BugTraq Mode:
(Page 1160 of 1748)  < Prev  1155 1156 1157 1158 1159 1160 1161 1162 1163 1164 1165  Next >
NSFOCUS SA2006-03 : IBM AIX rm_mlcache_file Local Race Condition Vulnerability 2006-04-24
NSFOCUS Security Team (security nsfocus com)
NSFOCUS Security Advisory (SA2006-03)

IBM AIX rm_mlcache_file Local Race Condition Vulnerability

Release Date: 2006-04-24

CVE ID: CVE-2006-1247

http://www.nsfocus.com/english/homepage/research/0603.htm

Affected systems & software
===================
IBM AIX 5.1
IBM AIX 5.2
IBM AIX 5.3

Unaffec

[ more ]  [ reply ]
[USN-272-1] cyrus-sasl2 vulnerability 2006-04-24
Martin Pitt (martin pitt canonical com)
===========================================================
Ubuntu Security Notice USN-272-1 April 24, 2006
cyrus-sasl2 vulnerability
CVE-2006-1721
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 4.10 (Warty Warthog)
U

[ more ]  [ reply ]
MSIE (mshtml.dll) OBJECT tag vulnerability 2006-04-22
Michal Zalewski (lcamtuf dione ids pl)
Perhaps not surprisingly, there appears to be a vulnerability in how
Microsoft Internet Explorer handles (or fails to handle) certain
combinations of nested OBJECT tags. This was tested with MSIE
6.0.2900.2180.xpsp.040806-1825 and mshtml.dll 6.00.2900.2873
xpsp_sp2_gdr.060322-1613.

At first sight,

[ more ]  [ reply ]
Yahoo! Mail XSS Vulnerability 2006-04-21
Cheng Peng Su (applesoup gmail com)
Adivisory Name : Yahoo! Mail XSS Vulnerability
Release Date : 2006.04.21
Application : Yahoo! web-based email service
Test On : Microsoft IE 6.0
Discover : Cheng Peng Su(applesoup_at_gmail.com)

Description:

Yahoo! Mail is one of the Internet's most popular web based email solutions.

Details:

Thi

[ more ]  [ reply ]
FlexBB 0.5.5 Exploit [ function/showprofile.php ] Remote SQL Injection 2006-04-21
o y 6 hotmail com
#!/usr/bin/perl
use IO::Socket;
#FlexBB Exploit [ function/showprofile.php ] Remote SQL Injection
#
# 1- First Do Login
# 2- View This Link :D
#
# index.php?page=showprofile&id=-1' UNION ALL SELECT%201,username,3,4,5,6,7,8,9,0,1,2,3,password,5,6,7,8,9,0,1,2,3,4,3
,4,5,7,8 FROM fl

[ more ]  [ reply ]
Re: Strengthen OpenSSH security? 2006-04-21
Bob Goodman (goodman mac hush com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Off topic, but anyway -- you could firewall those smart guys out,
since they have to make more connections in less time then any sane
legit
user would. Something like
http://www.bgnett.no/~peter/pf/en/bruteforce.html
can be done with almost any firewall

[ more ]  [ reply ]
Re: [Full-disclosure] Microsoft DNS resolver: deliberately sabotagedhosts-file lookup 2006-04-20
John Biederstedt (john johnsdomain org) (1 replies)
In brief:
need a checkpoint firewall 4.1 or higher. set up a preshared key.
install client on winXP machine -w- preshared key.
boot XP box not in target network, but from a remote network connected
to the Internet via TCP/IP.
Once connectivity to the Internet is established do a dns lookup of
somet

[ more ]  [ reply ]
[ GLSA 200604-11 ] Crossfire server: Denial of Service and potential arbitrary code execution 2006-04-22
Thierry Carrez (koon gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200604-11
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -

[ more ]  [ reply ]
Advisory: CoreNews <= 2.0.1 Multiple Remote Vulnerabilities. 2006-04-21
Mustafa Can Bjorn IPEKCI (nukedx nukedx com)

--Security Report--
Advisory: CoreNews <= 2.0.1 Multiple Remote Vulnerabilities.
---
Author: Mustafa Can Bjorn "nukedx a.k.a nuker" IPEKCI
---
Date: 21/04/06 21:43 PM
---
Contacts:{
ICQ: 10072
MSN/Email: nukedx (at) nukedx (dot) com [email concealed]
Web: http://www.nukedx.com
}
---
Vendor: CoreNews (http://www.coreslawn.de/)

[ more ]  [ reply ]
Advisory: Simplog <= 0.93 Multiple Remote Vulnerabilities. 2006-04-21
Mustafa Can Bjorn IPEKCI (nukedx nukedx com)

--Security Report--
Advisory: Simplog <= 0.93 Multiple Remote Vulnerabilities.
---
Author: Mustafa Can Bjorn "nukedx a.k.a nuker" IPEKCI
---
Date: 21/04/06 22:13 PM
---
Contacts:{
ICQ: 10072
MSN/Email: nukedx (at) nukedx (dot) com [email concealed]
Web: http://www.nukedx.com
}
---
Vendor: Simplog (http://www.simplog.org/)
Vers

[ more ]  [ reply ]
vBulletin <= 3.5.4 with MKPortal 1.1 Remote SQL Injection Vulnerability. 2006-04-21
Mustafa Can Bjorn IPEKCI (nukedx nukedx com)

--Security Report--
Advisory: vBulletin <= 3.5.4 with MKPortal 1.1 Remote SQL Injection
Vulnerability.
---
Author: Mustafa Can Bjorn "nukedx a.k.a nuker" IPEKCI
---
Date: 21/04/06 22:36 PM
---
Contacts:{
ICQ: 10072
MSN/Email: nukedx (at) nukedx (dot) com [email concealed]
Web: http://www.nukedx.com
}
---
Vendor: MKPortal (htt

[ more ]  [ reply ]
dForum <= 1.5 Multiple Remote File Inclusion Vulnerabilities. 2006-04-21
Mustafa Can Bjorn IPEKCI (nukedx nukedx com)

--Security Report--
Advisory: dForum <= 1.5 Multiple Remote File Inclusion Vulnerabilities.
---
Author: Mustafa Can Bjorn "nukedx a.k.a nuker" IPEKCI
---
Date: 21/04/06 23:17 PM
---
Contacts:{
ICQ: 10072
MSN/Email: nukedx (at) nukedx (dot) com [email concealed]
Web: http://www.nukedx.com
}
---
Vendor: dForum (http://didj.de.vu

[ more ]  [ reply ]
VWar <= ver 1.21 Remote Code Execution Exploit 2006-04-22
ali hackerz ir
#!/usr/bin/perl
#
# Exploit by s3rv3r_hack3r
# Special Thanx : hessamx ,sattar.li , stanic, mfox,blood moon and..
######################################################
# ___ ___ __ #
# / | \_____ ____ | | __ ___________________ #
#/ ~ \__ \ _/

[ more ]  [ reply ]
[SECURITY] [DSA 1038-1] New xzgv packages fix arbitrary code execution 2006-04-22
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 1038-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
April 22nd, 2006

[ more ]  [ reply ]
[Symantec Security Advisor] Symantec Scan Engine Multiple Vulnerabilities 2006-04-21
secure symantec com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Title: Symantec Scan Engine Multiple Vulnerabilities
Threat: Moderate
Impact: Unauthorized access
Product: Symantec Scan Engine

Situation Overview: Three vulnerabilities have been discovered in the
Symantec Scan Engine. Symantec Scan Engine is a

[ more ]  [ reply ]
Rapid7 Advisory R7-0019: Directory traversal vulnerability in SolarWinds TFTP Server for Windows 2006-04-21
advisory rapid7 com
_______________________________________________________________________
Rapid7, LLC Security Advisory
_______________________________________________________________________

Rapid7 Advisory R7-0019
Directory traversal vulnerability in SolarWinds TFTP Server for Windows

Date

[ more ]  [ reply ]
Rapid7 Advisory R7-0023: Symantec Scan Engine File Disclosure Vulnerability 2006-04-21
advisory rapid7 com
_______________________________________________________________________
Rapid7, LLC Security Advisory
_______________________________________________________________________

Rapid7 Advisory R7-0023
Symantec Scan Engine File Disclosure Vulnerability

Published: April 21, 200

[ more ]  [ reply ]
Rapid7 Advisory R7-0022: Symantec Scan Engine Known Immutable DSA Private Key 2006-04-21
advisory rapid7 com
_______________________________________________________________________
Rapid7, LLC Security Advisory
_______________________________________________________________________

Rapid7 Advisory R7-0022
Symantec Scan Engine Known Immutable DSA Private Key

Published: April 21, 2

[ more ]  [ reply ]
Rapid7 Advisory R7-0021: Symantec Scan Engine Authentication Fundamental Design Error 2006-04-21
advisory rapid7 com
_______________________________________________________________________
Rapid7, LLC Security Advisory
_______________________________________________________________________

Rapid7 Advisory R7-0021
Symantec Scan Engine Authentication Fundamental Design Error

Published: Apr

[ more ]  [ reply ]
Scry Gallery Directory Traversal & Full Path Disclosure Vulnerabilites 2006-04-21
simo64 gmail com
Software : Scry Gallery
WebSite :http://scry.org/
discovred by :Moroccan Security Team

[+] Directory Traversal :

A remote attacker may employ directory traversal strings '../' to access arbitrary files outside of the webroot directory.
This flaw is due to an input validation error in the "index

[ more ]  [ reply ]
Re: Mini-NUKE v2.3<<--- SQL Injection 2006-04-21
nukedx nukedx com
It was already found and published you can see more details at: http://www.nukedx.com/?viewdoc=9
http://secunia.com/advisories/18439/
http://seclists.org/lists/fulldisclosure/2006/Feb/0479.html
http://www.zone-h.org/en/advisories/read/id=8739/
Regards,
Mustafa Can Bjorn IPEKCI a.k.a nukedx

[ more ]  [ reply ]
[SECURITY] [DSA 1037-1] New zgv packages fix arbitrary code execution 2006-04-21
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 1037-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
April 21st, 2006

[ more ]  [ reply ]
(Page 1160 of 1748)  < Prev  1155 1156 1157 1158 1159 1160 1161 1162 1163 1164 1165  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus