Re: [Full-disclosure] Administrivia: Spring Cleaning

2009-02-03 Thread Ureleet
i m willing to bet he is still on the list tho. who knows how many aliases he has. no--i m not 1, even tho he accuses me of being 1. i guarantee hes watching right now. On Mon, Feb 2, 2009 at 12:32 AM, Biz Marqee biz.mar...@gmail.com wrote: n3td3v being moderated is fantastic. his banning

Re: [Full-disclosure] Windows 7 UAC compromised

2009-02-03 Thread Valdis . Kletnieks
On Tue, 03 Feb 2009 09:48:48 EST, Ureleet said: y not have ur os secure in the first place and designed with full permissions instead of bothering the user. look at linux, look at unix. theyve been doing it 4 years. Well, that *would* be an alternate way to design a system - but how would

[Full-disclosure] BBC cyber war piece

2009-02-03 Thread imipak
Nato officials have told the BBC their computers are under constant attack from organisations and individuals bent on trying to hack into their secrets. http://news.bbc.co.uk/go/rss/-/1/hi/world/europe/7851292.stm (NB - the author of that piece, IMNSHO, has a tendency to sound like an uncritical

Re: [Full-disclosure] Administrivia: Spring Cleaning

2009-02-03 Thread Pete Licoln
Who cares anyway ? 2009/2/3 Ureleet urel...@gmail.com i guarantee hes watching right now. On Mon, Feb 2, 2009 at 12:32 AM, Biz Marqee biz.mar...@gmail.com wrote: n3td3v being moderated is fantastic. his banning is not a strike against the spirit of fd, its someone standing up and

[Full-disclosure] SMF 1.1.7 Persistent XSS (requires permision to edit censor)

2009-02-03 Thread Eduardo Vela
SMF 1.1.7 (simplemachines.org) XSS Exploitation: If you can modify the censor on a SMF forum, then you can make it execute arbitrary JS code. http://SMF.Forum.com/index.php?action=postsettings;sa=censor Just add the following entry: http://www.test.xss/ = http://www.test-xss/;

[Full-disclosure] Team SHATTER Security Advisory: SQL Injection in Oracle Enterprise Manager (TARGET Parameter)

2009-02-03 Thread Shatter
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Team SHATTER Security Advisory SQL Injection in Oracle Enterprise Manager (TARGET Parameter) January 29, 2009 Risk Level: Medium Affected versions: Oracle Enterprise Manager 10g Grid Control 10.2.0.4 and previous patchsets Remote exploitable: Yes

[Full-disclosure] Team SHATTER Security Advisory: Oracle Database Buffer Overflow in SYS.OLAPIMPL_T.ODCITABLESTART

2009-02-03 Thread Shatter
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Team SHATTER Security Advisory Oracle Database Buffer Overflow in SYS.OLAPIMPL_T.ODCITABLESTART January 29, 2009 Risk Level: High Affected versions: Oracle Database Server version 9iR2 Remote exploitable: Yes (Authentication to Database Server is

Re: [Full-disclosure] Windows 7 UAC compromised

2009-02-03 Thread Ureleet
y not have ur os secure in the first place and designed with full permissions instead of bothering the user. look at linux, look at unix. theyve been doing it 4 years. On Mon, Feb 2, 2009 at 2:14 PM, Christopher Pritchard mailingl...@brainiacghost.co.uk wrote: The biggest issue here is that

[Full-disclosure] CORE-2008-1009 - VNC Multiple Integer Overflows

2009-02-03 Thread CORE Security Technologies Advisories
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Core Security Technologies - CoreLabs Advisory http://www.coresecurity.com/corelabs/ VNC Multiple Integer Overflows 1. *Advisory Information* Title: VNC Multiple Integer Overflows Advisory ID: CORE-2008-1009 Advisory

Re: [Full-disclosure] Windows 7 UAC compromised

2009-02-03 Thread M.B.Jr.
Windows says: Hello world! Check this out, world, this is really cool. Now I have, uh, something like, uh, privileges management! UAC is no more than a new commercial designation for something with about 40 years. And they (Redmond) are still missing the concept's point. On Mon, Feb 2,