PowerCHM Stack-based Buffer Overflow
1. General Information
PowerCHM is a tool that can create CHM files from Html Files, Text
Files, Microsoft Word Documents and Adobe Acrobat Document.
In March 2009, Bkis has just detected a vulnerability in the software,
related to the processing of PowerCH
_You_ are two dim to imagine that this issue is more like a bug than a
vulnerability. If _you_ did try to imagine it, your head would probably
explode and xssme would ooze out.
On Thu, Mar 26, 2009 at 12:42 AM, Nick FitzGerald
wrote:
> Rubén Camarero wrote:
>
> > What great references. Owasp isn'
Rubén Camarero wrote:
> What great references. Owasp isn't the king of vulnerability information, of
> course a website named XSSed is going to count this as super serious, and
> while I respect Insecure.. these days, people have exploited web bugs to
> their max (and I'm waiting for more), but th
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200903-39
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2009/3/25 Lorenzo Vogelsang
> Neverthless i think that the open redirect vulnerabilty it's serious,
> because "This vulnerability is used in phishing attacks to get users to
> visit malicious sites without realizing it." (
> http://www.owasp.org/index.php/Open_redirect)
Well that's actually fals
http://en.wikipedia.org/wiki/URL_redirection
XSS is often useful when its relevant...
Nice try, keep up the research Lorenzo!
On Wed, Mar 25, 2009 at 5:54 PM, Lorenzo Vogelsang
wrote:
> I don't know if this bug it's a "serious one" or not, i only posted a "url
> redirection flaw" and i think th
I don't know if this bug it's a "serious one" or not, i only posted a "url
redirection flaw" and i think that its dangerousness and importance should
be inferred from the type of vulnerability and the site which is affected...
I am still a beginner in the field of security , i still have much to
le
There's a difference between an xss and an url redirection ..
this post was about an url js based redirection, now it's a Xss, to me
that's a lot of talk ( and i do contribute ) for an no persistant xss , now
if you wanna have your 2 sec of glory post it on xssed.com ..
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
-
Debian Security Advisory DSA-1755-1 secur...@debian.org
http://www.debian.org/security/ Moritz Muehlenhoff
March 25, 2009
2009/3/25 Rubén Camarero :
> What great references. Owasp isn't the king of vulnerability information, of
> course a website named XSSed is going to count this as super serious, and
> while I respect Insecure.. these days, people have exploited web bugs to
> their max (and I'm waiting for more), bu
In this email message I'd like to discuss two subjects:
a. Phishing against ISPs.
b. Phishing in different languages against ISPs as soon as Google adds a
new translation module.
[My apologies to those who receive this email more than once. I am
approaching several different industries on this mat
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
-
Debian Security Advisory DSA-1745-2 secur...@debian.org
http://www.debian.org/security/ Steffen Joeris
March 25, 2009
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
What is this field you brag experience in? Independent
Professional Open URL Redirection Vulnerability Reporting? Can you
cite any of these statistics you're talking about because to be
quite honest we think you're making this up, along with everythi
What great references. Owasp isn't the king of vulnerability information, of
course a website named XSSed is going to count this as super serious, and
while I respect Insecure.. these days, people have exploited web bugs to
their max (and I'm waiting for more), but they aren't directly serious.
DIR
On Wed, 25 Mar 2009 15:21:42 BST, Lorenzo Vogelsang said:
> Despite i've told to nvidia only the "url redirection" flaw i think
> that, if "url redirection" will be solved all the xss inherently
> vulnerabilites will be solved too.
Actual experience in the field has shown that in general, if you
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Cisco Security Advisory: Cisco IOS Software Mobile IP and Mobile IPv6
Vulnerabilities
Advisory ID: cisco-sa-20090325-mobileip
http://www.cisco.com/warp/public/707/cisco-sa-20090325-mobileip.shtml
Revision 1.0
For Public Release 2009 March 25 1600
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Cisco Security Advisory: Cisco IOS Software WebVPN and SSLVPN
Vulnerabilities
Advisory ID: cisco-sa-20090325-webvpn
http://www.cisco.com/warp/public/707/cisco-sa-20090325-webvpn.shtml
Revision 1.0
For Public Release 2009 March 25 1600 UTC (GMT
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Cisco Security Advisory: Cisco IOS cTCP Denial of Service
Vulnerability
Advisory ID: cisco-sa-20090325-ctcp
http://www.cisco.com/warp/public/707/cisco-sa-20090325-ctcp.shtml
Revision 1.0
For Public Release 2009 March 25 1600 UTC (GMT
2009/3/24 Rubén Camarero
> If ATI and nVidia were web content developers, this may be a valid
> argument, but they are not. They are graphics vendors, hardware and
> software. Not to mention the fact that this isn't a "serious" issue. RFI is
> a serious issue, IMHO.
>
Well, not everyone agreed w
2009/3/24 ascii :
> Pete Licoln wrote:
>> It's just a browser based Js redirection
>>
> http://www.nvidia.com/content/DriverDownload/download_confirmation.asp?kw=&url=http://whatismyip.com
>
> and what makes it worst than an http redirection?
>
> http://www.nvidia.com/content/DriverDownload/dow
Yes i've notice that is also vulnerable to Xss.. In fact this link :
http://www.nvidia.com/content/DriverDownload/download_confirmation.asp?kw=&url=%22%3E%3Cscript%3Ealert(%22xss%22)%3C/script%3E
will succefully popup an "xss" alert message. Moreover i've checked
Xssed.com and i saw that a Xss fl
Helol n3td3v
-Original Message-
From: full-disclosure-boun...@lists.grok.org.uk
[mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of
mac.u...@mac.hush.com
Sent: 25. marts 2009 15:08
To: full-disclosure@lists.grok.org.uk; mic...@sharescope.co.uk
Subject: Re: [Full-disclosure] nV
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Look, this security mailing list is about computer security issues
and not meant to be your video gaming blog Also you are confusing
the issues of hardware and the drivers and other softwares that
interact with them, but that is beside the point!!
Well, we have a XSS too, just put whatever you want on the variable
"url" closing first the meta refresh tag, i.e:
http://www.nvidia.com/content/DriverDownload/download_confirmation.asp?kw=&url=";>http://www.yahoo.com/"; with="100%" height=600>
Are you smoking crack?
-Original Message-
From: full-disclosure-boun...@lists.grok.org.uk
[mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of
mac.u...@mac.hush.com
Sent: 25. marts 2009 14:17
To: full-disclosure@lists.grok.org.uk; as...@ush.it
Subject: Re: [Full-disclosure] nVi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Confirmed working with Internet Explorer on Microsoft Windows 7 x64
with all patches. Nice one!
On Tue, 24 Mar 2009 15:41:41 -0400 ascii wrote:
>Pete Licoln wrote:
>> It's just a browser based Js redirection
>>
>http://www.nvidia.com/content/Dri
I'd like to quickly jump on this bandwagon, backing up what someone said
about nVidia being a driver company not a website company; nVidia drivers
are far FAR better then ATI. Mentioned is the security, yes ok, but in terms
of putting ATI and nVidia drivers side by side, nVidia win, hands down. I
m
I don't think he wants credibility as much as he wants inbound links to
www.g*ldwatches.com. A site selling gold watches with the domain
registered by "John Doe" and a Mailboxes etc mailing address? Niiice!
On Mon, Mar 23, 2009 at 03:24:28PM -0400, T Biehn wrote:
> I'd like to build up FD credibil
==
Secunia Research 25/03/2009
- Adobe Reader JBIG2 Symbol Dictionary Buffer Overflow -
==
Table of Contents
Affected Software
--
[ iViZ Security Advisory 09-00125/03/2009 ]
--
iViZ Techno Solutions Pvt. Ltd.
retardo
-Original Message-
From: full-disclosure-boun...@lists.grok.org.uk
[mailto:full-disclosure-boun...@lists.grok.org.uk] On Behalf Of
mac.u...@mac.hush.com
Sent: 24. marts 2009 18:38
To: full-disclosure@lists.grok.org.uk; vogelsang.lore...@gmail.com
Subject: Re: [Full-disclosure] nVi
31 matches
Mail list logo