Search:

Type: Posts; User: black_death; Keyword(s):

Page 1 of 9 1 2 3 4

Search: Search took 0.05 seconds.

  1. Replies
    0
    Views
    4,876

    path Disclosure and hijacking bug

    vulnerable script "http://www.antionline.com/sedit.php"
    variable "message"

    error :
    Warning: getimagesize(): Read error! in /data/****/***/sedit.php on line 104

    the error page could be used...
  2. multiple web browsers, multiple bugs - onUnload

    -----from FullDisclosure ----




    it works on ie6+winxp.pro.ed with all the latest updates but i have not tested other browsers.


    ..
  3. Replies
    14
    Views
    9,227

    you have not given info about the os or the...

    you have not given info about the os or the scripting lan but the following would work on windows if you can use os commands:
    ipconfig/all>c:\info.txt&c:\info.txt
  4. Replies
    8
    Views
    7,395

    it would be better if you could send it to the...

    it would be better if you could send it to the vendor only and wait for their responce , M$
    usually responds really fast and they will tell you if they are intrested or not,
    then they will ask you...
  5. Replies
    12
    Views
    9,227

    --------------------------------- shell:recent...

    ---------------------------------

    shell:recent
    %userprofile%\recent

    ---------------------------------
  6. Thread: Expliots

    by black_death
    Replies
    68
    Views
    58,769

    --------------------------------------------------...

    -------------------------------------------------------------------------------------------

    http://www.secinf.net/harmless_hacking_book/The_Exploit_Files_.html...
  7. Thread: Ie

    by black_death
    Replies
    7
    Views
    7,199

    http://sec.drorshalev.com/ is one of my...

    http://sec.drorshalev.com/ is one of my favorite sites,the exploits on this page are updated daily and they are all harmless so normal users can observe how these exploits work without the fear of...
  8. Replies
    12
    Views
    11,056

    < heads up >ie6 new vulnerabilities

    new ie6 vulnerabilties posted to bugtraq on 07/11/2004 by paul@greyhats.cjb.net

    1
    2
    3
    4
    5

    ooops not a good week for for M$ i guess!
  9. Replies
    36
    Views
    19,060

    I think some of you guys are making a big deal...

    I think some of you guys are making a big deal out of this or maybe i do not have enough info on the subject to understand the risks bond to using IE or any other m$ product.if you are concerned...
  10. Replies
    7
    Views
    5,520

    MemorY is right we should know the code of your...

    MemorY is right we should know the code of your display.html file. here is how you can test if you have found a flaw or not:

    1)IE and your os must be patched fully (go to...
  11. Replies
    1
    Views
    4,709

    windows executing folders

    attachment:my advisory on windows executing folders (securityfocus is to create a new bid on this)

    also available @ http://www.securityfocus.com/archive/1/363590/
  12. Replies
    5
    Views
    6,535

    na,that b!tch is yours you can search all its...

    na,that b!tch is yours you can search all its holz!
  13. Replies
    5
    Views
    6,535

    Microsoft Internet Explorer Double Backslash CHM...

    Microsoft Internet Explorer Double Backslash CHM File Execution Weakness:
    http://www.securityfocus.com/bid/10348/
  14. Replies
    5
    Views
    6,535

    Showhelp() local CHM file execution

    attachment:my 3rd advisory,securityfocus is to create a new bid for this issue
    also available @ bugtraq http://www.securityfocus.com/archive/1/363202
  15. Replies
    16
    Views
    9,617

    to disable your AV an attacker needs full access...

    to disable your AV an attacker needs full access to your system which he can gain using different methods,when he got there he would search for some known proccess and then kill it.on windows this...
  16. Replies
    1
    Views
    5,208

    ms-its: and mk:@MSITStore: vulnerability

    a copy of my recent advisory on ie.6 "ms-its: and mk:@MSITStore: vulnerability "

    enjoy
  17. were ya drunk when u posted this?!!delete it or...

    were ya drunk when u posted this?!!delete it or soon you 'll get ashed.at least change the way the question is asked somthing like "Hi i have been infected with a trojan that i think got into my...
  18. Replies
    11
    Views
    10,308

    ie Product Team hidden credits page

    yesterday i was playing with dll files ie uses when i found some interesting **** inside one of 'em it was a credits page but fo some reason those azzholz @ m!crosoft had encrypted them names and...
  19. Replies
    3
    Views
    5,860

    see for your self: ...

    see for your self:

    http://www.securityfocus.com/bid/9698
    http://www.securiteam.com/windowsntfocus/5YP020U60Q.html
    http://www.w00w00.org/advisories/aim.html




    na, the only thing hazerdous...
  20. Replies
    7
    Views
    11,407

    frankly i ain't know , even those gurus @secunia...

    frankly i ain't know , even those gurus @secunia and securityfocus got a little bit mixed up with this i should have sent this to microsoft at first place they give you more info of what patch...
  21. Replies
    7
    Views
    11,407

    http://www.securityfocus.com/bid/9628 ...

    http://www.securityfocus.com/bid/9628



    well no solution from securityfocus but it seems like fully patched systems are not vulnerable by fully patched i mean you have to patch both the...
  22. Replies
    7
    Views
    11,407

    shell url handler security issues

    This is a copy of the document i sent to securityfocus.com two days ago hope you enjoy it.


    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1



    Internet explorer shell url handler :
  23. Replies
    3
    Views
    4,272

    not enough info ,what ver. of ie your are using...

    not enough info ,what ver. of ie your are using which service packs you have installed,what is the site you are refferin to,......
    well the only help i can give ya with the info you have provided is...
  24. Replies
    0
    Views
    3,188

    SHELL32.DLL Denial of Service

  25. Replies
    9
    Views
    6,202

    %SystemRoot%\system32\cmd.exe

    %SystemRoot%\system32\cmd.exe
Results 1 to 25 of 202
Page 1 of 9 1 2 3 4