Re: PHP security (or the lack thereof)

2006-06-24 Thread Geo.
I think that any ability of the (l)users to expose executables as web services threatens the security of the web server machine, irrespective of programming language. (But I don't see how it threatens the internet -- they can already connect their own misconfigured machine to the net

Re: Opera 9 DoS PoC

2006-06-24 Thread Bruno Lustosa
On 21 Jun 2006 03:39:09 -, [EMAIL PROTECTED] [EMAIL PROTECTED] wrote: Details: Vulnerability can be exploited by using a large value in a href tag to create an out-of-bounds memory access. Proof Of Concept DoS exploit: http://www.critical.lt/research/opera_die_happy.html Interesting

WBB---v2.0 RC2 newthread.php SQL Injection

2006-06-24 Thread CrAzY . CrAcKeR
Discovered By: CrAzY CrAcKeR Site:www.alshmokh.com I want to thank my friend:- nono225-mHOn-rageh-Lover Hacker-Brh BoNy_m-Rootshill-LiNuX_rOOt-Sw33t h4ck3r Example:- /newthread.php?boardid=[SQL]

Re: Re: MS Excel Remote Code Execution POC Exploit

2006-06-24 Thread Juha-Matti Laurio
Steven M. Christey [EMAIL PROTECTED] wrote: * Advisories: * http://www.microsoft.com/technet/security/advisory/921365.mspx * http://www.securityfocus.com/bid/18422/ There are at least three separate Excel issues that were published in the past week. These references suggest that it's the

Softbiz Dating 1.0 SQL injection

2006-06-24 Thread securityconnection
Softbiz Dating 1.0 http://www.softbizscripts.com - - SQL injection - http://target.xx/search_results.php?country=1[SQL] http://target.xx/search_results.php?pg=2sort_by=1[SQL] http://target.xx/featured_photos.php?browse=1[SQL]

Re: Cisco Secure ACS Weak Session Management Vulnerability

2006-06-24 Thread Clayton Kossmeyer
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hello - The Cisco PSIRT has posted a public response to a vulnerability made public by a researcher on multiple public mailing lists. This is the Cisco PSIRT response to the statements made by Darren Bounds in his advisory: Cisco Secure ACS Weak