Rosiello Security - Eterm-LibAST Advisory
Eterm-LibAST Advisory Rosiello Security http://www.rosiello.org I. BACKGROUND Eterm (http://www.eterm.org) is a color vt102 terminal emulator intended as an xterm(1) replacement. It is designed with a Freedom of Choice philosophy, leaving as much power, flexibility, and freedom...
0.4AI Score
0.001EPSS
-0.2AI Score
Oracle TNS protocol fails to properly validate authentication requests
Overview The Oracle TNS protocol authentication mechanism fails to properly sanitize authentication requests, possibly allowing a remote attacker to execute arbitrary SQL statements with elevated privileges. Description Oracle databases authenticate and manage database connections via Oracle...
0.8AI Score
0.02EPSS
SQL injection vulnerability in Nkads 1.0 alfa 3 allows remote attackers to execute arbitrary SQL commands via the (1) usuario_nkads_admin or (2) password_nkads_admin...
8.4AI Score
0.003EPSS
SQL injection vulnerability in Nkads 1.0 alfa 3 allows remote attackers to execute arbitrary SQL commands via the (1) usuario_nkads_admin or (2) password_nkads_admin...
8.4AI Score
0.003EPSS
SQL injection vulnerability in Nkads 1.0 alfa 3 allows remote attackers to execute arbitrary SQL commands via the (1) usuario_nkads_admin or (2) password_nkads_admin...
9.1AI Score
0.003EPSS
SQL injection vulnerability in Nkads 1.0 alfa 3 allows remote attackers to execute arbitrary SQL commands via the (1) usuario_nkads_admin or (2) password_nkads_admin...
8.4AI Score
0.003EPSS
[SA18302] NKads Login SQL Injection Vulnerability
TITLE: NKads Login SQL Injection Vulnerability SECUNIA ADVISORY ID: SA18302 VERIFY ADVISORY: http://secunia.com/advisories/18302/ CRITICAL: Highly critical IMPACT: Security Bypass, Manipulation of data, System access WHERE: >From remote SOFTWARE: NKads 1.x http://secunia.com/product/6738/...
0.4AI Score
Adobe Macromedia MX 2004 products, Captivate, Contribute 2, Contribute 3, and eLicensing client install the Macromedia Licensing Service with the Users group permitted to configure the service, including the path to executable, which allows local users to execute arbitrary code as Local...
7.3AI Score
0.001EPSS
Super hacker interview how to attack Cisco router IOS-vulnerability warning-the black bar safety net
FX is the German hacking group Phenoelit one of the members, well versed in routing protocols. He 2 0 0 1 years with Michael and Lynn similar techniques to compromise a Cisco routerIOSoperating system. The following is his most recentinterview. 1)you firstintroduce yourself? I am a German hacker,.....
AI Score
Go to the Black anti-phishing-exploit warning-the black bar safety net
With phishing attacksartin the country to be disclosed later, the networkas if into the vastness of the ocean, a wide variety of phishing attacks everywhere. A newtechnologyis public, I how could not go to attention? So they go online and in magazines to find some information abouttechnologyof...
-0.5AI Score
Nowserviceis almost entirely put in a hardware firewall, hard to penetrate, only to find that with a hardware Firewall, the party pooper! What TerminalService, what Radmin and the like in a controlled manner do not even think. Tried, found that almost all support reverse connection, the forward...
-0.1AI Score
Preface originally really do not want to write this article, but really can not let people endure. Did not expect the school campus network security situation is actually so bad, one of the most impressive Willy-nilly. Or administrator of quality and safety awareness. Status of the recall a year...
-0.3AI Score
Herein the main idea is to through the structure of the statement is added to the execution time delay of the function, if we submit the judgment is correct, then the MYSQL query time on the emergence of delay, if the submitted judgment is correct, will not perform the time delay function, the...
-0.7AI Score
-0.4AI Score
[Full-disclosure] ExoPHPDesk is helpdesk written in PHP/SQL.
=========================================================== ============================================================ Title: ExoPHPDesk Multiple Remote Vulnerabilities Vulnerability discovery: SoulBlack - Security Research - http://soulblack.com.ar Date: 15/11/2005 Severity: High. Remote Users.....
1.4AI Score
IBM DB2 Database server running on Windows XP with Simple File Sharing enabled, allows remote attackers to bypass authentication and log on to the guest account without supplying a...
6.8AI Score
0.004EPSS
Oracle Databases running on Windows XP with Simple File Sharing enabled, allows remote attackers to bypass authentication by supplying a valid...
6.7AI Score
0.002EPSS
IBM Informix Dynamic Database server running on Windows XP with Simple File Sharing enabled, allows remote attackers to bypass authentication and log on to the guest account by supplying an invalid...
6.9AI Score
0.004EPSS
0.5AI Score
0.015EPSS
[Full-disclosure] Advisory 22/2005: Multiple vulnerabilities in phpSysInfo
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hardened PHP Project www.hardened-php.net -= Security Advisory =- Advisory: Multiple vulnerabilities in phpSysInfo Release Date: 2005/11/13 Last Modified: 2005/11/12 Author:...
0.7AI Score
0.015EPSS
Optimistic TCP acknowledgements can cause denial of service
Overview A vulnerability in the TCP congestion control mechanism could be leveraged by an attacker to cause a denial of service. Description The Transmission Control Protocol (TCP) is described in RFC 793 as a means to provide reliable host-to-host transmission in a packet-switched computer...
0.5AI Score
0.013EPSS
Oracle DBMS_ASSERT and the October 2005 CPU
Whilst there are problems with the Oracle October 2005 Critical Patch Update, it's not all bad news.... There is a great deal of evidence in this patch that Oracle are beginning to treat security properly. They've introduced a new package PL/SQL package DBMS_ASSERT into the RDBMS. Whilst...
-0.3AI Score
[Full-disclosure] CYBSEC - Security Advisory: HTTP Response Splitting in SAP WAS
(The following advisory is also available in PDF format for download at: http://www.cybsec.com/vuln/CYBSEC_Security_Advisory_HTTP_Response_Splitting_in_SAP_WAS.pdf ) CYBSEC S.A. www.cybsec.com Advisory Name: HTTP Response Splitting in SAP WAS (Web Application Server) Vulnerability Class: HTTP...
-0.2AI Score
Oracle 9iAS SOAP configuration file retrieval
In a default installation of Oracle 9iAS v.1.0.2.2.1, it is possible to access some configuration files. These file includes detailed information on how the product was installed in the server including where the SOAP provider and service manager are located as well as administrative URLs...
5.9AI Score
0.938EPSS
Oracle 9iAS mod_plsql cross site scripting
The mod_plsql module supplied with Oracle9iAS allows cross site scripting attacks to be...
0.3AI Score
0.02EPSS
Oracle 9iAS SOAP Default Configuration Vulnerability (HTTP)
In a default installation of Oracle 9iAS v.1.0.2.2, it is possible to deploy or undeploy SOAP services without the need of any kind of...
6.3AI Score
0.918EPSS
Oracle 9iAS access to SOAP documentation
In a default installation of Oracle 9iAS, it is possible to access SOAP documentation. These files might be useful for an attacker to determine what application server is being...
0.2AI Score
Oracle 9iAS can provide access to the PL/SQL application OWA_UTIL that provides web access to some stored...
6.1AI Score
0.85EPSS
Oracle XSQLServlet XSQLConfig.xml File
It is possible to read the contents of the XSQLConfig.xml file which contains sensitive...
6.2AI Score
0.938EPSS
In a default installation of Oracle 9iAS v.1.0.2.2, it is possible to deploy or undeploy SOAP services without the need of any kind of credentials. This is due to SOAP being enabled by default after installation in order to provide a convenient way to use SOAP samples. However, this feature poses.....
0.7AI Score
0.918EPSS
Oracle XSQLServlet XSQLConfig.xml File
It is possible to read the contents of the XSQLConfig.xml file which contains sensitive...
-0.4AI Score
0.938EPSS
Oracle 9iAS access to SOAP documentation
In a default installation of Oracle 9iAS, it is possible to access SOAP documentation. These files might be useful for an attacker to determine what application server is being...
7AI Score
Oracle 9iAS default error information disclosure
Oracle 9iAS allows remote attackers to obtain the physical path of a file under the server root via a request for a non-existent .JSP file. The default error generated leaks the pathname in an error...
6AI Score
0.109EPSS
Oracle 9iAS can provide access to the PL/SQL application OWA_UTIL that provides web access to some stored procedures. These procuedures, without authentication, can allow users to access sensitive information such as source code of applications, user credentials to other database servers and run...
0.2AI Score
0.85EPSS
Oracle 9iAS SOAP configuration file retrieval
In a default installation of Oracle 9iAS v.1.0.2.2.1, it is possible to access some configuration files. These file includes detailed information on how the product was installed in the server including where the SOAP provider and service manager are located as well as administrative URLs to...
-0.2AI Score
0.938EPSS
Oracle 9iAS default error information disclosure
It is possible to obtain the physical path of the remote server web root. Description : Oracle 9iAS allows remote attackers to obtain the physical path of a file under the server root via a request for a non-existent .JSP file. The default error generated leaks the pathname in an error...
0.3AI Score
0.109EPSS
Oracle 9iAS mod_plsql cross site scripting
The mod_plsql module supplied with Oracle9iAS allows cross site scripting attacks to be...
6.4AI Score
0.02EPSS
Private IP address Leaked using the PROPFIND method
The remote web server leaks a private IP address through the WebDAV interface. If this web server is behind a Network Address Translation (NAT) firewall or proxy server, then the internal IP addressing scheme has been leaked. This is typical of IIS 5.0 installations that are not configured...
9.6AI Score
0.01EPSS
Multiple SQL injection vulnerabilities in Subdreamer 2.2.1 allow remote attackers to execute arbitrary SQL commands via (1) the loginusername parameter or (2) cookies to (a) subdreamer.php, (b) ipb2.php, (c) phpbb2.php, (d) vbulletin2.php, and (e)...
8.5AI Score
0.014EPSS
Multiple SQL injection vulnerabilities in Subdreamer 2.2.1 allow remote attackers to execute arbitrary SQL commands via (1) the loginusername parameter or (2) cookies to (a) subdreamer.php, (b) ipb2.php, (c) phpbb2.php, (d) vbulletin2.php, and (e)...
8.9AI Score
0.014EPSS
Multiple SQL injection vulnerabilities in Subdreamer 2.2.1 allow remote attackers to execute arbitrary SQL commands via (1) the loginusername parameter or (2) cookies to (a) subdreamer.php, (b) ipb2.php, (c) phpbb2.php, (d) vbulletin2.php, and (e)...
8.5AI Score
0.014EPSS
[SA17378] Subdreamer Login SQL Injection Vulnerabilities
TITLE: Subdreamer Login SQL Injection Vulnerabilities SECUNIA ADVISORY ID: SA17378 VERIFY ADVISORY: http://secunia.com/advisories/17378/ CRITICAL: Highly critical IMPACT: Manipulation of data, System access, Security Bypass WHERE: >From remote SOFTWARE: Subdreamer 2.x...
0.6AI Score
Subdreamer 2.2.1 - SQL Injection Command Execution
Subdreamer 2.2.1 - SQL Injection Command...
0.6AI Score
7.1AI Score
7.4AI Score
EPSS
Ventrilo <= 2.3.0 Remote Denial of Service Exploit (all platforms)
Exploit for multiple platform in category dos /...
7.1AI Score
7.4AI Score
EPSS
Ventrilo 2.3.0 (All Platforms) - Remote Denial of Service
Ventrilo 2.3.0 (All Platforms) - Remote Denial of...
0.1AI Score
Ventrilo <= 2.3.0 Remote Denial of Service Exploit (all platforms)
No description provided by...
7.1AI Score