Re: 18 ways to escalate privileges in Zone Labs ZoneAlarm Security Suite build 6.1.744.000

2006-03-09 Thread 3APA3A
Dear Reed Arvin, Having insecure directory in PATH is configuration bug, because PATH is expected way to search required dynamic libraries under Windows. In your very case, user can elevate privileges by simply overwriting binaries of Active Perl installation. In case Active

nCipher Advisory #12: Insecure Generation of Diffie-Hellman keys

2006-03-09 Thread nCipher Support
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 nCipher Security Advisory No. 12 Insecure Generation of Diffie-Hellman keys -- Note nCipher is publishing three advisories numbered 12, 13, and 14 simultaneously.

nCipher Advisory #13: CBC-MAC IV misleading programming interface

2006-03-09 Thread nCipher Support
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 nCipher Security Advisory No. 13 CBC-MAC IV misleading programming interface --- Note nCipher is publishing three advisories numbered 12, 13 and 14 simultaneously.

nCipher Advisory #14: Presence of flaws in firmware security

2006-03-09 Thread nCipher Support
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 nCipher Security Advisory No. 14 Presence of flaws in firmware security -- Note nCipher is publishing three advisories numbered 12, 13 and 14 simultaneously. You

[SECURITY] [DSA 989-1] New zoph packages fix SQL injection

2006-03-09 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 989-1 [EMAIL PROTECTED] http://www.debian.org/security/ Moritz Muehlenhoff March 9th, 2006

Remote access to NeuSecure/Netcool backend database via web interface credentials leakage

2006-03-09 Thread D . Snezhkov
-= DDSi Security Report =- March 8th, 2006 -- --- Another credentials leak was found in Netcool/NeuSecure Security Information Management platform which

Easy File Sharing Web Server Multiple Vulnerablilities

2006-03-09 Thread revnic
Easy File Sharing Web Server Multiple Vulnerablilities Software: Easy File Sharing Web Server Version: 3.2 Website: http://www.sharing-file.com/ Description: Easy File Sharing Web Server is a Windows program that allows you to host a secure peer-to-peer and web-based file sharing system

HYSA-2006-005 WordPress 2.0.1 Remote DoS Exploit

2006-03-09 Thread h4cky0u . org
-- HYSA-2006-005 h4cky0u.org Advisory 014 -- Date - Wed March 08 2006 TITLE: == WordPress 2.0.1 Remote DoS Exploit SEVERITY: = Medium SOFTWARE: = Wordpress

INFIGO-2006-03-01: PeerCast streaming server remote buffer overflow

2006-03-09 Thread infocus
INFIGO IS Security Advisory #INFIGO-2006-03-01 http://www.infigo.hr/ Title: PeerCast streaming server remote buffer overflow Advisory ID: INFIGO-2006-03-01 Date: 2006-03-08 Advisory URL: http://www.infigo.hr/in_focus/INFIGO-2006-03-01 Impact: Remote code execution Risk

ADP Forum 2.0,* script #304;njection

2006-03-09 Thread liz0
ADP Forum 2.0,* script #304;njection site:http://www.linux.it/~fedro/ demo:http://www.adp.host.sk/Forum203/ -- Post This Code: scriptalert(/Liz0ziM/)/script

MyBloggie: Multiple XSS Vulnerabilities

2006-03-09 Thread enji
=== MyBloggie: Multiple XSS Vulnerabilities === Technical University of Vienna Security Advisory TUVSA-0603-002, March 9, 2006 ===

txtForum: Multiple XSS Vulnerabilities

2006-03-09 Thread enji
=== txtForum: Multiple XSS Vulnerabilities === Technical University of Vienna Security Advisory TUVSA-0603-003, March 9, 2006 ===

txtForum: Script Injection Vulnerability

2006-03-09 Thread enji
=== txtForum: Script Injection Vulnerability === Technical University of Vienna Security Advisory TUVSA-0603-004, March 9, 2006

Re: a worm for mediaWiki??

2006-03-09 Thread Michael Rice
vitamona wrote: Hi, i've noticed a strange thing on MediaWiki that i used sometimes. The highlight word on the varius articoles on mediaWiki was replace with strange string like this: NaodW29-pre1dc0e53c28ac067d0016 For look this on google see here:

RevilloC MailServer 1.x USER Command Handling Remote Buffer Overflow Exploit

2006-03-09 Thread securma
Product: RevilloC MailServer and Proxy v 1.21 (http://www.revilloC.com) The mail server is a central point for emails coming in and going out from home or office. The service will work with any standard email client that supports POP3 and SMTP. Vulnerability Description: sending a large buffer

Re: Re: [CORRECTIONS AND ADDITIONS ]Azbb v1.1.00 Cross-Site Scripting

2006-03-09 Thread no_reply
The mentioned issue, ie passing script via the form, will only affect the USER who is doing it. you probably mean the person who is the target of such an attack, right?! It has no effect on the AZbb, the server or the forum That is what XSS is about,it effects the client.

Re: 18 ways to escalate privileges in Zone Labs ZoneAlarm Security Suite build 6.1.744.000

2006-03-09 Thread reedarvin
Hmmm...looks like not all of the characters were HTML safe in the source code. The original advisory can be found at: a href=http://reedarvin.thearvins.com/20060308-01.html;http://reedarvin.thearvins.com/20060308-01.html/a

RE: [Full-disclosure] PHP-based CMS mass-exploitation

2006-03-09 Thread hchemin
This is a mambo based exploit. There are linux based worm variants which compromise an site running a vulnerable version of Mambo and then execute a malicious perl script which in turns attempts to exploit remote sites. Harry Original Message Subject: [Full-disclosure]

Aluria/WhenU Troubled Past and Whitewashing History

2006-03-09 Thread Paul Laudanski
I realize this may not be a bug report in the classic instance, but I do feel the community needs to be advised of what is going on with Aluria and their apparent WhenU delisting coverup. We're all supposed to be in this security thing together, but the recent actions on Aluria's part leaves

Re: [waraxe-2006-SA#047] - Evading sql-injection filters in phpNuke 7.8

2006-03-09 Thread omega13a
I forgot to mention but Evaders99 posted a fix for this on nukefixes.com. Just replace if((!is_admin($admin)) AND (isset($_SERVER['QUERY_STRING'])) AND (!stristr($_SERVER['QUERY_STRING'], ad_click))) { with if(!isset($admin) OR (isset($admin) AND !is_admin($admin))) { .

Re: [waraxe-2006-SA#047] - Evading sql-injection filters in phpNuke 7.8

2006-03-09 Thread omega13a
This exploit is in PHPNuke 7.9 as well. It could be in additional versions as well.

UnrealIRCd3.2.3 Server-Link Denial of Service

2006-03-09 Thread admin
-Description- UnrealIRCd 3.2.3 is vulnerable to strings sent from a linked server for adding/removing Q:lines with special characters. Could be sent through services. Fixed as of version 3.2.4 -PoC- #!/usr/bin/perl # Denial of Service exploit for UnrealIRCd 3.2.3 # Successfully tested on both

DVguestbook 1.0 And 1.2.2 Cross Site Scripting

2006-03-09 Thread liz0
- DVguestbook 1.0 And 1.2.2 Cross Site Scripting Site:http://suprem.free.fr Credit : Liz0ziM webpage:www.biyosecurity.com Mail :[EMAIL PROTECTED]

PHP Advanced Transfer Manager Download users password hashes

2006-03-09 Thread liz0
PHP Advanced Transfer Manager Download users password hashes PHP Advanced Transfer Manager 1.* Site:http://phpatm.free.fr/ Bugs: http://victim.com/path/users/username example:

n8cms 1.1 1.2 version Sql #304;njection And XSS

2006-03-09 Thread liz0
- n8cms 1.1 1.2 version Sql #304;njection And XSS Site:http://www.nathanlandry.com Demo:http://www.nathanlandry.com/n8cms_v1.1/ Credit : Liz0ziM webpage:www.biyosecurity.com Mail :[EMAIL PROTECTED]

Re: HYSA-2006-005 WordPress 2.0.1 Remote DoS Exploit

2006-03-09 Thread scaturan
if you're using mod_security, try a variant of this ruleset: SecFilterSelective THE_REQUEST wp-register.php id:1004,deny,log,status:412 #SecFilterRemove 1004 - use this to remove the rule per virtual host, uncommented.