|
Colapse all |
Post message
[ GLSA 200603-26 ] bsd-games: Local privilege escalation in tetris-bsd 2006-03-29 Stefan Cornelius (dercorny gentoo org) Full path disclosure in Webcalendar 1.1.0-CVS 2006-03-29 crasher kecoak or id Full path disclosure in webcalendar Author : Rusydi Hasan M a.k.a : cR45H3R Location : Indonesia, Cilacap Date : March,28th 2006 Version : 1.1.0-CVS --- (software description) WebCalendar is a PHP application used to maintain a calendar for one or more persons and for a variety of purp [ more ] [ reply ] Re: [Full-disclosure] Critical PHP bug - act ASAP if you are running web with sensitive data 2006-03-29 Jasper Bryant-Greene (jasper album co nz) (1 replies) Tõnu Samuel wrote: > > Nice! I was really nervous already as I got bombed with e-mails and I > really did not knew much more than was discovered. Meanwhile I am bit > disappointed that we had nearly month such a bug in wild and software > distributors like SuSE in my case did not published patch [ more ] [ reply ] Re: [Full-disclosure] Critical PHP bug - act ASAP if you are running web with sensitive data 2006-03-29 Tõnu Samuel (tonu jes ee) PhxContacts <= 0.93.1 beta Multiple SQL injection & xss 2006-03-28 dabdoub-mosikar moroccan-security com [+]PhxContacts [+]website of software:http://www.phoetux.net/ [+]founded by Morocco Security Team [+]special 10x to:all friends ww.lezr.com & www.cim-team.org [+]xss [+]http://[target]/login.php?m=[xss] [+]SQL [+]http://[target]/carnet.php?view_cat=&all_lines=true&motclef=[sql] [+]http://[target]ca [ more ] [ reply ] Re: Re: phpBB 2.06 search.php SQL injection 2006-03-28 fritz-li umail hinet net My phpBB is 2.06, however, when I implement the script to test the vulnerability of my site, there is no result coming out, is that means that my website is OK? Besides, what do we need to change of the value of these serizable string in order to make it work? What is the difference between "a:1:{ [ more ] [ reply ] Resource to Report and Stop Phishing Scams 2006-03-28 Paul Laudanski (zx castlecops com) C|Net Exclusive Headline News: http://tinyurl.com/l5wbf CastleCops, a globally oriented security and privacy site, and Sunbelt Software, a leading provider of Windows security software, announced today a new anti-phishing task force designed to help consumers and businesses combat the unending s [ more ] [ reply ] [eVuln] Skull-Splitter's PHP Downloadcounter for Wallpapers SQL Injection 2006-03-29 alex evuln com New eVuln Advisory: Skull-Splitter's PHP Downloadcounter for Wallpapers SQL Injection http://evuln.com/vulns/105/summary.html --------------------Summary---------------- eVuln ID: EV0105 CVE: CVE-2006-1328 Software: Skull-Splitter's PHP Downloadcounter for Wallpapers Sowtware's Web Site: http://www [ more ] [ reply ] [eVuln] Skull-Splitter's PHP Guestbook XSS Vulnerability 2006-03-29 alex evuln com New eVuln Advisory: Skull-Splitter's PHP Guestbook XSS Vulnerability http://evuln.com/vulns/104/summary.html --------------------Summary---------------- eVuln ID: EV0104 CVE: CVE-2006-1256 Software: Skull-Splitter's PHP Guestbook Sowtware's Web Site: http://www.boysen.be/ Versions: 2.6 2.7 Critical [ more ] [ reply ] [HV-INFO] Enova hardware encryption: false sense of security 2006-03-29 vuln hexview com -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Enova hardware encryption: False sense of security Classification: =============== Level: Informational ID: HEXVIEW*2006*03*28*1 URL: http://www.hexview.com/docs/20060328-1.txt Overview: ========= Enova Technology is a manufacturer of the X-Wall ASIC [ more ] [ reply ] [xfocus-SD-060329]MPlayer: Multiple integer overflows 2006-03-29 XFOCUS Security Team (security xfocus org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [xfocus-SD-060329]MPlayer: Multiple integer overflows MPlayer is a media player capable of handling multiple multimedia file formats. XFOCUS team (http://www.xfocus.org/) had discovered Multiple integer overflows .Those can lead to a heap-based [ more ] [ reply ] Re: Secunia Research: Microsoft Internet Explorer "createTextRange()"Code Execution 2006-03-27 edubp2002 hotmail com Internet Explorer 6 on XP SP2 portuguese seems not vulnerable to code execution, that´s what I conclude after several tests on 4 machines. the vulnerability exists, but it causes IE to crash after some time and Windows alerts about low virtual memory. some times while IE was frozen and windows alert [ more ] [ reply ] Critical PHP bug - act ASAP if you are running web with sensitive data 2006-03-28 Tõnu Samuel (tonu jes ee) Hi everybody! I want to tell that pretty nasty bug was discovered in PHP (all tested versions were vulnerable). I do not want to disclose much details as it may hurt many websites. I expect PHP team to make patch first. There is simple way to protect yourself against this bug if you put some cod [ more ] [ reply ] Re: [Full-disclosure] Critical PHP bug - act ASAP if you are running web with sensitive data 2006-03-28 Stefan Esser (sesser php net) (1 replies) Hello, just to stop this: The bug is a binary safety issue in html_entity_decode. A function that is not usually used on user input, because user input is usually not expected in HTML format and then decoded. Even if the function is used on user input it can only leak memory to a potential attacke [ more ] [ reply ] Re: [Full-disclosure] Critical PHP bug - act ASAP if you are runningweb with sensitive data 2006-03-28 Tõnu Samuel (tonu jes ee) Re: Sudo tricks 2006-03-27 Steven M. Christey (coley mitre org) >So, in other words, all you need in order to get root access is a >rootkit, your shell script, and root access? Ummm... I don't get it. I was also confused by this. However, one guess is that by compromising an unprivileged account and creating command aliases to run trojaned su and sudo program [ more ] [ reply ] Determina Fix for CVE-2006-1359 (Zero Day MS Internet Explorer Remote "CreateTextRange()" Code Execution) 2006-03-28 Determina Secure (secure determina com) March 27, 2006 Determina Fix for CVE-2006-1359 (Zero Day MS Internet Explorer Remote "CreateTextRange()" Code Execution) Overview & Instructions On Downloading The Free Determina Shield For CVE-2006-1359 Based on the same technology used in the VPS LiveShield product, Determina has engineere [ more ] [ reply ] Cantv/Movilnet's Web SMS vulnerability. 2006-03-27 Bugtraq @ SNSecurity (bugtraq snsecurity com) (1 replies) Quick Summary: ************************************************************************ Product : Movilnet's Web SMS. Version : In-production versions. Vendor : Movilnet - http://www.movilnet.com.ve/ Class : Remote Criticality : High Operating System(s) : N/A. Synopsis *************************** [ more ] [ reply ] Announcement: The Web Hacking Incidents Database 2006-03-27 contact webappsec org "The web hacking incident database (WHID) is a Web Application Security Consortium project dedicated to maintaining a list of web applications related security incidents. The goal is to serve as a tool for raising awareness of the web application security problem and provide the information for stat [ more ] [ reply ] Re: SYM06-006, Veritas NetBackup: Multiple Overflow Vulnerabilities in NetBackup Daemons 2006-03-28 secure symantec com -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 the correct URL for the full advisory should be http://securityresponse.symantec.com/avcenter/security/Content/2006.03.2 7.html -----BEGIN PGP SIGNATURE----- Version: PGP Desktop 9.0.5 (Build 5050) iQA/AwUBRCl0MpIF/uvuJQrOEQJJkACg1cuOuGWn7e90QLgkmjwA [ more ] [ reply ] ArabPortal 2.0 Stable CrossSiteScripting 2006-03-28 o y 6 hotmail com ArabPortal 2.0 Stable .. The Best Arbian Portal & Forums System * The Bug Is XSS * [code] online.php?&title=D3vil-0x1</title><XSS>CODE</XSS> download.php?action=byuser&userid=1&title=D3vil-0x1</title><XSS>CODE</XS S> [/code] [center] ^^ Secumod 0.1 Anti-XSS & SQL Injection ^^ [ Get It For Free !! [ more ] [ reply ] Secunia Research: Blazix Web Server JSP Source Code DisclosureVulnerability 2006-03-28 Secunia Research (remove-vuln secunia com) |
|
Privacy Statement |
Gentoo Linux Security Advisory GLSA 200603-26
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -
[ more ] [ reply ]