|
Colapse all |
Post message
[ MDKSA-2006:072 ] - Updated kernel packages fix multiple vulnerabilities 2006-04-17 security mandriva com Another flaw in Firefox 1.5.0.2: to open files from remote 2006-04-18 miky gmail com https://bugzilla.mozilla.org/show_bug.cgi?id=334341 It is possible by a malicious web site to open local content in the browser by tricking a user into right-clicking and choosing "View Image" on a broken image, which is referencing a local resource (e.g. via the file: URI handler). This may be ex [ more ] [ reply ] Remote Xine Format String Vulnerability 2006-04-18 c0ntexb gmail com /* ************************************************************************ ***************************************** $ An open security advisory #16 - Xine Media Player Format String Bug ************************************************************************ ************************************* [ more ] [ reply ] RE: gcc 4.1 bug miscompiles pointer range checks, may place you at risk 2006-04-18 Michael Wojcik (Michael Wojcik microfocus com) > From: Felix von Leitner [mailto:felix-bugtraq (at) fefe (dot) de [email concealed]] > Sent: Monday, 17 April, 2006 16:04 > > static inline int range_ptrinbuf(const void* buf,unsigned > long len,const void* ptr) { > register const char* c=(const char*)buf; /* no pointer > arithmetic on void* */ > return (c && c+le [ more ] [ reply ] Linpha 1.1.0 - XSS Vulnerabilities 2006-04-17 d4igoro gmail com Linpha 1.1.0 - XSS Vulnerabilities -------------------------------------------------------- Software: Linpha Version: 1.1.0 Type: Cross Site Scripting Vulnerability Date: Mon Apr 17 22:59:39 CEST 2006 Vendor: The LinPHA developers Page: http://linpha.sourceforge.net/ Risc: Low credits: ------------ [ more ] [ reply ] [SA-03] Example of Grsecurity protection avoid. 2006-04-17 adam pinkhat org I'm proud to introduce an example of return into libc exploit which works though grsecurity patch protection. Please read source carefully and change some lines cause default version probably wont work on your machine. -> This is example, remember it. ;) /* * Grsecurity bypass tryout - system("/ [ more ] [ reply ] [eVuln] Wire Plastik wpBlog SQL Injection Vulnerability 2006-04-17 alex evuln com New eVuln Advisory: Wire Plastik wpBlog SQL Injection Vulnerability http://evuln.com/vulns/119/summary.html --------------------Summary---------------- eVuln ID: EV0119 CVE: CVE-2006-1639 Software: wpBlog Sowtware's Web Site: http://www.wireplastik.com/ Versions: 0.4 Critical Level: Moderate Type: [ more ] [ reply ] gcc 4.1 bug miscompiles pointer range checks, may place you at risk 2006-04-17 Felix von Leitner (felix-bugtraq fefe de) (3 replies) I wrote a small library of functions to do typical range checks as they are needed in code that handles incoming packets or messages from untrusted sources. My impetus was SMB code, in case you want to know. Here is one of my functions: static inline int range_ptrinbuf(const void* buf,unsigned lo [ more ] [ reply ] Re: gcc 4.1 bug miscompiles pointer range checks, may place you at risk 2006-04-18 Alexander Klimov (alserkli inbox ru) Re: gcc 4.1 bug miscompiles pointer range checks, may place you at risk 2006-04-17 Forrest J. Cavalier III (mibsoft mibsoftware com) Re: gcc 4.1 bug miscompiles pointer range checks, may place you at risk 2006-04-17 Michael Chamberlain (michael chamberlain net au) [Argeniss] Alert - Yahoo! Webmail XSS 2006-04-17 Cesar (cesarc56 yahoo com) (1 replies) Hi. I just got a targeted phishing attack to one of my Yahoo email accounts, what it´s insteresting it's that the attack exploits a Yahoo! webmail 0day XSS vulnerability. I'm trying to contact Yahoo right now but in the meantime I thought it will be good to provide some bits because the seriousnes [ more ] [ reply ] Re: [Full-disclosure] [Argeniss] Alert - Yahoo! Webmail XSS 2006-04-18 Morning Wood (se_cur_ity hotmail com) [ GLSA 200604-08 ] libapreq2: Denial of Service vulnerability 2006-04-17 Thierry Carrez (koon gentoo org) Tiny PHP forum - vulns 2006-04-17 hessam hessamx net ~ Summery : ------------------------------ Name : Tiny PHP forum v3.6 Software : http://sourceforge.net/projects/tinyphpforum/ Discovered by : Hessam-x (Hessam M.Salehi) - www.hessamx.net ~ Vulnerabilities : ------------------------------ I. Cross-site Scripting A.Input code to the " [ more ] [ reply ] [eVuln] CzarNews XSS and Multiple SQL Injection Vulnerabilities 2006-04-17 alex evuln com New eVuln Advisory: CzarNews XSS and Multiple SQL Injection Vulnerabilities http://evuln.com/vulns/118/summary.html --------------------Summary---------------- eVuln ID: EV0118 CVE: CVE-2006-1640 CVE-2006-1641 Software: CzarNews Sowtware's Web Site: http://www.czaries.net/scripts/ Versions: 1.14 Cr [ more ] [ reply ] - PHPGraphy <= 0.9.11 "editwelcome" unauthorized access / cross site scripting - 2006-04-17 rgod autistici org (1 replies) - PHPGraphy <= 0.9.11 "editwelcome" unauthorized access / cross site scripting - -------------------------------- software site: http://phpgraphy.sourceforge.net/ description: "Full featured photo gallery PHP script - Light, fast and easy to install" vulnerable code index.php near li [ more ] [ reply ] Re: - PHPGraphy <= 0.9.11 "editwelcome" unauthorized access / cross site scripting - 2006-04-18 JiM / aEGIS (jim aegis-corp org) [SECURITY] [DSA 1036-1] New bsdgames packages fix local privilege escalation 2006-04-17 Moritz Muehlenhoff (jmm debian org) ZDI-06-009: Mozilla Firefox Tag Parsing Code Execution Vulnerability 2006-04-17 zdi-disclosures 3com com ZDI-06-009: Mozilla Firefox Tag Parsing Code Execution Vulnerability http://www.zerodayinitiative.com/advisories/ZDI-06-009.html April 14, 2006 -- CVE ID: CVE-2006-0749 -- Affected Vendor: Mozilla -- Affected Products: Firefox 1.0 through 1.0.7 Thunderbird 1.5 through 1.5.0.1 Thunderbird 1.0 thro [ more ] [ reply ] MyEvent Remote File Execution And XSS Attacking 2006-04-16 botan linuxmail org Website : http://mywebland.com/ Script : MyEvent Version : 1.2 Risk : High Class : Remote Credits : b3g0k,Nistiman,flot,Netqurd etc.. my forget other friends Google look for :) = "MyEvent 1.2 " or "/calendar/myevent.php" I. Remote Code Execution This is script to very big high it bug being foun [ more ] [ reply ] Re: Snipe Gallery <= 3.1.4 Multiple XSS 2006-04-16 nobody nowhere com There is also sql injections when magic quotes are off. Maybe you tested with them on . Example: view.php?gallery_id=83' Result: View Images in: A database error has occured. mySQL said: You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the [ more ] [ reply ] FlexBB v0.5.5 BETA [SQL Inj] [XSS] [Login bypass] 2006-04-16 kr4ch web de App: FlexBB v0.5.5 BETA Advistory by: p0w3r - curse-crew.de SQL Inj: magic_quotes_gpc = off /index.php?page=showprofile&id=1'[SQL]/* /index.php?page=forums&forumid=1'[SQL]/* /index.php?page=viewthread&threadid=1'[SQL]/* /index.php?page=editpost&threadid=1'[SQL]/* Login bypass: magic_quotes_gpc = [ more ] [ reply ] |
|
Privacy Statement |
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDKSA-2006:072
http://www.mandriva.com/security/
____________________________________________________________________
[ more ] [ reply ]