|
Colapse all |
Post message
[SECURITY] [DSA 1155-1] New sendmail packages fix denial of service 2006-08-24 joey infodrom org (Martin Schulze) Advisory: Integramod Portal <= 2.x File Inclusion Vulnerability 2006-08-24 Mustafa Can Bjorn IPEKCI (nukedx nukedx com) --Security Report-- Advisory: Integramod Portal <= 2.x File Inclusion Vulnerability --- Author: Mustafa Can Bjorn "nukedx a.k.a nuker" IPEKCI --- Date: 24/08/06 03:00 AM --- Contacts:{ ICQ: 10072 MSN/Email: nukedx (at) nukedx (dot) com [email concealed] Web: http://www.nukedx.com } --- Vendor: Integramod (http://www.integramo [ more ] [ reply ] Advisory: VistaBB <= 2.x Multiple File Inclusion Vulnerabilities 2006-08-24 Mustafa Can Bjorn IPEKCI (nukedx nukedx com) --Security Report-- Advisory: VistaBB <= 2.x Multiple File Inclusion Vulnerabilities --- Author: Mustafa Can Bjorn "nukedx a.k.a nuker" IPEKCI --- Date: 24/08/06 03:00 AM --- Contacts:{ ICQ: 10072 MSN/Email: nukedx (at) nukedx (dot) com [email concealed] Web: http://www.nukedx.com } --- Vendor: VistaBB (http://www.vistabb.net [ more ] [ reply ] pSlash v0.7 (lvc_include_dir) Remote Include Vulnerability 2006-08-24 x0r0n hotmail com ############################################################ pSlash v0.7 (lvc_include_dir) Remote Include Vulnerability ############################################################ #Author: XORON ############################################################ #Class: Remote ########## [ more ] [ reply ] FreeBSD Security Advisory FreeBSD-SA-06:18.ppp 2006-08-23 FreeBSD Security Advisories (security-advisories freebsd org) [ GLSA 200608-22 ] fbida: Arbitrary command execution 2006-08-23 Raphael Marichez (falco gentoo org) [ GLSA 200608-21 ] Heimdal: Multiple local privilege escalation vulnerabilities 2006-08-23 Raphael Marichez (falco gentoo org) New malware names and updates to PowerPoint FAQ document 2006-08-23 Juha-Matti Laurio (juha-matti laurio netti fi) Several names of related Trojan and dropper have been added to "Microsoft PowerPoint Vulnerability FAQ - August 2006, CVE-2006-4274" document today. Changes to the document have been done too: It is known that the Trojan -generates a hidden iexplore.exe process, -executes as a thread of this proces [ more ] [ reply ] Bugtraq ID: 18402 2006-08-23 The Cute Group (cuties thecutegroup com) Hello, All issues concerning this script and others at cescripts.com have been addressed and fixed. Files have been re-distributed to customers. A patch is available for download for members. All current versions have been updated. Please update/delete your listing. http://www.securityfocus.com/ [ more ] [ reply ] Cisco Security Advisory: Unintentional Password Modification in Cisco Firewall Products 2006-08-23 Cisco Systems Product Security Incident Response Team (psirt cisco com) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Cisco Security Advisory: Unintentional Password Modification in Cisco Firewall Products Document ID: 70811 Advisory ID: cisco-sa-20060823-firewall http://www.cisco.com/warp/public/707/cisco-sa-20060823-firewall.shtml Revision 1.0 For Public Relea [ more ] [ reply ] Cisco Security Advisory: Cisco VPN 3000 Concentrator FTP Management Vulnerabilities 2006-08-23 Cisco Systems Product Security Incident Response Team (psirt cisco com) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Cisco Security Advisory: Cisco VPN 3000 Concentrator FTP Management Vulnerabilities Document ID: 71141 Advisory ID: cisco-sa-20060823-vpn3k http://www.cisco.com/warp/public/707/cisco-sa-20060823-vpn3k.shtml Revision 1.0 For Public Release 2006 Au [ more ] [ reply ] Symantec Gateway Security DNS exploit 2006-08-23 Gianstefano Monni (gianstefano lugnu it) (2 replies) I. THE SYSTEM Symantec Gateway Security (SGS) is an enterprise-class appliance with a linux-based stateful inspection firewall and application proxy capabilities (http/https, ftp, smtp, dns, and so on). Using the default installation the system keeps listening on the WAN interface for all its proxie [ more ] [ reply ] RE: Symantec Gateway Security DNS exploit 2006-08-23 Pretorius, Wynand (ZA - Johannesburg) (wpretorius deloitte co za) PHProjekt v0.6.1 Remote File Inclusion Vulnerability (2) 2006-08-21 D3nGeR Gmail CoM (1 replies) ######################################################################## # Content management module for PHProjekt v0.6.1 Remote File Inclusion Vulnerability (2) # # # Found By: D3nGeR # E-Mail: D3nGeR (at) Gmail (dot) CoM [email concealed] ######################################################################## # ex [ more ] [ reply ] Re: PHProjekt v0.6.1 Remote File Inclusion Vulnerability (2) 2006-08-23 Carsten Eilers (ceilers-lists gmx de) Symantec Enterprise Security Manager Denial-of-Service Vulnerability 2006-08-22 Avert avertlabs com McAfee, Inc. McAfee® Avert® Labs Security Advisory Public Release Date: 2006-08-22 Symantec Enterprise Security Manager Denial-of-Service Vulnerability CVE Number Pending ________________________________________________________________________ _______ ? Synopsis The Symantec Enterprise [ more ] [ reply ] Linux Kernel SCTP Privilege Elevation Vulnerability 2006-08-22 Avert avertlabs com ________________________________________________________________________ _______ McAfee, Inc. McAfee® Avert® Labs Security Advisory Public Release Date: 2006-08-22 Linux Kernel SCTP Privilege Elevation Vulnerability CVE-2006-3745 ___________________________________________________________ [ more ] [ reply ] Tons of SQL-injections and XSS in Eichhorn Portal and vendor page 2006-08-20 MC Iglo (mc iglo googlemail com) Hi list. There are lots of SQL injections and XSS in the 'Eichhorn Portal' by 'Guder und Koch Netzwerktechnik' and their own website. Input passed to multiple parameters in different PHP-files isn't properly sanitised before being returned to the user. This can be exploited to execute arbitrary H [ more ] [ reply ] (exploit) firefox 1.5.0.6 linux DoS 2006-08-22 tomas (toomaaas gmail com) #!/usr/bin/perl #author: tomas kempinsky use strict; use Socket; my $port = shift || 2121; my $proto = getprotobyname('tcp'); my $payload = "\x32\x32\x30\x20\x5a\x0d\x0a\x33". "\x33\x31\x20\x5a\x0d\x0a\x35\x30". "\x30\x20\x44\x6f\x53\x0d\x0a\x35\". "x30\x30\x20\x5a\x0d\x0a"; socket(SERVER, PF_IN [ more ] [ reply ] |
|
Privacy Statement |
www.paessler.com
[ more ] [ reply ]