[KAPDA]MyBB 1.1.7~ htmlspeacialchar_uni(), fixjavascript(), functions_post.php ~[url]XSS attack

2006-08-30 Thread addmimistrator
ORIGINAL ADVISORY: http://myimei.com/security/2006-08-15/mybb-117-htmlspeacialchar_uni-fixjavascript-functions_postphp-urlxss-attack.html http://kapda.ir/page-advisory.html ** ——-Summary—- Software: MyBB Sowtware’s Web Site: http://www.mybboard.com Versions: 1.1.7 Class

Hackers to Hackers Conference III - Call for Papers

2006-08-30 Thread Rodrigo Rubira Branco (BSDaemon)
General Objectives The H2HC have as mainly objective offer a national and internation conference for Brazilians Hackers, strongly the ethical of hacking. We have as mission change and desmistify the word hacker from the pejoractive sense to show the hacker as who works in software research and se

feedsplitter considered harmful

2006-08-30 Thread jon
I was looking through the feedsplitter.php script avaiable from http://chxo.com/software/feedsplitter/, version 2006-01-21 (revision 1.7 according to the RCS $Id$, but that looks out of date) today, and noticed a few problems. (Background: feedsplitter turns RSS feeds into HTML or javascript so

[KAPDA]MyBB 1.1.7 ~ admin/global.php ~ XSS Attack

2006-08-30 Thread addmimistrator
ORIGINAL ADVISORY: http://myimei.com/security/2006-08-17/mybb-117-adminglobalphp-xss-attack.html http://kapda.ir/page-advisory.html ** ——-Summary—- Software: MyBB Sowtware’s Web Site: http://www.mybboard.com Versions: 1.1.7 Class: Remote Status: Unpatched Exploit: Ava

osCommerce < 2.2 Milestone 2 060817 POC Exploit

2006-08-30 Thread s10242006
#!/usr/bin/php -q -d short_open_tag=on '/') or ($path[strlen($path)-1]<>'/')) {echo 'Error... check the path!'; die;} if($Debug==1) { echo "Name\t: osCommerce Multiple Vulnerabilities\r\n"; echo "Date\t: August 17, 2006\r\n"; echo "Vendor\t: osCommerce\r\n";

ezContents Version 2.0.3 Remote/Local File Inclusion, SQL Injection, XSS

2006-08-30 Thread gmdarkfig
# # VulnScr: ezContents Version 2.0.3 # Web: http://www.ezcontents.org/ # # Date...: Web July 28 10:44 2006 # Credits: DarkFig ([EMAIL PROTECTED]) # Vuln...: SQL Injection, Remote/Local File Inclusion, Cross Site Scripting # ==[ Remote / Local File Inclusion ==

Re: JetBox cms (search_function.php) Remote File Include

2006-08-30 Thread Carsten Eilers
Hi Steve, Steven M. Christey schrieb am Tue, 29 Aug 2006 19:57:13 -0400: >Frank Reissner said: > >> //comments >> >> function phpdigSearch(){ >> >> Line: 423 > ?> >> >> ... >> } >> >>Please explain us how that should be exploited. > >While this statement appears to be in a function de

[SECURITY] [DSA 1163-1] New gtetrinet packages fix arbitrary code execution

2006-08-30 Thread Martin Schulze
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 1163-1[EMAIL PROTECTED] http://www.debian.org/security/ Martin Schulze August 30th, 2006

[KAPDA::#56] - FREEKOT SQL Injection Vulnerability

2006-08-30 Thread farhadkey
KAPDA New advisory Vendor: http://www.digiappz.com Vulnerability: SQL_Injection Date : Found : Aug 10, 2006 Vendor Contacted : N/A Release Date : Aug 30, 2006 About Freekot : FREEKOT is a free tool which allows you to insert a random quotation

XSS in HLstats 1.34

2006-08-30 Thread MC Iglo
Hello, world ;) Input passed to multiple parameters in index.php isn't properly sanitised before being returned to the user. This can be exploited to execute HTML and script code in a user's browser session in context of an affected site with limitation of ' and ". This may also affect prior vers

Nuked Klan 1.7 SP4.3 : Function Anti-XSS Bypassed

2006-08-30 Thread Blwood
// *- BEGIN -* // By Blwood // http://blwood.net We can bypassed the function anti-xss called nk_CSS ( nuked.php) using like this : http://www.blwood.net')) "> Here is the function : function nk_CSS($str) { if ($str != "") {

IwebNegar v1.1 Multiple vulnerabilities

2006-08-30 Thread Hessamx
:: IwebNegar v1.1 Multiple vulnerabilities :: Software : IwebNegar v1.1 Website : Bug Discover : Hessam-x / www.hessamx.net I. Cross Site Scripting Vulnerability - Parameter "com

Ezportal/Ztml v1.0 Multiple vulnerabilities

2006-08-30 Thread Hessamx
:: Ezportal/Ztml v1.0 Multiple vulnerabilities :: Software : Ezportal/Ztml Website : http://www.ztml.org Bug Discover : Hessam-x / www.hessamx.net I. Multiple Cross Site Scripting Vulnerabilities --

[SECURITY] [DSA 1162-1] New libmusicbrainz packages fix arbitrary code execution

2006-08-30 Thread Martin Schulze
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 1162-1[EMAIL PROTECTED] http://www.debian.org/security/ Martin Schulze August 30th, 2006

SQL-Ledger serious security vulnerability and workaround

2006-08-30 Thread chris
Hi; This post is to inform everyone that there is a serious security hole that has been discovered in SQL-Ledger involving session handling. The flaw allows anyone with network access to the server to access the application as any logged in user using trivial mechanisms. I have previously br

Re: AW: JetBox cms (search_function.php) Remote File Include

2006-08-30 Thread Steven M. Christey
Frank Reissner said: > //comments > > function phpdigSearch(){ > > Line: 423 ?> > > ... > } > >Please explain us how that should be exploited. While this statement appears to be in a function declaration, there would be nested " Notice the "?>" in front of the

Re: Cisco NAC Appliance Agent Installation Bypass Vulnerability

2006-08-30 Thread Joe Feise
Hello, This is an answer to Cisco's response to our advisory entitled "NAC agent installation bypass". We appreciate Cisco's answer to our advisory and the confirmation of the validity of our approach. We like to address some of the points Eloy Paris from Cisco makes in his answer. Eloy Paris w

InfoSec Paper: Creating Business Through Virtual Trust

2006-08-30 Thread Kenneth F. Belva
Information Security Community, Please consider our paper - "Creating Business Through Virtual Trust: How to Gain and Sustain a Competitive Advantage Using Information Security" - for your review. Here is the abstract from our paper: "Cash. Profit. Margins. Productivity. This is the language

Re: CuteNews 1.3.* Remote File Include Vulnerability

2006-08-30 Thread Carsten Eilers
Hi, [EMAIL PROTECTED] schrieb am Fri, 25 Aug 2006 19:14:46 +: >Vendor: CuteNews 1.3.* > >-Description--- > > >$cutepath = __FILE__; Here $cutepath is set to the path of this script >$cutepath = preg_replace( "'\\\search\.php'", "", $cutepath); > >$cutepath = pr

Re: Jupiter CMS 1.1.5 index.php Remote File Include

2006-08-30 Thread Carsten Eilers
Hi, [EMAIL PROTECTED] schrieb am Fri, 25 Aug 2006 22:50:11 +: ># ># > >#Jupiter CMS 1.1.5 index.php Remote File Include > ># the code > >#$template = "default"; > ># include "te