Search Results - Antionline Forums - Maximum Security for a Connected World

Search:

Type: Posts; User: black_death; Keyword(s):

Page 1 of 9 1 2 3 4

Search: Search took 0.01 seconds.

  1. Replies
    0
    Views
    1,160

    path Disclosure and hijacking bug

    vulnerable script "http://www.antionline.com/sedit.php"
    variable "message"

    error :
    Warning: getimagesize(): Read error! in /data/****/***/sedit.php on line 104

    the error page could be used...
  2. multiple web browsers, multiple bugs - onUnload

    -----from FullDisclosure ----




    it works on ie6+winxp.pro.ed with all the latest updates but i have not tested other browsers.


    ..
  3. Replies
    14
    Views
    1,509

    you have not given info about the os or the...

    you have not given info about the os or the scripting lan but the following would work on windows if you can use os commands:
    ipconfig/all>c:\info.txt&c:\info.txt
  4. Replies
    8
    Views
    515

    it would be better if you could send it to the...

    it would be better if you could send it to the vendor only and wait for their responce , M$
    usually responds really fast and they will tell you if they are intrested or not,
    then they will ask you...
  5. Replies
    12
    Views
    1,291

    --------------------------------- shell:recent...

    ---------------------------------

    shell:recent
    %userprofile%\recent

    ---------------------------------
  6. Thread: Expliots

    by black_death
    Replies
    68
    Views
    5,753

    --------------------------------------------------...

    -------------------------------------------------------------------------------------------

    http://www.secinf.net/harmless_hacking_book/The_Exploit_Files_.html...
  7. Thread: Ie

    by black_death
    Replies
    7
    Views
    1,030

    http://sec.drorshalev.com/ is one of my...

    http://sec.drorshalev.com/ is one of my favorite sites,the exploits on this page are updated daily and they are all harmless so normal users can observe how these exploits work without the fear of...
  8. Replies
    12
    Views
    1,033

    < heads up >ie6 new vulnerabilities

    new ie6 vulnerabilties posted to bugtraq on 07/11/2004 by paul@greyhats.cjb.net

    1
    2
    3
    4
    5

    ooops not a good week for for M$ i guess!
  9. Replies
    36
    Views
    3,919

    I think some of you guys are making a big deal...

    I think some of you guys are making a big deal out of this or maybe i do not have enough info on the subject to understand the risks bond to using IE or any other m$ product.if you are concerned...
  10. Replies
    7
    Views
    760

    MemorY is right we should know the code of your...

    MemorY is right we should know the code of your display.html file. here is how you can test if you have found a flaw or not:

    1)IE and your os must be patched fully (go to...
  11. Replies
    1
    Views
    734

    windows executing folders

    attachment:my advisory on windows executing folders (securityfocus is to create a new bid on this)

    also available @ http://www.securityfocus.com/archive/1/363590/
  12. Replies
    5
    Views
    812

    na,that b!tch is yours you can search all its...

    na,that b!tch is yours you can search all its holz!
  13. Replies
    5
    Views
    812

    Microsoft Internet Explorer Double Backslash CHM...

    Microsoft Internet Explorer Double Backslash CHM File Execution Weakness:
    http://www.securityfocus.com/bid/10348/
  14. Replies
    5
    Views
    812

    Showhelp() local CHM file execution

    attachment:my 3rd advisory,securityfocus is to create a new bid for this issue
    also available @ bugtraq http://www.securityfocus.com/archive/1/363202
  15. Replies
    16
    Views
    1,452

    to disable your AV an attacker needs full access...

    to disable your AV an attacker needs full access to your system which he can gain using different methods,when he got there he would search for some known proccess and then kill it.on windows this...
  16. Replies
    1
    Views
    1,361

    ms-its: and mk:@MSITStore: vulnerability

    a copy of my recent advisory on ie.6 "ms-its: and mk:@MSITStore: vulnerability "

    enjoy
  17. were ya drunk when u posted this?!!delete it or...

    were ya drunk when u posted this?!!delete it or soon you 'll get ashed.at least change the way the question is asked somthing like "Hi i have been infected with a trojan that i think got into my...
  18. Replies
    11
    Views
    1,525

    ie Product Team hidden credits page

    yesterday i was playing with dll files ie uses when i found some interesting **** inside one of 'em it was a credits page but fo some reason those azzholz @ m!crosoft had encrypted them names and...
  19. Replies
    3
    Views
    1,203

    see for your self: ...

    see for your self:

    http://www.securityfocus.com/bid/9698
    http://www.securiteam.com/windowsntfocus/5YP020U60Q.html
    http://www.w00w00.org/advisories/aim.html




    na, the only thing hazerdous...
  20. Replies
    7
    Views
    3,400

    frankly i ain't know , even those gurus @secunia...

    frankly i ain't know , even those gurus @secunia and securityfocus got a little bit mixed up with this i should have sent this to microsoft at first place they give you more info of what patch...
  21. Replies
    7
    Views
    3,400

    http://www.securityfocus.com/bid/9628 ...

    http://www.securityfocus.com/bid/9628



    well no solution from securityfocus but it seems like fully patched systems are not vulnerable by fully patched i mean you have to patch both the...
  22. Replies
    7
    Views
    3,400

    shell url handler security issues

    This is a copy of the document i sent to securityfocus.com two days ago hope you enjoy it.


    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1



    Internet explorer shell url handler :
  23. Replies
    3
    Views
    628

    not enough info ,what ver. of ie your are using...

    not enough info ,what ver. of ie your are using which service packs you have installed,what is the site you are refferin to,......
    well the only help i can give ya with the info you have provided is...
  24. Replies
    0
    Views
    462

    SHELL32.DLL Denial of Service

  25. Replies
    9
    Views
    838

    %SystemRoot%\system32\cmd.exe

    %SystemRoot%\system32\cmd.exe
Results 1 to 25 of 202
Page 1 of 9 1 2 3 4