Network Security News – Wednesday, August 17, 2005 Events
PHPOpenChat userpage.php profile Field XSS
PHPOpenChat contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate user-supplied input to the 'profile' field upon submission to the 'userpage.php' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.. Read more at osvdb.org/18676
PHPOpenChat profile_misc.php Multiple Field XSS
PHPOpenChat contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate user-supplied input to the 'title' and 'content' fields upon submission to the 'profile_misc.php' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.. Read more at osvdb.org/18675
PHPOpenChat mail.php Multiple Field XSS
PHPOpenChat contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate user-supplied input to the 'subject' and 'body' fields upon submission to the 'mail.php' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.. Read more at osvdb.org/18677
PHPOpenChat profile.php Multiple Field XSS
PHPOpenChat contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate user-supplied input to the 'title' and 'content' fields upon submission to the 'profile.php' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.. Read more at osvdb.org/18674
PHPOpenChat invite.php Multiple Field XSS
PHPOpenChat contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate user-supplied input to the 'disinvited_chatter' and 'invited_chatter' fields upon submission to the 'invite.php' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.. Read more at osvdb.org/18678
FunkBoard info.php Arbitrary Command Execution
FunkBoard contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue is due when the 'mysql_install.php' script is not removed after installation. It is possible for a remote attacker to arbitrarily manipulate the 'info.php' script and execute arbitrary commands resulting in a loss of integrity.. Read more at osvdb.org/18623
FunkBoard mysql_install.php Email Field Arbitrary PHP Code Injection
FunkBoard contains a flaw that may allow a remote attacker to inject arbitrary PHP code. The issue is due to 'mysql_install.php' not properly sanitizing user input supplied to the 'Email' field, which may allow a remote attacker to inject arbitrary PHP code and create a backdoor resulting in a loss of integrity.. Read more at osvdb.org/18622
PC-XP/Toppe CMS pm.php Message Body XSS
PCXP/TOPPE CMS contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate $msg variables upon submission to the 'pm.php' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.. Read more at osvdb.org/18715
My Image Gallery (Mig) index.php Crafted image Variable Path Disclosure
My Image Gallery (MiG) contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered when a remote attacker manipulates the 'image' parameter, which will disclose the software's installation path resulting in a loss of confidentiality. While such information is relatively low risk, it is often useful in carrying out additional, more focused attacks.. Read more at osvdb.org/18742
My Image Gallery (Mig) index.php Multiple Variable XSS
Mig contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the "currDir" & "image" variable upon submission to "index.php". This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.. Read more at osvdb.org/18741
Vuln: PHPXMLRPC and PEAR XML_RPC Remote Code Injection Vulnerability
PHPXMLRPC and PEAR XML_RPC Remote Code Injection Vulnerability. Read more at securityfocus.com/bid/14560
Vuln: ECW Shop Index.PHP Cross Site Scripting Vulnerability
ECW Shop Index.PHP Cross Site Scripting Vulnerability. Read more at securityfocus.com/bid/14578
Vuln: ECW Shop Index.PHP HTML Injection Vulnerability
ECW Shop Index.PHP HTML Injection Vulnerability
. Read more at securityfocus.com/bid/14579
Vuln: ECW Shop Order Input Validation Vulnerability
ECW Shop Order Input Validation Vulnerability. Read more at securityfocus.com/bid/14580
[security bulletin] SSRT4874 rev.0 – HP-UX Ignite-UX Remote Unauthorized Access
[security bulletin] SSRT4874 rev.0 – HP-UX Ignite-UX Remote Unauthorized Access. Read more at securityfocus.com/archive/1/408273
RE: Serious flaw in Linksys wireless AP password security
RE: Serious flaw in Linksys wireless AP password security. Read more at securityfocus.com/archive/1/408272
Win32 Port of Nessusd
Win32 Port of Nessusd
. Read more at securityfocus.com/archive/1/408270
Re: Serious flaw in Linksys wireless AP password security
Re: Serious flaw in Linksys wireless AP password security. Read more at securityfocus.com/archive/1/408271
Leave a Reply