BugTraq Mode:
(Page 1143 of 1748)  < Prev  1138 1139 1140 1141 1142 1143 1144 1145 1146 1147 1148  Next >
[SECURITY] [DSA 1063-1] New phpgroupware packages fix execution of arbitrary web script code 2006-05-19
Moritz Muehlenhoff (jmm debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 1063-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Moritz Muehlenhoff
May 8th, 2006

[ more ]  [ reply ]
CYBSEC - Security Pre-Advisory: Local Privilege Escalation in SAPsapdba Command 2006-05-19
Leandro Meiners (lmeiners cybsec com)
(The following advisory is also available in PDF format for download at:
http://www.cybsec.com/vuln/CYBSEC_Security_Pre-Advisory_Local_Privilege_
Escalation_in_SAP_sapdba_Command.pdf )

CYBSEC S.A.
www.cybsec.com

Pre-Advisory Name: Local Privilege Escalation in SAP sapdba Command

Vulnerability Clas

[ more ]  [ reply ]
Jemscripts Download Control v1.0 2006-05-19
luny youfucktard com
Jemscripts Download Control v1.0

Homepage:

http://www.jemscripts.co.uk

Description:

DownloadControl provides a complete download file management system that is easy to set-up and maintain and yet gives you powerful features for controlling and monitoring your site download files. You will

[ more ]  [ reply ]
[SECURITY] [DSA 1060-1] New kernel-patch-vserver packages fix privilege escalation 2006-05-19
Moritz Muehlenhoff (jmm debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 1060-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Moritz Muehlenhoff
May 19th, 2006

[ more ]  [ reply ]
Yourfreeworld.com Short Url & Url Tracker Script 2006-05-19
luny youfucktard com
((This is the second script I've tested from these people. It will be assumed for right now that all of their scripts contain full path disclosure errors as well as XSS'ing))

Yourfreeworld.com Short Url & Url Tracker Script

Homepage:

http://www.yourfreeworld.com/script/shorturl.asp

Shor

[ more ]  [ reply ]
[SECURITY] [DSA 1062-1] New kphone packages fix information disclosure 2006-05-19
Moritz Muehlenhoff (jmm debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 1062-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Moritz Muehlenhoff
May 19th, 2006

[ more ]  [ reply ]
[SECURITY] [DSA 1061-1] New popfile packages fix denial of service 2006-05-19
Moritz Muehlenhoff (jmm debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 1061-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Moritz Muehlenhoff
May 19th, 2006

[ more ]  [ reply ]
Yourfreeworld Styleish Text Ads Script 2006-05-19
luny youfucktard com
Homepage of script

http://www.yourfreeworld.com/script/textads.asp

Stylish Text Ads Script can be one of the most useful tools for any webmaster.

If you own 1 or more websites and want to sell text ads then this tool can be one of the best tool for you.

Effected files:

tr1.php

advertis

[ more ]  [ reply ]
[SECURITY] [DSA 1059-1] New quagga packages fix several vulnerabilities 2006-05-19
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 1059-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
May 19th, 2006

[ more ]  [ reply ]
[security bulletin] HPSBTU02118 SSRT061145 rev.1 - HP Tru64 UNIX Running Firefox or Mozilla Application Suite, Remote Execution of Arbitrary Code or Denial of Service (DoS) 2006-05-19
security-alert hp com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c00672120
Version: 1

HPSBTU02118 SSRT061145 rev.1 - HP Tru64 UNIX Running Firefox or Mozilla Application Suite, Remote Execution of Arbitrary Code or Denial of Service (DoS)

NOTICE: The informati

[ more ]  [ reply ]
[security bulletin] HPSBUX02117 SSRT2400 rev.1 - HP-UX Running BINDv4 Domain Name Server (DNS) Remote Unauthorized Access, Denial of Service (DoS) 2006-05-19
security-alert hp com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c00668546

Version: 1

HPSBUX02117 SSRT2400 rev.1 - HP-UX Running BINDv4 Domain Name Server (DNS) Remote Unauthorized Access, Denial of Service (DoS)

NOTICE: The information in this Security Bulle

[ more ]  [ reply ]
[security bulletin] HPSBUX02108 SSRT061133 rev.11 - HP-UX Running Sendmail, Remote Execution of Arbitrary Code 2006-05-19
security-alert hp com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c00629555

Version: 11

HPSBUX02108 SSRT061133 rev.11 - HP-UX Running Sendmail,
Remote Execution of Arbitrary Code

NOTICE: The information in this Security Bulletin should be acted
upon as soon as

[ more ]  [ reply ]
Secunia Research: CAM UnZip ZIP File Handling Buffer OverflowVulnerability 2006-05-19
Secunia Research (remove-vuln secunia com)
======================================================================

Secunia Research 19/05/2006

- CAM UnZip ZIP File Handling Buffer Overflow Vulnerability -

======================================================================
Table of Contents

Affected Software...

[ more ]  [ reply ]
Re: Firefox (with IETab Plugin) Null Pointer Dereferences Bug 2006-05-19
Roman Daszczyszak (romandas gmail com)
Using Firefox 1.5.0.3 and IE Tab 1.0.9 on a Windows XP Pro SP2 +
latest patches, I was unable to reproduce this using your PoC
provided.

I created a new tab, pasted the URL you provided into it, hit enter
and received an 'Action Cancelled' page from IE. Neither Firefox nor
IE crashed.

Was there s

[ more ]  [ reply ]
RE: [Full-disclosure] RealVNC 4.1.1 Remote Compromise 2006-05-18
Krpata, Tyler (tkrpata bjs com)
Here's a real quick vulnerability check in Perl...I think someone else
put out another scanner, but there was no source provided and it wasn't
working right for me.

------------------------------------------------------------------------

--------------------
#!/usr/bin/perl

# scan for OpenVNC 4.11

[ more ]  [ reply ]
[ MDKSA-2006:086 ] - Updated kernel packages fix multiple vulnerabilities 2006-05-18
security mandriva com

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDKSA-2006:086
http://www.mandriva.com/security/
____________________________________________________________________

[ more ]  [ reply ]
Re: phpBB "charts.php" XSS and SQL-Injection 2006-05-16
phpbb popmartian com
This is NOT a vulnerability in phpBB. phpBB Chart Mod is an independant Mod for phpBB that allows voting for billboard-like charts (movies, music, etc.) which is available from phpbbhacks.com.

phpBB Chart Mod is not maintained or endorsed by phpBB.

[ more ]  [ reply ]
Sun single-CPU DOS 2006-05-17
Doug Hughes (doug eng auburn edu)


single CPU Sun microsystems system running solaris7, 8, or 9
(haven't tested on 10). E.g. netra.

if you telnet to a local router, disable nagle (on purpose
or by accident or whatever - if nagle is turned off), and then
ping another device with interpacket delay of 0 and a count
of somewhere above

[ more ]  [ reply ]
Code Injection via Hidden Form Field Manipulation 2006-05-17
mtoren alertpool com


Code Injection via Hidden Form Field Manipulation

Date: 5/17/2006

Author: Monte Toren

mtoren (at) AlertPool (dot) com [email concealed]

http://www.AlertPool.com (Security Alert Aggregator)

* Systems Affected:

Potentially any website that passes user supplied data via a hidden form field element.

* Overview:

[ more ]  [ reply ]
Re: PHPBB 2.0.20 persistent issues with avatars 2006-05-16
s89df987 s9f87s987f (a059d8e0a9s8d0 hotmail com)
On 5/13/06, Paul Laudanski <zx (at) castlecops (dot) com [email concealed]> wrote:
>I'd sure love to see the POC on this one. PHP by default needs exif to be
>enabled during installation in order to work with the image meta data. So
>in theory not enabling exif should cause this to be benign.

you misunderstanding the usage

[ more ]  [ reply ]
Myspace Friend Train v2.8 2006-05-18
luny youfucktard com
Myspace Friend Train v2.8

Full path disclosure & possible SQL injection.

<BR><BR>

Its possible to put ' in the input myspace ID box to get the error. Example of the

error is below:

<BR><BR>

<b>Invalid query: You have an error in your SQL syntax; check the manual that

corresponds to your MyS

[ more ]  [ reply ]
Re: MediaSlash Gallery 'rub' variable Remote File inlcusion Vulnerability 2006-05-16
gyzmo77 yahoo fr
This error has been corrected and all website are patched.

Thanks this information been public.

[ more ]  [ reply ]
Re:POC exploit for freeFTPd 1.0.10 2006-05-17
Tauqeer Ahmad (ahmadtauqeer yahoo com)

To exploit this issue, FTP SSL option "use FTP+SSL"
option must be checked.SFTP service must be running.

__________________________________________________
Do You Yahoo!?
Tired of spam? Yahoo! Mail has the best spam protection around
http://mail.yahoo.com

[ more ]  [ reply ]
Re: Checkpoint SYN DoS Vulnerability 2006-05-17
sanjay naik (sanjaynaik hotmail com)

Hi Chris,

This is almost similar to what I notice with the scans. The URL you provided
is similar except for a few differences. The scans are being done from the
inside interface to the outside from the firewall. The scan is a complete
TCP Connect scan.

However, what you have pointed out is re

[ more ]  [ reply ]
RE: Checkpoint SYN DoS Vulnerability 2006-05-17
Sterling, Chuck (csterlin smtp3 wstf nasa gov)
Would the firewall behavior in attempting the three-packet handshake be
dependent on a large number of connection attempts in a relatively short
period of time, or should a slow scan, say nmap with -T set at 2, also
trigger its returning the SYN/ACK on behalf of the target?

Reason for question:
In

[ more ]  [ reply ]
Re: Re: Checkpoint SYN DoS Vulnerability 2006-05-17
jrh57 maine rr com
Chris,

You may be correct that SYN flood protection is somehow being triggered, although Sanjay says he has SYNdefender disabled.

However, it should be possible to configure the FW to allow scanning through without triggering this behavior. We have done it a few times with ours and (while

[ more ]  [ reply ]
(Page 1143 of 1748)  < Prev  1138 1139 1140 1141 1142 1143 1144 1145 1146 1147 1148  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus