|
Colapse all |
Post message
Advisory: XSS in WebCal (v1.11-v3.04) 2005-12-16 Stan Bubrouski (stan bubrouski gmail com) Author: Stan Bubrouski Date: December 16, 2005 Package: WebCal (by Michael Arndt; http://bulldog.tzo.org/webcal/webcal.html) Versions Affected: 1.11-3.04 (unknown <1.11) Severity: XSS allowing cookie theft, etc.. Description: This particular WebCal (there are in fact over a dozen separate webcal pr [ more ] [ reply ] Update on the PGP NTFS File Wipe Issue, 16 Dec 2005 2005-12-16 Jon Callas (jon pgp com) We have verified the problem; with an NTFS volume and Windows XP, free space wiping of slack after the end of a file but before the end of the cluster does not occur correctly with Windows XP and NTFS. It does work correctly with NTFS under Windows 2000, or with Windows XP and another file s [ more ] [ reply ] DoS in Cisco Clean Access 2005-12-16 alex box sk Date of release: 16/12/2005 Software: Cisco Clean Access/Perfigo CleanMachines (http://www.cisco.com/en/US/products/ps6128/index.html) Affected versions: Tested on 3.5.5, assumed all <=current. Risk: Medium/High Discovered by: Alex Lanstein Background -------- Cisco Clean Access is an easily deplo [ more ] [ reply ] iDefense Security Advisory 12.16.05: Citrix Program Neighborhood Name Heap Corruption Vulnerability 2005-12-16 labs-no-reply (at) idefense (dot) com [email concealed] (labs-no-reply idefense com) Citrix Program Neighborhood Name Heap Corruption Vulnerability iDefense Security Advisory 12.16.05 www.idefense.com/application/poi/display?id=357&type=vulnerabilities December 16, 2005 I. BACKGROUND Citrix Program Neighborhood is the client used to connect to applications published on Citrix Met [ more ] [ reply ] DMA[2005-1214a] - 'Widcomm BTW - Bluetooth for Windows Remote Audio Eavesdropping' 2005-12-16 Kevin Finisterre (kfinisterre cfm ohio-state edu) DMA[2005-1214a] - 'Widcomm BTW - Bluetooth for Windows Remote Audio Eavesdropping' Author: Kevin Finisterre Vendor: http://www.widcomm.com, http://www.broadcom.com/products/Bluetooth/ Product: 'versions <= BTW 4.0.1.1500 ?' References: http://www.digitalmunition.com/DMA[2005-1214a].txt Description [ more ] [ reply ] ZRCSA-200505: libremail - "pop.c" Format String Vulnerability 2005-12-16 deepfear zone-h fr Zone-H Research Center Security Advisory 200505 http://www.zone-h.fr Date of release: 16/12/2005 Software: libremail (http://libremail.tuxfamily.org/en/) Affected versions: <= 1.1.0 Risk: Low/Medium Discovered by: Mehdi Oudad "deepfear" from the Zone-H Research Team Background ---------- libremail [ more ] [ reply ] phpCOIN-1.2.2-Full-2005 SQL Injection 2005-12-16 stranger-killer hotmail com This bug can't exploited cuz the sql injection is after [ ORDER BY ] and then we can't do UNION SELECT with MySQL Server if the Server is MS-SQL try to do this 0,0;[ New SQL Query ] //------------// File Name :- \coin_modules\articels\articles_funcs.php Line :- 187 Var :- $_rec_next Fi [ more ] [ reply ] [USN-230-2] ffmpeg/xine-lib vulnerability 2005-12-16 Martin Pitt (martin pitt canonical com) =========================================================== Ubuntu Security Notice USN-230-2 December 16, 2005 xine-lib vulnerability CVE-2005-4048 =========================================================== A security issue affects the following Ubuntu releases: Ubuntu 4.10 (Warty Warthog) Ubun [ more ] [ reply ] Re: Patches available for IBM AIX flaws 2005-12-16 Shiva Persaud (shivapd austin ibm com) One correction: the getShell/getCommand issue only pertains to AIX 5.3. Advisories and fixes are available at: https://techsupport.services.ibm.com/server/pseries.subscriptionSvcs Shiva Persaud, AIX Security -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.1 (GNU/Linux) iD8DBQFDoso7L6zf98kMBI0R [ more ] [ reply ] [ GLSA 200512-08 ] Xpdf, GPdf, CUPS, Poppler: Multiple vulnerabilities 2005-12-16 Sune Kloppenborg Jeppesen (jaervosz gentoo org) [ GLSA 200512-09 ] cURL: Off-by-one errors in URL handling 2005-12-16 Sune Kloppenborg Jeppesen (jaervosz gentoo org) Bios Information Leakage 2005-12-13 Jonathan Brossard (jbrossar messel emse fr) (1 replies) Bios Manufacturers Warned : Yes Feedback from Bios Manufacturers : None CERT Warned : Yes CERT Reference : VU#847537 |=---------------------------------------------------------------------- -=| |=-------------=[ BIOS Information Leakage ]=------------------=| |=---------------------------- [ more ] [ reply ] Re: [Full-disclosure] iDEFENSE Security Advisory 12.06.05: Ipswitch Collaboration Suite SMTP Format String Vulnerability 2005-12-13 Owen Dhu (0wnj00 gmail com) On 12/6/05, labs-no-reply (at) idefense (dot) com [email concealed] <labs-no-reply (at) idefense (dot) com [email concealed]> wrote: > Ipswitch Collaboration Suite SMTP Format String Vulnerability [...] > Remote exploitation of a format string vulnerability in Ipswitch > IMail allows remote attackers to execute arbitrary code. Can iDEFENSE (or anyone els [ more ] [ reply ] RE: RLA ("Remote LanD Attack") 2005-12-15 Roger A. Grimes (roger banneretcs com) Just to clarify, so that people don't think this affects Windows XP SP2. I've tested SP2 again, and the LAND attack no longer works. This announcement concerns gateway network devices that computers may attach to (the announcement is a little confusing at first). Also, to pull off the hping2 exampl [ more ] [ reply ] AIX Heap Overflow paper 2005-12-15 David Litchfield (davidl ngssoftware com) I've just published a paper on AIX heap overflows. I wrote it back in August but wanted to wait until a couple of flaws I discovered whilst researching the topic were fixed by IBM. IBM released the patches today. You can get the paper at http://www.databasesecurity.com/dbsec/aix-heap.pdf Cheers, Dav [ more ] [ reply ] [security bulletin] SSRT4728 rev.1 - HP-UX running TCP/IP Remote Denial of Service (DoS) 2005-12-15 security-alert hp com -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c00579189 Version: 1 HPSBUX02087 SSRT4728 rev.1 - HP-UX running TCP/IP Remote Denial of Service (DoS) NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. [ more ] [ reply ] Re: RLA ("Remote LanD Attack") 2005-12-15 Synister Syntax (synistersyntaxlist gmail com) To All: As requested: MSWord (.doc): http://www.teamtrinix.com/exploits/rla/RLA.doc Plain Text (.txt): http://www.teamtrinix.com/exploits/rla/RLA.txt HTML: http://www.teamtrinix.com/exploits/rla/RLA.htm PDF; (Coming Soon) I will go ahead and create the PDF later this evening. The HTM [ more ] [ reply ] Re: RLA ("Remote LanD Attack") 2005-12-15 Synister Syntax (synistersyntaxlist gmail com) I agree that this is in fact a DoS, however it is using the old LanD attack (from 1997) syntax/style. That fact that it is a packet to itself, from it's self, obviously spoofed. As this was the same way it was done back in the 90's. The difference here, is the fact that the LanD attack can b [ more ] [ reply ] MarmaraWeb E-commerce Script Cross Site Scripting 2005-12-15 B3g0k hackermail com MarmaraWeb E-commerce Script Cross Site Scripting ###Hi all ###B3g0k[at]hackermail.com ###Kurdish Hacker ###Special Thanx All Kurdish Hackers ###Freedom For Ocalan!!! ###----------------------------------- ###MarmaraWeb E-commerce Script Cross Site Scripting ###----------------------------------- # [ more ] [ reply ] MarmaraWeb E-commerce Remote Command Exucetion 2005-12-15 B3g0k hackermail com MarmaraWeb E-commerce Remote Command Exucetion ###Hi all ###B3g0k[at]hackermail.com ###Kurdish Hacker ###Special Thanx All Kurdish Hackers ###Freedom For Ocalan!!! ###----------------------------------- ###MarmaraWeb E-commerce Remote Command Exucetion ###----------------------------------- ###Site [ more ] [ reply ] CYBSEC - Security Advisory: Watchfire AppScan QA Remote Code Execution 2005-12-15 Mariano Nuñez Di Croce (mnunez cybsec com) (The following advisory is also available in PDF format for download at: http://www.cybsec.com/vuln/CYBSEC_Security_Advisory_AppScanQA_RemoteCode Exec.pdf) CYBSEC S.A. www.cybsec.com Advisory Name: Watchfire AppScan QA Remote Code Execution ========== Vulnerability Class: Buffer Overflow ======== [ more ] [ reply ] Metasploit Framework v3.0 Alpha Release 1 2005-12-15 H D Moore (sflist digitaloffense net) The Metasploit staff is proud to present the first alpha release of the 3.0 branch of the Metasploit Framework. This release marks a major milestone in the evolution of the Metasploit Framework and is based on a complete rewrite of the 2.x series. The 3.0 branch is designed to provide automation [ more ] [ reply ] Notacon Call for Proposals open 2005-12-15 Paul Schneider (froggy notacon org) Notacon, an annual "hacker" conference in Cleveland, Ohio, will be held this year from April 7th through 9th, 2006. The event seeks to explore technology not only in traditional ways, but also as relevant to graphics, art, music, and social interaction. Two tracks of presentations centered on the t [ more ] [ reply ] Patches available for IBM AIX flaws 2005-12-15 NGSSoftware Insight Security Research (nisr nextgenss com) (1 replies) David Litchfield of NGSSoftware has discovered a multiple high risk vulnerabilities in IBM's AIX operating systems. 1) There is a buffer overflow in the malloc debug system that when exploited can yeild root privileges. 2) There is a buffer overflow in muxatmd which is setuid root. 3) There is a [ more ] [ reply ] |
|
Privacy Statement |
Kachal667 Under9round Team (KuT)
new exploit with HTML for Advanced Guestbook 2.2 .
This bug found by BHST.
Coded By Hessam-x
Note : For use this exploit first change [target] to victim example : www.targetsite.com/guestbook/admin.php
=====HTML CODE :
<html>
<title>GuestBook 2.2 exp
[ more ] [ reply ]