|
Colapse all |
Post message
HPSBUX02178 SSRT061267 rev.1 - HP-UX Secure Shell Remote Denial of Service (DoS) 2006-12-05 security-alert hp com -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c00815112 Version: 1 HPSBUX02178 SSRT061267 rev.1 - HP-UX Secure Shell Remote Denial of Service (DoS) NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. [ more ] [ reply ] Re: Re: [Aria-Security Team] uGestBook SQL Injection Vuln 2006-12-05 saps audit gmail com well actually there no injection sql in the var : -page -block it's just an error for type mismatch ... ( Microsoft VBScript runtime error '800a000d' Type mismatch: '[string: "query_blabla"]' i think those guys ( aria ) doesn't understand the difference between an error sql and a injection sql [ more ] [ reply ] eEye's Zero-Day Tracker Launch 2006-12-05 chinese soup (noodle mastah gmail com) http://eeyeresearch.typepad.com/blog/ http://research.eeye.com/html/alerts/zeroday/index.html "If something is reported as a non-exploitable bug, we'll make sure to exhaust the flaw for exploitability, as we have shown with the ASX Playlist and the ADODB.Connection ActiveX zero-day vulnerabilities. [ more ] [ reply ] Re: Symantec LiveState Agent for Windows vulnerabi 2006-12-05 Damjan (damjan widesec com) (1 replies) > >> we've found local privilege escalation in Symantec LiveState agent. > >> > >> PoC: > >> > >> 1. kill shstart.exe process > > MS> Wouldn't you have to be administrator to kill shstart.exe? > > LocalSystem account has more privilegies then administrator's one. I don't think so. I thin [ more ] [ reply ] Re: Symantec LiveState Agent for Windows vulnerability - Local Privilege Escalation 2006-12-05 Thor (Hammer of God) (thor hammerofgod com) On 12/5/06 11:16 AM, "eugeny gladkih" <john (at) drweb (dot) com [email concealed]> spoketh to all: >>>>>> "MS" == Michael Scheidell <scheidell (at) secnap (dot) net [email concealed]> writes: > >>> we've found local privilege escalation in Symantec LiveState agent. >>> >>> PoC: >>> >>> 1. kill shstart.exe process > > MS> Wouldn't you have to be adm [ more ] [ reply ] [SECURITY] [DSA 1228-1] New elinks packages fix arbitrary shell command execution 2006-12-05 Moritz Muehlenhoff (jmm debian org) [security bulletin] HPSBUX02145 SSRT061202 rev.2 - HP-UX running Apache Remote Execution of Arbitrary Code, Denial of Service (DoS), and Unauthorized Access 2006-12-05 security-alert hp com -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c00760969 Version: 2 HPSBUX02145 SSRT061202 rev.2 - HP-UX running Apache Remote Execution of Arbitrary Code, Denial of Service (DoS), and Unauthorized Access NOTICE: The information in this Secur [ more ] [ reply ] CYBSEC - Security Pre-Advisory: SAP Internet Graphics Service (IGS) Remote Arbitrary File Removal 2006-12-05 Mariano Nuñez Di Croce (mnunez cybsec com) (The following pre-advisory is also available in PDF format for download at: http://www.cybsec.com/vuln/CYBSEC-Security_Pre-Advisory_SAP_IGS_Remote_A rbitrary_File_Removal.pdf ) CYBSEC S.A. www.cybsec.com Pre-Advisory Name: SAP Internet Graphics Service (IGS) Remote Arbitrary File Removal ======= [ more ] [ reply ] CYBSEC - Security Pre-Advisory: SAP Internet Graphics Service (IGS) Undocumented Features 2006-12-05 Mariano Nuñez Di Croce (mnunez cybsec com) (The following pre-advisory is also available in PDF format for download at: http://www.cybsec.com/vuln/CYBSEC-Security_Pre-Advisory_SAP_IGS_Undocume nted_Features.pdf ) CYBSEC S.A. www.cybsec.com Pre-Advisory Name: SAP Internet Graphics Service (IGS) Undocumented Features ================== Vuln [ more ] [ reply ] DistrRTgen 1.0 launched! 2006-12-05 Martin Jørgensen (martin westergaard gmail com) We at freerainbowtables.com are happy to announce the release of DistrRTgen 1.0 DistRTgen is a distributed rainbowtables generator client based on the work of Zhu Shuanglei (http://www.antsight.com/zsl/rainbowcrack/). www.freerainbowtables.com provides rainbowtables for download for free, and now Di [ more ] [ reply ] Re: [Aria-Security Team] uGestBook SQL Injection Vuln 2006-12-05 Stuart Moore (smoore bugtraq securityglobal net) RE: Symantec LiveState Agent for Windows vulnerability - Local Privilege Escalation 2006-12-05 Michael Scheidell (scheidell secnap net) (1 replies) > -----Original Message----- > From: ss_team [mailto:ssteam.pl (at) gmail (dot) com [email concealed]] > Sent: Monday, December 04, 2006 11:28 AM > To: bugtraq (at) securityfocus (dot) com [email concealed] > Subject: Symantec LiveState Agent for Windows vulnerability - > Local Privilege Escalation > > > hello, > > we've found local privilege escalat [ more ] [ reply ] Re: Symantec LiveState Agent for Windows vulnerability - Local Privilege Escalation 2006-12-05 eugeny gladkih (john drweb com) (2 replies) Re: Symantec LiveState Agent for Windows vulnerability - Local Privilege Escalation 2006-12-05 Ansgar -59cobalt- Wiechers (bugtraq planetcobalt net) Re: Symantec LiveState Agent for Windows vulnerability - Local Privilege Escalation 2006-12-05 Steve Shockley (steve shockley shockley net) [KOffice security advisory] KOffice OLEfilter integer overflow 2006-12-05 Dirk Mueller (mueller kde org) Re: Evolve Merchant[ injection sql ] 2006-12-05 tony lynxinternet com We have fixed the (original) viewcart.asp?zoneid one, that was a legitimate sql injection hole. The (other) products.asp?pa rtno is not a sql-injection vulnerability. However it does put up a sql error message if an unknown partno is passed. So the researcher would have put in an apostrophe int [ more ] [ reply ] SNORT Covered channels detector patch 2006-12-05 fryxar fryxar (fryxar yahoo com ar) Usually, in every medium/high size company Network, there's a firewall conecting the corporative LAN/WAN to the Internet with a set of rules that only allows specific traffic, such as HTTP, HTTPS. FTP or POP3 / SMTP. A malicious internal user, could take advantage of these open ports, and use them t [ more ] [ reply ] TSRT-06-14: IBM Tivoli Storage Manager Mutiple Buffer Overflow Vulnerabilities 2006-12-04 TSRT 3com com TSRT-06-14: IBM Tivoli Storage Manager Mutiple Buffer Overflow Vulnerabilities http://www.tippingpoint.com/security/advisories/TSRT-06-14.html December 4, 2006 -- CVE ID: CVE-2006-5855 -- Affected Vendor: IBM -- Affected Products: Tivoli Storage Manager <5.2.9 Tivoli Storage Manager < [ more ] [ reply ] new xss in modbb forum 2006-12-04 h angel (angel_h6 yahoo fr) ************************************************** ************************************************** ****** mowdBB forums ************************************************** ************************************************** ****** * mowdBB RC-6 ; * Class = XSS ; * Found by = ScReAmDz * cont [ more ] [ reply ] rPSA-2006-0211-2 doxygen libpng 2006-12-04 rPath Update Announcements (announce-noreply rpath com) rPath Security Advisory: 2006-0211-2 Published: 2006-11-15 Updated: 2006-12-04 added doxygen to advisory Products: rPath Linux 1 Rating: Minor Exposure Level Classification: Indirect Deterministic Denial of Service Updated Versions: libpng=/conary.rpath.com@rpl:devel//1/1.2.13-0.1-1 [ more ] [ reply ] XSS in JAB Guest Book 2006-12-04 nj hackerz ir Script Name: JAB Guest Book Authors: Barnz (at) hotmail.co (dot) uk [email concealed] Website: James Barnsley Bug Report: NetJackal (nj[AT]hackerz[DOT]ir & nima_501[AT]yahoo[DOT]com) Status: Patch not released First i should apologize for my bad english. Intro: JAB Guest Book is a free guest book written in PHP, it works using [ more ] [ reply ] Symantec LiveState Agent for Windows vulnerability - Local Privilege Escalation 2006-12-04 ss_team (ssteam pl gmail com) hello, we've found local privilege escalation in Symantec LiveState agent. PoC: 1. kill shstart.exe process 2. from symantec livestate agent icon in systray choose "Web Self-Service" 3. New browser window will open, it is running with SYSTEM privileges. tested on fully patched Win XP SP2, Symant [ more ] [ reply ] |
|
Privacy Statement |
By : Hackerz.ir
Link :
http://hide_your_url_plz.com ]
--------------------------------------------------
this is a simple error ...
( try with /default.aspx?page=Document&app=Documents )
there's totally no injection in this case
[ more ] [ reply ]