http://www.encyclopediadramatica.com/index.php/Younger_Woolwich_Boyz
be careful out there folks,
Jamie
-
Looking for earth-friendly autos?
Browse Top Cars by Green Rating at Yahoo! Autos' Green Center. ___
Author: Sebastian Bauer
Web: http://blog.gjl-network.net
Date: 01/12/07
Vuln. website: http://www.knorr.de
Vulnerability: SQL Injection (mainly login authentication bypass + any
other SQL inj.
possibility), XSS
Significance: Very Critical
Great i cannot wait!
On 2/28/07, Steven McGrath [EMAIL PROTECTED] wrote:
The March Chicago 2600 Meeting is near! The meeting will be Friday,
March 2nd at the Neighborhood Boys and Girls Club and will feature much
of the same usual fun that all of you have grown to expect!
[Presentation
On 3/2/07, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote:
Significance: Very Critical
For who, the sauce-people? Not for me.
All problems found have been discussed with Unilever, the mother
company of Knorr and
have been fixed before the release of this document.
Sooo, why should anyone
The point why I rated those problems as high risk was that due to this
problems free access to all user data was possible.
And problems that will offer any kind of user data (including
unencrypted passwords) is a significant security risk from my point of
view (see the latest problems
I was also going to query the way vulnerabilities are rated on a
personal level here...
Significance: Double Plus Ungood
It's always nice to see problems being solved instead of just
targeted, while maintaining disclosure though Sebastian.
Regards,
Joe.
On 02/03/07, Knud Erik Højgaard [EMAIL
Significance: Very Critical
I'm very pro-disclosure. I do see a point in disclosing flaws in software
or hardware we might use. I do see a point in reporting flaws in websites
we rely on (banks, online shops). Hey, there might even be a weak case for
shaming security vendors, IT companies, or
Attached is another exploit for the MailEnable Pro/Ent = 2.37 (including the
latest). The vulnerability is a bog-standard stack based overflow in the
call at offset 0x00417CD6 (MEIMAPS.exe, v2.37).
---
([EMAIL PROTECTED])
ZDI-07-008: Apache Tomcat JK Web Server Connector Long URL Stack
Overflow Vulnerability
http://www.zerodayinitiative.com/advisories/ZDI-07-008.html
March 2, 2007
-- CVE ID:
CVE-2007-0774
-- Affected Vendor:
Apache
-- Affected Products:
Tomcat JK Web Server Connector 1.2.19
Tomcat
Type: CSRF/XSS
| Status: 0day
+- -- - -
| Discovered by: Samenspender
| Released: 20070302
| SaMuschie Release Number: 5
+--- - -- -
CSRF/XSS Exploit:
cat EOF wetpussy.html
form name='evilform' method='POST'
action='http
Kaspersky AntiVirus UPX File Decompression DoS Vulnerability
iDefense Security Advisory 03.02.07
http://labs.idefense.com/intelligence/vulnerabilities/
Mar 02, 2007
I. BACKGROUND
Kaspersky Antivirus is a popular client and gateway virus scanner for Unix
and Windows. UPX, the ultimate packer for
###
Luigi Auriemma
Application: Netrek
http://www.netrek.org
Versions: = 2.12.0 (Vanilla server)
Platforms:*nix and Windows
Bug: format string
Exploitation: remote
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDKSA-2007:050-1
http://www.mandriva.com/security/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200703-04
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - -
14 matches
Mail list logo