BugTraq Mode:
(Page 1130 of 1748)  < Prev  1125 1126 1127 1128 1129 1130 1131 1132 1133 1134 1135  Next >
Client buffer-overflow in Quake 3 engine (1.32c / rev 795) 2006-06-02
Luigi Auriemma (aluigi autistici org)

#######################################################################

Luigi Auriemma

Application: Quake 3 engine
http://www.idsoftware.com
http://www.icculus.org/quake3/
Versions: Quake 3 <= 1.32c
Icculus.

[ more ]  [ reply ]
Multiple Vendor NTFS Data Stream Malware Stealth Technique 2006-06-04
Joxean Koret (joxeankoret yahoo es)
Hi to all!

Because it isn't a new problem and is well known by virus and spyware
writters I decide to release to the public now. Full disclosure.

Attached goes a simple paper that describes this "very-advanced"
technique that was applicable at 1993 and is currently applicable.

Regards,
Joxean K

[ more ]  [ reply ]
XSS in ICQ.com 2006-06-02
sn4k3 23 gmail com
Hello,

there's a XSS Bug in www.ICQ.com

http://www.icq.com/boards/atoz.php?letter=oOOoOooOOOoO%3Cscript%3Ealert%
28%27www.SR-Crew.de.tt%27%29%3C/script%3E

[ more ]  [ reply ]
SMS "messages.php" SQL injection 2006-06-02
CrAzY CrAcKeR hotmail com
===================================

Discovery By: CrAzY CrAcKeR

Site: www.alshmokh.com

I want to thank my friend:-

nono225-mHOn-rageh-LoverHacker-BoNy_m

Breeeeh-Rootshil-LiNuX_rOOt-SauDiVirUS

===================================

Example:-

/messages.php?id=[SQL]

==================

[ more ]  [ reply ]
New <<BackTrack release announcement 2006-06-02
Max Moser (max moser gmail com)
Muts & I like to announce a new and stable release of "<< BackTrack".
This project i a merger out of two well known security penetration
testing focused linux live distributions (Whax and Auditor). After
hundreds of combined man hours, we can provide you with the finest
linux and windows tools on on

[ more ]  [ reply ]
Timberland Search XSS Vulnerability 2006-06-01
try_og hotmail com
There's a vulnerability in Timberland's search engine.

The variable 'keywords' in searchHandler/index.jsp is not correctly sanitized.

URL:

hxxp://www.timberland.com/searchHandler/index.jsp?keywords=[XSS Code]

Example:

hxxp://www.timberland.com/searchHandler/index.jsp?keywords=<script>aler

[ more ]  [ reply ]
VMSA-2006-0001 - VMware ESX Server Cross Site Scripting issue 2006-06-01
VMware Security Team (security vmware com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -------------------------------------------------------------------
VMware Security Advisory

Advisory ID: VMSA-2006-0001
Synopsis: VMware ESX Server Cross Site Scripting issue
VMware ESX 2.5.2 prior to upgrade p

[ more ]  [ reply ]
Re: phpFoX All Version Login Exploit 2006-06-01
purefan phpfox com
Hello.

This issue has been solved already and should not work since the whole log in system has been improved.

Thank you for sharing

[ more ]  [ reply ]
Re: Re: Fire fox dos exploit 2006-05-31
vincenzo ampolo gmail com
Yep.

I can confirm this for firefox 1.5.0.3 on ubuntu dapper amd64.

Filling a bug report

[ more ]  [ reply ]
LifeType <=1.0.4 'articleId' SQL injection 2006-06-03
rgod autistici org
#!/usr/bin/php -q -d short_open_tag=on

<?

echo "LifeType <= 1.0.4_r3270 SQL injection / admin credentials disclosure\r\n";

echo "by rgod rgod (at) autistici (dot) org [email concealed]\r\n";

echo "site: http://retrogod.altervista.org\r\n";

echo "dork: \"Powered by LifeType\" \"RSS 0.90\" \"RSS 1.0\" \"RSS 2.0\" \"Valid XHT

[ more ]  [ reply ]
DotClear <= 1.2.4 'blog_dc_path' (php5) arbitrary remote inclusion 2006-06-03
rgod autistici org
#!/usr/bin/php -q -d short_open_tag=on

<?

echo "DotClear <= 1.2.4 prepend.php/'blog_dc_path' arbitrary remote inclusion\r\n";

echo "by rgod rgod (at) autistici (dot) org [email concealed]\r\n";

echo "site: http://retrogod.altervista.org\r\n\r\n";

echo "dork: \"propulsé par DotClear\" \"fil atom\" \"fil rss\" +commentaires\

[ more ]  [ reply ]
[SECURITY] [DSA 1089-1] New freeradius packages fix arbitrary code execution 2006-06-03
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 1089-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
June 3rd, 2006

[ more ]  [ reply ]
[MajorSecurity #7]dotWidget CMS <= 1.0.6 - Remote File Include Vulnerability 2006-06-03
admin majorsecurity de
[MajorSecurity #7]dotWidget CMS <= 1.0.6 - Remote File Include Vulnerability

------------------------------------------------------------------------
-------------

Software: dotWidget CMS

Version: <=1.0.6

Type: Remote File Include Vulnerability

Date: June, 2nd 2006

Vendor: dotWidget

[ more ]  [ reply ]
phpBB2 (template.php) Remote File Inclusion 2006-06-03
canberx linuxmail org
********************************************************************

*Title:

*phpBB2 Remote File Include

*

*

*Credit:

*Canberx

*

*

*Thanx:

*Forewer-Partizan

*

*

*Mail:

*canberx (at) linuxmail (dot) org [email concealed] www.canberx.tk

*

*

*Google Dork:

*Powered by phpBB © 2001, 2002 phpBB Group

*

*

*Expl

[ more ]  [ reply ]
LocazoList Classifieds <= v1.05e(viewmsg.asp) Remote SQL Injection Vulnerability 2006-06-03
ajannhwt hotmail com
# Title : LocazoList Classifieds <= v1.05e(viewmsg.asp) Remote SQL Injection Vulnerability

# Author : ajann

#Vulnerability;

$$$ http://[target]/[path]/viewmsg.asp?msgid= SQL TEXT

$$$ Example:

http://[target]/[path]/viewmsg.asp?msgid=-1%20union%20select%20epass,0,0
,0,email,0,0,0,0,0

[ more ]  [ reply ]
Re: # MHG Security Team --- MyBloggie 2.1.1 version Remote File Include Vulnerabilit 2006-06-03
nukedx nukedx com
This is not vulnerable,PHP-Nuke having a special in their files and when includes mainfile.php it overwrites the global variables and it caused to make an arbitrary file inclusion.

But in MyBloggie there is no common vulnerability like it.I checked all files and all versions did not see any vulnera

[ more ]  [ reply ]
Blackhat USA 2006 - Review , remarks and proposal agenda 2006-06-03
newslist (at) security-briefings (dot) com [email concealed] (newslist security-briefings com)
the Blackhat agenda for USA 2006 session had just been published : URL
<http://www.blackhat.com/html/bh-usa-06/bh-usa-06-schedule.html>

The first remark is that this year, Blackhat USA, will be an incredible
briefing !

There will be several Zero day announcements. For example: Brendan
O'Connor

[ more ]  [ reply ]
[SECURITY] [DSA 1088-1] New centericq packages fix arbitrary code execution 2006-06-03
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 1088-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
June 3rd, 2006

[ more ]  [ reply ]
Critical SQL Injection in CoolForum 2006-06-03
gmdarkfig gmail com
Type: SQL Injection

Risk: Critical

Product: CoolForum <= 0.8.3 beta

********************************

Vulnerability

*************

// File: editpost.php

// Line 38

//

if(isset($_REQUEST['post'])) $post = intval($_REQUEST['post']);

else $post = 0;

--

// Line 77

//

$canedit = getrighte

[ more ]  [ reply ]
[ECHO_ADV_32$2006] SCart 2.0 Remote Code Execution 2006-06-03
eufrato gmail com
____________________ ___ ___ ________

\_ _____/\_ ___ \ / | \\_____ \

| __)_ / \ \// ~ \/ | \

| \\ \___\ Y / | /_______ / \______ /\___|_ /\_______ /

\/ \/ \/ \/

.OR.ID

ECHO_ADV_32$2006

----

[ more ]  [ reply ]
(Page 1130 of 1748)  < Prev  1125 1126 1127 1128 1129 1130 1131 1132 1133 1134 1135  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus