And from one firmware revision to another? Could you make that change with a
#pragma in the code or something like that?
*From:* full-disclosure-boun...@lists.grok.org.uk [mailto:
full-disclosure-boun...@lists.grok.org.uk] *On Behalf Of *Thor (Hammer of
God)
*Sent:* Sunday, December 19, 2010 12:
did not say that he wrote code. He said that "Jason
Wright and several other developers were responsible for those
backdoors"
-Original Message-
From: Paul Schmehl [mailto:pschmehl_li...@tx.rr.com]
Sent: Friday, December 17, 2010 12:12 PM
To: Larry Seltzer; full-disclosure@li
is a fucking laugh riot
this thread!
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Instead of an overt back-door, is it possible that Theo's old friend (;))
is referring to exploitable vulnerabilities. These vulnerabilities may or
may not have been found in the interim and fixed, but not recognized as
backdoors.
As you said, it's impossible to prove a negative (prove to me that
here are already probably already a
latent vulnerability in it already? Then there is no deniability concerns
and no audit trail of the source code.
My 2 cents
On 16/12/2010, at 1:04 PM, mark seiden wrote:
>
> On Dec 15, 2010, at 5:23 PM, Graham Gower wrote:
>
>> On 16 December 20
> Has anyone read this yet?
>
> http://www.downspout.org/?q=node/3
>
> Seems IPSEC might have a back door written into it by the FBI?
>
Surely the thing to do now is not to audit *your own* OpenBSD code, but to
audit the OpenBSD code from about 8 years ago. If there's nothing there,
then the claim
Theo,
How would one go about getting the code that was worked on at the time? I
don't see it at openbsd.org.
Also, do you have a sense of what other projects used that code?
Presumably at least some of them did audits as well.
LJS
___
Full-Disclosure
>>> 2. some interpret it as a feature and some as a bug?
> Does it have to be either?
It sounds to me as if this is a deliberate design decision, and people are
disagreeing over the severity of its implications.
LJS
___
Full-Disclosure - We believe in
I think the Intranet zone was Medium in IE6 but of course there was no
Protected Mode there. Maybe that's where the confusion is from.
-Original Message-
From: full-disclosure-boun...@lists.grok.org.uk
[mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of Thor
(Hammer of God)
Sen
I've made a lot of money writing papers inspired by Moxie's work, so I can
relate.
-Original Message-
From: full-disclosure-boun...@lists.grok.org.uk
[mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of Eyeballing
Weev
Sent: Tuesday, November 23, 2010 4:44 PM
To: full-disclosure
It says “My name is Roger Waters and I’m a completely selfish asshole and
I’m taking my ball and going home now.”
*From:* full-disclosure-boun...@lists.grok.org.uk [mailto:
full-disclosure-boun...@lists.grok.org.uk] *On Behalf Of *Thor (Hammer of
God)
*Sent:* Thursday, October 14, 2010 6:33 PM
*
also illustrates
the extent of the problem, because each of those installations is likely
vulnerable.
-Original Message-
From: Dan Kaminsky [mailto:d...@doxpara.com]
Sent: Tuesday, September 14, 2010 6:54 PM
To: Stefan Kanthak
Cc: Larry Seltzer; full-disclosure@lists.grok.org.uk;
valdis.klet
It's true that conventional certs have been completely devalued by the
bottom-feeders. This is a good argument for EV. Goatse may dismiss EV as a
joke, but there are very few EV CAs and none of them are TELECOM MINISTRY
OF BUTTFUCKISTAN. The spec requires that they authenticate the operation
of the
I don’t think you read my e-mail. They fixed it. Have you retested today?
*From:* Christian Sciberras [mailto:uuf6...@gmail.com]
*Sent:* Thursday, September 02, 2010 9:44 AM
*To:* Larry Seltzer
*Cc:* full-disclosure@lists.grok.org.uk
*Subject:* Re: [Full-disclosure] DLL hijacking POC (failed
FYI everyone, ACROS has fixed the POC for 64-bit systems. The old one
failed on my Win7 64-bit and the new one works.
http://www.binaryplanting.com/test.htm
I did notice that if you just click on the link
(\\www.binaryplanting.com\demo\windows_address_book_64) Windows turns it
into a file:// url
signatures are consistent with the EXE.
*From:* Arthur Orr [mailto:a...@gci.com]
*Sent:* Friday, August 27, 2010 1:52 PM
*To:* Larry Seltzer; Dan Kaminsky; Christian Sciberras
*Cc:* full-disclosure@lists.grok.org.uk; valdis.kletni...@vt.edu
*Subject:* RE: [Full-disclosure] DLL hijacking with
:* Friday, August 27, 2010 10:50 AM
*To:* Christian Sciberras
*Cc:* Larry Seltzer; full-disclosure@lists.grok.org.uk;
valdis.kletni...@vt.edu
*Subject:* Re: [Full-disclosure] DLL hijacking with Autorun on a USB drive
...up till the moment you realize that the interface doesn't really
differen
, August 27, 2010 10:08 AM
*To:* Larry Seltzer
*Cc:* valdis.kletni...@vt.edu; full-disclosure@lists.grok.org.uk
*Subject:* Re: [Full-disclosure] DLL hijacking with Autorun on a USB drive
h0h0h0. There be history, Larry.
Short version: Go see how many DLLs exist outside of c:\windows\system32.
Look
Clearly desktops need to be able to run arbitrary code. That’s what they’re
there for.
Why wouldn’t eliminating the CWD from the DLL search order fix the problem?
I asked Microsoft about this (
http://blogs.pcmag.com/securitywatch/2010/08/list_of_dll_vulnerability_wind.php)
and they said the obv
> Instead of it executing "wab.exe (Windows Address Book) and open the
> file test.vcf", one can directly get any .exe file open.
Users have shown themselves very willing to open up test.vcf.exe.
LJS
___
Full-Disclosure - We believe in it.
Charter: htt
It's better than nothing, but it speaks ill of the agency. Yes, the
encryption is the same.
Certificates have expiration dates so that the verification that happens
at the time the cert is acquired can have some "freshness." So if it's
just expired, well it's no biggie, especially if this is a pla
Oh cool, this is like those TV ads where the guy parades his social security
# around, right?
*From:* full-disclosure-boun...@lists.grok.org.uk [mailto:
full-disclosure-boun...@lists.grok.org.uk] *On Behalf Of *Thor (Hammer of
God)
*Sent:* Friday, June 11, 2010 11:33 PM
*To:* full-disclosure@lis
onsider the ramifications
> of the “VPN first” model before assuming it grants you some inherent
> security.
>
>
>
> t
>
>
>
> *From:* full-disclosure-boun...@lists.grok.org.uk [mailto:
> full-disclosure-boun...@lists.grok.org.uk] *On Behalf Of *Larry Seltzer
> *
See http://technet.microsoft.com/en-us/library/cc782610(WS.10).aspx
If you connect through a VPN it should be as secure as anything else you’re
going to consider.
*From:* full-disclosure-boun...@lists.grok.org.uk [mailto:
full-disclosure-boun...@lists.grok.org.uk] *On Behalf Of *Jeffrey Walto
Click here to retrieve your free beer.
http://bit.ly/4a8VOA
*From:* Benji [mailto:m...@b3nji.com]
*Sent:* Wednesday, June 09, 2010 7:08 PM
*To:* Larry Seltzer
*Cc:* Thor (Hammer of God); noloa...@gmail.com; Daniel Sichel;
full-disclosure@lists.grok.org.uk
*Subject:* Re: [Full-disclosure] RDP
I might be able to buy you one beer with the money, but it won’t be
anything good.
*From:* Thor (Hammer of God) [mailto:t...@hammerofgod.com]
*Sent:* Wednesday, June 09, 2010 6:56 PM
*To:* Larry Seltzer; noloa...@gmail.com; Daniel Sichel
*Cc:* full-disclosure@lists.grok.org.uk
*Subject:* RE
10 years ago I wrote a book on Terminal Services for Windows 2000. Believe
it or not, I still get trivial royalties on it, $6.81 for the first quarter
of this year, and the book has been out of print for years.
Someone out there in 2010 is buying a book on Windows 2000, sucking out the
last co
Don't you get it? Your customers installed malware while logged in as
administrator on XP. MSRT isn't magic. From this you tell people "Don't
run Windows"?
And if your customers' apps require admin privileges and they have to
run on XP then they really can't
d and they didn't reply.
More than one antivirus vendor has said that their products are not
vulnerable to the technique. It's hard to say who is telling the truth,
but given all their overstatement matousec doesn't deserve the benefit
of the doubt.
Larry Seltzer
Contributing Edito
You need admin privileges for it. It's not a vulnerability, it's a
feature.
-Original Message-
From: full-disclosure-boun...@lists.grok.org.uk
[mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of Justin
C. Klein Keane
Sent: Tuesday, April 27, 2010 3:07 PM
To: full-disclosure@lis
jws seems to be one of those gifts that keeps on giving. I don't have
actual numbers, but it seems to me I see it mentioned regularly in their
vulnerability reports.
-Original Message-
From: full-disclosure-boun...@lists.grok.org.uk
[mailto:full-disclosure-boun...@lists.grok.org.uk] On Beh
Per Ryan Naraine (a friend and former colleague), the story has been
updated and corrected: http://blogs.zdnet.com/security/?p=5573
Larry Seltzer
From: full-disclosure-boun...@lists.grok.org.uk
[mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of
Berend-Jan Wever
Sent: Wednesday
e 256 randomization slots? The point of
it is that if you're going to crash the system 255 out of 256 times it's
not worth attacking.
Larry Seltzer
From: full-disclosure-boun...@lists.grok.org.uk
[mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of
Berend-Jan Wever
Sent: Monday, Marc
Google translates this as “Sun your mother!”
Larry Seltzer
Contributing Editor, PC Magazine
larry_selt...@ziffdavis.com
http://blogs.pcmag.com/securitywatch/
From: full-disclosure-boun...@lists.grok.org.uk
[mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of yuange
Sent
Full-Disclosure has been submitted to ISO as a discussion standard, requiring
English posting, but allowing for a subposting field with referrals to
internationalized versions
Larry Seltzer
Contributing Editor, PC Magazine
larry_selt...@ziffdavis.com
http://blogs.pcmag.com/securitywatch
eivable by then, as a distinct southern
culture had already emerged.
Larry Seltzer
Contributing Editor, PC Magazine
larry_selt...@ziffdavis.com
http://blogs.pcmag.com/securitywatch/
___
Full-Disclosure - We believe in it.
Charter: http://l
Wow, that’s a searing indictment if I’ve ever heard one, I think.
Larry Seltzer
Contributing Editor, PC Magazine
larry_selt...@ziffdavis.com
http://blogs.pcmag.com/securitywatch/
From: full-disclosure-boun...@lists.grok.org.uk
[mailto:full-disclosure-boun...@lists.grok.org.uk] On
It’s harmless, he’s just blowing his own company’s horn. Speaking of spam…
h, shall I click a tinyurl coming from a f-d poster?
n/n, pick one
this is email, not twitter. if you're sharing a legitimate link, there's no
reason not to directly link to it.
2010/1/11 Chen Levkovich
S
>>> Recent evidence shows that the globe is again cooling
>> So the CO2 emissions are the only things saving us, right Paul?
Post-hoc, ergo propter hoc.
It's a staple of climate science.
Larry Seltzer
Contributing Editor, PC Magazine
larry_selt...@ziffdavis.com
ht
to request privilege
elevation and a system which handles it automatically is a better one.
And as the article says, the claim in the subject line of this thread is
nonsense. It's obvious to anyone who reads the patent, which is a very
short one.
Larry Seltzer
Contributing Editor, PC Magazi
Yes, they used the bulletin to soft-pedal the description, but at the
same time I think they send a message about XP users being on shaky
ground. Just because they've got 4+ years of Extended Support Period
left doesn't mean they're going to get first-class treatment.
Larry Seltz
would have rated it at least Medium. If I'm wrong about
that then the "Low" rating is misleading.
Larry Seltzer
Contributing Editor, PC Magazine
larry_selt...@ziffdavis.com
http://blogs.pcmag.com/securitywatch/
-Original Message-
From: full-disclosure-boun...@lists
I’ve never before received anything like this for Windows Live. I got a second
invite just like this through Live Messenger.
(Soon this will be changing to Bing profile spam)
Larry Seltzer
Contributing Editor, PC Magazine
larry_selt...@ziffdavis.com
http://blogs.pcmag.com/securitywatch
It looks like this was fixed in 9.1, the version from a week or two ago. Why
wasn't the vulnerability disclosed until now?
Larry Seltzer
eWEEK.com Security Center Editor
http://security.eweek.com/
http://blogs.pcmag.com/securitywatch/
Contributing Editor, PC Magazine
larry
>> They keep saying that the BBC "hacked" 22,000 computers, when in
reality
the original articles said the BBC "acquired" or "hijacked" the botnet.
Strawman for the win?
If they paid for access to the botnet then there's no real moral
difference.
Larry
75ca3011ae2a15f851cc3334cf7918ae851c92f1
Larry Seltzer
eWEEK.com Security Center Editor
http://security.eweek.com/
http://blogs.pcmag.com/securitywatch/
Contributing Editor, PC Magazine
larry.selt...@ziffdavisenterprise.com
___
Full-Disclosure - We
Jeez, the "stolen" part was a joke. Finally someone says something on
this thread related to computer security and you all jump on me.
Larry Seltzer
eWEEK.com Security Center Editor
http://security.eweek.com/
http://blogs.pcmag.com/securitywatch/
Contributing Editor, PC Magazine
Also stolen from the Palestinian people: their domain name.
The web site of the Permanent Observer Mission of Palestine to the
United Nations: http://www.palestine-un.org/
Click some of the links on the left and check the whois.
Larry Seltzer
eWEEK.com Security Center Editor
http
German population.
Larry Seltzer
eWEEK.com Security Center Editor
http://security.eweek.com/
http://blogs.pcmag.com/securitywatch/
Contributing Editor, PC Magazine
larry.selt...@ziffdavisenterprise.com
___
Full-Disclosure - We believe in it.
Charter
Holy crap, a crash bug in a beta browser!
Larry Seltzer
eWEEK.com Security Center Editor
http://security.eweek.com/
http://blogs.pcmag.com/securitywatch/
Contributing Editor, PC Magazine
[EMAIL PROTECTED]
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of
Moving beyond the old partisan politics, a cause we can all get behind.
Larry Seltzer
eWEEK.com Security Center Editor
http://security.eweek.com/ <http://security.eweek.com/>
<http://blogs.pcmag.com/securitywatch/>
http://blogs.pcmag.com/securitywatch/
<http://blogs.pcmag.co
4ss!ama" password for amazon.com how long will it take me to
figure out all your others?
Larry Seltzer
eWEEK.com Security Center Editor
http://security.eweek.com/ <http://security.eweek.com/>
<http://blogs.pcmag.com/securitywatch/>
http://blogs.pcmag.com/securitywatch/
<http://b
ave any
of these problems.
Larry Seltzer
eWEEK.com Security Center Editor
http://security.eweek.com/
http://blogs.pcmag.com/securitywatch/
Contributing Editor, PC Magazine
[EMAIL PROTECTED]
___
Full-Disclosure - We believe in it.
Charter: http://lists.
do get your point,
but I bet that the best alternative is to give them one set of
credentials and make it as strong as possible.
Larry Seltzer
eWEEK.com Security Center Editor
http://security.eweek.com/
http://blogs.pcmag.com/securitywatch/
Contributing Editor, PC Magazine
[EMAI
It's worth pointing out that some OpenID providers are better than
others. An OpenID provider could implement 2-factor authentication, and
some have
(http://www.infrastructure.ziffdavisenterprise.com/c/a/Blogs/OpenID-In-H
ardware/), or other features which could strengthen it.
Larry Se
lnerable
if an attacker gets to the system
> while the screen is locked or the computer is asleep (though not if it
is hibernating or powered off).
So in other words, hibernate does make a difference, especially if you
follow their guidelines.
Larry Seltzer
eWEEK.com Security Center Edi
er.
>>
<http://blogs.technet.com/markrussinovich/archive/2005/12/12/circumventi
ng-group-policy-as-a-limited-user.aspx>
What he says is that some group policies, not including system-wide
security settings, maybe circumvented, even by a limited user.
Larry Seltzer
eWEEK.com Securit
off. Even if the memory has some residual charge I'm
sure it's far less reliable than with sleep.
Everything I've seen in descriptions of that attack tells me they are
unfairly conflating sleep and hibernate.
Larry Seltzer
eWEEK.com Security Center Editor
http://security.eweek.com/
http
The frozen notebook memory attack seems a
little too Mission Impossible for me to get worked up about. And if
you're the sort of high-value target who needs to worrry about this sort
of attack, there are measures you can take: use drive encryption, use
2-factor authentication, use hibernat
aiming they can disable
password authentication *even while the system is not logged on* - do I
have that right?
Larry Seltzer
eWEEK.com Security Center Editor
http://security.eweek.com/
http://blogs.pcmag.com/securitywatch/
Contributing Editor, PC Magazine
[EMAI
Let's say the computer is off. You can turn it on, but that gets you to
a login screen. What can the Firewire device do?
Larry Seltzer
eWEEK.com Security Center Editor
http://security.eweek.com/
http://blogs.pcmag.com/securitywatch/
Contributing Editor, PC Magazine
[EMAIL PROT
>>Who can be the one to find and publish the first exploit?
I hear you can completely compromise an IE8 system through the Firewire
port.
Larry Seltzer
eWEEK.com Security Center Editor
http://security.eweek.com/
http://blogs.pcmag.com/securitywatch/
Contributing Editor, PC Magazine
ws (or any OS) to open up DMA for a device
only to a certain range?
If not, what options are available?
Larry Seltzer
eWEEK.com Security Center Editor
http://security.eweek.com/
http://blogs.pcmag.com/securitywatch/
Contributing Editor, PC Magazine
>>...Windows would not do this. It would only open up access to devices
that it thought needed DMA. This is why Metlstorm had to make his Linux
machine behave like an iPod to fool Windows into spreading it's legs.
So the iPod software opens up the whole address space? I don'
ice compatibility of doing
this?
Larry Seltzer
eWEEK.com Security Center Editor
http://security.eweek.com/
http://blogs.pcmag.com/securitywatch/
Contributing Editor, PC Magazine
[EMAIL PROTECTED]
___
Full-Disclosure - We believe in it.
Charter: htt
>>Next we'll be seeing "Japanese tactical nukes "Hidden in Toyota
trunks"
And who knows what the French are putting in that cheese.
Larry Seltzer
eWEEK.com Security Center Editor
http://security.eweek.com/ <http://security.eweek.com/>
<http://b
."
So does the same capability exist on Macs?
Larry Seltzer
eWEEK.com Security Center Editor
http://security.eweek.com/
http://blogs.pcmag.com/securitywatch/
Contributing Editor, PC Magazine
[EMAIL PROTECTED]
___
Full-Disclosure - We bel
I get this same warning on FF 3.0 beta 2 on Vista.
Larry Seltzer
eWEEK.com Security Center Editor
http://security.eweek.com/
http://blogs.pcmag.com/securitywatch/
Contributing Editor, PC Magazine
[EMAIL PROTECTED]
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On
One more thing. Nobody is forcing you go buy Vista. Believe it or not,
you have alternatives in the market. If Vista sucks so badly in your
mind, go buy something else.
Larry Seltzer
eWEEK.com Security Center Editor
http://security.eweek.com/
http://blogs.pcmag.com/securitywatch/
Contributing
>>MS is planning on stopping XP sales after June 30,2008.
Why don't you start hoarding copies now? Come July you'll run the
market! Ha ha ha!
Larry Seltzer
eWEEK.com Security Center Editor
http://security.eweek.com/
http://blogs.pcmag.com/securitywatch/
Contributing Editor, PC
>>This vulnerability allows for arbitrary command execution and is really quite
>>severe.
So the following proof of concept causes the Windows Calculator to be executed?
C:\>calc
Larry Seltzer
eWEEK.com Security Center Editor
http://security.eweek.com/
http://blogs.pcmag.co
The redirect is in this from the blogspot page. No real attempt to hide
it.
http://homeoflove.selfip.com/ads/ads.php?src=hushmail"; width="468"
height="60" scrolling=no frameborder=0>
selfip.com is owned by Dyndns and I guess it's used for customer
>>..perhaps one day, this will be exploitable.
Consider the possibilities for this code:
If ((4.2-0.1) != 4.1) { exploit_client(); }
Larry Seltzer
eWEEK.com Security Center Editor
http://security.eweek.com/
http://blogs.eweek.com/cheap_hack/
Contributing Editor, PC Magazine
[EMAIL PRO
>>Firefox 2.0.0.7 result: 5.1005 (WRONG!) Internet Explorer
7 result: 5.1 (OK)
Maybe they're using Excel 2007 for their math.
Larry Seltzer
eWEEK.com Security Center Editor
http://security.eweek.com/
http://blogs.eweek.com/cheap_hack/
Contributing Editor, PC Magazine
[EMAI
Actually, I see 5.1005 in both browsers.
Larry Seltzer
eWEEK.com Security Center Editor
http://security.eweek.com/
http://blogs.eweek.com/cheap_hack/
Contributing Editor, PC Magazine
[EMAIL PROTECTED]
___
Full-Disclosure - We believe in it
>>Found this page, click on "Accessories" then try to print the page, it
seems to crash all the browsers I have soon as I try to print. Thought
someone here might like to play with the crash.
Printed from IE7 and FF 2.0.0.4 no problems.
Larry Seltzer
eWEEK.com Security Ce
>>The picture taken on my system:
>>http://alt.swiecki.net/idn.png
It looks different on my system: http://www.larryseltzer.com/safe2.png
Safari 3.0.2 on XPSP2
Larry Seltzer
eWEEK.com Security Center Editor
http://security.eweek.com/
http://blogs.eweek.com/cheap_hack/
Contributin
_reall
y_need_another_windows_browser.html). They have already done this with
QuickTime. Safari could develop installed base quickly that way.
Larry Seltzer
eWEEK.com Security Center Editor
http://security.eweek.com/
http://blogs.eweek.com/cheap_hack/
Contributing Editor, PC Magazine
[EMAIL PRO
>>In luxembourg for instance mails labeled as PRIVATE or CONFIDENTIAL
are not allowed to be viewed by the company, ALSO as email. Write it in
the subject line.
Hey, don't read this. This isn't for you.
Larry Seltzer
eWEEK.com Security Center Editor
http://security
>>A more ethical company would have sent HDM a polite note saying that
the person no longer works there before curiosity got the best of them.
Does your company do this for all former employee e-mail accounts?
Let's hope he unsubscribed from all his mailing lists before he left.
La
>>Really? I have gotten benefits and medical communications at my office
addy.
That stuff should be going to your home address, not least for this
reason.
Larry Seltzer
eWEEK.com Security Center Editor
http://security.eweek.com/
http://blogs.eweek.com/cheap_hack/
Contributing Edit
>>Would you feel the same way if it was a voicemail left on his machine?
>>What about a postal letter addressed to the person?
To the company phone or address? Yes. Of course. They're company
property, there for company purposes.
Larry Seltzer
eWEEK.com Security C
Why would this be offensive? It's a company address. Someone might send
e-mail containing company business to the address.
Larry Seltzer
eWEEK.com Security Center Editor
http://security.eweek.com/
http://blogs.eweek.com/cheap_hack/
Contributing Editor, PC Magazine
[EMAIL PROT
>>Check out a recent survey of 50 WordPress blogs conducted at
blogsecurity.net <http://blogsecurity.net/> :
>>http://blogsecurity.net/wordpress/articles/article-230507/
<http://blogsecurity.net/wordpress/articles/article-230507/>
Can the Month of WordPress Bugs be far
>> http://www.milw0 .. <http://www.milw0rm.com/exploits/3260> for
example
A word of advice to everyone: Don't send milw0rm links out to the list
unless you want to drown in blowback from Antigen gateways.
Larry Seltzer
eWEEK.com Security Center Editor
http://securit
>>I was wondering if anyone has a few Microsoft Windows Word proof of
concept exploits for a demo?
Go to http://www.milw0rm.com and search on Word
http://www.milw0rm.com/exploits/3260
http://www.milw0rm.com/exploits/3260> for example
Larry Seltzer
eWEEK.com Security Center Ed
>>http://moaxb.blogspot.com/
Why is this site in Italian now?
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Maybe if we issued one every minute we could keep the time frame
reasonable
Larry Seltzer
eWEEK.com Security Center Editor
http://security.eweek.com/
http://blogs.eweek.com/cheap_hack/
Contributing Editor, PC Magazine
[EMAIL PROTECTED]
-Original Message-
From: [EMAIL PROTECTED]
[mailto
Sorry for the smart-ass tail end to my message, but this *is* F-D after
all
Larry Seltzer
eWEEK.com Security Center Editor
http://security.eweek.com/
http://blogs.eweek.com/cheap_hack/
Contributing Editor, PC Magazine
[EMAIL PROTECTED]
-Original Message-
From: [EMAIL PROTECTED]
[mailto
>>I know Larry, wtf is an office exploit good for? nothing thats what..
It's not an Office exploit, it's an exploit in a 3rd-party add-on
package. And not an especially popular one.
You do understand the difference, don't you?
Larry Seltzer
eWEEK.com Securi
Looks like this has turned into the Month of Officeocx bugs, since the
first 3 are components sold in that package.
Larry Seltzer
eWEEK.com Security Center Editor
http://security.eweek.com/ http://security.eweek.com/>
http://blogs.eweek.com/cheap_hack/
<http://blog.eweek.com
>>"just a segfault"
Remember back when there were crash bugs? Now all we have are DoS's.
Larry Seltzer
eWEEK.com Security Center Editor
http://security.eweek.com/
http://blogs.eweek.com/cheap_hack/
Contributing Editor, PC Maga
How do you know that?
Larry Seltzer
eWEEK.com Security Center Editor
http://security.eweek.com/
http://blogs.eweek.com/cheap_hack/
Contributing Editor, PC Magazine
[EMAIL PROTECTED]
___
Full-Disclosure - We believe in it.
Charter: http://lists.
>>http://moaxb.blogspot.com/
Wow, a DoS in a 3rd-party Poiwerpoint viewer. This ought to bring the
Internet to its knees. I wonder if he'll have any actual ActiveX bugs or
if they'll just be DoS's in controls.
___
Full-Disclosure - We believe in it.
Ch
ved, is there?
>>Maybe the url should be in quites? This works for me:
>>
It's actually supposed to work with or without quotes I think and I've
tried a dozen variants and yours here. No luck. The cursors are straight
out of c:\windows\cursors. I'll try it in the mor
g with this code?
BODY{cursor: url(<a rel="nofollow" href="http://www.larryseltzer.com/DRUM.ANI">http://www.larryseltzer.com/DRUM.ANI</a>);}
This is a harmless animated cursor.
This is a harmless animated cursor.
This is a harmless animated cursor.
This is a ha
NI code in GDI is fixed.
Larry Seltzer
eWEEK.com Security Center Editor
http://security.eweek.com/
http://blog.eweek.com/blogs/larry%5Fseltzer/
Contributing Editor, PC Magazine
[EMAIL PROTECTED]
-Original Message-
From: Daniel Veditz [mailto:[EMAIL PROTECTED]
Sent: Tuesday, April 03, 2007
Firefox is vulnerable?
Larry Seltzer
eWEEK.com Security Center Editor
http://security.eweek.com/
http://blog.eweek.com/blogs/larry%5Fseltzer/
Contributing Editor, PC Magazine
[EMAIL PROTECTED]
___
Full-Disclosure - We believe in it.
Charter: http://
Specifically
http://developer.mozilla.org/en/docs/Using_URL_values_for_the_cursor_pro
perty in the "Limitations" section
Larry Seltzer
eWEEK.com Security Center Editor
http://security.eweek.com/
http://blog.eweek.com/blogs/larry%5Fseltzer/
Contributing Editor, PC Magazine
[EMAIL
>>I just posted a video of exploiting IE7 and Firefox on Vista.
The Firefox docs say that it doesn't support .ani files for cursors. How
are you exploiting it?
Larry Seltzer
eWEEK.com Security Center Editor
http://security.eweek.com/
http://blog.eweek.com/blogs/larry%5Fseltzer/
C
1 - 100 of 147 matches
Mail list logo