Advisory: Quezza BB = 1.0 File Inclusion Vulnerability.

2006-05-17 Thread Mustafa Can Bjorn IPEKCI
--Security Report-- Advisory: Quezza BB = 1.0 File Inclusion Vulnerability. --- Author: Mustafa Can Bjorn nukedx a.k.a nuker IPEKCI --- Date: 17/05/06 05:37 AM --- Contacts:{ ICQ: 10072 MSN/Email: [EMAIL PROTECTED] Web: http://www.nukedx.com } --- Vendor: Quezza (http://www.quezza.com/) Version:

Maksymilian Arciemowicz

2006-05-17 Thread cxib
Trust unworthy variables in PHP by SecurityReason.Com Maksymilian Arciemowicz max [at] jestsuper [dot] pl cxib [at] securityreason [dot] com http://securityreason.com/key/Arciemowicz.Maksymilian.gpg Recently, I have published a simple 'Full Path Disclosure and SQL Errors' bug, which has

Re: Checkpoint SYN DoS Vulnerability

2006-05-17 Thread sanjay naik
Hi David, The firewalls are not configured to confuse the scanner. The configurations have been checked by the Checkpoint Tech Support and the Checkpoint SMEs from our team. This is not a mis-configuration issue and SYNdefender is disabled. Regards, Sanjay Naik, CISSP Sr. Security

Secunia Research: IZArc unacev2.dll Buffer Overflow Vulnerability

2006-05-17 Thread Secunia Research
== Secunia Research 17/05/2006 - IZArc unacev2.dll Buffer Overflow Vulnerability - == Table of Contents Affected

Re: Checkpoint SYN DoS Vulnerability

2006-05-17 Thread Bojan Zdrnja
Sanjay, On 5/17/06, sanjay naik [EMAIL PROTECTED] wrote: Pawel, We have done a complete test using TCPdump on the checkpoint side and Tethereal on the scanner side. We have tested this on atleast 3 dfferent firewalls and found the same issue with our scans. SYNdefender is disabled on the

VNC_bypauth: vnc scanner multithreaded linux windows

2006-05-17 Thread [EMAIL PROTECTED]
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 windows: http://heapoverflow.com/vnc_reloaded/VNC_bypauth-win32.rar linux: http://heapoverflow.com/vnc_reloaded/VNC_bypauth-linux.tar.gz comments: http://heapoverflow.com/viewtopic.php?p=1729 Hello J.Weatherall :) -BEGIN PGP SIGNATURE-

Re[2]: The Weakness of Windows Impersonation Model

2006-05-17 Thread Brian L. Walche
thanks for reference David. As advisory notes impersonation implications are not something new. We would like to stress the fact of how easy it is to exploit by two notable samples. - An attacker can reliably elevate a context running on behalf of Network Service acccount. For example, by

What's Up Professional Spoofing Authentication Bypass

2006-05-17 Thread Kenneth F. Belva
What's Up Professional 2006 is vulnerable to a spoofing attack whereby the attacker can trick the application into thinking he/she is making a request from the console (which is considered trusted). This attack will allow the attacker to bypass the authentication mechanism of the application and

Firefox (with IETab Plugin) Null Pointer Dereferences Bug

2006-05-17 Thread Debasis Mohanty
Firefox (with IETab Plugin) Null Pointer Dereferences Bug ^ Vendor: Mozilla Product: FireFox with IE Tab Tested On: FireFox Version 1.5.0.3 + IE Tab Version 1.0.9 + Windows (XP / 2K) Introduction: IETab

DIMVA 2006 - Call For Participation

2006-05-17 Thread Thomas Biege
Sorry, if you receive multiple copies of this Call for Participation. == CALL FOR PARTICIPATION == Early Bird Rates

Re[2]: The Weakness of Windows Impersonation Model

2006-05-17 Thread Brian L. Walche
Just one important note regarding Database Security Brief: http://www.databasesecurity.com/dbsec/db-sec-tokens.pdf Why should I never logon to a Windows database server if I've got admin privileges? We describe a little different problem for MS SQL. MS SQL gets privileged context on its own from

Secunia Research: Eazel unacev2.dll Buffer Overflow Vulnerability

2006-05-17 Thread Secunia Research
== Secunia Research 17/05/2006 - Eazel unacev2.dll Buffer Overflow Vulnerability - == Table of Contents Affected

Two heap overflow in libextractor 0.5.13 (rev 2832)

2006-05-17 Thread Luigi Auriemma
### Luigi Auriemma Application: libextractor http://gnunet.org/libextractor/ Versions: = 0.5.13 (rev 2832) Platforms:*nix, *BSD, Windows and more Bugs: A] heap

Mobotix IP Network Cameras Multiple XSS

2006-05-17 Thread jaime . blasco
Mobotix IP Network Cameras Multiple XSS Version: Tested on M1 and M10 - M10-V2.0.5.2 - M1-V1.9.4.7 Discovered by: jaime.blasco(at)eazel(dot).es http://www.eazel.es Description: Mobotix is vulnerable to multiple security vulnerabilites that allow cross site scripting flaws.

Boastmachine Cross Site Scripting Vulnerability

2006-05-17 Thread mail
Advisory : Cross Site Scripting in Boastmachine (http://boastology.com/) Release Date : 17/05/2005 Last Modified : 17/05/2005 Author: Yunus Emre Yilmaz ( http://yns.zaxaz.com) Application : BoastMachine v3.1 ( maybe older versions) Risk : High Problem : Form action

OpenWiki--v0.78 Cross-Site Scripting

2006-05-17 Thread LiNuX_rOOt1
=== Discovery by: LiNuX_rOOt Site:www.alshmokh.com === Example: /ow.asp?p=[XSS]

HYSA-2006-008 myBloggie 2.1.3 CRLF SQL Injection

2006-05-17 Thread h4cky0u . org
-- HYSA-2006-008 h4cky0u.org Advisory 017 -- Date - Wed May 17 2006 TITLE: == myBloggie 2.1.3 CRLF SQL Injection SEVERITY: = Medium SOFTWARE: =

Re: The Weakness of Windows Impersonation Model

2006-05-17 Thread David Litchfield
Hi Brian, I wrote a paper on this subject last year, Snagging Security Tokens to Elevate Privileges (http://www.databasesecurity.com/dbsec-briefs.htm) after Tim Mullen and thrashed out a few details at Blackhat last year over a few White Russians. The paper discusses the problem in the context

RadLance Local Inclusion Exploit

2006-05-17 Thread Hussain Salim
Discovered And Coded By Mr.CrackerZ Exploit Code ___ #!/usr/bin/perl #Discovered and coded by Mr.CrackerZ ( Security Team ) #Contact me ( [EMAIL PROTECTED] ) #Usage: radlance.pl victim local file to read #Google: Powered by: RadLance Gold v7 #Tested Under RadLance Gold v7 ( Local

Wargamming Network..

2006-05-17 Thread Dusty
Hello all, just thought I would drop ya all this like: http://www.smashthestack.org/ -- Wargamming network, offers free shells, webspace, email accounts. Check it out - Help support the community! Dusty.

Gawab.com Register Xss Bugtraq

2006-05-17 Thread rootter
Script: Gawab.com Mail Services Portal System Version: ? Language: PHP Problem: Xss Vendor: http://www.HackMaster.Us Discovered by: rootter(at)hackmaster(dot)us Example: