BugTraq Mode:
(Page 1400 of 1748)  < Prev  1395 1396 1397 1398 1399 1400 1401 1402 1403 1404 1405  Next >
RE: Paper: SQL Injection Attacks by Example 2005-01-05
Michael Silk (michaelsilk gmail com)
Michael,

But that doesn't really matter - you'd attempt to execute your
malicious code at the level where the procedure is executed, not
inside of it.

I.e. the code could be:
sql = " exec spSuperSecure " + one + ", " + two;

We aren't really interested in "spSuperSecure" and it's typed
parame

[ more ]  [ reply ]
RE: Paper: SQL Injection Attacks by Example 2005-01-05
Scovetta, Michael V (Michael Scovetta ca com) (1 replies)
David,

Actually, to nitpick your comment a bit, stored procedures usually have
typed input variables:

create procedure foo ( a int, b varchar(20) ) as ...

At least in MSSQL, you'd have to do something bad like use sp_executesql
or some other function that will re-form a complete sql query and pa

[ more ]  [ reply ]
Re: Paper: SQL Injection Attacks by Example 2005-01-05
Chip Andrews (chip sqlsecurity com)
IBM DB2 XML functions file creation vulnerabilities (#NISR05012005I) 2005-01-05
NGSSoftware Insight Security Research (nisr nextgenss com)
NGSSoftware Insight Security Research Advisory

Name: IBM DB2 XML functions file creation vulnerabilities
Systems Affected: DB2 8.1
Severity: High risk from remote
Vendor URL: http://www.ibm.com/
Author: David Litchfield [ david at ngssoftware.com ]
Relates to: http://www.nextgenss.com/advisories/db

[ more ]  [ reply ]
IBM DB2 XML functions overflows (#NISR05012005H) 2005-01-05
NGSSoftware Insight Security Research (nisr nextgenss com)
NGSSoftware Insight Security Research Advisory

Name: IBM DB2 XML functions overflows
Systems Affected: DB2 8.1
Severity: High risk from remote
Vendor URL: http://www.ibm.com/
Author: David Litchfield [ david at ngssoftware.com ]
Relates to: http://www.nextgenss.com/advisories/db2-02.txt
Date of Pub

[ more ]  [ reply ]
IBM DB2 to_char and to_date Denial Of Service (#NISR05012005G) 2005-01-05
NGSSoftware Insight Security Research (nisr nextgenss com)
NGSSoftware Insight Security Research Advisory

Name: IBM DB2 to_char and to_date Denial Of Service
Systems Affected: DB2 8.1
Severity: High risk from local
Vendor URL: http://www.ibm.com/
Author: Chris Anley [ chris at ngssoftware.com ]
Relates to: http://www.ngssoftware.com/advisories/db2-02.txt
D

[ more ]  [ reply ]
IBM DB2 Windows Permission Problems (#NISR05012005F) 2005-01-05
NGSSoftware Insight Security Research (nisr nextgenss com)
NGSSoftware Insight Security Research Advisory

Name: IBM DB2 Windows Permission Problems
Systems Affected: DB2 8.1
Severity: High risk from local
Vendor URL: http://www.ibm.com/
Author: Chris Anley [ chris at ngssoftware.com ]
Relates to: http://www.ngssoftware.com/advisories/db2-02.txt
Date of Pub

[ more ]  [ reply ]
IBM DB2 SATADMIN.SATENCRYPT buffer overflow (#NISR05012005E) 2005-01-05
NGSSoftware Insight Security Research (nisr nextgenss com)
NGSSoftware Insight Security Research Advisory

Name: IBM DB2 SATADMIN.SATENCRYPT buffer overflow
Systems Affected: DB2 8.1
Severity: Medium risk from remote
Vendor URL: http://www.ibm.com/
Author: David Litchfield [ david at ngssoftware.com ]
Relates to: http://www.nextgenss.com/advisories/db2-02.t

[ more ]  [ reply ]
IBM DB2 JDBC Applet Server buffer overflow (#NISR05012005D) 2005-01-05
NGSSoftware Insight Security Research (nisr nextgenss com)
NGSSoftware Insight Security Research Advisory

Name: IBM DB2 JDBC Applet Server buffer overflow
Systems Affected: DB2 8.1
Severity: High risk from remote
Vendor URL: http://www.ibm.com/
Author: David Litchfield [ david at ngssoftware.com ]
Relates to: http://www.nextgenss.com/advisories/db2-02.txt

[ more ]  [ reply ]
IBM DB2 call buffer overflow (#NISR05012005C) 2005-01-05
NGSSoftware Insight Security Research (nisr nextgenss com)
NGSSoftware Insight Security Research Advisory

Name: IBM DB2 call buffer overflow
Systems Affected: DB2 8.1/7.x
Severity: High risk from remote
Vendor URL: http://www.ibm.com/
Author: David Litchfield [ david at ngssoftware.com ]
Relates to: http://www.nextgenss.com/advisories/db2-02.txt
Date of P

[ more ]  [ reply ]
IBM DB2 libdb2.so buffer overflow (#NISR05012005B) 2005-01-05
NGSSoftware Insight Security Research (nisr nextgenss com)
NGSSoftware Insight Security Research Advisory

Name: IBM DB2 libdb2.so.1 buffer overflow
Systems Affected: DB2 8.1/7.x
Severity: High risk from local
Vendor URL: http://www.ibm.com/
Author: David Litchfield [ david at ngssoftware.com ]
Relates to: http://www.nextgenss.com/advisories/db2-02.txt
Dat

[ more ]  [ reply ]
Paper: SQL Injection Attacks by Example 2005-01-05
Steve Friedl (steve unixwiz net) (1 replies)
Hello folks (and Happy New Year),

I recently posted this to the PEN-TEST list, but it was suggested that
the wider Bugtraq readership might benefit from it.

During a recent security review for a customer, I was able to completely
compromise his web application in about two hours using SQL Injectio

[ more ]  [ reply ]
RE: Paper: SQL Injection Attacks by Example 2005-01-05
David Litchfield (davidl ngssoftware com)
IBM DB2 db2fmp buffer overflow (#NISR05012005A) 2005-01-05
NGSSoftware Insight Security Research (nisr nextgenss com)
NGSSoftware Insight Security Research Advisory

Name: IBM DB2 db2fmp buffer overflow
Systems Affected: DB2 8.1/7.x
Severity: High risk from local
Vendor URL: http://www.ibm.com/
Author: David Litchfield [ david at ngssoftware.com ]
Relates to: http://www.nextgenss.com/advisories/db2-02.txt
Date of

[ more ]  [ reply ]
DMA[2005-0103a] - 'William LeFebvre "top" format string vulnerability' 2005-01-05
KF (Lists) (kf_lists digitalmunition com)
Moving forward my work will be released independent of any previous
affiliations. Once I have a web presence I will let you folks know.

-Kevin Finisterre

[ more ]  [ reply ]
[ GLSA 200501-03 ] Mozilla, Firefox, Thunderbird: Various vulnerabilities 2005-01-05
Thierry Carrez (koon gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200501-03
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -

[ more ]  [ reply ]
[ GLSA 200501-02 ] a2ps: Insecure temporary files handling 2005-01-04
Thierry Carrez (koon gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200501-02
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -

[ more ]  [ reply ]
[ GLSA 200501-01 ] LinPopUp: Buffer overflow in message reply 2005-01-04
Thierry Carrez (koon gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200501-01
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -

[ more ]  [ reply ]
[ GLSA 200501-04 ] Shoutcast Server: Remote code execution 2005-01-05
Luke Macken (lewk gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200501-04
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -

[ more ]  [ reply ]
[CLA-2005:910] Conectiva Security Announcement - mplayer 2005-01-05
Conectiva Updates (secure conectiva com br)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
CONECTIVA LINUX SECURITY ANNOUNCEMENT
- ------------------------------------------------------------------------
--

PACKAGE : mplayer
SUMMARY : Fixes for mplayer vulnerabi

[ more ]  [ reply ]
[SECURITY] [DSA 625-1] New pcal packages fix arbitrary code execution 2005-01-05
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 625-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
January 5th, 2004

[ more ]  [ reply ]
[SECURITY] [DSA 624-1] New zip packages fix arbitrary code execution 2005-01-05
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 624-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
January 5th, 2004

[ more ]  [ reply ]
QWikiwiki directory traversal vulnerability 2005-01-04
Madelman (madelman iname com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Title: QWikiwiki directory traversal vulnerability
Vulnerability discovery: Madelman <madelman AT iname.com>
Date: 01/01/2005
Severity: Critical

Summary:
- --------

QwikiWiki is driven by one core design goal: simplicity. This design
goal is codified

[ more ]  [ reply ]
Socket termination, format string and XSS in Soldner Secret Wars 30830 2005-01-04
Luigi Auriemma (aluigi autistici org)

#######################################################################

Luigi Auriemma

Application: SÖLDNER - Secret Wars
http://www.secretwars.net
Versions: <= 30830
Platforms: Windows
Bugs: A] silent socket termination
B]

[ more ]  [ reply ]
MyBB SQL Injection 2005-01-05
scottm spamcop net


Description:

MyBB is a powerful, efficient and free forum package developed in PHP and MySQL. MyBB has been designed with the end users in mind, you and your subscribers. Full control over your discussion system is presented right at the tip of your fingers, from multiple styles and themes to the

[ more ]  [ reply ]
[KDE Security Advisory] ftp kioslave command injection 2005-01-04
Dirk Mueller (mueller kde org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

KDE Security Advisory: ftp kioslave command injection
Original Release Date: 2005-01-01
URL: http://www.kde.org/info/security/advisory-20050101-1.txt

0. References

http://www.securityfocus.com/bid/11827
http://cve.mitre.org/cgi-bin/cv

[ more ]  [ reply ]
[SECURITY] [DSA 623-1] New nasm packages fix arbitrary code execution 2005-01-04
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 623-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
January 4th, 2004

[ more ]  [ reply ]
Serious Vulnerabilities In PhotoPost ReviewPost 2005-01-03
GulfTech Security (security gulftech org)


##########################################################
# GulfTech Security Research January 02, 2005
##########################################################
# Vendor : All Enthusiast, Inc.
# URL : http://www.reviewpost.com/
# Version : ReviewPost PHP Pro All Versions
# Risk

[ more ]  [ reply ]
Multiple PhotoPost Pro Vulnerabilities 2005-01-03
GulfTech Security (security gulftech org)


##########################################################
# GulfTech Security Research January 03, 2005
##########################################################
# Vendor : All Enthusiast, Inc.
# URL : http://www.photopost.com/class/
# Version : PhotoPost PHP 4.8.1 && Others
# Risk

[ more ]  [ reply ]
3Com 3CDaemon Multiple Vulnerabilities 2005-01-04
Sowhat . (smaillist gmail com)
3Com 3CDaemon Multiple Vulnerabilities

By Sowhat
04.JAN.2005

http://secway.org/advisory/ad20041011.txt
[I.T.S] Security Research Team

Product Affected:

3Com 3CDaemon 2.0 revision 10

Vendor:

www.3Com.com

(1) BACKGROUD

3CDaemon is a free popular TFTP, FTP, and Syslog daemon for Microsoft W

[ more ]  [ reply ]
(Page 1400 of 1748)  < Prev  1395 1396 1397 1398 1399 1400 1401 1402 1403 1404 1405  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus