|
Colapse all |
Post message
DCP-Portal 6.1.x, Remote command execution 2006-06-12 Federico Fazzi (federico autistici org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ----------------------------------------------------- Advisory id: FSA:013 Author: Federico Fazzi Date: 12/06/2006, 9:31 Sinthesis: DCP-Portal 6.1.x, Remote command execution Type: high Product: http://www.dcp-portal.org/ Patch: unavail [ more ] [ reply ] [FSA013] phpCMS 1.2.1pl2, Remote command execution 2006-06-12 Federico Fazzi (federico autistici org) ----------------------------------------------------- Advisory id: FSA:014 Author: Federico Fazzi Date: 12/06/2006, 10:25 Sinthesis: phpCMS 1.2.1pl2, Remote command execution Type: high Product: http://www.phpcms.de/ Patch: unavailable ------------------------------------------------- [ more ] [ reply ] Content-Builder (CMS) 0.7.5, Remote command execution 2006-06-11 Federico Fazzi (federico autistici org) ----------------------------------------------------- Advisory id: FSA:012 Author: Federico Fazzi Date: 11/06/2006, 22:30 Sinthesis: Content-Builder (CMS) 0.7.5, Remote command execution Type: high Product: http://www.content-builder.de/ Patch: unavailable ---------------------------- [ more ] [ reply ] internet explorer vulnerability based on MarjinZ & Mr.Niega discovered 2006-06-08 Kevin Berkane (kberkane asso-montevideo org) Meefo.com - XSS with cookie include 2006-06-10 luny youfucktard com Meefo.com Homepage: http://meefo.com Effected files: reading profiles index.php input boxes onprofiles sending private msgs ------------------------------ Reading aprofile and with cookie include PoC: Since data isn't properlly filtered (backslashes are added to ' and "), a user ca [ more ] [ reply ] [ GLSA 200606-09 ] SpamAssassin: Execution of arbitrary code 2006-06-11 Sune Kloppenborg Jeppesen (jaervosz gentoo org) [EEYEB-20060524] Symantec Remote Management Stack Buffer Overflow 2006-06-12 eEye Advisories (Advisories eeye com) Symantec Remote Management Stack Buffer Overflow Release Date: June 12, 2006 Date Reported: May 24, 2006 Severity: High (Remote Code Execution) Systems Affected: Symantec AntiVirus 10.0.x for Windows (all versions) Symantec AntiVirus 10.1.x for Windows (all versions) Symantec Client Security 3.0 [ more ] [ reply ] Vampirefreaks.com - XSS with cookie disclosure 2006-06-11 luny youfucktard com Vampirefreaks.com Homepage: http://www.vampirefreaks.com Effected files: input boxes of editing your profile posting a journal entry. Commenting XSS Vulnerability: Data isn't properly filtered when editing your profile. One way to bypass the filter is to escape quotes and useclosing [ more ] [ reply ] RE: Internet Explorer vulnerbility 2006-06-09 Greg Merideth (Forward Technology) (gmerideth forwardtechnology net) IE7 Beta 2 build [7.0.5346.5] parses without crashing. Greg Merideth Forward Technology, LLC. CTO & Other Wild Stuff gmerideth (at) forwardtechnology (dot) net [email concealed] PGP Fingerprint 18C3CE191171736225D62C3829F7B18A00F2AC0C -----Original Message----- From: Mr.Niega (at) gmail (dot) com [email concealed] [mailto:Mr.Niega (at) gmail (dot) com [email concealed]] [ more ] [ reply ] Re: SSL VPNs and security 2006-06-09 wnorth verizon net Very good information, we use F5 firepass products and I could see the same issue inherinet in your statements. The benefits to the business, from a cost perspective, are many, no need for tokens unless you are doing 2-factor auth, which I encourage as it will check your personal PIN against your AD [ more ] [ reply ] [ MDKSA-2006:099 ] - Updated freetype2 packages fixes multiple vulnerabilities. 2006-06-12 security mandriva com rPSA-2006-0100-1 freetype 2006-06-12 Justin M. Forbes (jmforbes rpath com) rPath Security Advisory: 2006-0100-1 Published: 2006-06-12 Products: rPath Linux 1 Rating: Major Exposure Level Classification: User Non-deterministic Weakness Updated Versions: freetype=/conary.rpath.com@rpl:devel//1/2.1.10-2.2-1 References: http://www.cve.mitre.org/cgi-bin/cvename.cgi [ more ] [ reply ] [ GLSA 200606-14 ] GDM: Privilege escalation 2006-06-12 Sune Kloppenborg Jeppesen (jaervosz gentoo org) |
|
Privacy Statement |
>Exploit: http://www.example.com/showtopic.php?threadid=1&pagenum=[SQL]
The same program and parameter were already reported to Bugtraq by Qex
on April 19 for version 3 beta 2.84 (CVE-2006-1926).
- Steve
[ more ] [ reply ]