BugTraq Mode:
(Page 1144 of 1748)  < Prev  1139 1140 1141 1142 1143 1144 1145 1146 1147 1148 1149  Next >
POC exploit for freeFTPd 1.0.10 2006-05-17
Tauqeer Ahmad (ahmadtauqeer yahoo com)
Hi,

The exploit that i publish for freeSSHd 1.0.9 will
work against freeFTPd 1.0.10 as well. Upgrade to the
lattest version of freeFTPd.

http://www.securityfocus.com/data/vulnerabilities/exploits/2680392359-ss
h.py

Disclaimer:

All the information and exploit in this mail and the
previous are prov

[ more ]  [ reply ]
FrontRange iHeat Vulnerability 2006-05-16
mcdanielar hushmail com
A vulnerability has been found in FrontRange's iHeat product that allows users to gain access to the host machine through a logged on session or execute arbitrary code while using the active-x version of the product.

To reproduce the exploit, first upload a file with an extension that has not bee

[ more ]  [ reply ]
XSS in orkut.com 2006-05-15
Rohin Koul (rohin koul gmail com)
Hi,
I found this little XSS thing with the search.aspx page of orkut.com.
The page uses GET method to get user criteria for searching the
profiles of people.
The fields textboxAgeFrom and textboxAgeTo in the URL are not verified
and one can inject any html code using these parameters.
Proof of conce

[ more ]  [ reply ]
Re: [Full-disclosure] RealVNC 4.1.1 Remote Compromise 2006-05-15
Joachim Schipper (j schipper math uu nl)
On Mon, May 15, 2006 at 07:58:10AM -0500, Dixon, Wayne wrote:
> So what can be done about this exploit? Does 4.1.2 protect against this
> vulnerability? And what other mitigation procedures are available for
> this?

The best solution is not to run a VNC service using no more than it's
own authent

[ more ]  [ reply ]
[SECURITY] [DSA 1058-1] New awstats packages fix arbitrary command execution 2006-05-18
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 1058-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
May 18th, 2006

[ more ]  [ reply ]
Gmail/Gtalk web client DoS 2006-05-16
dan pathology washington edu
Gmail/Gtalk web client DoS

Summary

It is trivial to freeze the browser of a known user who is currently using Gmail with the Gtalk feature enabled. This could lead to a denial of service attack against any user of Gmail who is using the web client.

Technical Details

Gtalk within Gmail c

[ more ]  [ reply ]
AspBB Forum "profile.asp & default.asp" XSS Vulnerability 2006-05-18
TeufeL Online (teufel hotmail com)
This xss works on Aspbb Forums

Homapage : http://www.aspbb.org

Version : 0.5.2

Exploit:

http://www.example.com/default.asp?action="><script>alert('Xss
Vulnerability');</script>

http://www.example.com/profila.asp?get="><script>alert('Xss
Vulnerability');</script>&URL=%2FDefault%2Easp%3F

Teuf

[ more ]  [ reply ]
[Info Disclosure] Diesel PHP Job Site Latest Version 2006-05-18
Matt Gibson (diwelf gmail com)
Subject: [Info Disclosure] Diesel PHP Job Site Latest Version

Severity: Pretty Bad
Title: Diesel PHP Job Site Latest Version Information Disclosure
Home Page: http://www.dieselscripts.com/
Product Page: http://www.dieselscripts.com/diesel-job-site.html
Date: May 17, 2006

Synopsis:
=========
When

[ more ]  [ reply ]
[cosmoshop again] sql injection + view all files as admin user 2006-05-18
innate gmx de
i am: l0om

page: www.excluded.org

product: cosmoshop

1) show all files as admin-user

2) sql injection

Cosmoshop - Lse (<= )V8.11.106

1) Show all files as an admin-user:

/cgi-bin/admin/bestellvorgang/edit_mailtexte.cgi?file=../../../../../../
../../../etc/passwd%00

/cgi-bin/admin/bestm

[ more ]  [ reply ]
Multiple Vulns in Bitrix CMS 2006-05-18
Gogi The Georgian (gogi__ mail ru)
Multiple Vulns in Bitrix CMS
Vendor bitrix.com
Version The latest one (4.1.x)
Severity Medium
Patched: No

Multiple vulnerabilities discovered in Bitrix CMS. A remote attacker can conduct XSS attacks and compromise vulnerable system.
1. A remote attacker can get information about version history an

[ more ]  [ reply ]
CodeScan Advisory: Avatar MOD v1.3 for Snitz Forums v3.4 - Arbitrary File Upload 2006-05-17
CodeScan Labs (advisories codescan com)
========================================================================

= CodeScan Advisory, codescan.com <advisories (at) codescan (dot) com [email concealed]>
= http://www.codescan.com/Advisories/CodeScanLabs_AvatarMod.html
=
= Avatar MOD v1.3 for Snitz Forums v3.4 - Arbitrary File Upload
=
= Vendor Website:
= http://www.

[ more ]  [ reply ]
Gawab.com Register Xss Bugtraq 2006-05-15
rootter hackmaster us
Script: Gawab.com Mail Services Portal System

Version: ?

Language: PHP

Problem: Xss

Vendor: http://www.HackMaster.Us

Discovered by: rootter(at)hackmaster(dot)us

Example: http://gawab.com/webfront/register.php?formAction=start&newDomain=i%20fo
und%20a%20xss%20vuln.%20%20%3Cscript%3Ea

[ more ]  [ reply ]
Wargamming Network.. 2006-05-14
Dusty (dusty smashthestack org)
Hello all, just thought I would drop ya all this like:
http://www.smashthestack.org/ -- Wargamming network, offers free shells,
webspace, email accounts. Check it out - Help support the community!

Dusty.

[ more ]  [ reply ]
RadLance Local Inclusion Exploit 2006-05-14
Hussain Salim (bo_ali90 hotmail com)
Discovered And Coded By Mr.CrackerZ

Exploit Code

___________

#!/usr/bin/perl
#Discovered and coded by Mr.CrackerZ ( Security Team )
#Contact me ( bo_ali90 (at) hotmail (dot) com [email concealed] )
#Usage: radlance.pl <victim> <local file to read>
#Google: Powered by: RadLance Gold v7
#Tested Under RadLance Gold v7 ( Loc

[ more ]  [ reply ]
HYSA-2006-008 myBloggie 2.1.3 CRLF & SQL Injection 2006-05-17
h4cky0u org gmail com
------------------------------------------------------

HYSA-2006-008 h4cky0u.org Advisory 017

------------------------------------------------------

Date - Wed May 17 2006

TITLE:

======

myBloggie 2.1.3 CRLF & SQL Injection

SEVERITY:

=========

Medium

SOFTWARE:

==

[ more ]  [ reply ]
OpenWiki<--v0.78 Cross-Site Scripting 2006-05-17
LiNuX_rOOt1 hotmail com
=======================

Discovery by: LiNuX_rOOt

Site:www.alshmokh.com

=======================

Example:

/ow.asp?p=[XSS]

[ more ]  [ reply ]
Boastmachine Cross Site Scripting Vulnerability 2006-05-17
mail yunusemreyilmaz com
Advisory : Cross Site Scripting in Boastmachine (http://boastology.com/)

Release Date : 17/05/2005

Last Modified : 17/05/2005

Author : Yunus Emre Yilmaz ( http://yns.zaxaz.com)

Application : BoastMachine v3.1 ( maybe older versions)

Risk : High

Problem : Form action v

[ more ]  [ reply ]
Mobotix IP Network Cameras Multiple XSS 2006-05-17
jaime blasco eazel es
Mobotix IP Network Cameras Multiple XSS

Version: Tested on M1 and M10

- M10-V2.0.5.2

- M1-V1.9.4.7

Discovered by: jaime.blasco(at)eazel(dot).es

http://www.eazel.es

Description:

Mobotix is vulnerable to multiple security vulnerabilites that allow cross site scripting flaws.

[ more ]  [ reply ]
Two heap overflow in libextractor 0.5.13 (rev 2832) 2006-05-17
Luigi Auriemma (aluigi autistici org)

#######################################################################

Luigi Auriemma

Application: libextractor
http://gnunet.org/libextractor/
Versions: <= 0.5.13 (rev 2832)
Platforms: *nix, *BSD, Windows and more
Bugs: A] heap overflow

[ more ]  [ reply ]
Re[2]: The Weakness of Windows Impersonation Model 2006-05-17
Brian L. Walche (gsw gentlesecurity com)


Just one important note regarding Database Security Brief:
http://www.databasesecurity.com/dbsec/db-sec-tokens.pdf
"Why should I never logon to a Windows database server if I've got
admin privileges?"

We describe a little different problem for MS SQL. MS SQL gets
privileged context on its own fro

[ more ]  [ reply ]
Firefox (with IETab Plugin) Null Pointer Dereferences Bug 2006-05-17
Debasis Mohanty (debasis hackingspirits com)
Firefox (with IETab Plugin) Null Pointer Dereferences Bug
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Vendor: Mozilla
Product: FireFox with IE Tab

Tested On:
FireFox Version 1.5.0.3 + IE Tab Version 1.0.9 + Windows (XP / 2K)

Introduction:
IETab (https://addons.mozilla.org/firefox/

[ more ]  [ reply ]
Secunia Research: Eazel unacev2.dll Buffer Overflow Vulnerability 2006-05-17
Secunia Research (remove-vuln secunia com)
======================================================================

Secunia Research 17/05/2006

- Eazel unacev2.dll Buffer Overflow Vulnerability -

======================================================================
Table of Contents

Affected Software........

[ more ]  [ reply ]
DIMVA 2006 - Call For Participation 2006-05-17
thomas suse de (Thomas Biege)


Sorry, if you receive multiple copies of this Call for Participation.

======================================================================
CALL FOR PARTICIPATION
======================================================================
######## Early Bird Rates available

[ more ]  [ reply ]
What's Up Professional Spoofing Authentication Bypass 2006-05-17
Kenneth F. Belva (ken ftusecurity com)
What's Up Professional 2006 is vulnerable to a spoofing attack whereby
the attacker can trick the application into thinking he/she is making a
request from the console (which is considered trusted). This attack will
allow the attacker to bypass the authentication mechanism of the
application and log

[ more ]  [ reply ]
Re[2]: The Weakness of Windows Impersonation Model 2006-05-16
Brian L. Walche (gsw gentlesecurity com)


thanks for reference David. As advisory notes impersonation
implications are not something new. We would like to stress the fact
of how easy it is to exploit by two notable samples.
- An attacker can reliably elevate a context running on behalf of
Network Service acccount. For example, by default,

[ more ]  [ reply ]
(Page 1144 of 1748)  < Prev  1139 1140 1141 1142 1143 1144 1145 1146 1147 1148 1149  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus