|
Colapse all |
Post message
[ MDKSA-2006:078 ] - Updated mozilla-thunderbird packages fix numerous vulnerabilities 2006-04-25 security mandriva com [ MDKSA-2006:077 ] - Updated ethereal packages fix numerous vulnerabilities 2006-04-25 security mandriva com [ MDKSA-2006:076 ] - Updated mozilla packages fix numerous vulnerabilities 2006-04-25 security mandriva com Recent Oracle exploit is _actually_ an 0day with no patch 2006-04-26 David Litchfield (davidl ngssoftware com) The recent Oracle exploit posted to Bugtraq (http://www.securityfocus.com/archive/1/431353) is actually an 0day and has no patch. The patch for 10g Release 2 for April 2006 Critical Patch Update does _not_ contain a fix for the specific flaw that the exploit takes advantage of. As it happens - this [ more ] [ reply ] DCForumLite V 3.0<--XSS/SQL Injection 2006-04-25 Breeeeh hotmail com >>>>>>>-------------------------------<<<<<<< foud by Breeeeh :::..alshmokh team..:: Site: http://www.alshmokh.com >>>>>>>-------------------------------<<<<<<< ----example: http://www.target.com/dcforum/dcboard.cgi?az=[XSS] http://www.target.com/dcforum/dcboard.cgi?az=[SQL] ----Search: Powered [ more ] [ reply ] Multiple browsers Windows mailto protocol Office 2003 file attachment exploit 2006-04-24 inge henriksen booleansoft com ** Inge Henriksen Security Advisory http://ingehenriksen.blogspot.com/ ** Advisory Name: Multiple browsers Windows mailto protocol Office 2003 file attachment exploit Release Date: Not released Tested and Confirmed Vulerable: Micrsoft Outlook 2003 SP 1 Microsoft Internet Explorer 6 SP2 Mozilla F [ more ] [ reply ] Multiple vulnerabilities in IP3 Networks 'NetAccess' NA75 appliance 2006-04-24 Moonen, Ralph (Moonen Ralph kpmg nl) -------------------- Multiple vulnerabilities have been identified in IP3 Networks 'NetAccess' NA75 appliance. -------------------- KPMG recommends that owners of a NetAccess NA75 take steps to ensure the security of the device, and that IP3 Networks is contacted to acquire the new firmware that [ more ] [ reply ] RE: [Full-disclosure] Microsoft DNS resolver: deliberately sabotagedhosts-file lookup 2006-04-24 Sean Scott (sscott positivenetworks net) Having been a victim of this issue I can attest to this reported behaviour. Your failure to reproduce the issue is due to using different testing methods. Although you are following his reported testing method, it is important to note that his "do a dns lookup" does not mean to "perform an nslooku [ more ] [ reply ] PowerPoint Phishing Trojan 2006-04-22 Lance James (bugtraq securescience net) Hi all, Just an FYI, there is a neat little PowerPoint Trojan that we received from a helpful source yesterday. It appears to be exploiting this vuln: http://www.microsoft.com/technet/security/Bulletin/MS06-012.mspx I extracted the PE file(s) out of the ppt and got only 3 recognizing the file as [ more ] [ reply ] Fenice - Open Media Streaming Server remote BOF exploit 2006-04-25 Kaveh Razavi (c0d3r ihsteam com) the attched source code contains the exploit for the recent vulnerability reported in Fenice - Open Media Streaming Server by Luigi Auriemma. the vulnerability is still remained unpatched. so the software users should shutdown their software till a patch is released by vender. Regards c0d3r of IHS [ more ] [ reply ] [SECURITY] [DSA 1042-1] New Cyrus SASL packages fix denial of service 2006-04-25 joey infodrom org (Martin Schulze) Invision Vulnerabilities, including remote code execution 2006-04-25 spam we11er co uk Several Invision Flaws (2.1.5 and possibly earlier) --------------------------------------------------- IceShaman & Wells HackThisSite.org 1) Code execution sources/action_public/search.php line 1261 $this->output = preg_replace( "#(value=[\"']{$this->ipsclass->input['lastdate']}[\"'])#i", "\\1 [ more ] [ reply ] NASL 'Split' function Buffer overflow Vulnerability 2006-04-25 OS2A BTO (os2a bto gmail com) (1 replies) Hi, We have discovered a vulnerability in libnasl of Nessus which can cause Denial of Service. We have attached the advisory which details the vulnerability and also has the fix. A patch for libnasl 2.2.4 is included. Thanks, OS2A Team. NASL Split() function Buffer Overflow Vulnerability OS2A [ more ] [ reply ] Re: NASL 'Split' function Buffer overflow Vulnerability 2006-04-25 Renaud Deraison (deraison nessus org) (1 replies) Re: NASL 'Split' function Buffer overflow Vulnerability 2006-04-25 Renaud Deraison (deraison nessus org) [SECURITY] [DSA 1041-1] New abc2ps packages fix arbitrary code execution 2006-04-25 joey infodrom org (Martin Schulze) PhpWebFtp Cross Site Scripting Vulnerability 2006-04-25 arko dhar gmail com Summary =============================================== phpWebFTP enables connections to FTP servers, even behind a firewall not allowing traffic. phpWebFTP bypasses the firewall by making a FTP connection from your webserver to the FTP server and transfering the files to your webclient over the htt [ more ] [ reply ] [ MDKSA-2006:075 ] - Updated mozilla-firefox packages fix numerous vulnerabilities 2006-04-25 security mandriva com NextAge Shopping Cart Software XSS 2006-04-25 AminRayden yahoo com NextAge Shopping Cart Software XSS ------------------------------------------------------- Aria-security.com advisory Bug Discovered by R@1D3N (amin emami) AminRayden (at) yahoo (dot) com [email concealed] Date:25/04/2005 original advisory:http://www.aria-security.net/advisory/nextage/nextageshoppingca rt.txt ------------------- [ more ] [ reply ] photokorn 1.53 , 1.542 << Sql 2006-04-25 Dr-Jr7 hotmail com photokorn 1.53 , 1.542 << Sql example : http://www.[Site].com/[Path]/index.php?action=showgal&cat=[Sql] http://www.[Site].com/[Path]/index.php?action=showpic&cat=1&pic=[Sql] http://www.[Site].com/[Path]/postcard.php?action=view&id=[Sql] http://www.[Site].com/[Path]/index.php?action=showgal&cat=5&p [ more ] [ reply ] [ MDKSA-2006:073 ] - Updated cyrus-sasl packages addresses vulnerability 2006-04-24 security mandriva com [ MDKSA-2006:074 ] - Updated php packages address multiple vulnerabilities. 2006-04-24 security mandriva com |
|
Privacy Statement |
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDKSA-2006:078
http://www.mandriva.com/security/
____________________________________________________________________
[ more ] [ reply ]