WBB<<---v2.0 RC2 "newthread.php" SQL Injection

2006-06-24 Thread CrAzY . CrAcKeR
Discovered By: CrAzY CrAcKeR Site:www.alshmokh.com I want to thank my friend:- nono225-mHOn-rageh-Lover Hacker-Brh BoNy_m-Rootshill-LiNuX_rOOt-Sw33t h4ck3r Example:- /newthread.php?boardid=[SQL] ==

Re: Re: MS Excel Remote Code Execution POC Exploit

2006-06-24 Thread Juha-Matti Laurio
"Steven M. Christey" <[EMAIL PROTECTED]> wrote: > * Advisories: > * http://www.microsoft.com/technet/security/advisory/921365.mspx > * http://www.securityfocus.com/bid/18422/ There are at least three separate Excel issues that were published in the past week. These references suggest that it'

Softbiz Dating 1.0 SQL injection

2006-06-24 Thread securityconnection
Softbiz Dating 1.0 http://www.softbizscripts.com - - SQL injection - http://target.xx/search_results.php?country=1[SQL] http://target.xx/search_results.php?pg=2&sort_by=1[SQL] http://target.xx/featured_photos.php?browse=1[SQL] http://targ

Re: Cisco Secure ACS Weak Session Management Vulnerability

2006-06-24 Thread Clayton Kossmeyer
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hello - The Cisco PSIRT has posted a public response to a vulnerability made public by a researcher on multiple public mailing lists. This is the Cisco PSIRT response to the statements made by Darren Bounds in his advisory: Cisco Secure ACS Weak Ses