Uninformed Journal Release Announcement: Volume 5

2006-09-26 Thread H D Moore
Uninformed is pleased to announce the release of its fifth volume. The articles included in this volume are: - Exploitation Technology: Implementing a Customer X86 Encoder Author: skape - Exploitation Technology: Preventing the Exploitation of SEH Overwrites Author: skape - Fuzzing:

WebspotBlogging = 3.0 Remote File Include Vulnerabilities

2006-09-26 Thread h4ck3riran
# WebspotBlogging = 3.0 Remote File Include Vulnerabilities # Script.. :WebspotBlogging # Discovered By : Root3r_H3ll # Location .. : Iran # Class.. : Remote # Original Advisory : http://Www.PersainFox.com # We ArE : Root3r_H3LL Arash.Rj #

DanPHPSupport = 0.5 Cross Site Scripting Vulnerabilities

2006-09-26 Thread h4ck3riran
DanPHPSupport = 0.5 Cross Site Scripting Vulnerabilities # Discovered By : You_You # Location .. : Iran # Class.. :CSS /XSS # Spical TNX : O.U.T.L.A.W , A.r.i.a , Sh3ll ,T3rr0r1st # Expolit :

php_news = 2.0 Remote File Include Vulnerabilities

2006-09-26 Thread h4ck3riran
# php_news = 2.0 Remote File Include Vulnerabilities # Script.. :php_news # Discovered By : Root3r_H3ll # Location .. : Iran # Class.. : Remote # Original Advisory : http://Www.PersainFox.com # We ArE : Root3r_H3LL Arash.Rj # Spical TNX Irania

Back-end = 0.4.5 Remote File Include Vulnerabilities

2006-09-26 Thread h4ck3riran
# Back-end = 0.4.5 Remote File Include Vulnerabilities # Script.. :Back-end # Discovered By : Root3r_H3ll # Location .. : Iran # Class.. : Remote # Original Advisory : http://Www.PersainFox.com # We ArE : Root3r_H3LL Arash.Rj # Spical TNX

webnews = v1.4 (WN_BASEDIR) Remote File Inclusion Exploit

2006-09-26 Thread the-wolf-ksa
#== #webnews = v1.4 (WN_BASEDIR) Remote File Inclusion Exploit #=== #

CubeCart Multiple input Validation vulnerabilities

2006-09-26 Thread security
Hello,, CubeCart Multiple input Validation vulnerabilities Discovered By : HACKERS PAL Copy rights : HACKERS PAL Website : http://www.soqor.net Email Address : [EMAIL PROTECTED] Sql injection admin/forgot_pass.php?submit=1user_name=-1'or%201=1/* it will reset the password for the

Vbulletin 2.X sql injection

2006-09-26 Thread security
Hello,, Vbulletin 2.X sql injection Discovered By : HACKERS PAL Copy rights : HACKERS PAL Website : http://www.soqor.net Email Address : [EMAIL PROTECTED] This is sql injection in vbulletin systems the injection is in the global.php file we can use it global.php?templatesused=))/*

[ GLSA 200609-15 ] GnuTLS: RSA Signature Forgery

2006-09-26 Thread Sune Kloppenborg Jeppesen
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200609-15 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - -

[ GLSA 200609-14 ] ImageMagick: Multiple Vulnerabilities

2006-09-26 Thread Sune Kloppenborg Jeppesen
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200609-14 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - -

SolpotCrew Advisory #13 - phpMyChat 0.1 (ChatPath) Remote File Inclusion

2006-09-26 Thread chris_hasibuan
#SolpotCrew Community # # phpMyChat 0.1 (ChatPath) Remote File Inclusion # # vendor : http://www.phpheaven.net/phpmychat:home # # # # # Bug

[SECURITY] [DSA 1184-2] New Linux 2.6.8 packages fix several vulnerabilities

2006-09-26 Thread Martin Schulze
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 1184-2[EMAIL PROTECTED] http://www.debian.org/security/ Dann Frazier September 26th, 2006

PHP Invoice 2.2 (Billing and client Management) home.php Xss vuln.

2006-09-26 Thread meto5757
## description : - PHP Invoice designed to automate your entire account, order, billing, ticket system needs. From displaying your sales content, to ordering, PHP Invoice will handle all your billing and authentication requirements

[ GLSA 200609-16 ] Tikiwiki: Arbitrary command execution

2006-09-26 Thread Sune Kloppenborg Jeppesen
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200609-16 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - -

[Whitepaper] - Access over Ethernet: Insecurities in AoE

2006-09-26 Thread Morgan Marquis-Boire
Access over Ethernet: Insecurities in AoE -- ATA over Ethernet (AoE) is an open standards based protocol which allows direct network access to disk drives by client hosts. AoE has been incorporated into the mainstream Linux kernel, recently been the

SUSE Security Announcement: gzip (SUSE-SA:2006:056)

2006-09-26 Thread Thomas Biege
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 __ SUSE Security Announcement Package:gzip Announcement ID:SUSE-SA:2006:056 Date:

WD25:- Deparcq Pieter project File Include Vulnerability

2006-09-26 Thread stormhacker
[W]orld [D]efacers Team Summary eVuln ID: WD26 Vendor: Deparcq Pieter project Dook:- Copyright © 2004 by Deparcq Pieter Dries Van Thourhout Software: Live Customer Support Solution :- http://www.davidsfonds-roeselare.be/ Class: Remote

Re: Re: Apple Remote Desktop root vulneravility

2006-09-26 Thread securityfocus
This is not so much a vulnerability as an oversight. Who's oversight is up to you, but if you run a process remotely as root, and it has a GUI, then the GUI will appear on the screen, as a root process. This usually involves a menubar, adn thereby access to System Preferences. An easy

Re: Re: Woltlab Burning Board 2.3.X SQL Injection Vulnerability

2006-09-26 Thread Bastian Ahrens
Hi again, I had some time to research into this. I tested about ten boards with different versions from 2.3.3 to 2.3.5. On some this bug works on some it doesn't, independent of the version! On pages this doesn't work you will only get an empty thread without any posts as I told, otherwise

Free Rainbow Tables.com

2006-09-26 Thread Jerome Athias
Hi there, we're proud to announce the official birth of http://www.freerainbowtables.com this website is dedicated to offer free rainbow tables (based on rainbowcrack) a complete set of MD5 tables alpha-numeric - lowercase - up to 8 characters is available for free download it's just the

JAF CMS 4.0 RC1 multiple vulnerabilities

2006-09-26 Thread nanoymaster
## ## ## __ __ ## ## Hacker: NanoyMaster ## /|| \ | || \ / ||\ ## ## Exploit: JAF CMS

Re: XSS in AckerTodo v4.0

2006-09-26 Thread hensleyrob
This issue has since been fixed in CVS as of a couple days ago and will be in the next release (probably coming tomorrow). Thanks for reporting the bug. Thanks, Rob

VML Exploit vs. AV/IPS/IDS signatures

2006-09-26 Thread avivra
The code for exploiting the unpatched VML vulnerability is in-the-wild for a week or so. This was enough time for Anti Virus, IPS/IDS and other reactive security products' vendors to create a signature for the in-the-wild exploit. So, I put my hand on one of the in-the-wild and tested it using

rPSA-2006-0173-1 openoffice.org

2006-09-26 Thread rPath Update Announcements
rPath Security Advisory: 2006-0173-1 Published: 2006-09-26 Products: rPath Linux 1 Rating: Major Exposure Level Classification: Indirect User Deterministic Unauthorized Access Updated Versions: openoffice.org=/[EMAIL PROTECTED]:devel//1/2.0.3-1.6-1 References:

Windows VML security update MS06-055 released

2006-09-26 Thread Juha-Matti Laurio
Security update for Windows Vector Markup Language (VML) vulnerability has been released. Fix is available via Microsoft Update or downloadable with links included to MS06-055: http://www.microsoft.com/technet/security/bulletin/ms06-055.mspx Fix information has been added to Windows VML

Re: VML Exploit vs. AV/IPS/IDS signatures

2006-09-26 Thread Pukhraj Singh
Avivra, I acknowledge the research you and Ertunga (http://www.immunitysec.com/pipermail/dailydave/2006-September/003557.html) have put up. Protection against client-side scripting vulnerabilities is the Achilles' Heel for all network-style IDS/IPS vendors. These languages offer too much

ZDI-06-029: Ipswitch WS_FTP Server Checksum Command Parsing Buffer Overflow Vulnerabilities

2006-09-26 Thread zdi-disclosures
ZDI-06-029: Ipswitch WS_FTP Server Checksum Command Parsing Buffer Overflow Vulnerabilities http://www.zerodayinitiative.com/advisories/ZDI-06-029.html September 26, 2006 -- CVE ID: CVE-2006-5000 -- Affected Vendor: Ipswitch -- Affected Products: Ipswitch WS_FTP Server v5.04, v5.05

RE: VML Exploit vs. AV/IPS/IDS signatures

2006-09-26 Thread Aviv Raff
Hi, There are gateway solutions out there which implement sort-of lexical parsers (e.g. www.esafe.com, www.webwasher.com, www.finjan.com). Also, there is no way to gather the maximum number of exploit variants as you can. Because, by using server side scripting to randomize the exploit's