BugTraq Mode:
(Page 1099 of 1748)  < Prev  1094 1095 1096 1097 1098 1099 1100 1101 1102 1103 1104  Next >
Invision Power Board 2.1 <= 2.1.6 sql injection 2006-07-14
rst ghc ru
RST/GHC advisory#41

Product: Invision Power Board

Version: 2.1 <= 2.1.6

Vendor: INVISION Power Service

URL: http://www.invisionpower.com

VULNERABILITY CLASS: SQL injection

[Product Description]

Invision Power Board, an award-winning scaleable bulletin board system, written in PHP, uses S

[ more ]  [ reply ]
Fantastic Guestbook v2.0.1 Advisory 2006-07-11
omnipresent email it
.:. Fantastic Guestbook v2.0.1 Advisory .:.

Date of written Advisory:

-------------------------

July, 11 2006

Product:

--------

Fantastic Guestbook v2.0.1

Vendor:

-------

http://fscripts.com/

Description:

------------

Fantastic GuestBook version 2.0.1 is simple GuestBook;

[ more ]  [ reply ]
[OpenPKG-SA-2006.013] OpenPKG Security Advisory (mutt) 2006-07-15
OpenPKG (openpkg openpkg org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________

OpenPKG Security Advisory The OpenPKG Project
http://www.openpkg.org/security/ http://www.openpkg.org
openpkg-security (at) openpkg (dot) org [email concealed]

[ more ]  [ reply ]
Re: phpbb 3.x sql injection (with global moderator rights) 2006-07-14
bugtraq neothermic com
This issue has been fixed in CVS. I will also remind everyone that 3.0 is beta software and has not yet had a security audit, and therefore we do not recommend to use the beta in a live environment.

I would also like to remind people that in future we would appreciate it if such reports could be

[ more ]  [ reply ]
VBZooM <=V1.11 " ignore-pm.php" SQL Injection 2006-07-11
Breeeeh hotmail com
===========================================

Discovered By: C.B.B.L

CrAzY CrAcKeR ,Breeeeh ,BoNy-m ,LiNuX_rOOt

===========================================

Search:-

POWERED BY: VBZooM V1.11

Example:-

ignore-pm.php?UserID=[SQL Injection]

===========================================

[ more ]  [ reply ]
Re: Buddy Zone Version 1.0.1 - XSS 2006-07-15
support vastal com
The vulnerability has been patched in version 1.0.1 and all customers have been notified who are using version 1.0.1 to install the patch.

Vastal I-Tech & Co. Team,

www.vastal.com

[ more ]  [ reply ]
VBZooM <=V1.11 " reply.php" SQL Injection 2006-07-11
Breeeeh hotmail com
===========================================

Discovered By: C.B.B.L

CrAzY CrAcKeR ,Breeeeh ,BoNy-m ,LiNuX_rOOt

===========================================

Search:-

POWERED BY: VBZooM V1.11

Example:-

/reply.php?UserID=[SQL njection]

[ more ]  [ reply ]
RE: MIMESweeper For Web 5.X Cross Site Scripting 2006-07-11
Erez Metula (erezmetula 2bsecure co il)

Hi list,
I've been asked the following question:

"It sounds like the net impact of this vulnerability is that an attacker can steal cookies for a site the user isn't allowed to visit anyway. In other words, there aren't going to be any interesting cookies to steal. Is there more to this attack s

[ more ]  [ reply ]
SubberZ[Lite] - Remote File Include 2006-07-14
ChironeX FleckeriX Gmail Com
################ Chironex Fleckeri ###############################

#SubberZ[Lite] - Remote File Include

#Find by Chironex Fleckeri

#Mail/MSN: ChironeX.FleckeriX (at) Gmail (dot) Com [email concealed]

##################################################################

http://[site]/[path]/user-func.php?myadmindir=[Shell]

[ more ]  [ reply ]
Microsoft PowerPoint 0-day Vulnerability FAQ document written 2006-07-14
Juha-Matti Laurio (juha-matti laurio netti fi)
I have written FAQ document including 33 items about the recently reported 0-day vulnerability in PowerPoint.
This vulnerability is being exploited by Trojan horse including keylogger features.

The document entitled as Microsoft PowerPoint 0-day Vulnerability FAQ is located at my SecuriTeam Blogs s

[ more ]  [ reply ]
Re: [Full-disclosure] ERNW Security Advisory 02/2006 - Buffer Overflow in sipXtapi (used in AOL Triton) 2006-07-11
Mailinglists (mozilla ids-guide de)
The bug is confirmed and fixed, but it's up to the guys from
sipfoundry to work on their changelogs ;-)

TD> is there an official notification from sipX?
TD> I dont see any mention to this vulnerability in the changelog

TD> On 7/10/06, mozilla (at) ids-guide (dot) de [email concealed] <mozilla (at) ids-guide (dot) de [email concealed]> wrote:
>>
>> ERNW

[ more ]  [ reply ]
VBZooM "sendmail.php" SQL Injection 2006-07-11
Breeeeh hotmail com
===========================================

Discovered By: C.B.B.L

CrAzY CrAcKeR ,Breeeeh ,BoNy-m ,LiNuX_rOOt

===========================================

Example:-

/sendmail.php?UserID=[SQL Injection]

===========================================

[ more ]  [ reply ]
MiniBB Forum <= 1.5a Remote File Include Vulnerabilities 2006-07-15
matdhule gmail com
------------------------------------------------------------------------
---------

MiniBB Forum <= 1.5a Remote File Include Vulnerabilities

------------------------------------------------------------------------
---------

Author : Matdhule

Contact : matdhule (at) gmail (dot) com [email concealed]

Application : Mi

[ more ]  [ reply ]
Phorum 5.1.14 XSS SQL injection Vulnerability 2006-07-11
securityconnection gmail com
Phorum 5.1.14

http://www.phorum.org

--------------------------

Cross Site Scripting (XSS)

--------------------------

POST http://target.xx:80/posting.php HTTP/1.0

Accept: */*

Content-Type: application/x-www-form-urlencoded

Host: target.xx

Content-Length: 447

message_id=0&forum_id=1&mode=<s

[ more ]  [ reply ]
[SECURITY] Plain text password in Finjan Appliance 5100/8100 NG backup file 2006-07-11
finde_schwachstelle gmx net
Plain text password in backup file ( Finjan Appliance 5100/8100 NG)
The Version 8.3.5 is affected.

In the new console function backup and restore the passwords are saved as plain text.

The Finjan Appliance uses a Firebird database. The backup saves the database as text file.
Samba and FTP passwo

[ more ]  [ reply ]
Re: WordPress 2.0.3 SQL Error and Full Path Disclosure 2006-07-13
jholguin gmail com
Change in wp-includes/classes.php :

line : if (empty($page))

for

line : if (empty($page) || $page <0 || !is_integer($page))

it's easy.

[ more ]  [ reply ]
Rocks Clusters <=4.1 local root 2006-07-14
Xavier (compromise gmail com)
(direct link: http://xavier.tigerteam.se/advisories/TSEAD-200606-6.txt)

tigerteam.se security advisory - TSEAD-200606-6
www.tigerteam.se

Advisory: Rocks Clusters <=4.1 local root vulnerabilities
Date: Wed Jul 5 15:52:59 EDT 2006
Applicati

[ more ]  [ reply ]
MyGallery "Room.php" SQL Injection 2006-07-11
Breeeeh hotmail com
===========================================

Discovered By: C.B.B.L

CrAzY CrAcKeR ,Breeeeh ,BoNy-m ,LiNuX_rOOt

===========================================

Example:-

/MyGallery/Room.php?id=[SQL Injection]

===========================================

[ more ]  [ reply ]
XSS phpBB 2.0.21 in administration 2006-07-11
renatrix gmail com
phpBB 2.0.21 XSS in administration

**********************************

//-- By Blwood [renatrix (at) gmail (dot) com [email concealed]]

//-- [ http://www.blwood.net ]

//--

Style Admin

-----------

Management & Create a theme

Lots of input are not properly "filtrate" like style_name, head_stylesheet, body_backgrou

[ more ]  [ reply ]
(Page 1099 of 1748)  < Prev  1094 1095 1096 1097 1098 1099 1100 1101 1102 1103 1104  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus