wwwpaintboar(newsfile) Remote File Inclusion Vulnerability

2007-03-10 Thread saw_xyz
wwwpaintboar(newsfile) Remote File Inclusion Vulnerability --- Version : 1.0 Website URL: http://phpforge.oirac.com/ --- Discoved by saw_xyz (sasan) [XIII Security Researcher]

Remote File Include In Script Premod SubDog 2

2007-03-10 Thread RaeD Hasadya
By Hasadya Raed Contact : [EMAIL PROTECTED] Script : Premod SubDog 2 Dork : Premod SubDog 2 B.Files : functions_kb.php themen_portal_mitte.php logger_engine.php Exploits :

Remote File Include In Script SoftNews Media Group

2007-03-10 Thread RaeD Hasadya
By Hasadya Raed Contact : [EMAIL PROTECTED] Script : SoftNews Media Group Dork : Copyright © 2004,2006 SoftNews Media Group Greetz : Only To Security Focus B.Files : init.php editnews.php

Pre-open files attack agains locked file

2007-03-10 Thread 3APA3A
Hello lists, hello Roger. It's me again. Sorry for annoyance, but there is one more attack vector with pre-open files I meant, but forgot to mention. It seems dangerous enough and need to be investigated for different applications. It's theoretical attack against application relying on

PHP-Nuke = 8.0 Cookie Manipulation (lang)

2007-03-10 Thread programmer
/ PHPNuke = 8.0 Cookie Manipulation (lang) PROGRAM: PHP-Nuke HOMEPAGE: http://phpnuke.org/ VERSION: All version BUG: Cookie Manipulation (lang) (SQL Injection + Local file include) AUTHOR:

[ECHO_ADV_68$2007] PMB Services = 3.0.13 Multiple Remote File Inclusion Vulnerability

2007-03-10 Thread erdc
- [ECHO_ADV_68$2007] PMB Services = 3.0.13 Multiple Remote File Inclusion Vulnerability - Author : M.Hasran

Re: [Full-disclosure] Microsoft Windows Vista/2003/XP/2000 file management security issues

2007-03-10 Thread Thor (Hammer of God)
Apps utilizing temporary files should always use the TEMP or TMP environment variables, not a hard-coded path. And by default, each user has their own temp directory created (in XP/Server it is \Documents and Settings\username\Local Settings\temp and in Vista it is

[SECURITY] [DSA 1265-1] New Mozilla packages fix several vulnerabilities

2007-03-10 Thread Martin Schulze
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 1265-1[EMAIL PROTECTED] http://www.debian.org/security/ Martin Schulze March 10th, 2007

Re: PHP Classifieds 7.1 - Remote File Include Vulnerability

2007-03-10 Thread support
This will not work as long as you follow the warning messages during install. This can only work with register_globals turned ON. The program warns about this both during install AND each time admin logs in.

Re: [Full-disclosure] PHP import_request_variables() arbitrary variable overwrite

2007-03-10 Thread Stefano Di Paola
Hi Stefan, first of all let me say i come in peace :) Il giorno sab, 10/03/2007 alle 15.17 +0100, Stefan Esser ha scritto: Hello, PHP import_request_variables() arbitrary variable overwrite Date #-1;#-1; 20060307 I believe all dates in the advisory contain the wrong year...

RE: [Full-disclosure] Microsoft Windows Vista/2003/XP/2000 file management security issues

2007-03-10 Thread Roger A. Grimes
Two things regarding this ongoing (civil) flame war: 1. I was wrong about most versions of Linux having the same inheritance behavior as Windows. Dead wrong. And several people have wrote to correct me. Thank you. The search for truth is more important than my ego. grin Before I wrote that

Re: [Full-disclosure] PHP import_request_variables() arbitrary variable overwrite

2007-03-10 Thread ascii
Stefan Esser wrote: Taking into account that the vulnerability you describe is fixed in Hardened-PHP for years and that there is also a protection against this in the Suhosin Extension you can be sure that this NOT a new vulnerability (and that you are not the first one who found it...) not

Re: [Full-disclosure] PHP import_request_variables() arbitrary variable overwrite

2007-03-10 Thread Stefan Esser
Hello Stefano, first of all. I am not angry at you, although my mail might have sounded so, but at the people that deserve it. The fault of the PHP Security Response Team is not yours. They are the ones that give credit to the wrong persons. Luckily after 2.5 years they fixed that issue (or

F#305;st#305;q Duyuru Scripti Remote Sql #304;njection Exploit

2007-03-10 Thread crazy_king
F#305;st#305;q Duyuru Scripti Remote Sql #304;njection File : goster.asp Sql : -1%20union+all+select+0,kullaniciadi,sifre,3+from+admin Admin Name + Admin Pass Admin Menu: yoneticiii/default.asp Thanks : Ajann , Xoron , ApAci , ErNE , Uyuss , Eno7 , Thehacker , Enjexion .pl Exploit Code :

Security bypass vulnerability in LedgerSMB and SQL-Ledger (fixes released today)

2007-03-10 Thread Chris Travers
Hi all; George Theall of Tenable Security notified the LedgerSMB core team today of an authentication bypass vulnerability allowing full access to the administrator interface of LedgerSMB 1.1 and SQL-Ledger 2.x. The problem is caused by the password checking routine failing to enforce a

[ GLSA 200703-10 ] KHTML: Cross-site scripting (XSS) vulnerability

2007-03-10 Thread Raphael Marichez
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200703-10 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - -

Re: Firekeeper - IDS for Firefox available

2007-03-10 Thread Bob Beck
* Jex [EMAIL PROTECTED] [2007-03-09 13:27]: ... rules similar to Snort ones to describe browser based attack attempts. All incoming HTTP and HTTPS traffic is scanned with these rules. HTTPS and compressed responses are scanned after decryption/decompression. So the next snort style