BugTraq Mode:
(Page 1158 of 1748)  < Prev  1153 1154 1155 1156 1157 1158 1159 1160 1161 1162 1163  Next >
[ MDKSA-2006:078 ] - Updated mozilla-thunderbird packages fix numerous vulnerabilities 2006-04-25
security mandriva com

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDKSA-2006:078
http://www.mandriva.com/security/
____________________________________________________________________

[ more ]  [ reply ]
[ MDKSA-2006:077 ] - Updated ethereal packages fix numerous vulnerabilities 2006-04-25
security mandriva com

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDKSA-2006:077
http://www.mandriva.com/security/
____________________________________________________________________

[ more ]  [ reply ]
[ MDKSA-2006:076 ] - Updated mozilla packages fix numerous vulnerabilities 2006-04-25
security mandriva com

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDKSA-2006:076
http://www.mandriva.com/security/
____________________________________________________________________

[ more ]  [ reply ]
Recent Oracle exploit is _actually_ an 0day with no patch 2006-04-26
David Litchfield (davidl ngssoftware com)

The recent Oracle exploit posted to Bugtraq
(http://www.securityfocus.com/archive/1/431353) is actually an 0day and has
no patch. The patch for 10g Release 2 for April 2006 Critical Patch Update
does _not_ contain a fix for the specific flaw that the exploit takes
advantage of. As it happens - this

[ more ]  [ reply ]
Instant Photo Gallery <= Multiple XSS 2006-04-25
qex bsdmail org
====================
Discovered by: Qex
Date: 25 April 2006
====================

/portfolio.php?cat_id=[XSS]
/portfolio_photo_popup.php?id=[XSS]

[ more ]  [ reply ]
Instant Photo Gallery <= Multiple XSS 2006-04-25
qex bsdmail org
====================
Discovered by: Qex
Date: 25 April 2006
====================

/member.php?action=viewpro&member=[XSS]

[ more ]  [ reply ]
DCForumLite V 3.0<--XSS/SQL Injection 2006-04-25
Breeeeh hotmail com
>>>>>>>-------------------------------<<<<<<<

foud by Breeeeh
:::..alshmokh team..::
Site: http://www.alshmokh.com

>>>>>>>-------------------------------<<<<<<<

----example:
http://www.target.com/dcforum/dcboard.cgi?az=[XSS]

http://www.target.com/dcforum/dcboard.cgi?az=[SQL]

----Search:
Powered

[ more ]  [ reply ]
Multiple browsers Windows mailto protocol Office 2003 file attachment exploit 2006-04-24
inge henriksen booleansoft com
** Inge Henriksen Security Advisory http://ingehenriksen.blogspot.com/ **

Advisory Name: Multiple browsers Windows mailto protocol Office 2003 file attachment exploit

Release Date: Not released

Tested and Confirmed Vulerable:
Micrsoft Outlook 2003 SP 1
Microsoft Internet Explorer 6 SP2
Mozilla F

[ more ]  [ reply ]
Re: Advisory: Clansys <= 1.1 PHP Code Insertion Vulnerability. 2006-04-24
nukedx nukedx com
Hi
Dork must be "ClanSys v.1.1"
Sorry for typo.
Regards,
Mustafa Can Bjorn IPEKCI a.k.a nukedx

[ more ]  [ reply ]
Multiple vulnerabilities in IP3 Networks 'NetAccess' NA75 appliance 2006-04-24
Moonen, Ralph (Moonen Ralph kpmg nl)
--------------------
Multiple vulnerabilities have been identified in IP3 Networks
'NetAccess' NA75 appliance.
--------------------

KPMG recommends that owners of a NetAccess NA75 take steps to ensure the
security of the
device, and that IP3 Networks is contacted to acquire the new firmware
that

[ more ]  [ reply ]
RE: [Full-disclosure] Microsoft DNS resolver: deliberately sabotagedhosts-file lookup 2006-04-24
Sean Scott (sscott positivenetworks net)
Having been a victim of this issue I can attest to this reported
behaviour. Your failure to reproduce the issue is due to using
different testing methods. Although you are following his reported
testing method, it is important to note that his "do a dns lookup" does
not mean to "perform an nslooku

[ more ]  [ reply ]
PowerPoint Phishing Trojan 2006-04-22
Lance James (bugtraq securescience net)
Hi all,

Just an FYI, there is a neat little PowerPoint Trojan that we received
from a helpful source yesterday. It appears to be exploiting this vuln:

http://www.microsoft.com/technet/security/Bulletin/MS06-012.mspx

I extracted the PE file(s) out of the ppt and got only 3 recognizing the
file as

[ more ]  [ reply ]
Fenice - Open Media Streaming Server remote BOF exploit 2006-04-25
Kaveh Razavi (c0d3r ihsteam com)

the attched source code contains the exploit for the recent
vulnerability reported in Fenice - Open Media Streaming Server by Luigi
Auriemma. the vulnerability is still remained unpatched.
so the software users should shutdown their software till a patch is
released by vender.

Regards
c0d3r of IHS

[ more ]  [ reply ]
[SECURITY] [DSA 1042-1] New Cyrus SASL packages fix denial of service 2006-04-25
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 1042-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
April 25th, 2006

[ more ]  [ reply ]
Invision Vulnerabilities, including remote code execution 2006-04-25
spam we11er co uk
Several Invision Flaws (2.1.5 and possibly earlier)
---------------------------------------------------
IceShaman & Wells
HackThisSite.org

1) Code execution

sources/action_public/search.php line 1261
$this->output = preg_replace( "#(value=[\"']{$this->ipsclass->input['lastdate']}[\"'])#i", "\\1

[ more ]  [ reply ]
NASL 'Split' function Buffer overflow Vulnerability 2006-04-25
OS2A BTO (os2a bto gmail com) (1 replies)
Hi,

We have discovered a vulnerability in libnasl of Nessus which can
cause Denial of
Service. We have attached the advisory which details the vulnerability and
also has the fix. A patch for libnasl 2.2.4 is included.

Thanks,
OS2A Team.
NASL Split() function Buffer Overflow Vulnerability

OS2A

[ more ]  [ reply ]
Re: NASL 'Split' function Buffer overflow Vulnerability 2006-04-25
Renaud Deraison (deraison nessus org) (1 replies)
Re: NASL 'Split' function Buffer overflow Vulnerability 2006-04-25
Renaud Deraison (deraison nessus org)
[SECURITY] [DSA 1041-1] New abc2ps packages fix arbitrary code execution 2006-04-25
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 1041-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
April 25th, 2006

[ more ]  [ reply ]
PhpWebFtp Cross Site Scripting Vulnerability 2006-04-25
arko dhar gmail com
Summary
===============================================
phpWebFTP enables connections to FTP servers, even behind a firewall not allowing traffic. phpWebFTP bypasses the firewall by making a FTP connection from your webserver to the FTP server and transfering the files to your webclient over the htt

[ more ]  [ reply ]
[ MDKSA-2006:075 ] - Updated mozilla-firefox packages fix numerous vulnerabilities 2006-04-25
security mandriva com

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDKSA-2006:075
http://www.mandriva.com/security/
____________________________________________________________________

[ more ]  [ reply ]
NextAge Shopping Cart Software XSS 2006-04-25
AminRayden yahoo com
NextAge Shopping Cart Software XSS
-------------------------------------------------------
Aria-security.com advisory
Bug Discovered by R@1D3N (amin emami)
AminRayden (at) yahoo (dot) com [email concealed]
Date:25/04/2005
original advisory:http://www.aria-security.net/advisory/nextage/nextageshoppingca
rt.txt
-------------------

[ more ]  [ reply ]
photokorn 1.53 , 1.542 << Sql 2006-04-25
Dr-Jr7 hotmail com
photokorn 1.53 , 1.542 << Sql

example :

http://www.[Site].com/[Path]/index.php?action=showgal&cat=[Sql]
http://www.[Site].com/[Path]/index.php?action=showpic&cat=1&pic=[Sql]
http://www.[Site].com/[Path]/postcard.php?action=view&id=[Sql]
http://www.[Site].com/[Path]/index.php?action=showgal&cat=5&p

[ more ]  [ reply ]
[ MDKSA-2006:073 ] - Updated cyrus-sasl packages addresses vulnerability 2006-04-24
security mandriva com

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDKSA-2006:073
http://www.mandriva.com/security/
____________________________________________________________________

[ more ]  [ reply ]
[ MDKSA-2006:074 ] - Updated php packages address multiple vulnerabilities. 2006-04-24
security mandriva com

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDKSA-2006:074
http://www.mandriva.com/security/
____________________________________________________________________

[ more ]  [ reply ]
(Page 1158 of 1748)  < Prev  1153 1154 1155 1156 1157 1158 1159 1160 1161 1162 1163  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus