Re: Re: Re: Re: Apache Server HTML Injection and UTF-7 XSS Vulnerability

2008-05-19 Thread Paul Szabo
Yossi Yakubov wrote in http://www.securityfocus.com/archive/1/492202 : > if you, apache guys will set 403 page's charset ... Done, as per http://www.securityfocus.com/archive/1/492094 : >> All [current] releases include fixes ... > ... change manually the ecnoding in Firefox to UTF-7 ... There i

Cpanel all version >> root access with a reseller account.

2008-05-19 Thread a . jasbi
By : Ali Jasbi ( IHST security & hacking Research team) WwW.Hackerz.ir Vendor : Cpanel.net Version : ALL !! Risk : Very high What u can do with this bug is : u can have a access to all the server with reseller privilege (Th3 r00t) how it's work ? when u want to create an account in shell wha

Re: Re: Re: Re: Apache Server HTML Injection and UTF-7 XSS Vulnerability

2008-05-19 Thread Tim
Hello Yossi, I've read your previous messages and I'm not convinced. > I think that you didn't understand this vulnerability properly. I ask > to to check again and run this exploit with Firefox. After running this > exploit, change manually the ecnoding in Firefox to UTF-7.. You will see > that

Re: Apple iPhone 1.1.3 remote DoS exploit

2008-05-19 Thread sohotguy
seems to work on 1.1.4 as well. froze my whole phone, and i had to do a hard reset.

[SECURITY] [DSA 1579-1] New netpbm-free packages fix arbitrary code execution

2008-05-19 Thread Devin Carraway
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - Debian Security Advisory DSA-1579-1 [EMAIL PROTECTED] http://www.debian.org/security/ Devin Carraway May 18, 2008

Re: Apache Server HTML Injection and UTF-7 XSS Vulnerability

2008-05-19 Thread William A. Rowe, Jr.
[EMAIL PROTECTED] wrote: Dear Bill From Apache I think that you didn't understand this vulnerability properly. We understand it quite well; we simply disagree on the context of which is vulnerable, the Apache server which holds to RFC2616, or IE (and Firefox apparently in some cases) which do

Insomnia : ISVA-080516.2 - Altiris Deployment Solution - Domain Account Disclosure

2008-05-19 Thread Brett Moore
__ Insomnia Security Vulnerability Advisory: ISVA-080516.2 ___ Name: Altiris Deployment Solution - Domain Account Disclosure Released: 16 May 2008 Vendor Link:

Re: Re: Re: Re: Re: Apache Server HTML Injection and UTF-7 XSS Vulnerability

2008-05-19 Thread Tom . Donovan
re: "set 403 page's charset in the server side by writing it in your server code" Apache *does* set the charset in the HTTP header. It is set to iso-8859-1 by default. Adding a tag with the iso-8859-1 charset does not change the browser behavior. See below for the captured response from a

Wordpress Malicious File Execution Vulnerability

2008-05-19 Thread tan_prathan
== Wordpress Malicious File Execution Vulnerability == AUTHOR : CWH Underground DATE : 18 May 2008 SITE : www.citecclub.org ##

Microsoft word javascript execution

2008-05-19 Thread jplopezy
Products affected: Microsoft word 2003/2007 OS Tested : Windows Xp all patch The vulnerability is that you can run javascript in an arbitrary manner without permission of the user. While it is limited what you can get to run, this may help attackers using methods that distort the environment j

Smeego CMS vulnerability

2008-05-19 Thread 0in . email
# Smeego CMS Local File Include Exploit # by # 0in from Dark-Coders Programming & Security Group # http://dark-coders.4rh.eu << # # Contact: 0in(dot)email[at]gmail(dot)com #---

DoS attacks using SQL Wildcards - White Paper

2008-05-19 Thread Ferruh Mavituna
This paper discusses abusing Microsoft SQL Query wildcards to consume CPU in database servers using only the search field present in most common web applications. It can be downloaded from http://www.portcullis-security.com/uplds/wildcard_attacks.pdf Majority of the Microsoft SQL Server based web

Insomnia : ISVA-080516.1 - Altiris Deployment Solution - SQL Injection

2008-05-19 Thread Brett Moore
__ Insomnia Security Vulnerability Advisory: ISVA-080516.1 ___ Name: Altiris Deployment Solution - SQL Injection Released: 16 May 2008 Vendor Link: http://ww