|
Colapse all |
Post message
[security bulletin] HPSBMA02121 SSRT061157 rev.1 - HP OpenView Storage Data Protector Remote Arbitrary Command Execution 2006-05-23 security-alert hp com [USN-285-1] awstats vulnerability 2006-05-23 Martin Pitt (martin pitt canonical com) =========================================================== Ubuntu Security Notice USN-285-1 May 23, 2006 awstats vulnerability CVE-2006-2237 =========================================================== A security issue affects the following Ubuntu releases: Ubuntu 5.04 (Hoary Hedgehog) Ubun [ more ] [ reply ] DGbook v1.0 - XSS 2006-05-23 luny youfucktard com DGbook v1.0 - XSS Homepage: http://www.diangemilang.com/dgscripts.php Description: This is Guestbook script, write on PHP from Dian Gemilang. Feature: Field validation, Limit character, Charecter filtering - This feature will remove "<" and ">" character, so user can't input HTML tag -, Auto [ more ] [ reply ] [security bulletin] HPSBUX02075 SSRT051074 rev.5 - HP-UX Running xterm Local Unauthorized Access 2006-05-23 security-alert hp com -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c00555516 Version: 5 HPSBUX02075 SSRT051074 rev.5 - HP-UX Running xterm Local Unauthorized Access NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Rel [ more ] [ reply ] Alstrasoft Article Manager Pro v1.6 2006-05-22 luny youfucktard com Alstrasoft Article Manager Pro v1.6 - XSS & Full Path errors Homepage: http://www.alstrasoft.com Description: Article Manager Pro is the next generation article publishing system designed to make your life a whole lot easier by enabling webmasters to publish articles or news into their websi [ more ] [ reply ] [security bulletin] HPSBUX02114 SSRT061115 rev.1 - HP-UX Running Software Distributor Local Elevation of Privilege 2006-05-23 security-alert hp com -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c00659649 Version: 1 HPSBUX02114 SSRT061115 rev.1 - HP-UX Running Software Distributor Local Elevation of Privilege NOTICE: The information in this Security Bulletin should be acted upon as soo [ more ] [ reply ] Nucleus CMS <= 3.22 arbitrary remote inclusion 2006-05-23 rgod autistici org #!/usr/bin/php -q -d short_open_tag=on <? echo "Nucleus <= 3.22 arbitrary remote inclusion exploit\r\n"; echo "by rgod rgod (at) autistici (dot) org [email concealed]\r\n"; echo "site: http://retrogod.altervista.org\r\n\r\n"; echo "this is called the \"deadly eyes of Sun-tzu\"\r\n"; echo "dork: Copyright . Nucleus CMS v3. [ more ] [ reply ] Kaspersky antivirus 6: HTTP monitor bypassing 2006-05-22 john kak-sam to Kaspersky antivirus 6 Kaspersky internet security 6 www.kaspersky.com Vulnerable Systems: KAV6, KIS6 Detail: The vulnerability is caused due to HTTP parsing errors in the HTTP monitor (Kaspersky Web-antivirus). Any mailicious software on local computer can bypass HTTP virus monitor. [ more ] [ reply ] Russcom Ping Remote code execution 2006-05-22 zerogue gmail com Russcom Ping Remote code execution Discovered by: Nomenumbra Date: 21/5/2006 impact:high (Remote code execution) Russcom's Ping script allows attackers to execute arbitrary code trough command piping after the ip (e.g 127.0.0.1 | nc -l -p 666 -e /bin/sh would grant a bindshell) Nomenumb [ more ] [ reply ] Russcom PHPImages lack of validation 2006-05-22 zerogue gmail com Russcom PHPImages lack of validation Discovered by: Nomenumbra Date: 21/5/2006 impact:moderate Russcom's PHPImages doesn't validate if the uploaded file is an image, it just checks for the extension, thus allowing an attacker to upload php scripts with a .gif extension for example, pote [ more ] [ reply ] IpLogger <= 1.7 XSS 2006-05-22 zerogue gmail com IpLogger <= 1.7 XSS Discovered by: Nomenumbra Date: 21/5/2006 impact:moderate (potential privilege escalation,possible defacement) tjthedj's IpLogger (http://tjthedj.us/projects/iplogger/) suffers from XSS in a user's useragent. It is possible to construct a useragent containing javascript, [ more ] [ reply ] Chatty improper input sanitizing 2006-05-22 zerogue gmail com Chatty improper input sanitizing Discovered by: Nomenumbra Date: 21/5/2006 impact:moderate (possible defacement) Chatty is a PHP-based chatscript allowing users to chat over the web. Subscribing with a username like this: <script>alert(%22xss%22)</script> would cause major xss in the chatr [ more ] [ reply ] Circumventing quarantine control in Windows 2003 and ISA 2004 2006-05-18 Memet Anwar (mmta gm gmail com) (2 replies) For those unfamiliar with MS quarantine control, you can read Jon Hassel's tutorial on Windows 2003 Network Access Quarantine Control (NAQC) [http://www.securityfocus.com/infocus/1794], and the ISA 2004 VPN Quarantine (ISAQ) feature [http://www.securityfocus.com/infocus/1799]. A simplistic mecha [ more ] [ reply ] RE: Circumventing quarantine control in Windows 2003 and ISA 2004 2006-05-23 Roger A. Grimes (roger banneretcs com) Re: Circumventing quarantine control in Windows 2003 and ISA 2004 2006-05-23 3APA3A (3APA3A SECURITY NNOV RU) Hackernetwork.Com Mail XSS Vulnerability 2006-05-18 TeufeL Online (teufel hotmail com) Hackernetwork.Com Mail XSS Vulnerability We use this method for steal mail adress.We use XSS (cross site scripting). We will send this with xss code to someone and then if he or she open this mail after that their cookies come to our log adress. We use Proxomitron for login this mails and edit co [ more ] [ reply ] Re: 90% of programs made in PHP5 and prior Full Path Disclosure vuln. 2006-05-19 Kamil Sienicki (K3 spelunca int pl) Re: POC exploit for freeFTPd 1.0.10 2006-05-19 Tauqeer Ahmad (ahmadtauqeer yahoo com) Hello Sanjay There was no technical difficulty. That was just a POC to proof the vulnerability and not to exploit it in the wild. The choice at your disposal is limit less. You can also debug the programe on windows 2003 server and include the offsets. you can debug it on windows 2000 professional, [ more ] [ reply ] Remote Code Execution in artmedic Newsletter 4.1 [log.php] 2006-05-19 c j schmitz gmx de I found a bug in artmedic Newsletter 4.1 (proably even in newer versions) which lets an attacker run arbitrary php-code and bypass the password protection. The reason for this is mistake in design. log.php: <?php $time = time(); $date = date("d.m.Y, H:i:s"); $remote = getenv("REMOTE_ADD [ more ] [ reply ] |
|
Privacy Statement |
Hash: SHA1
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c00671912
Version: 1
HPSBMA02121 SSRT061157 rev.1 - HP OpenView Storage Data Protector Remote
Arbitrary Command Execution
NOTICE: The information in this Security Bulletin should be acted upon
[ more ] [ reply ]