d parameter to view the debug output to verify this. Mike UNIX Systems Administrator at Wake Forest University. == J. Mike Rollins [EMAIL PROTECTED

Re: KPMG-2002013: Coldfusion Path Disclosure

2002-04-19 Thread Mike Fetherston
Hi, Just tested with CF 4.5 5.0 Enterprise on NT4 using Apache. It is not vulnerable. You receive a 403 - Forbidden when you try to access nul/con.cfm/dbm with no path disclosure. Sincerely, Mike Fetherston. Problem: Requests for certain DOS-devices are parsed by the isapi

Re: Multiple Vendor talkd user validation fault.

2002-04-05 Thread Mike Scher
On 3 Apr 2002, Tekno pHReak wrote: [...] Their exist a flaw within the talkd which allows anyone masquerade as anyone else either remotely or within the confines of the system. This is due to the lack of user validation by the talkd for incoming talk requests. This may be a catalyist for

Re: Two birds with one worm.

2001-07-19 Thread Mike Lewinski
higher-end Cisco's (i.e. 7500's) - Original Message - From: Mike Lewinski [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Thursday, July 19, 2001 1:00 PM Subject: Code Red - Router Memory depletion? We've seen two routers experiencing problems this AM that appear to be related to client

'Code Red' does not seem to be scanning for IIS

2001-07-19 Thread Mike Brockman
? If that is the case, the number should be increasing fast in the near future, right? I'll come back with a report in a week or so. m'name be mike brockman! jeeh! _ooh,_und_dunt_feed_my_eskimoes_

Re: Solaris whodo Vulnerability

2001-07-05 Thread Mike Gerdts
-bit version which is not installed by default on 32-bit systems. Mike

Re: Mozilla is excessively generous.

2001-06-29 Thread Mike Shaver
, and that you weren't just posting to be clever at our expense. Mike (not on bugtraq, please cc: on replies)

Re: SurfControl Internet Monitoring/Blocking

2001-06-25 Thread Mike Ciavarella
the patch from the time I notified them. No notification (as far as I know) ever went out to the customers. I do believe that a notice went to this list regarding the fix, but that was all. --Mike

Re: SCO Tarantella Remote file read via ttawebtop.cgi

2001-06-19 Thread Mike McEwen
3.00 and 3.01 only. To fix this problem upgrade to 3.10. Thank you for reporting this problem. - Mike McEwen

Re: [COVERT-2001-02] Globbing Vulnerabilities in Multiple FTP Daemons

2001-04-11 Thread Mike Gleason
mentioned recently (March 16) on BUGTRAQ. Mike Gleason NcFTP Software http://www.NcFTP.com (I apologize in advance if this message does not display correctly - I disabled HTML mail format in Microsoft Outlook so hopefully there will be no problems.) smime.p7s

Re: Multiple vendors FTP denial of service

2001-03-16 Thread Mike Gleason
enjoyed a terrific security track record since the initial release in 1997. Mike Gleason NcFTP Software http://www.NcFTP.com

Re: Vulnerability in Novell Netware

2001-03-12 Thread Mike Glassman - Admin
Only with Public Access non-NDPS printers as far as I have been able to determine. Mike -Original Message- From: Derek Wilson [SMTP:[EMAIL PROTECTED]] Sent: 09 2001 18:49 To: [EMAIL PROTECTED] Subject: Re: [BUGTRAQ] Vulnerability in Novell Netware Tested the Exploit

Re: trojaned Reality Fusion app

2001-03-05 Thread Mike Adams
It looks more like the application is GETTING data rather than sending it. If you look at the page http://204.176.10.168/GCSE/Messages/todolist04.tag In a regular browser, It's actually commented as to what it does. It looks like it's some way for the application to import dynamic banners or

m4 format string vulnerability [was: Re: SuSe / Debian man package ...]

2001-02-03 Thread Mike Gerber
: [kerouac:mg:~]m4 -G %x m4: 80499d9: Datei oder Verzeichnis nicht gefunden [kerouac:mg:~]cat /etc/redhat-release Red Hat Linux release 7.0 (Guinness) [kerouac:mg:~]rpm -q m4 m4-1.4.1-3 -- mike gerber

Re: Securax Security Advisory: Windows98 contains a serious buffer overflow with long filenameextensions.

2000-04-24 Thread Mike Murray
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Having tested it, it works on Win95 as well. - -Original Message- From: Zoa_Chien [EMAIL PROTECTED] To: [EMAIL PROTECTED] [EMAIL PROTECTED] Date: April 22, 2000 3:11 AM Subject: Securax Security Advisory: Windows98 contains a serious buffer

Adtran DoS

2000-04-19 Thread Mike Ireton
or not to address this, but for now my response has been to make sure the box is not acessible over the network and I hope others will do likewise. -- Mike Ireton Senior Systems Engineer Bay Office Net - http://www.bayoffice.net Voice (415) 643-8700"Where do you

Re: DoSing the Netgear ISDN RT34x router.

2000-02-27 Thread Mike Wade
Beta 15' from August of 1999. I see Netgear has some newer model ISDN routers available. Is Netgear even supporting these routers any more? --- Mike Wade ([EMAIL PROTECTED]) Director of Systems Administration CDC Internet, Inc.

Firewall and IP stack test tool

2000-02-23 Thread Mike Frantzen
With the re-occurrence of this unused TCP flags fiasco, I am getting off my ass and releasing a tool to stress test IP stacks, firewall rulesets, firewall resilience and IDS implementations. ISIC - 0.05 (IP Stack Integrity Check) Crafts random packets and launches them. Can fix or randomize

surfCONTROL SuperScout v2.6.1.6 flaw

2000-02-03 Thread Mike, C
Vulnerable Apps/Platforms: -So far, surfCONTROL SuperScout 2.6.1.6, Only version tested, with rules blocking based on web site category. Complete No Access rules still successfully block. -Possibly all previous versions. -This vulnerability voids the ability to block users based on category.

  1   2   >