|
Colapse all |
Post message
N-13 News Remote SQL/PHP Shell injection 2005-11-29 contropotere securityfocus com, *AT* securityfocus com,gmail securityfocus com, *DOT* securityfocus com,com securityfocus com <?php ### 0 day -- 29/11/2005 ### ### N-13 News Remote SQL / PHP-Shell Injection ### ### Just upload in a web-server with mod_php ### and run it trhough your browser ;) ### ### Affected Software : http://network-13.com/ N-13 News ### Version: All ### Exploit discovere and written by: KingOfSka [ more ] [ reply ] ASP-Rider Default.asp SQL Injection 2005-11-29 info hoder com Vendor : http://www.asp-rider.com Vulnerable Versions : 1.6 Where is the bug ---------------------- in default.asp : refsss=split(refererssss, "/",-1,1) refererdomain=refsss(2) strsql="Select * From tbl_refererd where domain='" & refererdomain & "'" objrs.open strsql, objconn,3,3 ------------------ [ more ] [ reply ] Xaraya <= 1.0.0 RC4 D.O.S / file corruption 2005-11-29 retrogod aliceposta it Xaraya <= 1.0.0 RC4 D.O.S / file corruption software: site: http://www.xaraya.com description: "Xaraya 1.0 Core is an Open Source web application framework written in PHP" vulnerable code in create() function in xarMLSXML2PHPBackend.php: i) you can create an empty dir, in some cases this leads [ more ] [ reply ] Re: Re: - Cisco IOS HTTP Server code injection/execution vulnerability- 2005-11-29 limfung gmail com [FLSA-2005:166943] Updated php packages fix security issues 2005-11-29 Marc Deslauriers (marcdeslauriers videotron ca) [Full-disclosure] [ GLSA 200511-23 ] chmlib,KchmViewer: Stack-based buffer overflow 2005-11-28 koon gentoo org [SECURITY] [DSA 911-1] New gtk+2.0 packages fix several vulnerabilities 2005-11-29 joey infodrom org (Martin Schulze) Cisco Security Advisory: Cisco Security Agent Vulnerable to Privilege Escalation 2005-11-29 Cisco Systems Product Security Incident Response Team (psirt cisco com) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Cisco Security Advisory: Cisco Security Agent Vulnerable to Privilege Escalation ===================================================================== Advisory ID: cisco-sa-20051129-csa http://www.cisco.com/warp/public/707/cisco-sa-20051129-csa.shtml [ more ] [ reply ] Core FORCE and OpenBSD PF's 2005-11-28 Ivan Arce (ivan arce coresecurity com) Hello everyone, Theo de Raadt, head of the OpenBSD project, has requested me to clarify something about the firewall technology of the endpoint security package (Core FORCE) released today by Core and announced to bugtraq and other mailing lists. Core FORCE uses a Windows port of OpenBSD's PF (ww [ more ] [ reply ] Flaw in Syn Attack Protection on non-updated Microsoft OSes can lead to DoS 2005-11-28 Luigi Mori (lm symbolic it) Flaw in Syn Attack Protection on non-updated Microsoft OSes, can lead to DoS Summary It is possible to mount a DoS attack against Windows 2000/2003 hosts where the SYN attack protection has been enabled. The attacker can consume all CPU resources of the victim host making it unresponsive. While a [ more ] [ reply ] What is wrong with these people? 2005-11-28 Paul Schmehl (pauls utdallas edu) <http://www.f-secure.com/weblog/#00000723> Here's an interesting one. Peripherals manufacturer I-O Data has shipped a series of nice-looking portable hard drives in the 40GB to 120GB range - carrying the Backdoor.Win32.Tompai trojan on them. You would think Sony's mistake would wake manufacturer [ more ] [ reply ] Google Talk cleartext credentials in process memory 2005-11-28 unknown pentester gmail com Title: Google Talk Beta Messenger cleartext credentials in process memory Affected versions: 1.0.0.64 (this version is believed to be the first one released to the public) Vendor contacted: 25/08/05 Patched version released: 29/08/05 Advisory released: 28/11/05 Author: pagvac (Adrian Pastor) H [ more ] [ reply ] Kadu remote DoS 2005-11-28 michal tux bz Hi. Kadu is a Gadu-Gadu instant messaging open source client. By sending message with rich_text ,image basic informations and nothing else to speciffic UIN thru Gadu-Gadu server Kadu is stopping to respond or is shutting down immidietly. Behavior depends on version 0.4.2 In most cases Ka [ more ] [ reply ] - Cisco IOS HTTP Server code injection/execution vulnerability- 2005-11-28 picardos terra es (1 replies) It has been identified a vulnerability in the Cisco IOS Web Server. An attacker can inject arbitrary code in some of the dynamically generated web pages. To succesfully exploit the vulnerability the attacker only needs to know the IP of the Cisco. THERE'S NO NEED TO HAVE ACCESS TO THE WEB SERVER! On [ more ] [ reply ] Re: - Cisco IOS HTTP Server code injection/execution vulnerability- 2005-11-28 Florian Weimer (fw deneb enyo de) DNS query spam 2005-11-27 Piotr Kamisiski (rotunda ktd krakow pl) (1 replies) Hi all, Recently my DNS servers get jammed with bogus queries. The attacks come in series, taking a few minutes each, sometimes from different IPs at the same time, at least twice a day. <snap> 23:05:40.241026 IP 204.92.73.10.40760 > xx.xx.xx.xx.53: 38545+ [1au] ANY ANY? e.mpisi.com. (40) 23:0 [ more ] [ reply ] Re: phpBB Code EXEC (v2.0.10) 2005-11-27 deane10 sbcglobal net (1 replies) ZRCSA-200503 - ktools Buffer Overflow Vulnerability 2005-11-27 siegfried zone-h org ZRCSA-200503 - ktools Buffer Overflow Vulnerability Zone-H Research Center Security Advisory 200503 http://www.zone-h.fr Date of release: 27/11/2005 Software: ktools (http://konst.org.ua/ktools) Affected versions: <= 0.3 Risk: Medium Discovered by: Mehdi Oudad "deepfear" and Kevin Fernandez "Siegf [ more ] [ reply ] APC Security Advisory - PowerChute Network Shutdown's Web Interface Only Supports HTTP 2005-11-28 Security advisory apcc com -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 APC Security Advisory - PowerChute Network Shutdown's Web Interface Only Supports HTTP Problem Summary: PowerChute Network Shutdown's web interface is only accessible via HTTP, which is not a cryptographically secure protocol. User authentication is [ more ] [ reply ] Guppy <= 4.5.9 Remote code execution 2005-11-28 retrogod aliceposta it Guppy <= 4.5.9 Remote code execution / various arbitrary inclusion issues software: site: http://www.freeguppy.org/ description: a very popular French PHP CMS that stores data in files i) remote code/commands execution (tested and working against php 5.0.2 and php 4.3.3 with register globals off [ more ] [ reply ] ANN: Free endpoint security software released (Core FORCE 070.105) 2005-11-28 Core FORCE team (force force coresecurity com) Greetings: CoreLabs, the research arm of Core Security Technologies is pleased to announce the public release of Core FORCE, a free software endpoint security solution. Core FORCE, a fully functional endpoint protection software for Windows 2000 and Windows XP systems, is released under the Apache [ more ] [ reply ] |
|
Privacy Statement |
a new class of exploitable (remote code) perl format string
vulnerabilities. During the login process it is possible to trigger this
vulnerability via a crafted username parameter containing format string
data. In the observed
[ more ] [ reply ]