Hi
Lately I came across several Citrix and Terminal Server projects which
provide a restricted set of applications to their users. This is achieved
using Windows Software Restriction Policies or AppSense Application Manager
to white or black list executables.
One of these permitted binaries is of
# LiderHack.Org
# script name : PhpBB Toplist 1.3.7
#Dork : toplist.php?f=toplistnew
# Risk : High
# Found By : [EMAIL PROTECTED]
# Vulnerable file : Toplist.php
# New add sites addres: toplist.php?f=toplistnew
#Name: [xss code]
&
#Information: [xss code]
&
#Name: Your name
&
#Name: aler
===
Ubuntu Security Notice USN-394-1 December 08, 2006
ruby1.8 vulnerability
CVE-2006-6303
===
A security issue affects the following Ubuntu releases:
Ubuntu 5.10
Ubuntu 6.06
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[PHP 5.2.0 session.save_path safe_mode and open_basedir bypass]
Author: Maksymilian Arciemowicz (SecurityReason)
Date:
- - Written: 02.10.2006
- - Public: 08.12.2006
SecurityAlert Id: 43
CVE: CVE-2006-6383
SecurityRisk: High
Affected Software: PHP 5.
# LiderHack.Org & Trtekforum.com
# script name : Animated Smiley Generator
# Version : All
# script sites : http://smileygenerator.us
#Dork : "Smileygenerator"
# Risk : High
# Found By : [EMAIL PROTECTED]
# Vulnerable file :final.php
#Error code : require("$smiley/cmd.php");
#Exploit:
Hi list(s),
The recent coverage of ASX Playlist issues seems somewhat strange.
For the uninitiated, here is a quick wrapup:
XMPlay ASX buffer overflow PoC code posted to milw0rm - 21 November
This PoC demonstrated an exploitable buffer overflow condition in the
handling of 'ref href' URIs
LS-20061001
LSsec has discovered a vulnerability in Computer Associates BrightStor ARCserve
Backup v11.5, which could be exploited by an anonymous attacker in order to
execute arbitrary code with SYSTEM privileges on an affected system. The flaw
specifically exists within the Tape Engine (tapee
LS-20060908
LSsec has discovered a vulnerability in Computer Associates BrightStor ARCserve
Backup v11.5, which could be exploited by an anonymous attacker in order to
execute arbitrary code with SYSTEM privileges on an affected system. The flaw
specifically exists within the Tape Engine (tapee
(waiting for the deluge of other lemmings who go:
"it works on blahblah with SPblahblah"
"confirmed on blahblah with blahblah language"
"blablah did not work for me blahblah"
can't you just find out the cause and not test EVERY version of IE
that you have? I mean, yeah, ok, so you tested it on IE
Title: CAID 34846: CA BrightStor ARCserve Backup Discovery Service
Buffer Overflow Vulnerability
CA Vulnerability ID (CAID): 34846
CA Advisory Date: 2006-12-07
Discovered By: Assurent Secure Technologies (assurent.com)
Impact: Remote attacker can execute arbitrary code.
Summary: CA BrightSto
lintah_|adv|[EMAIL PROTECTED]>=<[MidiCart]<===>[php b/d]
_ ___ ___
_ ___
/___
_ / /
ooo000-~-~-~-~-~-~-~-~-
I have posted Frequently Asked Questions document about the unpatched Microsoft
Word zero-day vulnerability.
The document entitled as Microsoft Word 0-day Vulnerability FAQ - December
2006, CVE-2006-5994 is located at my SecuriTeam Blogs section,
http://blogs.securiteam.com/?p=759
The document
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
-
Debian Security Advisory DSA-1230-1 [EMAIL PROTECTED]
http://www.debian.org/security/ Steve Kemp
December 08, 2006
-
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Publisher Name: OpenPKG GmbH
Publisher Home: http://openpkg.com/
Advisory Id (public):OpenPKG-SA-2006.038
Advisory Type: OpenPKG Security Adv
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- --
Trustix Secure Linux Security Advisory #2006-0070
Package names: gnupg, proftpd
Summary: Multiple vulnerabilities
Date: 2006-12-08
Affected version
#Aria-Security Team Advisory
#
#
#Original Advisory
#http://www.aria-security.com/forum/showthread.php?t=67
#---
#Software: cPanel Version 11 BoxTrapper
#Method: Cross Site Scripting
#
#PoC:
#
#http://target:2082/frontend/xtest/mail/manage.ht
#Aria-Security Team Advisory
#
#
#Original Advisory:
#http://www.aria-security.com/forum/showthread.php?t=68
#---
#Vulnerability: cPanel Version 11 Pops.Html Cross-Site Scripting
#
#PoC:
#
#http://target:2082/mail/pops.html?domain=XSS
#
#Conta
c#Aria-Security Team Advisory
#
#
#Original Advisory:
#http://www.aria-security.com/forum/showthread.php?t=44
#---
#Software: WebHost Manager (WHM)
#Tested WHM X v3.1.0 (demo.cpanel.net)
#Poc:
#
#http://target:2086/scripts2/changeemail?domain=
18 matches
Mail list logo