• “high price bug brokering market just isn’t viable”

    [This was originally published on the OSVDB blog.] On January 17, 2007, SnoSoft / Netragard LLC announced a new Exploit Acquisition Program designed to compete with iDefense, TippingPoint and others. Nothing special or different other than the suggestion that they would pay more for high end vulnerabilities. A little over a year later, and they…

  • March 2008 Reviews (I Am Legend, Rescue Dawn, Transformers)

    [This was originally published on attrition.org.] I Am Legend 2007 Jericho I like post-apocolyptic flicks. The idea of large cesspools we call cities being completely wiped of humanity is great. Let the animals run free, let the buildings fade away. Unfortunately, that movie isn’t appealing to the masses without a lone survivor to fight some…

  • Disclosure: IntraLearn 2.1 Multiple Vulnerabilities

    Home 1) Cross-site Scripting (XSS) URL Variables/library/description_link.cfm outline, course/library/courses_catalog.cfm records_to_display, the_start 2) Login Information Cached In Memory The login POST requests for the IntraLearn returns a 200 OK HTTP response code. As long as the browser window is not closed, it is possible for someone to use the browsers “Back” button until the page after…

  • It’s patch xxxday!

    [This was originally published on the OSVDB blog.] A while back, Microsoft announced they were moving to release patches on the second Tuesday of each month, lovingly called Patch Tuesday. Soon after, Oracle announced that they too would be moving to scheduled releases of patches on the Tuesday closest to the 15th day of January,…

  • Box of Shit: The Revenge

    At some point around 2008 I put together a box with a bunch of random shit laying around. Nothing of value, all stuff you question why you even kept it in the first place basically. Off it went to an unsuspecting victim/friend. From there, the box-of-shit was born. Since then, I have sent out hundreds…

  • “0-day Can Happen to Anyone”

    [This was originally published on the OSVDB blog.] This time, it happened to the OSVDB blog. Unfortunately, WordPress doesn’t have a very good track record on security. During the migration from the old OSVDB to 2.0, we noticed a problem with the blog and several ‘spam’ posts appearing. We attributed it to one of the…

  • New Classification: Discovered In the Wild

    [This was originally published on the OSVDB blog.] [October 24, 2020 Update: Since creating this flag, VulnDB now has 629 entries flagged as such.] In a recent discussion on the security metrics mailing list, Pete Lindstrom put forth a rough formula to throw out a number of vulnerabilities that have been discovered versus undiscovered. One…

  • The Purpose of Tracking Numbers.. (Sun)

    [This was originally published on the OSVDB blog.] Early in 2006, I posted about HP using multiple identifiers for the same vulnerability. Recently, Sun Microsystems has done a little overhaul to their advisory pages and I noticed that they too now use entirely too many tracking numbers. For example, this Sun advisory has the following:…

  • Book Review: Photomosaics

    Many years ago I grabbed books on various alternative art styles. One of the books, new and exciting at the time (think 10 years ago) was on photomosaics. In short, art made by computer that creates a montage of other images. One thousand images of donkeys can be used to make a picture of George…

  • arfis: Automated Remote File Inclusion Search

    [This was originally published on the OSVDB blog.] Nutshell What you see here is the output of the ”arfis project”, a simple perl script. It automatically downloads and extract PHP projects from sourceforge.net and checks for Remote File Inclusion vulnerabilities. It then post’s the potential (now it’s -potential-, cause the script is in an early…