[Full-disclosure] SecurityReason - Apache (mod_status) Refresh Header - Open Redirector (XSS)

2008-01-15 Thread sp3x
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 [SecurityReason - Apache (mod_status) Refresh Header - Open Redirector (XSS)] Author: sp3x Date: - - Written: 15.12.2007 - - Public: 15.01.2008 SecurityReason Research SecurityAlert Id: 50 CVE: CVE-2007-6388 SecurityRisk: Low Affected Software

[Full-disclosure] SecurityReason - Apache2 CSRF, XSS, Memory Corruption and Denial of Service Vulnerability

2008-01-11 Thread sp3x
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 [Apache2 CSRF, XSS, Memory Corruption and Denial of Service Vulnerability ] Author: sp3x Date: - - Written: 06.12.2007 - - Public: 09.01.2008 SecurityReason Research SecurityAlert Id: 48 CVE: CVE-2007-6420 CVE-2007-6421 CVE-2007-6422

[Full-disclosure] SecurityReason - Apache (mod_proxy_ftp) Undefined Charset UTF-7 XSS Vulnerability

2008-01-11 Thread sp3x
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 [SecurityReason - Apache (mod_proxy_ftp) Undefined Charset UTF-7 XSS Vulnerability] Author: sp3x Date: - - Written: 15.12.2007 - - Public: 10.01.2008 SecurityReason Research SecurityAlert Id: 49 CVE: CVE-2008-0005 SecurityRisk: Low Affected

[Full-disclosure] Critical SQL Injection PHPNuke <= 7.8 - Your_Account module

2006-02-16 Thread SecurityReason - sp3x
s_temp WHERE username='$username' At last here now we can say : "Critical SQL injection " Time to exploit this issue :Go to : http://[victim]/[phpnuke_dir]/modules.php?name=Your_Account&op=new_userAnd fill in all Fields but in Nickname: field enter : ' or 1=1/*The Re

[Full-disclosure] Critical SQL Injection PHPNuke <= 7.8

2005-11-15 Thread SecurityReason - sp3x
sword,0,0,0,0,0,0 FROM nuke_users/* -> users passwords and logins   s%') UNION SELECT 0,pwd,name,aid,0,0,0,0,0,0 FROM nuke_authors/* -> nuke_authors passwords and logins   Exploit :- -   http://securityreason.com/achievement_exploitalert/5   How to