BugTraq Mode:
(Page 1150 of 1748)  < Prev  1145 1146 1147 1148 1149 1150 1151 1152 1153 1154 1155  Next >
[ GLSA 200605-11 ] Ruby: Denial of Service 2006-05-10
Sune Kloppenborg Jeppesen (jaervosz gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200605-11
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -

[ more ]  [ reply ]
[ GLSA 200605-10 ] pdnsd: Denial of Service and potential arbitrary code execution 2006-05-10
Sune Kloppenborg Jeppesen (jaervosz gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200605-10
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -

[ more ]  [ reply ]
[ MDKSA-2006:083 ] - Updated gdm package fixes symlink attack vulnerability 2006-05-10
security mandriva com

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDKSA-2006:083
http://www.mandriva.com/security/
____________________________________________________________________

[ more ]  [ reply ]
# MHG Security Team --- OzzyWork Gallery Upload Vulnerabilities 2006-05-09
Dj_ReMix_20 hotmail com
# Milli-Harekat Advisory ( www.milli-harekat.org )

# OzzyWork Gallery Upload Vulnerabilities

# Risk : High

# Class: Remote

# Script : OzzyWork Gallery All Version

# Credits : Dj ReMix

# Thanks : ßy Korsan , ESKOBAR , Poizonb0x , TR_IP

OzzyWork Gallery pictures upload page :

[ more ]  [ reply ]
Re: Phil's Bookmark script admin By-pass 2006-05-09
Steven M. Christey (coley mitre org)

>google dork : "Phil's Bookmark"

This doesn't return anything except copies of the original Bugtraq
post and a reference to a person's web site.

Searching for "Phil's Bookmarks" found a lot of sites by people named
Phil who listed their favorite bookmarks.

Is there an actual product here? Or wa

[ more ]  [ reply ]
[Reversemode] Microsoft Infotech Storage library Heap Corruption 2006-05-09
Reversemode (advisories reversemode com)
Microsoft Infotech Storage System Library (itss.dll) is prone to a heap
corruption vulnerability. This issue is due to the failure of the
library to properly check a specially crafted CHM file.
The successful exploitation of this flaw would allow to execute
arbitrary code.

Itss.dll is the system li

[ more ]  [ reply ]
ZDI-06-013: 3Com TippingPoint SMS Server Information Disclosure Vulnerability 2006-05-09
zdi-disclosures 3com com
ZDI-06-013: 3Com TippingPoint SMS Server Information Disclosure
Vulnerability
http://www.zerodayinitiative.com/advisories/ZDI-06-013.html
May 9, 2006

-- CVE ID:
CVE-2006-0993

-- Affected Vendor:
3Com TippingPoint

-- Affected Products:
TippingPoint SMS Server

-- Vulnerability Details:
This vuln

[ more ]  [ reply ]
[SECURITY] [DSA 1054-1] New TIFF packages fix denial of service and arbitrary code execution 2006-05-09
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 1054-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
May 9th, 2006

[ more ]  [ reply ]
[EEYEB20051011A] - Microsoft Distributed Transaction Coordinator Heap Overflow 2006-05-09
eEye Advisories (Advisories eeye com)
Microsoft Distributed Transaction Coordinator Heap Overflow
http://www.eeye.com/html/research/advisories/AD20060509a.html

Release Date:
May 9, 2006

Date Reported:
October 11, 2005

Patch Development Time (In Days):
210

Severity:
High (Remote Code Execution)

Systems Affected:
Windows NT 4.0
Wi

[ more ]  [ reply ]
IGNORING SSH CONNECTION USES ARP CACHE POISSONING 2006-05-09
king_purba yahoo co uk (1 replies)
Author : Ph03n1X

Email : king_purba (at) yahoo.co (dot) uk [email concealed]

Site : http://kandangjamur.net/

Severity : Moderate

IGNORING SSH CONNECTION USES ARP CACHE POISSONING

We know that tcp connection will close by sending RST flag.

I try to connect to my openssh server on

slackware 10 from my computer fedora

[ more ]  [ reply ]
Re: IGNORING SSH CONNECTION USES ARP CACHE POISSONING 2006-05-09
Thierry Zoller (Thierry Zoller lu)
[EEYEB20051011B] - Microsoft Distributed Transaction Coordinator Denial of Service 2006-05-09
eEye Advisories (Advisories eeye com)
Microsoft Distributed Transaction Coordinator Denial of Service
http://www.eeye.com/html/research/advisories/AD20060509b.html

Release Date:
May 9, 2006

Date Reported:
October 11, 2005

Patch Development Time (In Days):
210

Severity:
Low (Denial of Service)

Systems Affected:
Windows NT 4.0
Win

[ more ]  [ reply ]
# MHG Security Team --- DuGallery V2.x SQL Injection 2006-05-09
Dj_ReMix_20 hotmail com
# Milli-Harekat Advisory ( www.milli-harekat.org )

# DUGaleri Admin SQL Injection

# Risk : High

# Script : DUGallery v2.x

# Credits : Dj ReMix

# Thanks : ßy Korsan , ESKOBAR , Poizonb0x , TR_IP , SariKamis

DuGallery Admin Page's www.victim.com/[DuGallery Path ]/admin_default.asp

[ more ]  [ reply ]
IBM Websphere Application Server Multiple Vulnerabilities 2006-05-09
SnoBmsn hotmail de
Impact: Unknown

Security Bypass

Exposure of sensitive information

Where: From remote

Solution Status: Vendor Patch

Description:

Some vulnerabilities have been reported in IBM WebSphere Application Server, where some have unknown impacts and others may disclose sensitive information or

[ more ]  [ reply ]
plaNetStat Admin ByPass 2006-05-09
alp_eren ayyildiz org
software version

===========

http://www.planetc.de

plaNetStat Version 27.01.2005

description

=============

planetstat admin bypass see the web sites log files and to do log settings.

google dork: "plaNetStat"

example;

www.site.com/planetstat or [path]/admin.php

www.site.com/planets

[ more ]  [ reply ]
ICQ Client Cross-Application Scripting (XAS) 2006-05-09
3APA3A (3APA3A SECURITY NNOV RU)


QQLan QQlan (at) yandex (dot) ru [email concealed] reported vulnerability in multiple versions of ICQ
Inc.' ICQ instant messenger client in a way it interacts with Microsoft
Internet Explorer.

Author: QQlan <QQlan (at) yandex (dot) ru [email concealed]>
Title: ICQ Client Cross-Application Scripting (XAS)
Vendor:

[ more ]  [ reply ]
# MHG Security Team --- OzzyWork Gallery SQL Injection 2006-05-09
Dj_ReMix_20 hotmail com
# Milli-Harekat Advisory ( www.milli-harekat.org )

# OzzyWork Galeri Admin SQL Injection

# Risk : High

# Script : OzzyWork Gallery All Version

# Credits : Dj ReMix

# Thanks : ßy Korsan , ESKOBAR , Poizonb0x , TR_IP

OzzyWork Gallery Admin Page's www.victim.com/[Ozzywork Path ]/ad

[ more ]  [ reply ]
[SECURITY] [DSA 1053-1] New Mozilla packages fix arbitrary code execution 2006-05-09
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 1053-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
May 9th, 2006

[ more ]  [ reply ]
Secunia Research: Where Is It unacev2.dll Buffer OverflowVulnerability 2006-05-09
Secunia Research (remove-vuln secunia com)
======================================================================

Secunia Research 09/05/2006

- Where Is It unacev2.dll Buffer Overflow Vulnerability -

======================================================================
Table of Contents

Affected Software......

[ more ]  [ reply ]
tseekdir.cgi<--Local File Include 2006-05-09
BoNy-m hotmail com
----------------------------------

foud by: BoNy-m

Site: http://www.alshmokh.com

E-mail: BoNy-m (at) hotmail (dot) com [email concealed]

----------------------------------

Search:

allinurl:tseekdir.cgi

example:

/tseekdir.cgi?location=/etc/passwd%00

/tseekdir.cgi?id=1055&location=/etc/passwd%00

/tseekdir.cgi?loca

[ more ]  [ reply ]
Re: ISA Server 2004 Log Manipulation 2006-05-09
Steven M. Christey (coley mitre org)

>You can insert the 'tab' value and possibly break 3rd party log
>analyzers.

OK, this makes sense - if ISA supports tab-separated format, then tab
is a special character within such a log file, and attackers should be
prevented from injecting it (by filtering, quoting, whatever...)

>Other interes

[ more ]  [ reply ]
Two independent vulnerabilities (client and server side) in Quake3 engine and many derived games 2006-05-08
Thilo Schulz (arny ats s bawue de)
Hello,

Quake 3 is a popular online first person shooter developed by IDsoftware [1]
that has been released in 1999 and is still widely played.
Additionally, a lot of vendors have licensed the Quake3 engine for their
games.
A few noteworthy examples include:

- The "Medal of Honour: Allied Assaul

[ more ]  [ reply ]
SYMSA-2006-003: Cisco Secure ACS for Windows - Administrator Password Disclosure 2006-05-08
research symantec com (1 replies)
-----BEGIN PGP SIGNED MESSAGE-----

Hash: SHA1

Symantec Vulnerability Research

https://www.symantec.com/research

Security Advisory

Advisory ID : SYMSA-2006-003

Advisory Title: Cisco

[ more ]  [ reply ]
[MajorSecurity] phpListPro <= 2.01 - Multiple Remote File Include Vulnerability 2006-05-08
admin majorsecurity de
[MajorSecurity] phpListPro <= 2.01 - Multiple Remote File Include Vulnerability

--------------------------------------------------------

Software: phpListPro

Version: <=2.01

Type: Multiple Remote File Include Vulnerability

Date: May, 8th 2006

Vendor: SmartISoft

Page: http://smartisoft.com

[ more ]  [ reply ]
Unfiltered Header Injection in Apache 1.3.34/2.0.57/2.2.1 2006-05-08
Zaninotti, Thiago (thiago nstalker com)
Folks,

During some specific tests with our upcoming Web App Security Scanner tool,
we have found that Apache would kindly accept HTML injection through
"Expect" header. Originally meant to be a protocol flow control that would
give web client the capacity of sending the HTTP headers for server's

[ more ]  [ reply ]
VSR Advisory: WebSense content filter bypass when deployed in conjunction with Cisco filtering devices 2006-05-08
Matthew Cerha (mcerha cisco com)
Cisco Response
==============

This is Cisco PSIRT's response to the statements made by George Gal
in his advisory: WebSense Content Filter Bypass in conjunction with
Cisco PIX in packet filter mode, posted on May 08, 2006.

The original email/advisory is available at
http://www.vsecurity.com/bullet

[ more ]  [ reply ]
PHPFusion <= v6.00.306 avatar mod_mime arbitrary file upload & local inclusion vulnerabilities 2006-05-08
rgod autistici org
#!/usr/bin/php -q -d short_open_tag=on

<?

echo "PHPFusion <= v6.00.306 avatar mod_mime arbitrary file upload &\r\n";

echo "local inclusion vulnerabilities\r\n";

echo "by rgod rgod (at) autistici (dot) org [email concealed]\r\n";

echo "site: http://retrogod.altervista.org\r\n\r\n";

if ($argc<6) {

echo "Usage: php ".$arg

[ more ]  [ reply ]
ZDI-06-012: Sophos Anti-Virus CAB Unpacking Code Execution Vulnerability 2006-05-08
zdi-disclosures 3Com com
ZDI-06-012: Sophos Anti-Virus CAB Unpacking Code Execution Vulnerability
http://www.zerodayinitiative.com/advisories/ZDI-06-013.html
May 8, 2006

-- CVE ID:
CVE-2006-0994

-- Affected Vendor:
Sophos Plc.

-- Affected Products:
Sophos Anti-Virus for Windows, Mac OS, Unix, Linux, NetWare, OS/2, OpenV

[ more ]  [ reply ]
(Page 1150 of 1748)  < Prev  1145 1146 1147 1148 1149 1150 1151 1152 1153 1154 1155  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus