[Full-disclosure] The US Government Officially Confirms the Existence of Extraterrestrial Civilizations

2011-04-01 Thread Valery Marchuk
. Barak Obama himself assures that that there is no danger coming from the extraterrestrial civilizations. More information with prooflinks on SecurityLab.ru: Russian: http://www.securitylab.ru/news/405274.php English: http://www.securitylab.ru/news/405276.php BR, Valery Marchuk

[Full-disclosure] The US Government Officially Confirms the Existence of Extraterrestrial Civilizations

2011-04-01 Thread Valery Marchuk
Obama himself assures that that there is no danger coming from the extraterrestrial civilizations. More information with prooflinks on SecurityLab.ru: Russian: http://www.securitylab.ru/news/405274.php English: http://www.securitylab.ru/news/405276.php BR, Valery Marchuk www.SecurityLab.ru

Re: [Full-disclosure] I got hacked

2011-04-01 Thread Valery Marchuk
Hi! Are your websites commercial? If not, I can help you identify the vulnerabilities and fix them. BR, Valery Marchuk www.SecurityLab.ru - Original Message - From: "McGhee, Eddie" To: "Cal Leeming" Cc: Sent: Thursday, March 31, 2011 3:57 PM Subject: Re: [Fu

Re: [Full-disclosure] e107 latest download link is backdoored

2010-01-25 Thread Valery Marchuk
I`ve just checked the archive. The latest version of the file class2.php was changed on 2010/01/21 03:57:43 and it does not contain the malicious code. It has been probably replaced already, or we are using different mirrors. Valery Marchuk www.SecurityLab.ru - Original Message - From

[Full-disclosure] [PT-2009-05] CA Internet Security Suite Denial of Service Vulnerability

2009-08-26 Thread Valery Marchuk
-- (PT-2009-05) Positive Technologies Security Advisory CA Internet Security Suite Denial of Service Vulnerability -- ---[ Affected Software ]

[Full-disclosure] [PT-2008-09] Microsoft Windows MSMQ Privilege Escalation Vulnerability

2009-08-12 Thread Valery Marchuk
-- (PT-2008-09) Positive Technologies Security Advisory Microsoft Windows MSMQ Privilege Escalation Vulnerability -- ---[ Affected Software ]

[Full-disclosure] [Positive Technologies SA 2009-01] PGP Desktop Pgpdisk.sys And Pgpwded.sys Multiple Vulnerabilities

2009-04-13 Thread Valery Marchuk
-- (PT-2009-01) Positive Technologies Security Advisory PGP Desktop Pgpdisk.sys And Pgpwded.sys Multiple Vulnerabilities -- ---[ Affected Software

[Full-disclosure] [Positive Technologies SA 2008-07] VMware Multiple Products hcmon.sys Denial of Service Vulnerability

2009-04-06 Thread Valery Marchuk
-- (PT-2008-07) Positive Technologies Security Advisory VMware Multiple Products hcmon.sys Denial of Service Vulnerability -- ---[ Affected Software ]

[Full-disclosure] [Positive Technologies SA 2008-05] VMware Multiple Products vmci.sys Privilege Escalation Vulnerability

2009-04-06 Thread Valery Marchuk
-- (PT-2008-05) Positive Technologies Security Advisory VMware Multiple Products vmci.sys Privilege Escalation Vulnerability -- ---[ Affected Software ]

[Full-disclosure] [Positive Technologies SA 2009-09] Trend Micro Internet Security Pro 2009 tmactmon.sys Priviliege Escalation Vulnerabilities

2009-03-31 Thread Valery Marchuk
-- (PT-2009-09) Positive Technologies Security Advisory Trend Micro Internet Security Pro 2009 tmactmon.sys Priviliege Escalation Vulnerabilities -

[Full-disclosure] [Positive Technologies SA: 2009-15] Living CMS Cross-Site Scripting Vulnerability

2009-03-13 Thread Valery Marchuk
-- (PT-2009-15) Positive Technologies Security Advisory Living CMS Cross-Site Scripting vulnerability -- ---[ Affected Software ]

[Full-disclosure] [Positive Technologies SA: 2009-20] A.CMS Multiple Vulnerabilities

2009-03-13 Thread Valery Marchuk
-- (PT-2009-20) Positive Technologies Security Advisory A.CMS Multiple Vulnerabilities -- ---[ Affected Software ] A.CMS

[Full-disclosure] [Positive Technologies SA: 2009-14] BLOG:CMS Cross-Site Scripting Vulnerability

2009-03-13 Thread Valery Marchuk
-- (PT-2009-14) Positive Technologies Security Advisory BLOG:CMS Cross-Site Scripting vulnerability -- ---[ Affected Software ]

[Full-disclosure] [PT-2009-11] SlySoft Multiple Products ElbyCDIO.sys Denial of Service

2009-03-12 Thread Valery Marchuk
-- (PT-2009-11) Positive Technologies Security Advisory SlySoft Multiple Products ElbyCDIO.sys Denial of Service -- ---[ Affected Software ] S

[Full-disclosure] [PT-2009-13] TinX CMS SQL Injection Vulnerability

2009-03-06 Thread Valery Marchuk
-- (PT-2009-13) Positive Technologies Security Advisory TinX CMS SQL Injection vulnerability -- ---[ Affected Software ] TinX

[Full-disclosure] [PT-2009-12] UMI.CMS Cross-Site Scripting Vulnerability

2009-03-06 Thread Valery Marchuk
-- (PT-2009-12) Positive Technologies Security Advisory UMI.CMS Cross-Site Scripting vulnerability -- ---[ Affected Software ]

[Full-disclosure] Utility to detect MS08-067, MS08-065 and MS09-001 vulnerabilities

2009-02-24 Thread Valery Marchuk
systems and install appropriate patches according to the scanning results. Details and download link are available at: http://www.securitylab.ru/news/extra/368760.php Best regards, Valery Marchuk www.securitylab.ru www.ptsecurity.ru ___ Full-Disclosure

[Full-disclosure] WASC Announcement: 2007 Web Application Security Statistics Published

2008-09-08 Thread Valery Marchuk
The Web Application Security Consortium (WASC) is pleased to announce the WASC Web Application Security Statistics Project 2007. This initiative is a collaborative industry wide effort to pool together sanitized website vulnerability data and to gain a better understanding about the web application

[Full-disclosure] SQL Injection Vulnerability in BtiTracker and xbtit

2008-08-25 Thread Valery Marchuk
s The vulnerability was discovered by InATeam (http://inattack.ru/). BR, Valery Marchuk www.SecurityLab.ru ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia

[Full-disclosure] UN against Open Source. Linux is a threat?

2008-04-01 Thread Valery Marchuk
aid Ban Ki-moon More at http://www.securitylab.ru/news/extra/349440.php (English) or http://www.securitylab.ru/news/349441.php (Russian) with links to BBC an un.org. BR, Valery Marchuk www.SecurityLab.ru ___ Full-Disclosure - We believe in it

[Full-disclosure] New penetration testing tool for wifi

2008-03-15 Thread Valery Marchuk
p.patch file we supply. This code based on following works and POCs: Sergey Gordeychik. wep0ff. (in russian) http://www.ptsecurity.ru/download/client-side-wep.pdf http://www.ptsecurity.ru/download/wepoff.tar.gz Cafe-Latte http://www.airtightnetworks.net/knowledgecenter/ppt/Toorcon.ppt ieee802_1

Re: [Full-disclosure] Distributed SSH username/password brute forceattack

2007-10-22 Thread Valery Marchuk
for root from 80.122.89.106 port 12387 ssh2 Oct 22 21:57:38 nms sshd[90884]: Connection from 82.207.23.93 port 3642 Best regards, Valery Marchuk - Original Message - From: "Philipp" <[EMAIL PROTECTED]> To: Sent: Monday, October 22, 2007 2:36 PM Subject: [Full-disclosure]

Re: [Full-disclosure] gnucitizen bt home hub latest, attacks wide spread, outages reported

2007-10-12 Thread Valery Marchuk
dialog, which is bypassed via default password or through a bug in authentication mechanism. That's it. Best regards, Valery Marchuk www.SecurityLab.ru - Original Message - From: "worried security" <[EMAIL PROTECTED]> To: Sent: Friday, October 12, 2007 7:15 P

[Full-disclosure] Skype Network Remote DoS Exploit

2007-08-17 Thread Valery Marchuk
Skype to reconnect to another server. The new server also "freezes" and so on ... the entire network. Liks: http://www.securitylab.ru/news/301422.php PoC: http://en.securitylab.ru/poc/301420.php Best regards, Valery Marchuk www.Secu

[Full-disclosure] Skype Network Remote DoS Exploit

2007-08-17 Thread Valery Marchuk
to reconnect to another server. The new server also "freezes" and so on ... the entire network. Liks: http://www.securitylab.ru/news/301422.php PoC: http://en.securitylab.ru/poc/301420.php Best regards, Valery Marchuk www.Secu

[Full-disclosure] XSS in famous web projects

2007-05-20 Thread Valery Marchuk
Hi all! Eston_gandon has reported in his blog several XSS vulnerabilities in famous web projects (www.rambler.ru, search.live.com and www.president.ee). http://www.securitylab.ru/blog/eston_gandon/ Have a nice day, Valery Marchuk ___ Full

[Full-disclosure] Maria Sharapova is a Cisco Certified Specialist

2007-04-01 Thread Valery Marchuk
Maria Sharapova, one of the most famous tennis players, gained the CCIE status yesterday. More at http://www.securitylab.ru/news/extra/293608.php ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html H

[Full-disclosure] FoxNews: Paralysis of the Fifth Power

2006-08-29 Thread Valery Marchuk
Last week Russian hackers attacked top news agencies web sites. Work in these agencies was almost completely paralyzed by mass defaces. Russian hackers replaced published news by anti-American slogan "Neft' bliznego vostoka - dostoyanee chelovechestva. Russkaya Komputernaya Mafia." (Oil of Midd

[Full-disclosure] XSS at top news agencies

2006-08-29 Thread Valery Marchuk
Hi! I`ve published XSS vulnerabilities at top news agencies (bbc, cbsnews, zdnet, cnn, cnet etc). Examples are in my blog http://www.securitylab.ru/blog/tecklord/224.php Have a nice day, Valery ___ Full-Disclosure - We believe in it. Charter: htt

[Full-disclosure] George Bush appoints a 9 year old to be the chairperson of the Information Security Deportment

2006-08-27 Thread Valery Marchuk
On Friday night, George Bush made an official announcement saying that Michael Antipov (http://michael.antipov.name), a 9 year old talented security specialist was to be the chairperson of the Information Security Department of the US... More at http://www.securitylab.ru/news/extra/272756.php

Re: [Full-disclosure] further to the XSS flaw in eEye by Valery Marchuk

2006-08-21 Thread Valery Marchuk
There was XSS vulnerability previous time and lots of people saw that. eEye reacted really fast and fixed it during one working day and now Ross Brown denies the existence of that flaw. Interesting, how does eEye feel to be in Microsoft`s shoes? I don`t think I`m the right person to explain yo

[Full-disclosure] XSS at eEye.com #2 (evidence of existence)

2006-08-21 Thread Valery Marchuk
Hi all! According to this blog eEye (Ross Brown) denies existence of XSS Vulnerability at their web site. http://www.stillsecureafteralltheseyears.com/ashimmy/2006/08/make_sure_the_s.html   Well, what else we can expect from the security company, which cannot protect its own web site? As a

[Full-disclosure] XSS Vulnerabilities at Sun, IBM, Verisign, AOL, F-Secure, eEye

2006-08-14 Thread Valery Marchuk
Why world’s leading security companies don’t take care of their security? I`ve published some of XSS vulnerabilities in my blog and forwarded them to full-disclosure. But it seems like leading security companies don`t even think of fixing these bugs. Cisco, Microsoft, Symantec, NSA, F-Secu

[Full-disclosure] XSS at snort.org

2006-08-13 Thread Valery Marchuk
Not very cool for an IDS vendor :) Example is in my blog at http://www.securitylab.ru/blog/tecklord/181.php Have a nice day, Valery ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and

Re: [Full-disclosure] XSS at msn.com и cisco.com

2006-08-12 Thread Valery Marchuk
I bet you haven't the balls all to search on nsa.gov and fbi.gov :> It looks like I have :) See my next message "XSS at nsa.gov" or just visit my blog http://www.securitylab.ru/blog/tecklord/179.php And it looks like you owes me a bottle of cognac, so send me an email, so I could tell you wh

[Full-disclosure] XSS at nsa.gov

2006-08-12 Thread Valery Marchuk
Well, and they take care of US security :) XSS at nsa.gov Example: http://www.securitylab.ru/blog/tecklord/179.php Have a nice day, Valery ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted

[Full-disclosure] RE: Use Google to discover web attacks

2006-08-10 Thread Valery Marchuk
These are traces lerft by webinspect and Watchfire Appscan webinspect: http://www.google.ru/search?q=serverinclude.html Watchfire Appscan: http://www.google.ru/search?q=watchfire+%22xss+test%22 The article is available in Russian at http://www.securitylab.ru/news/271743.php

[Full-disclosure] RE: Use Google to discover web attacks

2006-08-10 Thread Valery Marchuk
These are traces lerft by webinspect and Watchfire Appscan webinspect: http://www.google.ru/search?q=serverinclude.html Watchfire Appscan: http://www.google.ru/search?q=watchfire+%22xss+test%22 The article is available in Russian at http://www.securitylab.ru/news/271743.php

[Full-disclosure] XSS at Securityfocus.com

2006-08-07 Thread Valery Marchuk
Dear guys from Securityfocus. Shame on you! And you are security company and own security mailing list: How could this happen? :) Example: http://www.securitylab.ru/blog/tecklord/170.php Have a nice day Valery ___ Full-Disclosure - We be

[Full-disclosure] XSS vulnerability at Symantec.com #2

2006-08-04 Thread Valery Marchuk
Hi! This is another XSS vulnerability at Symantec.com and there are like 40 more (!) Just curious, can guys at Symantec read log files?   Example in my blog at http://www.securitylab.ru/blog/tecklord/165.php   Have a nice day Valery   ___ Full-D

[Full-disclosure] XSS at Symantec.com

2006-08-03 Thread Valery Marchuk
Dear security companies, How can we trust our security to you, if you are not capable to protect yourself? Another XSS vulnerability at Symantec.com Example of exploitation is in my blog at http://www.securitylab.ru/blog/tecklord/163.php Have a nice day Valery _

Re: [Full-disclosure] Re: XSS at Netcraft.com

2006-08-02 Thread Valery Marchuk
They seem to have fixed the particular issue as of now. Of course, it's rather sad that a net security company does have XSS issues, but at least they seem to have reacted quickly. No they have not. XSS still exists. http://uptime.netcraft.com//netmove/today?mode=new%5Fsite&zero=0";>alert('www.s

[Full-disclosure] XSS at Netcraft.com

2006-08-02 Thread Valery Marchuk
Hi All! This time XSS vulnerability at Netcraft. Hope this company will act a bit sooner than others. Example of vulnerability is as usually in my blog at http://www.securitylab.ru/blog/tecklord/?category=19 All the XSS vulnerabilities, published there since Monday this week are still

Re: [Full-disclosure] Do world's famous companies take care of their security?

2006-08-01 Thread Valery Marchuk
Just google boze and you will see what I am saying -JP Have tried your advice and googled a bit:) XSS at google.com Example: http://www.securitylab.ru/blog/tecklord/156.php Valery ___ Full-Disclosure - We believe in it. Charter: http://lists.grok

Re: [Full-disclosure] Re: Do world's famous companies take care of their security?

2006-07-31 Thread Valery Marchuk
- Original Message - From: "Steven M. Christey" <[EMAIL PROTECTED]> To: ; Sent: Monday, July 31, 2006 10:43 PM Subject: [Full-disclosure] Re: Do world's famous companies take care oftheir security? Vulnerability databases (CVE included) historically have NOT recorded site-specific X

[Full-disclosure] Do world's famous companies take care of their security?

2006-07-31 Thread Valery Marchuk
one week after XSS bugs were reveled). Are they planning to fix them?   Example of XSS vulns are in my blog at http://www.securitylab.ru/blog/tecklord/?category=19   I will publish such information in my blog and hope that companies will take care of their security.   Valery Marchuk

Re: [Full-disclosure] To XSS or not?

2006-07-23 Thread Valery Marchuk
Separating just XSS vulns from others is not an option. It would make more sense to create a separate mailing list for vulnerabilities in Web applications. Major ones could still be reported on the other lists. If kiddies discover them, then how should they know that the vulnerability they`ve f