BugTraq Mode:
(Page 1012 of 1748)  < Prev  1007 1008 1009 1010 1011 1012 1013 1014 1015 1016 1017  Next >
Re: EasyPage Portal ( all ver )SQL Injection 2006-12-05
saps audit gmail com
[ Bug : SQL Injection " Input string "

By : Hackerz.ir
Link :
http://hide_your_url_plz.com ]
--------------------------------------------------

this is a simple error ...
( try with /default.aspx?page=Document&app=Documents )
there's totally no injection in this case

[ more ]  [ reply ]
HPSBUX02178 SSRT061267 rev.1 - HP-UX Secure Shell Remote Denial of Service (DoS) 2006-12-05
security-alert hp com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c00815112
Version: 1

HPSBUX02178 SSRT061267 rev.1 - HP-UX Secure Shell Remote Denial of Service (DoS)

NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.

[ more ]  [ reply ]
Re: Re: [Aria-Security Team] uGestBook SQL Injection Vuln 2006-12-05
saps audit gmail com
well actually there no injection sql in the var :
-page
-block

it's just an error for type mismatch ...
( Microsoft VBScript runtime error '800a000d'
Type mismatch: '[string: "query_blabla"]'

i think those guys ( aria ) doesn't understand the difference between an error sql and a injection sql

[ more ]  [ reply ]
eEye's Zero-Day Tracker Launch 2006-12-05
chinese soup (noodle mastah gmail com)
http://eeyeresearch.typepad.com/blog/
http://research.eeye.com/html/alerts/zeroday/index.html

"If something is reported as a non-exploitable bug, we'll make sure to
exhaust the flaw for exploitability, as we have shown with the ASX
Playlist and the ADODB.Connection ActiveX zero-day vulnerabilities.

[ more ]  [ reply ]
EasyPage Portal ( all ver )SQL Injection 2006-12-05
matrix hackerz ir
Name : Matrix (S.B)

Bug : SQL Injection " Input string "

vendor : EasyPage

By : Hackerz.ir

Link :
http://www.easypage.org/sptrees/default.aspx?page=Document&app=Documents
&docId=#

[ more ]  [ reply ]
Re: Symantec LiveState Agent for Windows vulnerabi 2006-12-05
Damjan (damjan widesec com) (1 replies)
> >> we've found local privilege escalation in Symantec LiveState agent.
> >>
> >> PoC:
> >>
> >> 1. kill shstart.exe process
>
> MS> Wouldn't you have to be administrator to kill shstart.exe?
>
> LocalSystem account has more privilegies then administrator's one.

I don't think so. I thin

[ more ]  [ reply ]
Re: Symantec LiveState Agent for Windows vulnerabi 2006-12-05
eugeny gladkih (john drweb com)
Re: Symantec LiveState Agent for Windows vulnerability - Local Privilege Escalation 2006-12-05
Thor (Hammer of God) (thor hammerofgod com)

On 12/5/06 11:16 AM, "eugeny gladkih" <john (at) drweb (dot) com [email concealed]> spoketh to all:

>>>>>> "MS" == Michael Scheidell <scheidell (at) secnap (dot) net [email concealed]> writes:
>
>>> we've found local privilege escalation in Symantec LiveState agent.
>>>
>>> PoC:
>>>
>>> 1. kill shstart.exe process
>
> MS> Wouldn't you have to be adm

[ more ]  [ reply ]
[SECURITY] [DSA 1228-1] New elinks packages fix arbitrary shell command execution 2006-12-05
Moritz Muehlenhoff (jmm debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 1228-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Moritz Muehlenhoff
December 5th, 2006

[ more ]  [ reply ]
[security bulletin] HPSBUX02145 SSRT061202 rev.2 - HP-UX running Apache Remote Execution of Arbitrary Code, Denial of Service (DoS), and Unauthorized Access 2006-12-05
security-alert hp com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c00760969
Version: 2

HPSBUX02145 SSRT061202 rev.2 - HP-UX running Apache Remote Execution of Arbitrary Code, Denial of Service (DoS), and Unauthorized Access

NOTICE: The information in this Secur

[ more ]  [ reply ]
CYBSEC - Security Pre-Advisory: SAP Internet Graphics Service (IGS) Remote Arbitrary File Removal 2006-12-05
Mariano Nuñez Di Croce (mnunez cybsec com)
(The following pre-advisory is also available in PDF format for download at:
http://www.cybsec.com/vuln/CYBSEC-Security_Pre-Advisory_SAP_IGS_Remote_A
rbitrary_File_Removal.pdf )

CYBSEC S.A.
www.cybsec.com

Pre-Advisory Name: SAP Internet Graphics Service (IGS) Remote Arbitrary File Removal
=======

[ more ]  [ reply ]
CYBSEC - Security Pre-Advisory: SAP Internet Graphics Service (IGS) Undocumented Features 2006-12-05
Mariano Nuñez Di Croce (mnunez cybsec com)
(The following pre-advisory is also available in PDF format for download at:
http://www.cybsec.com/vuln/CYBSEC-Security_Pre-Advisory_SAP_IGS_Undocume
nted_Features.pdf )

CYBSEC S.A.
www.cybsec.com

Pre-Advisory Name: SAP Internet Graphics Service (IGS) Undocumented Features
==================

Vuln

[ more ]  [ reply ]
DistrRTgen 1.0 launched! 2006-12-05
Martin Jørgensen (martin westergaard gmail com)
We at freerainbowtables.com are happy to announce the release of DistrRTgen 1.0
DistRTgen is a distributed rainbowtables generator client based on the
work of Zhu Shuanglei (http://www.antsight.com/zsl/rainbowcrack/).
www.freerainbowtables.com provides rainbowtables for download for
free, and now Di

[ more ]  [ reply ]
URL Rdirecction Bug Yahoo 2006-12-05
matrix hackerz ir
Name: Matrix (S.B)

Vendor : yahoo.com

Bug : URL Redirection

Link:
http://rds.yahoo.com/_ylt=Ah0geusyaM2xEzqMAjS9XNyoA/SIG=11do5qdq6/EXP=11
48028186/**http%3a//www.hackerz.ir

http://search.yahoo.com/preferences/preferences?pref_done=http%3a//www.h
ackerz.ir

[ more ]  [ reply ]
Re: [Aria-Security Team] uGestBook SQL Injection Vuln 2006-12-05
Stuart Moore (smoore bugtraq securityglobal net)
Aria,

> index.asp?Block=1&page=[SQL INJECTION]

How is this SQL injection? Looking at the code in 'index.asp' shows
that the 'page' parameter is not used in the SQL statement:

strSQL = "SELECT message.* FROM message ORDER BY msg_id DESC;"

Stuart

[ more ]  [ reply ]
RE: Symantec LiveState Agent for Windows vulnerability - Local Privilege Escalation 2006-12-05
Michael Scheidell (scheidell secnap net) (1 replies)

> -----Original Message-----
> From: ss_team [mailto:ssteam.pl (at) gmail (dot) com [email concealed]]
> Sent: Monday, December 04, 2006 11:28 AM
> To: bugtraq (at) securityfocus (dot) com [email concealed]
> Subject: Symantec LiveState Agent for Windows vulnerability -
> Local Privilege Escalation
>
>
> hello,
>
> we've found local privilege escalat

[ more ]  [ reply ]
Re: Symantec LiveState Agent for Windows vulnerability - Local Privilege Escalation 2006-12-05
eugeny gladkih (john drweb com) (2 replies)
Re: Symantec LiveState Agent for Windows vulnerability - Local Privilege Escalation 2006-12-05
Ansgar -59cobalt- Wiechers (bugtraq planetcobalt net)
Re: Symantec LiveState Agent for Windows vulnerability - Local Privilege Escalation 2006-12-05
Steve Shockley (steve shockley shockley net)
[KOffice security advisory] KOffice OLEfilter integer overflow 2006-12-05
Dirk Mueller (mueller kde org)

KOffice Security Advisory: KOffice olefilters integer overflow
Original Release Date: 2006-12-04
URL: http://www.kde.org/info/security/advisory-20061204-1.txt

0. References

CVE-2006-6120

1. Systems affected:

KOffice 1.4.x and 1.6.0. 1.5.x releases are unaffected as well

[ more ]  [ reply ]
Re: Evolve Merchant[ injection sql ] 2006-12-05
tony lynxinternet com
We have fixed the (original) viewcart.asp?zoneid one, that was a legitimate sql injection hole.

The (other) products.asp?pa rtno is not a sql-injection vulnerability. However it does put up a sql error message if an unknown partno is passed. So the researcher would have put in an apostrophe int

[ more ]  [ reply ]
SNORT Covered channels detector patch 2006-12-05
fryxar fryxar (fryxar yahoo com ar)
Usually, in every medium/high size company Network,
there's a firewall conecting the corporative LAN/WAN
to the Internet with a set of rules that only allows
specific traffic, such as HTTP, HTTPS. FTP or POP3 /
SMTP. A malicious internal user, could take advantage
of these open ports, and use them t

[ more ]  [ reply ]
TSRT-06-14: IBM Tivoli Storage Manager Mutiple Buffer Overflow Vulnerabilities 2006-12-04
TSRT 3com com
TSRT-06-14: IBM Tivoli Storage Manager Mutiple Buffer Overflow
Vulnerabilities
http://www.tippingpoint.com/security/advisories/TSRT-06-14.html
December 4, 2006

-- CVE ID:
CVE-2006-5855

-- Affected Vendor:
IBM

-- Affected Products:
Tivoli Storage Manager <5.2.9
Tivoli Storage Manager <

[ more ]  [ reply ]
new xss in modbb forum 2006-12-04
h angel (angel_h6 yahoo fr)


**************************************************
**************************************************
******

mowdBB forums

**************************************************
**************************************************
******

* mowdBB RC-6 ;

* Class = XSS ;

* Found by = ScReAmDz

* cont

[ more ]  [ reply ]
Re: Multiple bugs in TFT-Gallery 2006-12-04
simo64 morx org
this is already reported on 2006-03-25

see -> http://www.securityfocus.com/bid/17250
or http://www.milw0rm.com/exploits/1611

[ more ]  [ reply ]
rPSA-2006-0211-2 doxygen libpng 2006-12-04
rPath Update Announcements (announce-noreply rpath com)
rPath Security Advisory: 2006-0211-2
Published: 2006-11-15
Updated:
2006-12-04 added doxygen to advisory
Products: rPath Linux 1
Rating: Minor
Exposure Level Classification:
Indirect Deterministic Denial of Service
Updated Versions:
libpng=/conary.rpath.com@rpl:devel//1/1.2.13-0.1-1

[ more ]  [ reply ]
XSS in JAB Guest Book 2006-12-04
nj hackerz ir
Script Name: JAB Guest Book
Authors: Barnz (at) hotmail.co (dot) uk [email concealed]
Website: James Barnsley
Bug Report: NetJackal (nj[AT]hackerz[DOT]ir & nima_501[AT]yahoo[DOT]com)
Status: Patch not released
First i should apologize for my bad english.
Intro:
JAB Guest Book is a free guest book written in PHP, it works using

[ more ]  [ reply ]
Symantec LiveState Agent for Windows vulnerability - Local Privilege Escalation 2006-12-04
ss_team (ssteam pl gmail com)
hello,

we've found local privilege escalation in Symantec LiveState agent.

PoC:

1. kill shstart.exe process
2. from symantec livestate agent icon in systray choose "Web Self-Service"
3. New browser window will open, it is running with SYSTEM privileges.

tested on fully patched Win XP SP2, Symant

[ more ]  [ reply ]
(Page 1012 of 1748)  < Prev  1007 1008 1009 1010 1011 1012 1013 1014 1015 1016 1017  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus