BugTraq Mode:
(Page 1139 of 1748)  < Prev  1134 1135 1136 1137 1138 1139 1140 1141 1142 1143 1144  Next >
VSR Advisory: PDF Tools AG - PDF Form Filling and Flattening Tool Buffer Overflow 2006-05-24
advisories vsecurity com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Virtual Security Research, LLC.
http://www.vsecurity.com/
Security Advisory

- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
-=-=-

Advisory Name: PDF Form Filling and Flat

[ more ]  [ reply ]
[ MDKSA-2006:091 ] - Updated php packages fix vulnerabilities 2006-05-24
security mandriva com

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDKSA-2006:091
http://www.mandriva.com/security/
____________________________________________________________________

[ more ]  [ reply ]
[ MDKSA-2006:090 ] - Updated shadow-utils packages fix mailbox creation vulnerability 2006-05-24
security mandriva com

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDKSA-2006:090
http://www.mandriva.com/security/
____________________________________________________________________

[ more ]  [ reply ]
[ MDKSA-2006:089 ] - Updated kphone packages fixes permissions issue with .qt/kphonerc 2006-05-24
security mandriva com

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDKSA-2006:089
http://www.mandriva.com/security/
____________________________________________________________________

[ more ]  [ reply ]
[ MDKSA-2006:088 ] - Updated hostapd package to address DoS vulnerability 2006-05-24
security mandriva com

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDKSA-2006:088
http://www.mandriva.com/security/
____________________________________________________________________

[ more ]  [ reply ]
[ MDKSA-2006:087 ] - Updated kernel packages fixes netfilter SNMP NAT memory corruption 2006-05-24
security mandriva com

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDKSA-2006:087
http://www.mandriva.com/security/
____________________________________________________________________

[ more ]  [ reply ]
Cisco Security Advisory: Windows VPN Client Local Privilege Escalation Vulnerability 2006-05-24
Cisco Systems Product Security Incident Response Team (psirt cisco com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Cisco Security Advisory: Windows VPN Client Local Privilege Escalation
Vulnerability

Document ID: 70332

Advisory ID: cisco-sa-20060524-vpnclient

http://www.cisco.com/warp/public/707/cisco-sa-20060524-vpnclient.shtml

Revision 1.0

For Public Release

[ more ]  [ reply ]
[SECURITY] [DSA 1074-1] New mpg123 packages fix arbitrary code execution 2006-05-24
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 1074-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
May 24th, 2006

[ more ]  [ reply ]
OpenCms version 6.0.x Xml Content Demo search engine Cross site scripting 2006-05-22
jaime blasco eazel es
Version: Tested on:

- 6.0.0

- 6.0.2

- 6.0.3

Discovered by: jaime.blasco(at)eazel(dot).es

http://www.eazel.es

Description:

Input passed to the search query in the Xml Content Demo search engine isn't properly sanitised. This can be exploited to conduct cross

[ more ]  [ reply ]
Write-up by Amit Klein: "IE + some popular forward proxy servers = XSS, defacement (browser cache poisoning)" 2006-05-22
Amit Klein (AKsecurity) (aksecurity hotpop com)
IE + some popular forward proxy servers = XSS, defacement
(browser cache poisoning)

Or

"Exploiting the XmlHttpRequest object in IE" part II

Amit Klein, May 2006

Preface
=======

When I published my Exploiting the XmlHttpRequ

[ more ]  [ reply ]
Diesel Joke Site SQL INJECTION 2006-05-22
a_linuxer yahoo com
Diesel Joke Site Suffer from An SQl Injection Vulnerability

http://www.dieselscripts.com/demo/joke/category.php?id='

thanks

[ more ]  [ reply ]
NETGEAR WGR614 v6 ? Wireless DSL router information disclosure vulnerability 2006-05-21
info teamintell com
A vulnerability exists in Netgear WGR614 Cable/DSL Wireless Router.

When configured to backup configuration settings, the device will store various information in cleartext. Accessing this file could allow an attacker to obtain sensitive information which could aid the attacker in compromising th

[ more ]  [ reply ]
Vodafone.de XSS Vulnerability 2006-05-21
try_og hotmail com
There's a little vulnerability in the post section of:

http://www.vodafone.de/business/support_download/77278.html

Sending a malicious code will result a code working on the page that pops up...

https://www.vodafone.de/simlock/servlets/sim?IMEI=[XSS CODE HERE]

example:

https://www.vodafon

[ more ]  [ reply ]
Default Screen Saver Vulnerability in Microsoft Windows 2006-05-21
susam pal gmail com (2 replies)
-- Advisory Name --

Default Screen Saver Vulnerability in Microsoft Windows

-- Author --

Susam Pal

-- Vulnerable Systems --

Windows XP, Windows 2003 Server

-- Vulnerability Description --

This vulnerability has been tested on Windows XP and Windows 2003 Server. The screen saver in these

[ more ]  [ reply ]
Re: Default Screen Saver Vulnerability in Microsoft Windows 2006-05-24
Ansgar -59cobalt- Wiechers (bugtraq planetcobalt net)
Re: Default Screen Saver Vulnerability in Microsoft Windows 2006-05-24
Eliah Kagan (degeneracypressure gmail com)
YLZH(right.php)Cross Site Scripting 2006-05-23
Breeeeh hotmail com
==========================

Discovery By: Breeeeh

Site: www.alshmokh.com

E-mail: Breeeeh (at) hotmail (dot) com [email concealed]

==========================

Example:

/right.php?deptid=[XSS]

[ more ]  [ reply ]
Mambo <= 4.6. RC1 xss 2006-05-23
rgod autistici org
Mambo <= 4.6. RC1 Cross Site Scripting

---------------------------------------

http://[target]/[path_to_mambo]/administrator/popups/index3pop.php?mosCo
nfig_sitename=</title><script>alert(document.cookie)</script>

http://[target]/[path_to_mambo]/mambots/editors/mostlyce/jscripts/tiny_m
ce/popup

[ more ]  [ reply ]
Publicist v0.95 - XSS And Full Path Errors 2006-05-23
luny youfucktard com
Publicist v0.95

Homepage:

http://publicist.kau.se/

Description:

Publicist is a free web server software, created for web papers, that allows groups of people to write and publish together on the web (i.e. schools or single classes, clubs, or other groups who wish to express themselves).

[ more ]  [ reply ]
AlstraSoft Web Host Directory v1.2 2006-05-23
luny youfucktard com
AlstraSoft Web Host Directory v1.2

Homepage:

http://www.alstrasoft.com/

((It should be noted too that the demo for this script is on a different domain which also sells a WebHost Directory which looks to be the same product/company called HyperStop WebHost Directory 1.2. Both scripts seem to

[ more ]  [ reply ]
Buffer-overflow in the WebTool service of PunkBuster for servers (minor than v1.229) 2006-05-23
Luigi Auriemma (aluigi autistici org)

#######################################################################

Luigi Auriemma

Application: PunkBuster
http://www.punkbuster.com
Versions: PunkBuster for servers, versions minor than v1.229:
America's Army <=

[ more ]  [ reply ]
Server termination in netPanzer 0.8 (rev 952) 2006-05-23
Luigi Auriemma (aluigi autistici org)

#######################################################################

Luigi Auriemma

Application: netPanzer
http://www.netpanzer.org
http://netpanzer.berlios.de
Versions: <= 0.8 (rev 952)
Platforms: *nix, *BSD, Windown, Mac and ot

[ more ]  [ reply ]
Re: Destiney Rated Images Script v0.5.0 - XSS Vulnv 2006-05-23
webmaster destiney com


> Effected Files:

You mean affected? `Effected` is not a word.

> addWeblog.php

I pasted the following example XSS code into both form fields, and saw no evidence of XSS vulnerabilities:

<DIV STYLE="background-image: url(javascript:alert('XSS'))">

<DIV STYLE="background-image:\007

[ more ]  [ reply ]
Re: Microsoft Internet Explorer - Crash on mouse button click 2006-05-23
unknown user (mac68k gmail com)
No, does crash on english IE 6.0.2900.2180 (Win XP Pro SP2).

screenshot: http://www.kil13r.info/iebug/screenshot2.jpg

You must click on empty white screen.

2006/5/23, s89df987 s9f87s987f <a059d8e0a9s8d0 (at) hotmail (dot) com [email concealed]>:
> does not crash on IE 6.0.2900.2180(english ver)
>
> On 20 May 2006 13:23:36 -0

[ more ]  [ reply ]
[security bulletin] HPSBMA02098 SSRT5911 rev.1 - HP OpenView Network Node Manager (OV NNM) Remote Unauthorized Privileged Access, Arbitrary Command Execution, Arbitrary File Creation 2006-05-23
security-alert hp com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c00672314

Version: 1

HPSBMA02098 SSRT5911 rev.1 - HP OpenView Network Node Manager (OV NNM)
Remote Unauthorized Privileged Access, Arbitrary Command Execution,
Arbitrary File Creation

NOTICE:

[ more ]  [ reply ]
(Page 1139 of 1748)  < Prev  1134 1135 1136 1137 1138 1139 1140 1141 1142 1143 1144  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus