BugTraq Mode:
(Page 424 of 1747)  < Prev  419 420 421 422 423 424 425 426 427 428 429  Next >
The Anatomy of COM Server-Based Binary Planting Exploits 2011-05-24
ACROS Security Lists (lists acros si)

Our new blog post describes in detail how the binary planting exploits we presented
at Hack In The Box Amsterdam work. Watch a user on IE8/XP getting pwned by two single
clicks on a web page, and a user on IE9/Win7 getting pwned by selecting an option
from a context menu.

http://blog.acrossecurity

[ more ]  [ reply ]
E-mail address spoofing with RLO 2011-05-24
Wouter Coekaerts (wouter coekaerts be)
E-mail address spoofing with RLO - http://wouter.coekaerts.be/2011/email-rlo

Introduction
=============
When we reply to an e-mail, the address we see in the To-field serves
a purpose beyond getting our answer back to original sender. We attach
a meaning to these addresses. If we see john.smith@exa

[ more ]  [ reply ]
[SECURITY] [DSA 2239-1] libmojolicious-perl security update 2011-05-24
Moritz Muehlenhoff (jmm debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-2239-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Moritz Muehlenhoff
May 24, 2011

[ more ]  [ reply ]
VUPEN Security Research - 7T Interactive Graphical SCADA System (IGSS) Remote Memory Corruption 2011-05-24
VUPEN Security Research (advisories vupen com)
VUPEN Security Research - 7T Interactive Graphical SCADA System ODBC Remote
Memory Corruption

http://www.vupen.com/english/research.php

I. BACKGROUND
---------------------

7T Interactive Graphical SCADA System (IGSS) is a state-of-the art
SCADA system used for monitoring and controlling industr

[ more ]  [ reply ]
[ MDVSA-2011:095-1 ] apr 2011-05-23
security mandriva com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2011:095-1
http://www.mandriva.com/security/
______________________________________________________________________

[ more ]  [ reply ]
HTB22986: SQL injection in ExtCalendar 2 2011-05-24
advisory htbridge ch
Vulnerability ID: HTB22986
Reference: http://www.htbridge.ch/advisory/sql_injection_in_extcalendar_2.html
Product: ExtCalendar 2
Vendor: http://sourceforge.net/projects/extcal/
Vulnerable Version: 2.0b2
Vendor Notification: 05 May 2011
Vulnerability Type: SQL Injection
Risk level: Medium
Credit:

[ more ]  [ reply ]
[ MDVSA-2011:097 ] ruby 2011-05-23
security mandriva com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2011:097
http://www.mandriva.com/security/
______________________________________________________________________

[ more ]  [ reply ]
Gadu-Gadu 0-Day Remote Code Execution 2011-05-24
Kacper Szczesniak (kacper3 14 gmail com)
Vendor: Gadu-Gadu (http://gadu-gadu.pl)
Vulnerable Version: All
Vulnerability Type: XSS, Remote Code Execution
Risk level: Very High
Credit: Kacper Szczesniak <kacper3.14 (at) gmail (dot) com [email concealed]>
Vulnerability Details:

Gadu-Gadu improperly handles file transfer requests. It's possible to
place 255 chars of HTML

[ more ]  [ reply ]
[ MDVSA-2011:100 ] cyrus-imapd 2011-05-24
security mandriva com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2011:100
http://www.mandriva.com/security/
______________________________________________________________________

[ more ]  [ reply ]
HTB22987: Multiple XSS in phpScheduleIt 2011-05-24
advisory htbridge ch
Vulnerability ID: HTB22987
Reference: http://www.htbridge.ch/advisory/multiple_xss_in_phpscheduleit.html
Product: phpScheduleIt
Vendor: php.brickhost.com
Vulnerable Version: 1.2.12
Vendor Notification: 05 May 2011
Vulnerability Type: XSS (Cross Site Scripting)
Risk level: Medium
Credit: High-Tech

[ more ]  [ reply ]
HTB22995: XSS in Ajax Chat 2011-05-24
advisory htbridge ch
Vulnerability ID: HTB22995
Reference: http://www.htbridge.ch/advisory/xss_in_ajax_chat.html
Product: Ajax Chat
Vendor: php-development.ru
Vulnerable Version: 1
Vendor Notification: 10 May 2011
Vulnerability Type: XSS (Cross Site Scripting)
Risk level: Medium
Credit: High-Tech Bridge SA Security Re

[ more ]  [ reply ]
[ MDVSA-2011:099 ] libzip 2011-05-24
security mandriva com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2011:099
http://www.mandriva.com/security/
______________________________________________________________________

[ more ]  [ reply ]
[ MDVSA-2011:098 ] ruby 2011-05-23
security mandriva com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2011:098
http://www.mandriva.com/security/
______________________________________________________________________

[ more ]  [ reply ]
Bypassing Cisco's ICMPv6 Router Advertisement Guard feature 2011-05-23
Marc Heuse (mh mh-sec de)
To bypass the Router Advertisement Guarding feature in the (very few)
Cisco switches (and images) that support it:

Attack:
=======
Make the evil Router Advertisement fragmented and put the ICMPv6 into
the second fragment, eg. by putting a very large Destination extension
header before the ICMPv6 pa

[ more ]  [ reply ]
NGS00054 Patch Notification: Lumension Device Control (formerly Sanctuary) remote memory corruption 2011-05-24
Research@NGSSecure (research ngssecure com)
Lumension Device Control (formerly Sanctuary) remote memory corruption

24/05/2011

Andy Davis of NGS Secure has discovered a high risk vulnerability in Lumension Device Control. Sending a specially crafted packet to a TCP service running on the Lumension Application Server results in a memory corru

[ more ]  [ reply ]
NNT Change Tracker - Hard-Coded Encryption Key 2011-05-23
Dennis Brunnen (dennis brunnen gmail com)
Background
----------

NNT Change Tracker Enterprise is a commercial product created by
UK-based New Net Technologies, and is designed to detect changes to
PC, server and network device configurations. The central component
'Core Server' is sent change data from 'Remote Angels' that monitor
remote s

[ more ]  [ reply ]
PR10-11: Multiple XSS injection vulnerabilities and a offsite redirection flaw within HP System Management Homepage (Insight Manager) 2011-05-23
research (research procheckup com)
PR10-11: Multiple XSS injection vulnerabilities and a offsite
redirection flaw within HP System Management Homepage (Insight Manager)

Vulnerability found: 6th June 2010

Date Published 20th May 2011

Severity: Medium

Description:

XSS vulnerabilities have been found within HP System Management; A

[ more ]  [ reply ]
[ MDVSA-2011:096 ] python 2011-05-22
security mandriva com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2011:096
http://www.mandriva.com/security/
______________________________________________________________________

[ more ]  [ reply ]
[SECURITY] [DSA 2237-2] apr security update 2011-05-21
Stefan Fritsch (sf debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-2237-2 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Stefan Fritsch
May 21, 2011

[ more ]  [ reply ]
Session hacking via authentication cookie on Oracle CRM on Demand 2011-05-20
jeffto eljeffto com
# Vulnerability Title: Session hacking via authentication cookie on Oracle CRM on Demand
# Date: 20/05/2011

# Vendor: Oracle
# Product: Oracle CRM on Demand
# Software Link: https://sso.crmondemand.com/

Summary: Oracle CRM on Demand is a web application to
manage Customer information.

Desc: On lo

[ more ]  [ reply ]
PHPCaptcha / Securimage 2.0.2 - Authentication Bypass - SOS-11-007 2011-05-20
Lists (lists senseofsecurity com)
Sense of Security - Security Advisory - SOS-11-007

Release Date. 20-May-2011
Last Update. -
Vendor Notification Date. 04-Apr-2011
Product. Securimage / PHPCaptcha
Platform. PHP
Affected versions. 1.0.4 - 2.0.2
Severity Ra

[ more ]  [ reply ]
[ MDVSA-2011:095 ] apr 2011-05-20
security mandriva com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2011:095
http://www.mandriva.com/security/
______________________________________________________________________

[ more ]  [ reply ]
[SECURITY] [DSA 2238-1] vino security update 2011-05-19
Moritz Muehlenhoff (jmm debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-2238-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Moritz Muehlenhoff
May 19, 2011

[ more ]  [ reply ]
[ MDVSA-2011:094 ] pure-ftpd 2011-05-19
security mandriva com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2011:094
http://www.mandriva.com/security/
______________________________________________________________________

[ more ]  [ reply ]
Ubuntu Security Notice publication update 2011-05-19
Jamie Strandboge (jamie canonical com)
Historically, Ubuntu sends Ubuntu Security Notices (USNs) to bugtraq,
full-disclosure and our own announce mailing list. After a recent review
of our publication process, we decided we will no longer post USNs to
bugtraq and full-disclosure.

People interested in receiving USNs by email should subsc

[ more ]  [ reply ]
Apache Struts 2, XWork, OpenSymphony WebWork Java Class Path Information Disclosure 2011-05-18
marian ventuneac gmail com

Security Advisory: MVSA-11-007 (http://www.ventuneac.net/security-advisories/MVSA-11-007)

CVE: CVE-2011-2088

Vendors: Apache Software Foundation, OpenSymphony

Products: Struts 2, XWork , WebWork

Vulnerabilities: Java Class Path Information Disclosure

Risk: Medium

Attack Vector: From Remote

[ more ]  [ reply ]
RE: CA20110420-02: Security Notice for CA Output Management Web Viewer 2011-05-19
Williams, James K (James Williams ca com)

CA20110420-01: Security Notice for CA SiteMinder

Issued: April 20, 2011
Updated: May 19, 2011

CA Technologies support is alerting customers to a security risk
associated with CA SiteMinder. A vulnerability exists that can allow a
malicious user to impersonate another user. CA Technologies

[ more ]  [ reply ]
Cisco Unified Operations Manager Multiple Vulnerabilities - SOS-11-006 2011-05-18
Lists (lists senseofsecurity com)
Sense of Security - Security Advisory - SOS-11-006

Release Date. 18-May-2011
Last Update. -
Vendor Notification Date. 28-Feb-2011
Product. Cisco Unified Operations Manager
Common Services Framework Help Ser

[ more ]  [ reply ]
[ MDVSA-2011:093 ] gnome-screensaver 2011-05-18
security mandriva com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2011:093
http://www.mandriva.com/security/
______________________________________________________________________

[ more ]  [ reply ]
DOMinator - The DOMXss Analyzer Tool - is finally public 2011-05-18
Stefano Di Paola (stefano dipaola wisec it)
What is DOMinator?
DOMinator is a Firefox based software for analysis and identification of
DOM Based Cross Site Scripting issues (DOMXss).
It is the first runtime tool which can help security testers to identify
DOMXss.

How it works?

It uses dynamic runtime tainting model on strings and can trace

[ more ]  [ reply ]
(Page 424 of 1747)  < Prev  419 420 421 422 423 424 425 426 427 428 429  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus