Ravens PHP Scripts: Security



Search on This Topic:   
[ Go to Home | Select a New Topic ]
 

 

Microsoft XMLHTTP ActiveX Control Code Execution Vulnerability More about

Posted on Saturday, November 04, 2006 @ 17:13:52 CST in Security
by Raven

SECUNIA ADVISORY ID: SA22687

VERIFY ADVISORY: http://secunia.com/advisories/22687/

CRITICAL: Extremely critical

IMPACT: System access

WHERE: >From remote

OPERATING SYSTEM:
Microsoft Windows XP Professional - http://secunia.com/product/22/
Microsoft Windows XP Home Edition - http://secunia.com/product/16/
Microsoft Windows Server 2003 Web Edition - http://secunia.com/product/1176/
Microsoft Windows Server 2003 Standard Edition - http://secunia.com/product/1173/
Microsoft Windows Server 2003 Enterprise Edition - http://secunia.com/product/1174/
Microsoft Windows Server 2003 Datacenter Edition - http://secunia.com/product/1175/
Microsoft Windows 2000 Server - http://secunia.com/product/20/
Microsoft Windows 2000 Professional - http://secunia.com/product/1/
Microsoft Windows 2000 Datacenter Server - http://secunia.com/product/1177/
Microsoft Windows 2000 Advanced Server - http://secunia.com/product/21/

SOFTWARE: Microsoft Core XML Services (MSXML) 4.x - http://secunia.com/product/6472/

DESCRIPTION: A vulnerability has been reported in Microsoft XML Core Services, which can be exploited by malicious people to compromise a users system. The vulnerability is caused due to an unspecified error in the XMLHTTP 4.0 ActiveX Control. Successful exploitation allows execution of arbitrary code when a user e.g. visits a malicious website using Internet Explorer. NOTE: The vulnerability is already being actively exploited.

SOLUTION: Microsoft has recommended various workarounds including setting the kill-bit for the affected ActiveX control (see the vendor's advisory for details).

PROVIDED AND/OR DISCOVERED BY: Discovered as a 0-day.

ORIGINAL ADVISORY: Microsoft: http://www.microsoft.com/technet/security/advisory/927892.mspx
 

 

PHP *htmlentities()* and *htmlspecialchars()* Buffer Overflows More about

Posted on Thursday, November 02, 2006 @ 14:20:49 CST in Security
by Raven

SECUNIA ADVISORY ID: SA22653

VERIFY ADVISORY: http://secunia.com/advisories/22653/

CRITICAL: Highly critical

IMPACT: DoS, System access

WHERE: >From remote

SOFTWARE:
PHP 4.0.x - http://secunia.com/product/1655/
PHP 4.1.x - http://secunia.com/product/1654/
PHP 4.2.x - http://secunia.com/product/105/
PHP 4.3.x - http://secunia.com/product/922/
PHP 4.4.x - http://secunia.com/product/5768/
PHP 5.0.x - http://secunia.com/product/3919/
PHP 5.1.x - http://secunia.com/product/6796/

DESCRIPTION: Some vulnerabilities have been reported in PHP, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. The vulnerabilities are caused due to boundary errors within the "htmlentities()" and "htmlspecialchars()" functions. If a PHP application uses these functions to process user-supplied input, this can be exploited to cause buffer overflows by passing specially crafted data to the affected application. Successful exploitation may allow execution of arbitrary code.

SOLUTION: Fixes are available in the CVS repository.

PROVIDED AND/OR DISCOVERED BY: Stefan Esser

ORIGINAL ADVISORY: http://www.ubuntu.com/usn/usn-375-1
 

 

phpMyAdmin Unspecified UTF-7 Cross-Site Scripting Vulnerability More about

Posted on Wednesday, November 01, 2006 @ 11:31:26 CST in Security
by Raven

SECUNIA ADVISORY ID: SA22599

VERIFY ADVISORY: http://secunia.com/advisories/22599/

CRITICAL: Less critical

IMPACT: Cross Site Scripting

WHERE: >From remote

SOFTWARE: phpMyAdmin 2.x - http://secunia.com/product/1720/

DESCRIPTION: A vulnerability has been reported in phpMyAdmin, which can be exploited by malicious people to conduct cross-site scripting attacks. Input containing UTF-7 encoded characters passed to unspecified parameters is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. The vulnerability is reported in versions 2.6.4 through 2.9.0.2.

SOLUTION: Update to version 2.9.0.3.

PROVIDED AND/OR DISCOVERED BY: The vendor credits Stefan Esser.

ORIGINAL ADVISORY: http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2006-6
 

 

PHP-Nuke *forwhat* SQL Injection Vulnerability More about

Posted on Wednesday, November 01, 2006 @ 09:01:40 CST in Security
by Raven

SECUNIA ADVISORY ID: SA22617

VERIFY ADVISORY: http://secunia.com/advisories/22617/

CRITICAL: Moderately critical

IMPACT: Manipulation of data

WHERE: >From remote

SOFTWARE: PHP-Nuke 7.x - http://secunia.com/product/2385/

DESCRIPTION: Paisterist has discovered a vulnerability in PHP-Nuke, which can be exploited by malicious people to conduct SQL injection attacks. Input passed to the "forwhat" parameter in modules/journal/search.php is not properly sanitised, before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. The vulnerability is confirmed in version 7.9. Other versions may also be affected.

SOLUTION: Edit the source code to ensure that input is properly verified.

PROVIDED AND/OR DISCOVERED BY: Paisterist

ORIGINAL ADVISORY: http://www.neosecurityteam.net/index.php?action=advisories&id=29
 

 

PHPEasyData Pro *cat* SQL Injection Vulnerability More about

Posted on Wednesday, November 01, 2006 @ 01:10:28 CST in Security
by Raven

SECUNIA ADVISORY ID: SA22616

VERIFY ADVISORY: http://secunia.com/advisories/22616/

CRITICAL: Moderately critical

IMPACT: Manipulation of data

WHERE: >From remote

SOFTWARE: PHPEasyData Pro 2.x - http://secunia.com/product/12454/

DESCRIPTION: ajann has reported a vulnerability in PHPEasyData Pro, which can be exploited by malicious people to conduct SQL injection attacks. Input passed to the "cat" parameter in index.php is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. The vulnerability is reported in version 2.2.2. Other versions may also be affected.

SOLUTION: Edit the source code to ensure that input is properly sanitised.

PROVIDED AND/OR DISCOVERED BY: ajann

ORIGINAL ADVISORY: http://milw0rm.com/exploits/2675
 

 

Internet Explorer 7 Window Injection Vulnerability More about

Posted on Wednesday, November 01, 2006 @ 01:08:25 CST in Security
by Raven

SECUNIA ADVISORY ID: SA22628

VERIFY ADVISORY: http://secunia.com/advisories/22628/

CRITICAL: Moderately critical

IMPACT: Spoofing

WHERE: >From remote

SOFTWARE: Microsoft Internet Explorer 7.x - http://secunia.com/product/12366/

DESCRIPTION: A vulnerability has been discovered in Internet Explorer 7, which can be exploited by malicious people to spoof the content of websites. The problem is that a website can inject content into another site's window if the target name of the window is known. This can e.g. be exploited by a malicious website to spoof the content of a pop-up window opened on a trusted website.

This is related to: SA13251. Secunia has constructed a test, which can be used to check if your browser is affected by this issue: http://secunia.com/multiple_browsers_window_injection_vulnerability_test/ . The vulnerability has been confirmed on a fully patched system with Internet Explorer 7.0 and Microsoft Windows XP SP2.

SOLUTION: Do not browse untrusted sites while browsing trusted sites.

PROVIDED AND/OR DISCOVERED BY: Originally discovered by: Secunia Research

Reported in Internet Explorer 7 by: Per Gravgaard

OTHER REFERENCES: SA13251: http://secunia.com/advisories/13251/
 



Page 68 of 102 (608 total stories) [ << | < | 63 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | 71 | 72 | 73 | > | >> ]  

News ©

Site Info

Last SeenLast Seen
  • vashd1
  • neralex
Server TrafficServer Traffic
  • Total: 513,925,763
  • Today: 45,199
Server InfoServer Info
  • Apr 29, 2025
  • 11:22 am CDT