|
Prev week |
Colapse all |
Post message
Re: [Full-disclosure] SEC Consult SA-20060314 :: Opera Browser CSS Attribute Integer Wrap / Buffer Overflow 2006-04-13 Thierry Zoller (Thierry Zoller lu) Firefox 1.5.0.1 Password Manager Arbtirary User Browsing History Disclosure 2006-04-13 franz noemail com Firefox Password Manager Arbtirary User Browsing History Disclosure Build Identifier: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.0.1) Gecko/20060111 Firefox/1.5.0.1 This privacy flaw has caused my fiancé and I to break-up after having dated for 5 years. Basically, we share one compute [ more ] [ reply ] [ GLSA 200604-07 ] Cacti: Multiple vulnerabilities in included ADOdb 2006-04-14 Thierry Carrez (koon gentoo org) Avast Linux Home Edition (vulnerability on a temporary folder creation) 2006-04-14 Julien L. (jlanthea hotmail com) Re: Re: function *() php/apache Crash PHP 4.4.2 and 5.1.2 2006-04-14 sp3x securityreason com We tested this issue on many platforms and in all cases there was reset of apache. Example error.log on Apache/1.3.34 (Win32) PHP/4.4.1 Windows XP : ----------------------- [Fri Apr 14 17:17:17 2006] [info] master_main: Child processed exited prematurely. Restarting the child process. [Fri Apr 14 1 [ more ] [ reply ] phpBB template file code execution 2006-04-14 noch22 gmail com phpBB HTML template files are parsed and executed as PHP code. This files are not well filtered so a user having access to template files can execute PHP code. You can't trust your designer or template files you found around the web Example: Replace ALL switch_enable_pm_popup in overall_header.tpl [ more ] [ reply ] [SECURITY] [DSA 1034-1] New horde2 packages fix several vulnerabilities 2006-04-14 Moritz Muehlenhoff (jmm debian org) phpBB Admin command execution 2006-04-14 noch22 gmail com On a phpBB board, a user having access to the admin panel is able to execute PHP code: This example will execute $user_sig as PHP code: Go to Administration Panel > Styles Admin > Management > subSilver > Edit Set "Font Colour 3" to "'./*" Profile Set Signature to "$fd=fopen($phpbb_root_path.'conf [ more ] [ reply ] Encyclopedia <= 3.0 (login.php) CrossSite Scripting - XSS 2006-04-14 n0m3rcy bsdmail org # Encyclopedia <= 3.0 (login.php) CrossSite Scripting - XSS # by n0m3rcy # Copyright (c) 2006 n0m3rcy <n0m3rcy (at) bsdmail (dot) org [email concealed]> # Exploit: www.site.com/login.php?action=form&username=<username>&password=%22%3E%3 Cscript%3Ealert(document.cookies);%3C/script%3E # Shoutz: cijfer , my baby , Dag & myself :Pp [ more ] [ reply ] Re: phpMyAdmin 2.7.0-pl1 2006-04-14 Kevin Waterson (kevin oceania net) This one time, at band camp, kr4ch (at) web (dot) de [email concealed] wrote: If somebody has access to your phpmyadmin directory, you have a bigger issue than this > App: phpMyAdmin 2.7.0-pl1 > Advistory by: p0w3r > Exploit: /phpmyadmin/sql.php?lang=de-utf-8&server=1&collation_connection=utf8_gen eral_ci&db=fu&table=fu&goto=t [ more ] [ reply ] osCommerce "extras/" information/source code disclosure 2006-04-14 rgod autistici org ---- osCommerce <= 2.2 "extras/" information/source code disclosure ------------ software site: http://www.oscommerce.com/ if extras/ folder is placed inside the www path, you can see all files on target system, including php source code with database details, poc: http://[target]/[path]/extras/ [ more ] [ reply ] Farsinews Cross-Site Scripting & Path disclosure vulnerability 2006-04-14 aminrayden yahoo com Farsinews Cross-Site Scripting & Path disclosure vulnerability #''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''''' '''''''''''''''''''''''''''''''''''''''''''' #Aria-Security.net Advisory #Discovered by:R@1D3N (amin emami) #<AminRayden (at) yahoo (dot) com [email concealed]> #Gr33t to:A.u.r.a & O.u.t.l. [ more ] [ reply ] [eVuln] aWebNews Multiple XSS and SQL Injection Vulnerabilities 2006-04-14 alex evuln com New eVuln Advisory: aWebNews Multiple XSS and SQL Injection Vulnerabilities http://evuln.com/vulns/116/summary.html --------------------Summary---------------- eVuln ID: EV0116 CVE: CVE-2006-1612 CVE-2006-1613 Software: aWebNews Sowtware's Web Site: http://labs.aweb.com.au/awebnews.php Versions: 1. [ more ] [ reply ] PowerClan 1.14 - SQL Injection 2006-04-13 d4igoro gmail com PowerClan 1.14 - SQL Injection -------------------------------------------------------- Software: PowerClan 1.14 Version: 1.14 Type: SQL Injection Date: Apr 13 23:37:50 CEST 2006 Vendor: powerscripts.org Page: http://www.powerscripts.org Risc: min credits: ---------------------------- d4igoro - d4 [ more ] [ reply ] Camino Browser HTML Parsing Null Pointer Dereference Denial of Service Vulnerability 2006-04-13 izimask thehackademy net Camino Browser HTML Parsing Null Pointer Dereference Denial of Service Vulnerability ______________________ Camino Browser is prone to a denial-of-service condition when parsing certain malformed HTML content. Successful exploitation will cause the browser to fail or hang. ______________________ [ more ] [ reply ] Re: [Full-disclosure] Microsoft DNS resolver: deliberately sabotaged hosts-file lookup 2006-04-13 A L M Buxey lboro ac uk [eVuln] RedCMS Multiple XSS and SQL Injection Vulnerabilities 2006-04-13 alex evuln com New eVuln Advisory: RedCMS Multiple XSS and SQL Injection Vulnerabilities http://evuln.com/vulns/115/summary.html --------------------Summary---------------- eVuln ID: EV0115 CVE: CVE-2006-1568 CVE-2006-1569 Software: RedCMS Sowtware's Web Site: http://redcms.co.uk/ Versions: 0.1 Critical Level: Mo [ more ] [ reply ] Re: RE: IBM 2006-04-13 Juha-Matti Laurio (juha-matti laurio netti fi) This information is correct and the first address security-alert [at] austin.ibm.com mentioned is a primary reporting address. This address is located at OSVDB Vendor database too; http://www.osvdb.org/vendor_dict.php?section=vendor&id=1215&c=I listed as International Business Machines Corporation [ more ] [ reply ] ZDI-06-008: Novell GroupWise Messenger Accept-Language Buffer Overflow 2006-04-13 zdi-disclosures 3com com ZDI-06-008: Novell GroupWise Messenger Accept-Language Buffer Overflow http://www.zerodayinitiative.com/advisories/ZDI-06-008.html April 13, 2006 -- CVE ID: CVE-2006-0092 -- Affected Vendor: Novell -- Affected Products: Novell GroupWise Messenger 2 -- TippingPoint(TM) IPS Customer Protection: Ti [ more ] [ reply ] SaphpLesson 2.0 (forumid) Remote SQL Injection Exploit 2006-04-12 selfar2002 hotmail com ------------------------------------------------------------------------ --- SaphpLesson 2.0 (forumid) Remote SQL Injection Exploit ------------------------------------------------------------------------ --- Discovered By SnIpEr_SA Author : SnIpEr_SA Exploit in Perl : http://www.milw0rm.com/explo [ more ] [ reply ] phpMyAdmin 2.7.0-pl1 2006-04-12 kr4ch web de App: phpMyAdmin 2.7.0-pl1 Advistory by: p0w3r Exploit: /phpmyadmin/sql.php?lang=de-utf-8&server=1&collation_connection=utf8_gen eral_ci&db=fu&table=fu&goto=tbl_properties_structure.php&back=tbl_proper ties_structure.php&sql_query=[XSS] Example: /phpmyadmin/sql.php?lang=de-utf-8&server=1&collation_conn [ more ] [ reply ] Re: function *() php/apache Crash PHP 4.4.2 and 5.1.2 2006-04-13 Michal Zalewski (lcamtuf dione ids pl) Steven M. Christey wrote: > 3) One does not expect an interpreted language to segfault Behavior of an application in resource exhaustion scenarios is, for objective reasons, quite hard to handle. There might be no stack available to invoke an error handling routine, there might be no memory for I/ [ more ] [ reply ] Re: IBM 2006-04-12 stend us ibm com Hello, For IBM Tivoli products, http://www-306.ibm.com/software/sysmgmt/products/support/Tivoli_Proactiv e_Notification.html contains our contact information. I'm not certain of the contact points for the other brands, but if you report involves one of them, we will ensure that the report is provid [ more ] [ reply ] |
|
Privacy Statement |
Opera is pretty bad at CSS, try the new fuzzer from HDM :
http://metasploit.com/users/hdm/tools/see-ess-ess-die/cssdie.html
--
http://secdev.zoller.lu
Thierry Zoller
Fingerprint : 5D84 BFDC CD36 A951 2C45 2E57 28B3 75DD 0AC6 F1C7
[ more ] [ reply ]