BugTraq Mode:
(Page 439 of 1747)  < Prev  434 435 436 437 438 439 440 441 442 443 444  Next >
[ MDVSA-2011:060 ] ffmpeg 2011-04-01
security mandriva com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2011:060
http://www.mandriva.com/security/
______________________________________________________________________

[ more ]  [ reply ]
Flag this message Windows Media player 11.0.5721.5145 Buffer overflow/DOS Exploit 2011-03-31
^Xecuti0N3r (xecuti0n3r yahoo com)
Hello Team,

I have attached a file WMPExploit.pl which makes exploits the memory vulnerability in Windows Media player 11.0.5721.5145 which can be used to perform a Denial of Service attack :) and to cause a crash.

To run this file, compile the WMPExploit.pl using perl and then you may open th

[ more ]  [ reply ]
AR Web Content Manager (AWCM) Cross-Site scripting Vulnerability 2011-04-01
SecPod Research (research secpod com)
Hi,

SecPod Research Team Member Antu Sanadi has found a XSS vulnerability in
AR Web Content Manager (AWCM)

Advisory details has been attached to this mail.

Regards,
SecPod Research Team
http://www.secpod.com

########################################################################
#######
AR

[ more ]  [ reply ]
[security bulletin] HPSBUX02639 SSRT100293 rev.1 - HP-UX Running XNTP, Remote Denial of Service (DoS) 2011-04-01
security-alert hp com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c02737553
Version: 1

HPSBUX02639 SSRT100293 rev.1 - HP-UX Running XNTP, Remote Denial of Service (DoS)

NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.

[ more ]  [ reply ]
[security bulletin] HPSBUX02645 SSRT100387 rev.1 - HP-UX Apache Web Server, Remote Information Disclosure, Cross-Site Scripting (XSS), Denial of Service (DoS) 2011-04-01
security-alert hp com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c02752210
Version: 1

HPSBUX02645 SSRT100387 rev.1 - HP-UX Apache Web Server, Remote Information Disclosure, Cross-Site Scripting (XSS), Denial of Service (DoS)

NOTICE: The information in this Sec

[ more ]  [ reply ]
[ MDVSA-2011:059 ] ffmpeg 2011-04-01
security mandriva com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2011:059
http://www.mandriva.com/security/
______________________________________________________________________

[ more ]  [ reply ]
6-year FreeBSD-SA-05:02.sendfile exploit 2011-04-01
Solar Designer (solar openwall com)
Hi,

This is almost 0-day. In a sense.

I wrote this for a pentesting company. I found it ethically OK to do
since the FreeBSD advisory was already out for a couple of weeks.
It turns out I was not alone to write an exploit for this bug, and to
publish the exploit this year.

Timeline:

2005/04/04

[ more ]  [ reply ]
[security bulletin] HPSBUX02646 SSRT100396 rev.1 - HP-UX, Local Denial of Service (DoS) 2011-04-01
security-alert hp com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c02753287
Version: 1

HPSBUX02646 SSRT100396 rev.1 - HP-UX, Local Denial of Service (DoS)

NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.

Release Date:

[ more ]  [ reply ]
Movie Player v4.82 0Day Buffer overflow/DOS Exploit 2011-03-31
^Xecuti0N3r (xecuti0n3r yahoo com)
Hello Team,

I have attached a file MoviePlayerExploit.py which exploits the memory vulnerability in Movie Player v4.82 which can be used to perform a Denial of Service attack :) and to cause a crash.

To run this file, compile the MoviePlayerExploit.py using python and then you may open the gen

[ more ]  [ reply ]
RE: [Full-disclosure] Microsoft VISTA TCP/IP heap buffer underflow 2011-04-01
Thor (Hammer of God) (thor hammerofgod com)
Just so that I understand correctly, are you reporting that if one is logged on as the administrator, it may be possible to execute this exploit in order to take over the machine?

t

-----Original Message-----
From: full-disclosure-bounces (at) lists.grok.org (dot) uk [email concealed] [mailto:full-disclosure-bounces (at) lists (dot) gro [email concealed]

[ more ]  [ reply ]
Microsoft VISTA TCP/IP heap buffer underflow 2011-04-01
J. Oquendo (sil infiltrated net)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Microsoft VISTA TCP/IP heap buffer underflow

Summary
- -----------------------------
Microsoft Device IO Control wrapped by an API shipping with Windows
Vista 32 bit and 64 bit contains a possibly exploitable, buffer
underflow corrupting kernel memor

[ more ]  [ reply ]
[ MDVSA-2011:058 ] quagga 2011-04-01
security mandriva com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2011:058
http://www.mandriva.com/security/
______________________________________________________________________

[ more ]  [ reply ]
[security bulletin] HPSBMA02650 SSRT100429 rev.1 - HP Operations for UNIX, Remote Cross Site Scripting (XSS), Unauthorized Access 2011-04-01
security-alert hp com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c02770049
Version: 1

HPSBMA02650 SSRT100429 rev.1 - HP Operations for UNIX, Remote Cross Site Scripting (XSS), Unauthorized Access

NOTICE: The information in this Security Bulletin should be acte

[ more ]  [ reply ]
BSD derived RFC3173 IPComp encapsulation will expand arbitrarily nested payload 2011-04-01
Tavis Ormandy (taviso cmpxchg8b com)
BSD derived RFC3173 IPComp encapsulation will expand arbitrarily nested payload
------------------------------------------------------------------------
-------

Gruezi, this document describes CVE-2011-1547.

RFC3173 ip payload compression, henceforth ipcomp, is a protocol intended to
provide compre

[ more ]  [ reply ]
iDefense Security Advisory 03.31.10: RealNetworks Helix DNA Server RTSP Stack Buffer Overflow 2011-03-31
labs-no-reply (labs-no-reply ivcp vrsn com)
iDefense Security Advisory 03.31.10
http://labs.idefense.com/intelligence/vulnerabilities/
Mar 31, 2010

I. BACKGROUND

Helix DNA Server is software that can play audio and video media in
various formats and stream them over a network. It is intended as a
largely free and open source digital media f

[ more ]  [ reply ]
[ MDVSA-2011:057 ] apache 2011-03-31
security mandriva com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2011:057
http://www.mandriva.com/security/
______________________________________________________________________

[ more ]  [ reply ]
Re: Solaris 10 Port Stealing Vulnerability 2011-03-31
Casper Dik Oracle COM

>Imagine if you find a Solaris system running a web server that has a
>remote exploit which allows for the execution of arbitrary code. If the
>web server happens to be listening on the wildcard interface than you
>can very easily insert your own web server in front of it!

There SO_EXCLBIND setso

[ more ]  [ reply ]
[USN-1100-1] OpenLDAP vulnerabilities 2011-03-31
Jamie Strandboge (jamie canonical com)
===========================================================
Ubuntu Security Notice USN-1100-1 March 31, 2011
openldap, openldap2.3 vulnerabilities
CVE-2011-1024, CVE-2011-1025, CVE-2011-1081
===========================================================

A security issue affects the followin

[ more ]  [ reply ]
HTB22931: XSS vulnerability in InTerra Blog Machine 2011-03-31
advisory htbridge ch
Vulnerability ID: HTB22931
Reference: http://www.htbridge.ch/advisory/xss_vulnerability_in_interra_blog_machin
e.html
Product: InTerra Blog Machine
Vendor: InTerra Blog Machine Team ( http://code.google.com/p/interra/ )
Vulnerable Version: 1.84 and probably prior versions
Vendor Notification: 31 Mar

[ more ]  [ reply ]
HTB22908: XSRF (CSRF) in Collabtive 2011-03-31
advisory htbridge ch
Vulnerability ID: HTB22908
Reference: http://www.htbridge.ch/advisory/xsrf_csrf_in_collabtive.html
Product: Collabtive
Vendor: Open Dynamics ( http://collabtive.o-dyn.de/ )
Vulnerable Version: 0.6.5 and probably prior versions
Vendor Notification: 17 March 2011
Vulnerability Type: CSRF (Cross-Site

[ more ]  [ reply ]
HTB22909: Path disclosure in Tine 2.0 2011-03-31
advisory htbridge ch
Vulnerability ID: HTB22909
Reference: http://www.htbridge.ch/advisory/path_disclosure_in_tine_2_0.html
Product: Tine 2.0
Vendor: Metaways Infosystems GmbH ( http://www.tine20.org/ )
Vulnerable Version: Neele (2011-01-2)
Vendor Notification: 17 March 2011
Vulnerability Type: Path disclosure
Status:

[ more ]  [ reply ]
HTB22910: XSRF (CSRF) in Feng Office 2011-03-31
advisory htbridge ch
Vulnerability ID: HTB22910
Reference: http://www.htbridge.ch/advisory/xsrf_csrf_in_feng_office.html
Product: Feng Office
Vendor: Secure Data SRL ( http://www.fengoffice.com/ )
Vulnerable Version: 1.7.3.3 and probably prior versions
Vendor Notification: 17 March 2011
Vulnerability Type: CSRF (Cross

[ more ]  [ reply ]
HTB22906: XSS vulnerabilities in Collabtive 2011-03-31
advisory htbridge ch
Vulnerability ID: HTB22906
Reference: http://www.htbridge.ch/advisory/xss_vulnerabilities_in_collabtive.html
Product: Collabtive
Vendor: Open Dynamics ( http://collabtive.o-dyn.de/ )
Vulnerable Version: 0.6.5 and probably prior versions
Vendor Notification: 17 March 2011
Vulnerability Type: XSS
Ri

[ more ]  [ reply ]
HTB22907: Directory Traversal in Collabtive 2011-03-31
advisory htbridge ch
Vulnerability ID: HTB22907
Reference: http://www.htbridge.ch/advisory/directory_traversal_in_collabtive.html
Product: Collabtive
Vendor: Open Dynamics ( http://collabtive.o-dyn.de/ )
Vulnerable Version: 0.6.5 and probably prior versions
Vendor Notification: 17 March 2011
Vulnerability Type: Direct

[ more ]  [ reply ]
[SECURITY] [DSA 2208-2] bind9 security update 2011-03-31
Florian Weimer (fw deneb enyo de)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-2208-2 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Florian Weimer
March 30, 2011

[ more ]  [ reply ]
RE: Solaris 10 Port Stealing Vulnerability 2011-03-30
Chris O'Regan (chris encs concordia ca)
On Wed, 2011-03-30 at 14:20 +0000, Jim Harrison wrote:
> Interesting...
> Windows also has similar functionality offered via .NET services (Net.Tcp Port Sharing http://msdn.microsoft.com/en-us/library/ms734772.aspx), but this is only available through .NET API; not directly through Winsock or AFD.

[ more ]  [ reply ]
[USN-1099-1] GDM vulnerability 2011-03-30
Steve Beattie (sbeattie ubuntu com)
===========================================================
Ubuntu Security Notice USN-1099-1 March 30, 2011
gdm vulnerability
CVE-2011-0727
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 9.10
Ubuntu 10.04 LTS
U

[ more ]  [ reply ]
Re: Re: HTB22905: Path disclosure in Wordpress 2011-03-30
mike sitewat ch
I agree, this is a configuration issue not an issue with Wordpress. Wordpress SHOULD NOT fix this "issue" because it will make it more difficult to write wordpress modules.

All production systems should have this configuration:
display_errors=off

[ more ]  [ reply ]
'Andy's PHP Knowledgebase' SQL Injection Vulnerability (CVE-2011-1546) 2011-03-30
Mark Stanislav (mark stanislav gmail com)
'Andy's PHP Knowledgebase' SQL Injection Vulnerability (CVE-2011-1546)
Mark Stanislav - mark.stanislav (at) gmail (dot) com [email concealed]

I. DESCRIPTION
---------------------------------------
A vulnerability exists in a_viewusers.php allowing for SQL injection of the 's' query parameter.

II. TESTED VERSION
-----------

[ more ]  [ reply ]
[SECURITY] [DSA 2208-1] bind9 security update 2011-03-30
Florian Weimer (fw deneb enyo de)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
-
Debian Security Advisory DSA-2208-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Florian Weimer
March 30, 2011

[ more ]  [ reply ]
(Page 439 of 1747)  < Prev  434 435 436 437 438 439 440 441 442 443 444  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus