BugTraq Mode:
(Page 474 of 1747)  < Prev  469 470 471 472 473 474 475 476 477 478 479  Next >
[ MDVSA-2010:249 ] clamav 2010-12-07
security mandriva com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2010:249
http://www.mandriva.com/security/
______________________________________________________________________

[ more ]  [ reply ]
XSS vulnerability in Zimplit CMS 2010-12-07
advisory htbridge ch
Vulnerability ID: HTB22715
Reference: http://www.htbridge.ch/advisory/xss_vulnerability_in_zimplit_cms.html
Product: Zimplit CMS
Vendor: Zimplit ( http://www.zimplit.com/ )
Vulnerable Version: Current at 22.11.2010 and Probably Prior Versions
Vendor Notification: 22 November 2010
Vulnerability Ty

[ more ]  [ reply ]
XSS vulnerability in Zimplit CMS 2010-12-07
advisory htbridge ch
Vulnerability ID: HTB22716
Reference: http://www.htbridge.ch/advisory/xss_vulnerability_in_zimplit_cms_1.html
Product: Zimplit CMS
Vendor: Zimplit ( http://www.zimplit.com/ )
Vulnerable Version: Current at 22.11.2010 and Probably Prior Versions
Vendor Notification: 22 November 2010
Vulnerability

[ more ]  [ reply ]
LFI in Exponent CMS 2010-12-07
advisory htbridge ch
Vulnerability ID: HTB22717
Reference: http://www.htbridge.ch/advisory/lfi_in_exponent_cms.html
Product: Exponent CMS
Vendor: http://www.exponentcms.org/ ( http://www.exponentcms.org/ )
Vulnerable Version: 2.0.0pr2
Vendor Notification: 22 November 2010
Vulnerability Type: Local File Inclusion
Statu

[ more ]  [ reply ]
LFI in Exponent CMS 2010-12-07
advisory htbridge ch
Vulnerability ID: HTB22718
Reference: http://www.htbridge.ch/advisory/lfi_in_exponent_cms_1.html
Product: Exponent CMS
Vendor: http://www.exponentcms.org/ ( http://www.exponentcms.org/ )
Vulnerable Version: 2.0.0pr2
Vendor Notification: 22 November 2010
Vulnerability Type: Local File Inclusion
Sta

[ more ]  [ reply ]
www.eVuln.com : XSS vulnerability in WWWThreads (php version) 2010-12-07
bt evuln com
www.eVuln.com advisory:
XSS vulnerability in WWWThreads (php version)
Summary: http://evuln.com/vulns/155/summary.html
Details: http://evuln.com/vulns/155/description.html

-----------Summary-----------
eVuln ID: EV0155
Software: n/a
Vendor: WWWThreads
Version: 2006.11.25
Critical Level: low
Type:

[ more ]  [ reply ]
VMSA-2010-0019 VMware ESX third party updates for Service Console 2010-12-07
VMware Security Team (security vmware com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------

VMware Security Advisory

Advisory ID: VMSA-2010-0019
Synopsis: VMware ESX third party updates for Service Console
Issue date: 2010-12-07

[ more ]  [ reply ]
Call for papers: 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET) 2010-12-06
Christopher Kruegel (chris cs ucsb edu)
------------------------------------------------------------------------

[ Please excuse multiple copies of this e-mail. ]
------------------------------------------------------------------------

LEET '11: Call for Papers
4th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET)
March

[ more ]  [ reply ]
[www.eVuln.com] SQL Injection vulnerability in Alguest 2010-12-06
bt evuln com
New eVuln Advisory:

SQL Injection vulnerability in Alguest

Summary: http://evuln.com/vulns/154/summary.html

Details: http://evuln.com/vulns/154/description.html

-----------Summary-----------

eVuln ID: EV0154

Software: Alguest

Vendor: n/a

Version: 1.1c-patched

Critical Level: medium

Typ

[ more ]  [ reply ]
DIMVA 2011 Call for Workshops Proposals 2010-12-05
Lorenzo Cavallaro (lorenzo cavallaro gmail com)
FYI,

(Apologies if you receive multiple copies)

----- BEGIN DIMVA 2011 Call for Workshops Proposals -----

This year, in a break from previous DIMVAs, we want to allow for a small
number of workshops to be co-located with the main conference.
Researchers and practitioners are therefore invited

[ more ]  [ reply ]
OWASP Zed Attack Proxy version 1.1.0 2010-12-05
psiinon (psiinon gmail com)
Hi,

The Zed Attack Proxy (ZAP) is an easy to use integrated penetration
testing tool for finding vulnerabilities in web applications.

Version 1.1.0 of ZAP has now been released.

This release adds the following main features:

OWASP rebranding
Brute Force scanner c/o the OWASP DirBuster project
Po

[ more ]  [ reply ]
rPSA-2010-0076-1 gnupg 2010-12-06
rPath Update Announcements (announce-noreply rpath com)
rPath Security Advisory: 2010-0076-1
Published: 2010-12-06
Products:
rPath Linux 2

Rating: Informational
Exposure Level Classification:
Indirect User Deterministic Unauthorized Access
Updated Versions:
gnupg=conary.rpath.com@rpl:2/2.0.9-1.1-1

rPath Issue Tracking System:
https://is

[ more ]  [ reply ]
'Pulse CMS Basic' Local File Inclusion Vulnerability (CVE-2010-4330) 2010-12-05
Mark Stanislav (mark stanislav gmail com)
'Pulse CMS Basic' Local File Inclusion Vulnerability (CVE-2010-4330)
Mark Stanislav - mark.stanislav (at) gmail (dot) com [email concealed]

I. DESCRIPTION
---------------------------------------
A vulnerability exists in the 'includes/controller.php' script that allows for arbitrary local file inclusion due to a null-byte att

[ more ]  [ reply ]
[ MDVSA-2010:247 ] kernel 2010-12-03
security mandriva com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2010:247
http://www.mandriva.com/security/
______________________________________________________________________

[ more ]  [ reply ]
Vulnerabilities in Register Plus Redux for WordPress 2010-12-03
MustLive (mustlive websecurity com ua)
Hello Bugtraq!

I want to warn you about Cross-Site Scripting, Insufficient Anti-automation
and Full path disclosure vulnerabilities in plugin Register Plus Redux for
WordPress. Register Plus Redux is a fork of plugin Register Plus.

-------------------------
Affected products:
---------------------

[ more ]  [ reply ]
Re: Flaw in Microsoft Windows SAM Processing Allows Continued Administrative Access Using Hidden Regular User Masquerading After Compromise (2010-M$-001) 2010-12-02
StenoPlasma @ ExploitDevelopment (StenoPlasma exploitdevelopment com)
To all,

The reason I wrote this article was not to explain how to create a hidden
user account. I wrote the article to show you that you can modify the SAM
in real time in a way that is undetectable by ANYONE. This modification
allows you to masquerade any user account as the built-in Administ

[ more ]  [ reply ]
[eVuln.com] PHP Code Execution in Alguest 2010-12-03
bt evuln com
New eVuln Advisory:
PHP Code Execution in Alguest
Summary: http://evuln.com/vulns/153/summary.html
Details: http://evuln.com/vulns/153/description.html

-----------Summary-----------
eVuln ID: EV0153
Software: Alguest
Vendor: n/a
Version: 1.1c-patched
Critical Level: high
Type: PHP Code Execution

[ more ]  [ reply ]
[eVuln.com] Cookie authentication bypass in Alguest 2010-12-03
bt evuln com
New eVuln Advisory:

Cookie authentication bypass in Alguest

Summary: http://evuln.com/vulns/152/summary.html

Details: http://evuln.com/vulns/152/description.html

-----------Summary-----------

eVuln ID: EV0152

Software: Alguest

Vendor: n/a

Version: 1.1c-patched

Critical Level: high

Type

[ more ]  [ reply ]
VMSA-2010-0018 VMware hosted products and ESX patches resolve multiple security issues 2010-12-03
VMware Security team (security vmware com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------

VMware Security Advisory

Advisory ID: VMSA-2010-0018
Synopsis: VMware hosted products and ESX patches resolve
multiple secur

[ more ]  [ reply ]
[security bulletin] HPSBUX02610 SSRT100341 rev.1 - HP-UX Running OpenSSL, Remote Execution of Arbitrary Code, Denial of Service (DoS) 2010-12-03
security-alert hp com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c02629503
Version: 1

HPSBUX02610 SSRT100341 rev.1 - HP-UX Running OpenSSL, Remote Execution of Arbitrary Code, Denial of Service (DoS)

NOTICE: The information in this Security Bulletin should be

[ more ]  [ reply ]
[security bulletin] HPSBUX02609 SSRT100147 rev.1 - CIFS Server (Samba), Remote Execution of Arbitrary Code, Denial of Service (DoS) 2010-12-03
security-alert hp com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c02627925
Version: 1

HPSBUX02609 SSRT100147 rev.1 - CIFS Server (Samba), Remote Execution of Arbitrary Code, Denial of Service (DoS)

NOTICE: The information in this Security Bulletin should be ac

[ more ]  [ reply ]
New paper by Amit Klein (Trusteer): "Detecting virtualization over the web with IE9 (platform preview) and Semi-permanent computer fingerprinting and user tracking in IE9 (platform preview)" 2010-12-02
Amit Klein (amit klein trusteer com)
Hi list

The IE9 (platform preview) Javascript Math.random implementation is vulnerable to seed reconstruction. The seed reveals the computer's boot time (and on Windows 7 - also CPU clock speed). These can be used to finger-print computers and track users within the same Windows session even if the

[ more ]  [ reply ]
Flaw in Microsoft Windows SAM Processing Allows Continued Administrative Access Using Hidden Regular User Masquerading After Compromise (2010-M$-001) 2010-12-02
Steno Plasma (exploitdevelopmentdotcom gmail com)
----------------------------------------------------------
www.ExploitDevelopment.com 2010-M$-001
----------------------------------------------------------

TITLE:
Flaw in Microsoft Windows SAM Processing Allows Continued
Administrative Access Using Hidden Regular User Masquerading After
Compromise

[ more ]  [ reply ]
NGS00014 Patch Notification: Cisco IPSec VPN Implementation Group Name Enumeration 2010-12-01
Research@NGSSecure (research1 nccgroup local)
Cisco IPSec VPN Implementation Group Name Enumeration

01/12/2010

Gavin Jones of NGS Secure has discovered a vulnerability in (Cisco) Cisco VPN Concentrator, Cisco PIX and Cisco Adaptive Security Appliance.

Versions affected include:

-Cisco ASA 5500 Series Adaptive Security Appliances
-Cisco PIX

[ more ]  [ reply ]
[SECURITY] [DSA-2129-1] New krb5 packages fix checksum verification weakness 2010-12-01
Stefan Fritsch (sf debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------

Debian Security Advisory DSA-2129-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Stefan Fritsch
December 1, 2010

[ more ]  [ reply ]
[SECURITY] [DSA-2128-1] New libxml2 packages fix potential code execution 2010-12-01
Giuseppe Iuculano (iuculano debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------

Debian Security Advisory DSA-2128-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Giuseppe Iuculano
December 01, 2010

[ more ]  [ reply ]
[USN-1025-1] Bind vulnerabilities 2010-12-01
Marc Deslauriers (marc deslauriers canonical com)
===========================================================
Ubuntu Security Notice USN-1025-1 December 01, 2010
bind9 vulnerabilities
CVE-2010-3613, CVE-2010-3614
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 6.0

[ more ]  [ reply ]
Vulnerabilities in Fabrica Engine 2010-12-01
MustLive (mustlive websecurity com ua)
Hello Bugtraq!

I want to warn you about Cross-Site Scripting, Denial of Service and SQL
Injection vulnerabilities in Fabrica Engine (which I found in 2008 and 2009
at web site of one online shop). It's commercial engine for online shops.

SecurityVulns ID: 11274.

-------------------------
Affected

[ more ]  [ reply ]
Re: D-Link DIR-300 authentication bypass 2010-12-01
Karol CeliÅ?ski (karol celin pl)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Polish D-Link branch confirmed the bug and produced relevant patched
firmware:

DIR-300:
ftp://ftp.dlink.pl/dir/dir-300/driver_software/DIR-300_fw_revA_1-05B09_a
ll_en_20101130.zip
ftp://ftp.dlink.pl/dir/dir-300/driver_software/DIR-300_fw_revB_2-05B03_a
l

[ more ]  [ reply ]
Secunia Research: Winamp NSV Table of Contents Parsing Integer Overflow 2010-12-01
Secunia Research (remove-vuln secunia com)
======================================================================

Secunia Research 30/11/2010

- Winamp NSV Table of Contents Parsing Integer Overflow -

======================================================================
Table of Contents

Affected Software...

[ more ]  [ reply ]
(Page 474 of 1747)  < Prev  469 470 471 472 473 474 475 476 477 478 479  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus