[Full-disclosure] G.R.I.D.S. virus being spread by the Younger Woolwich Boyz

2007-03-02 Thread Jaime Demetur
http://www.encyclopediadramatica.com/index.php/Younger_Woolwich_Boyz be careful out there folks, Jamie - Looking for earth-friendly autos? Browse Top Cars by Green Rating at Yahoo! Autos' Green Center. ___

[Full-disclosure] Knorr.de SQL Injection and XSS Vulnerabilities

2007-03-02 Thread sbauer
Author: Sebastian Bauer Web: http://blog.gjl-network.net Date: 01/12/07 Vuln. website: http://www.knorr.de Vulnerability: SQL Injection (mainly login authentication bypass + any other SQL inj. possibility), XSS Significance: Very Critical

Re: [Full-disclosure] March 2nd Chicago 2600/DefCon 312 Meeting Information

2007-03-02 Thread James Matthews
Great i cannot wait! On 2/28/07, Steven McGrath [EMAIL PROTECTED] wrote: The March Chicago 2600 Meeting is near! The meeting will be Friday, March 2nd at the Neighborhood Boys and Girls Club and will feature much of the same usual fun that all of you have grown to expect! [Presentation

Re: [Full-disclosure] Knorr.de SQL Injection and XSS Vulnerabilities

2007-03-02 Thread Knud Erik Højgaard
On 3/2/07, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote: Significance: Very Critical For who, the sauce-people? Not for me. All problems found have been discussed with Unilever, the mother company of Knorr and have been fixed before the release of this document. Sooo, why should anyone

Re: [Full-disclosure] Knorr.de SQL Injection and XSS Vulnerabilities

2007-03-02 Thread Sebastian Bauer
The point why I rated those problems as high risk was that due to this problems free access to all user data was possible. And problems that will offer any kind of user data (including unencrypted passwords) is a significant security risk from my point of view (see the latest problems

Re: [Full-disclosure] Knorr.de SQL Injection and XSS Vulnerabilities

2007-03-02 Thread Joe Hancock
I was also going to query the way vulnerabilities are rated on a personal level here... Significance: Double Plus Ungood It's always nice to see problems being solved instead of just targeted, while maintaining disclosure though Sebastian. Regards, Joe. On 02/03/07, Knud Erik Højgaard [EMAIL

Re: [Full-disclosure] Knorr.de SQL Injection and XSS Vulnerabilities

2007-03-02 Thread Michal Zalewski
Significance: Very Critical I'm very pro-disclosure. I do see a point in disclosing flaws in software or hardware we might use. I do see a point in reporting flaws in websites we rely on (banks, online shops). Hey, there might even be a weak case for shaming security vendors, IT companies, or

[Full-disclosure] MailEnable v2.37 APPEND exploit

2007-03-02 Thread mu-b
Attached is another exploit for the MailEnable Pro/Ent = 2.37 (including the latest). The vulnerability is a bog-standard stack based overflow in the call at offset 0x00417CD6 (MEIMAPS.exe, v2.37). --- ([EMAIL PROTECTED])

[Full-disclosure] ZDI-07-008: Apache Tomcat JK Web Server Connector Long URL Stack Overflow Vulnerability

2007-03-02 Thread zdi-disclosures
ZDI-07-008: Apache Tomcat JK Web Server Connector Long URL Stack Overflow Vulnerability http://www.zerodayinitiative.com/advisories/ZDI-07-008.html March 2, 2007 -- CVE ID: CVE-2007-0774 -- Affected Vendor: Apache -- Affected Products: Tomcat JK Web Server Connector 1.2.19 Tomcat

[Full-disclosure] Woltlab Burning Board (wbb) 2.3.6 CSRF/XSS - 0day

2007-03-02 Thread SaMuschie
Type: CSRF/XSS | Status: 0day +- -- - - | Discovered by: Samenspender | Released: 20070302 | SaMuschie Release Number: 5 +--- - -- - CSRF/XSS Exploit: cat EOF wetpussy.html form name='evilform' method='POST' action='http

[Full-disclosure] iDefense Security Advisory 03.02.07: Kaspersky AntiVirus UPX File Decompression DoS Vulnerability

2007-03-02 Thread iDefense Labs
Kaspersky AntiVirus UPX File Decompression DoS Vulnerability iDefense Security Advisory 03.02.07 http://labs.idefense.com/intelligence/vulnerabilities/ Mar 02, 2007 I. BACKGROUND Kaspersky Antivirus is a popular client and gateway virus scanner for Unix and Windows. UPX, the ultimate packer for

[Full-disclosure] Limited format string in Netrek 2.12.0

2007-03-02 Thread Luigi Auriemma
### Luigi Auriemma Application: Netrek http://www.netrek.org Versions: = 2.12.0 (Vanilla server) Platforms:*nix and Windows Bug: format string Exploitation: remote

[Full-disclosure] [ MDKSA-2007:050-1 ] - Updated Firefox packages fix multiple vulnerabilities

2007-03-02 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDKSA-2007:050-1 http://www.mandriva.com/security/

[Full-disclosure] [ GLSA 200703-04 ] Mozilla Firefox: Multiple vulnerabilities

2007-03-02 Thread Raphael Marichez
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200703-04 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - -