Easybookmarker 40tr Xss Vulnerability By Khashayar Fereidani

2008-07-21 Thread irancrash
Script : Easybookmarker 40tr Type : Xss Vulnerability Method : POST Alert : High Discovered by : Khashayar Fereidani a.k.a. Dr.Crash My Offical Website :

[ MDVSA-2008:149 ] - Updated mysql packages fix vulnerabilities

2008-07-21 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2008:149 http://www.mandriva.com/security/

Re: Oracle Database Local Untrusted Library Path Vulnerability

2008-07-21 Thread jmpascual
It is reported to Oracle since 2004 by open3s and affects others libs. The workaround is very simple but it is under investigation / being fixed in main codeline. Scheduled for future cpu regards juan manuel pascual On Sat, 19 Jul 2008, Joxean Koret wrote: Oracle Database Local

RE: Windows Vista Power Management Local Security Policy

2008-07-21 Thread Thor (Hammer of God)
If Jim is going to get Nancy to run a program, and that's not all that hard, then why not just have that program do what you want in the first place rather than worrying about the power switch nonsense? This is the one million and fourth time: If your 'vulnerability' begins with 'if I can get

EasyPublish 3.0tr Multiple Vulnerabilities ( Xss / Sql Injection Exploit / File Disclosure Exploit )

2008-07-21 Thread irancrash
#!/usr/bin/perl # # #Script : EasyPublish 3.0tr # #Type : Multiple Vulnerabilities ( Xss / Sql Injection Exploit / File Disclosure Exploit ) # #Variable Method : GET # #Alert : High #

Easyecards 310a Multipe Vulerabilities ( Xss / Sql Injection Exploit / File Disclosure Exploit ) By Khashayar Fereidani

2008-07-21 Thread irancrash
#!/usr/bin/perl # # #Script : Easyecards 310a # #Type : Multipe Vulerabilities ( Xss / Sql Injection Exploit / File Disclosure Exploit ) # #Variable Method : GET # #Alert : High #

[ MDVSA-2008:150 ] - Updated mysql packages fix vulnerabilities

2008-07-21 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2008:150 http://www.mandriva.com/security/

Maran PHP Blog Xss By Khashayar Fereidani

2008-07-21 Thread irancrash
Script : Maran PHP Blog Type : XSS (Pasive) Method : GET Alert : Medium Discovered by : Khashayar Fereidani a.k.a. Dr.Crash My Offical Website :

EMC Dantz Retrospect 7 backup Client PlainText Password Hash Disclosure Vulnerability

2008-07-21 Thread zhliu
FGA-2008-16: EMC Dantz Retrospect 7 backup Client PlainText Password Hash Disclosure Vulnerability http://www.fortiguardcenter.com/advisory/FGA-2008-16.html July 20, 2008 -- Affected Vendors: EMC -- Affected Products: EMC Dantz Retrospect 7 backup Client 7.5.116 -- Vulnerability Details: The

FGA-2008-16: EMC Dantz Retrospect 7 backup Client 7.5.116 Remote Memory corruption Vulnerability

2008-07-21 Thread zhliu
FGA-2008-16: EMC Dantz Retrospect 7 backup Client 7.5.116 Remote Memory corruption Vulnerability http://www.fortiguardcenter.com/advisory/FGA-2008-16.html July 20, 2008 -- Affected Vendors: EMC -- Affected Products: EMC Dantz Retrospect 7 backup Client 7.5.116 -- Vulnerability Details: The

Vulnerability CVE-2008-3671 - MyReview's vulnerability in the access control system

2008-07-21 Thread Julien Thomas
Incorrect management of the submission and camera ready versions of submitted papers to the MyReview system lets unintended users download these documents. This information leakage can be used to illegally retrieve sensitive or licensed documents. I. Description The MyReview web application is an

Easydynamicpages 30tr Multipe Vulerabilities ( Xss / Sql Injection Exploit / File Disclosure Exploit )

2008-07-21 Thread irancrash
#!/usr/bin/perl # # #Script : Easydynamicpages 30tr # #Type : Multipe Vulerabilities ( Xss / Sql Injection Exploit / File Disclosure Exploit ) # #Variable Method : GET # #Alert : High #

EZWebAlbum (dlfilename) Remote File Disclosure Vulnerability

2008-07-21 Thread Ghost hacker
## EZWebAlbum (dlfilename) Remote File Disclosure Vulnerability |, .-. .-. ,| Found by : Ghost Hacker [ R-H TeaM ] | )(_o/ \o_)( | My Site web : Real-hack.Net

RE: Windows Vista Power Management Local Security Policy

2008-07-21 Thread Abe Getchell
So, you guys don't think it's an issue that power management in Vista (apparently) has a pass to bypass local security policy? -- Abe Getchell [EMAIL PROTECTED] https://abegetchell.com/ -Original Message- From: Thor (Hammer of God) [mailto:[EMAIL PROTECTED] Sent: Saturday, July 19,

MyBlog =0.9.8 Multiple Vulnerabilities

2008-07-21 Thread admin
## www.BugReport.ir ### # # AmnPardaz Security Research Team # # Title: MyBlog =0.9.8 Multiple Vulnerabilities # Vendor: http://crewdesign.co.uk http://sourceforge.net/projects/myblog # Exploit: Available # Vulnerable

RE: Windows Vista Power Management Local Security Policy

2008-07-21 Thread Abe Getchell
I understand all of that, which is precisely the reason I put it out there. The example I put forth might have been a bad one (given that it relies on an additional piece of code to be installed on a target machine), but there's probably more to this issue than I can deduce. I'll let those more

Vim: Improper Implementation of shellescape()/Arbitrary Code Execution

2008-07-21 Thread Jan Minář
1. Summary Product : Vim -- Vi IMproved Version : = 7.2a.013; tested with 7.2b Impact : Arbitrary code execution Wherefrom: Local, possibly remote Original : http://www.rdancer.org/vulnerablevim-shellescape.html http://www.rdancer.org/vulnerablevim-latest.tar.bz2 Improper

FGA-2008-16: EMC Dantz Retrospect 7 backup Client 7.5.116 NULL-Pointer reference Denial of Service Vulnerability

2008-07-21 Thread zhliu
FGA-2008-16: EMC Dantz Retrospect 7 backup Client 7.5.116 NULL-Pointer reference Denial of Service Vulnerability http://www.fortiguardcenter.com/advisory/FGA-2008-16.html July 20, 2008 -- Affected Vendors: EMC -- Affected Products: EMC Dantz Retrospect 7 backup Client 7.5.116 -- Vulnerability

Re: Pwnie Awards 2008

2008-07-21 Thread David Litchfield
Hey Alexandr, I see I'm invited to award Brett his pwnie for his SQL flaw if he wins. I'd be more than happy to - after all one bug over 3 years means someone did a really good job ;) Cheers, David -- E-MAIL DISCLAIMER The information contained in this email and any subsequent correspondence is

Flip V3.0 final

2008-07-21 Thread Cru3l . b0y
### DeltaHackingSecurityTEAM ## ## Remote File Include Vulnerability ## ## Flip V3.0 final ## ## Download :

Re: SchoolCenter URL Handling Cross Site Scripting Vulnerability

2008-07-21 Thread Tester
IS there a patch for this hole?

[White Paper] Abusing HTML 5 Structured Client-side Storage

2008-07-21 Thread Alberto Trivero
The aim of this white paper is to analyze security implications of the new HTML 5 client-side storage technology, showing how different attacks can be conduct in order to steal storage data in the client’s machine. Download at: http://trivero.secdiscover.com/html5whitepaper.pdf Greetings,

[SECURITY] [DSA 1612-1] New ruby1.8 packages fix several vulnerabilities

2008-07-21 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - Debian Security Advisory DSA-1612-1 [EMAIL PROTECTED] http://www.debian.org/security/ Moritz Muehlenhoff July 21, 2008

E-Mail header Injection in HiFriend

2008-07-21 Thread Peter Wiesen
---Header Injection-- Script: hifriend.pl Vendor: Hibyte SoftwareVersion: The free one you get from many webpages Dork: hifriend.pl + cgi-bin

[ GLSA 200807-10 ] Bacula: Information disclosure

2008-07-21 Thread Pierre-Yves Rofes
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200807-10 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

[ GLSA 200807-11 ] PeerCast: Buffer overflow

2008-07-21 Thread Pierre-Yves Rofes
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200807-11 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -