[security bulletin] HPSBGN02298 SSRT071502 rev.2 - HP Quick Launch Button (QLB) Running on Windows, Remote Execution of Arbitrary Code, Gain Privileged Access

2007-12-27 Thread security-alert
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c01300486 Version: 2 HPSBGN02298 SSRT071502 rev.2 - HP Quick Launch Button (QLB) Running on Windows, Remote Execution of Arbitrary Code, Gain Privileged Access NOTICE: The information in this

Latest round of web hacking incidents for 2007 Project news

2007-12-27 Thread Ofer Shezaf
The last month was very active in the web application security field and at the Web Hacking Incidents Database Project we have collected numerous new incidents, listed below. It is very evident that both the rate of incidents as well the amount of information about each one is on the rise. We

Re: TotalPlayer 3.0 .m3u crash

2007-12-27 Thread Luigi Auriemma
Total Player in reality is the recompiling of the CoolPlayer source code available on the official website http://coolplayer.sf.net with the CoolPlayer string substituited by Total Player (but with the same skin, that's why it shows the CoolPlayer name). Other than being in full GPL violation

PHP - set_time_limit

2007-12-27 Thread brancohat
when safe_mode = on, set_time_limit is off, then we can use ini_set(max_execution_time, 9000); suppose the server is vulnerable PHP injection, then an attacker make a backdoor in PHP and register it in SCM of windows with win32service extension. the backdoor need wait for connections,

XZero Community Classifieds = v4.95.11 LFI SQL Injection

2007-12-27 Thread office
#!/usr/bin/perl # # XZero Community Classifieds = v4.95.11 LFI SQL Injection # linK : http://www.xzeroscripts.com # download: http://rapidshare.com/files/66809648/XZCl4.95.11.rar # http://en.rstzone.org/xzero-community-classifieds-v4-95-11-lfi-sql-in-t9394.rst # (c)od3d and f0unded by

Blakord Portal = Beta 1.3.A (all modules) Blind Sql Injection

2007-12-27 Thread sys-project
Blakord Portal = Beta 1.3.A (all modules) Blind Sql Injection. [+] Info: [~] Software: Blakord Portal [~] HomePage: http://www.cdv3k.com [~] Exploit: Blind Sql Injection [High] [~] Where: All Modules [~] Bug Found By: JosS / Jose Luis Góngora Fernández [~] Contact:

Re: Cryptome: NSA has real-time access to Hushmail servers

2007-12-27 Thread Valdis . Kletnieks
On Sat, 22 Dec 2007 14:02:18 +0200, Juha-Matti Laurio said: Guardster Team has posted its response on 21st Dec to Cryptome: We can assure you that we do not cooperate with the NSA or any other government agency anywhere in the world. We invite whomever is making this statement to provide

Re: Multiple xss in mambo 4.6.2

2007-12-27 Thread Hanno Böck
Has anyone checked if this also affects joomla? -- Hanno Böck Blog: http://www.hboeck.de/ GPG: 3DBD3B20 Jabber/Mail:[EMAIL PROTECTED] signature.asc Description: This is a digitally signed message part.

Re: TotalPlayer 3.0 .m3u crash

2007-12-27 Thread Luigi Auriemma
Ehmmm sorry for the double post, the problem is still the same which is already known from one year or two as stated in the following advisory of Mehdi Oudad and Kevin Fernandez of zone-h.fr: http://www.zone-h.fr/fr/advisories/read/id=1548/

Re: Tiger Team: New TV series about pen testers airing on CourtTV Dec 25 11 pm

2007-12-27 Thread blackredyellow
Court TV has posted the first full episode in four parts in streaming flash format at: http://www.courttv.com/onair/shows/red/red_player.html?id=870link=R EDshlk On Tue, 18 Dec 2007 14:33:27 -0500 [EMAIL PROTECTED] wrote: CourtTV (TruTV) has a new series starting Dec 25 called Tiger Team.

Re: Re: TotalPlayer 3.0 .m3u crash

2007-12-27 Thread david130490
It's true, I don't know the coolplayer but I see and it's the same software, so I searched any change in the virtual machine and I saw this: C:\Archivos de programa\OneStepSearch If a person downloaded and executed this software you have to erase this, now I'm seeing the malware but it's

Multiple vulnerabilities in Feng 0.1.15

2007-12-27 Thread Luigi Auriemma
### Luigi Auriemma Application: Feng http://live.polito.it/documentation/feng Versions: = 0.1.15 Platforms:*nix Bugs: A] first buffer-overflow in

Multiple vulnerabilities in libnemesi 0.6.4-rc1

2007-12-27 Thread Luigi Auriemma
### Luigi Auriemma Application: libnemesi http://live.polito.it/documentation/libnemesi Versions: = 0.6.4-rc1 Platforms:*nix Bugs: A] buffer-overflow in

Re: Re: Re: TotalPlayer 3.0 .m3u crash

2007-12-27 Thread david130490
To eliminate the malware completely, you should read this information: http://ca.com/es/securityadvisor/pest/pest.aspx?id=453118839 Sorry for the double topic

Buffer-overflow in Extended Module Player 2.5.1

2007-12-27 Thread Luigi Auriemma
### Luigi Auriemma Application: Extended Module Player (XMP) http://xmp.sourceforge.net Versions: = 2.5.1 Platforms:Linux, BSD, Solaris, HP-UX, MacOS X, QNX, BeOS, Windows,

Re: Cryptome: NSA has real-time access to Hushmail servers

2007-12-27 Thread Kurt Buff
Wasn't there an article or a post somewhere about an ISP that maintained a canary web page with the statement we haven't been served with an NSL and (I think) a date that was meant to be taken down or perhaps merely not updated in such an event? Cute idea, though I suppose they would also be

Re: Cryptome: NSA has real-time access to Hushmail servers

2007-12-27 Thread Steve Shockley
[EMAIL PROTECTED] wrote: Note that if they had been served with an NSL (National Security Letter), they may be legally *required* to lie about it while cooperating. Actually truthfully saying Yeah, an NSL showed up and we complied could land them in jail Requred to lie, or just required