Since it's public now I attached the original exploit with original headers.
Greetings,
Kingcope
2010/8/19 HI-TECH .
> Watch the Hacktro at
> http://www.youtube.com/watch?v=uavlQV2FTjU
>
> Cheers,
>
> Kingcope
>
freebsd-cache.c
Description: Binary data
Although it seems to have been fixed, it's still vulnerable to
Attribute-Based XSS.
http://adbard.net/sites/default/modules/ad/serve.php?k=22e342dc6a6a99267a46f18fc5dcecf1&ab_s=18f5d31e3e39e9d3c8d5b850e79d4848&u=http://evil.com?x=%22%20onmouseover=%22alert%28/XSS/%29%22%20%3E
I suppose that this is more useful
http://ownage.pastebin.com/dyKLRr0v
s.
On Thu, Aug 19, 2010 at 12:38:45AM +0200, HI-TECH . wrote:
> Watch the Hacktro at
> http://www.youtube.com/watch?v=uavlQV2FTjU
>
> Cheers,
>
> Kingcope
> ___
> Full-Disclosur
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
-
Debian Security Advisory DSA-2093-1 secur...@debian.org
http://www.debian.org/security/Giuseppe Iuculano
August 19, 2010
__
-- NSOADV-2010-005 ---
SonicWALL E-Class SSL-VPN ActiveX Control format string overflow
__