Last Updated: 2006-05-08 00:21:25 UTC
by Mike Poor (Version: 1)
Shows a very large number of records and sources, and a small set of targets.
Its is currently #1 in the Dshield Ports list:
Update to Firefox vulnerability posted earlier
This particular vulnerability could be exploited by a malicious web site, enabling the remote site to open and view content of local files. This is enabled by the site tricking the user into right-clicking (alt-clicking) and choosing the "view image" on a broken image link. The malicious site links to a file on your machine, which then exposes the file.
Many of us have been wanting packet capture file archives for a while. Richard Beijtlich started a project called OpenPacket.org and I startedPacketfoo. I have talked to Richard briefly about collaborating, and Im sure we will further that as the projects grow. Ill be setting up the charter, and putting up files as the days go by. Any support would be appreciated.
domo arigato gozaimas,
Handler on Duty
Last Updated: 2006-05-07 01:24:42 UTC
by Tony Carothers (Version: 1)
Today on Bugtraq a message was posted that listed a possible vulnerability in Firefox 220.127.116.11. Several attempts by various Handlers were unable to determine that a new vulnerability actually exists. The link posted to Bugtraq took us to a web page that was purported to run the exploit, which did not appear to work. Stay tuned for further details.The "exploit" appears to be a simple link to an audio file (claims to be an image). If you, as instructed by the exploit page, open the "image", you will launch your media player and load a local .wav file. Nothing actually "bad" about that as far as we can tell, so this is probably just a joke to point out some of the social engineering aspects of hyperlinked media.