BugTraq Mode:
(Page 1164 of 1748)  < Prev  1159 1160 1161 1162 1163 1164 1165 1166 1167 1168 1169  Next >
[ MDKSA-2006:072 ] - Updated kernel packages fix multiple vulnerabilities 2006-04-17
security mandriva com

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDKSA-2006:072
http://www.mandriva.com/security/
____________________________________________________________________

[ more ]  [ reply ]
Another flaw in Firefox 1.5.0.2: to open files from remote 2006-04-18
miky gmail com
https://bugzilla.mozilla.org/show_bug.cgi?id=334341

It is possible by a malicious web site to open local content in the browser by tricking a user into right-clicking and choosing "View Image" on a broken image, which is referencing a local resource (e.g. via the file: URI handler).

This may be ex

[ more ]  [ reply ]
Remote Xine Format String Vulnerability 2006-04-18
c0ntexb gmail com
/*
************************************************************************
*****************************************
$ An open security advisory #16 - Xine Media Player Format String Bug
************************************************************************
*************************************

[ more ]  [ reply ]
RE: gcc 4.1 bug miscompiles pointer range checks, may place you at risk 2006-04-18
Michael Wojcik (Michael Wojcik microfocus com)
> From: Felix von Leitner [mailto:felix-bugtraq (at) fefe (dot) de [email concealed]]
> Sent: Monday, 17 April, 2006 16:04
>
> static inline int range_ptrinbuf(const void* buf,unsigned
> long len,const void* ptr) {
> register const char* c=(const char*)buf; /* no pointer
> arithmetic on void* */
> return (c && c+le

[ more ]  [ reply ]
Linpha 1.1.0 - XSS Vulnerabilities 2006-04-17
d4igoro gmail com
Linpha 1.1.0 - XSS Vulnerabilities
--------------------------------------------------------
Software: Linpha
Version: 1.1.0
Type: Cross Site Scripting Vulnerability
Date: Mon Apr 17 22:59:39 CEST 2006
Vendor: The LinPHA developers
Page: http://linpha.sourceforge.net/
Risc: Low

credits:
------------

[ more ]  [ reply ]
[SA-03] Example of Grsecurity protection avoid. 2006-04-17
adam pinkhat org
I'm proud to introduce an example of return into libc exploit which works though grsecurity patch protection.

Please read source carefully and change some lines cause default version probably wont work on your machine.

-> This is example, remember it. ;)

/*
* Grsecurity bypass tryout - system("/

[ more ]  [ reply ]
[eVuln] Wire Plastik wpBlog SQL Injection Vulnerability 2006-04-17
alex evuln com
New eVuln Advisory:
Wire Plastik wpBlog SQL Injection Vulnerability
http://evuln.com/vulns/119/summary.html

--------------------Summary----------------
eVuln ID: EV0119
CVE: CVE-2006-1639
Software: wpBlog
Sowtware's Web Site: http://www.wireplastik.com/
Versions: 0.4
Critical Level: Moderate
Type:

[ more ]  [ reply ]
gcc 4.1 bug miscompiles pointer range checks, may place you at risk 2006-04-17
Felix von Leitner (felix-bugtraq fefe de) (3 replies)
I wrote a small library of functions to do typical range checks as they
are needed in code that handles incoming packets or messages from
untrusted sources. My impetus was SMB code, in case you want to know.

Here is one of my functions:

static inline int range_ptrinbuf(const void* buf,unsigned lo

[ more ]  [ reply ]
Re: gcc 4.1 bug miscompiles pointer range checks, may place you at risk 2006-04-18
Alexander Klimov (alserkli inbox ru)
Re: gcc 4.1 bug miscompiles pointer range checks, may place you at risk 2006-04-17
Forrest J. Cavalier III (mibsoft mibsoftware com)
Re: gcc 4.1 bug miscompiles pointer range checks, may place you at risk 2006-04-17
Michael Chamberlain (michael chamberlain net au)
[Argeniss] Alert - Yahoo! Webmail XSS 2006-04-17
Cesar (cesarc56 yahoo com) (1 replies)
Hi.

I just got a targeted phishing attack to one of my
Yahoo email accounts, what it´s insteresting it's that
the attack exploits a Yahoo! webmail 0day XSS
vulnerability.
I'm trying to contact Yahoo right now but in the
meantime I thought it will be good to provide some
bits because the seriousnes

[ more ]  [ reply ]
Re: [Full-disclosure] [Argeniss] Alert - Yahoo! Webmail XSS 2006-04-18
Morning Wood (se_cur_ity hotmail com)
Neon Responder (Dos,Exploit) 2006-04-17
Stefan Lochbihler (steve01 chello at)
Author: Stefan Lochbihler
Date: 17.04.2006
Affected Software: Neon Responder for Windows
Software 5.4
Software http://www.neon.com/NRwin.shtml
Attack: Dos

Overview:

[ more ]  [ reply ]
FlexBB 0.5.5 Bypass Exploit 2006-04-17
o y 6 hotmail com
#!/usr/bin/perl -w

# FlexBB <= 0.5.5 (/inc/start.php _COOKIE) Remote SQL ByPass Exploit , Perl C0d3
#
# Milw0rm ID :-
# http://www.milw0rm.com/auth.php?id=1539
# D3vil-0x1 | Devil-00 < BlackHat > :)
#
# DONT FORGET TO DO YOUR CONFIG !!
# DONT FORGET TO DO YOUR CONFIG !!
# DON

[ more ]  [ reply ]
[ GLSA 200604-08 ] libapreq2: Denial of Service vulnerability 2006-04-17
Thierry Carrez (koon gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200604-08
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -

[ more ]  [ reply ]
AnimeGenesis <= XSS 2006-04-17
qex bsdmail org
====================
Discovered by: Qex
Date: 17 April 2006
====================

index.php?cat=[XSS]

[ more ]  [ reply ]
Tiny PHP forum - vulns 2006-04-17
hessam hessamx net
~ Summery :
------------------------------
Name : Tiny PHP forum v3.6
Software : http://sourceforge.net/projects/tinyphpforum/
Discovered by : Hessam-x (Hessam M.Salehi) - www.hessamx.net

~ Vulnerabilities :
------------------------------
I. Cross-site Scripting
A.Input code to the "

[ more ]  [ reply ]
[eVuln] CzarNews XSS and Multiple SQL Injection Vulnerabilities 2006-04-17
alex evuln com
New eVuln Advisory:
CzarNews XSS and Multiple SQL Injection Vulnerabilities
http://evuln.com/vulns/118/summary.html

--------------------Summary----------------
eVuln ID: EV0118
CVE: CVE-2006-1640 CVE-2006-1641
Software: CzarNews
Sowtware's Web Site: http://www.czaries.net/scripts/
Versions: 1.14
Cr

[ more ]  [ reply ]
Neuron Blog <= 1.1 XSS 2006-04-17
qex bsdmail org
====================
Discovered by: Qex
Date: 17 April 2006
====================

Add comment :-

name: [XSS]

e-mail:

website: [XSS]

[ more ]  [ reply ]
ShoutBOOK <= 1.1 XSS 2006-04-17
qex bsdmail org
====================
Discovered by: Qex
Date: 16 April 2006
====================

Write a message:

Name: [XSS]
Location: (optional)
Website: (optional)
Comments: [XSS]

[ more ]  [ reply ]
- PHPGraphy <= 0.9.11 "editwelcome" unauthorized access / cross site scripting - 2006-04-17
rgod autistici org (1 replies)
- PHPGraphy <= 0.9.11 "editwelcome" unauthorized access / cross site scripting -

--------------------------------
software site: http://phpgraphy.sourceforge.net/
description: "Full featured photo gallery PHP script - Light, fast and easy to
install"

vulnerable code index.php near li

[ more ]  [ reply ]
[SECURITY] [DSA 1036-1] New bsdgames packages fix local privilege escalation 2006-04-17
Moritz Muehlenhoff (jmm debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 1036-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Steve Kemp
April 17th, 2006

[ more ]  [ reply ]
ZDI-06-009: Mozilla Firefox Tag Parsing Code Execution Vulnerability 2006-04-17
zdi-disclosures 3com com
ZDI-06-009: Mozilla Firefox Tag Parsing Code Execution Vulnerability
http://www.zerodayinitiative.com/advisories/ZDI-06-009.html
April 14, 2006

-- CVE ID:
CVE-2006-0749

-- Affected Vendor:
Mozilla

-- Affected Products:
Firefox 1.0 through 1.0.7
Thunderbird 1.5 through 1.5.0.1
Thunderbird 1.0 thro

[ more ]  [ reply ]
MyEvent Remote File Execution And XSS Attacking 2006-04-16
botan linuxmail org
Website : http://mywebland.com/
Script : MyEvent
Version : 1.2
Risk : High
Class : Remote
Credits : b3g0k,Nistiman,flot,Netqurd etc.. my forget other friends
Google look for :) = "MyEvent 1.2 " or "/calendar/myevent.php"

I. Remote Code Execution

This is script to very big high it bug being foun

[ more ]  [ reply ]
Re: Snipe Gallery <= 3.1.4 Multiple XSS 2006-04-16
nobody nowhere com
There is also sql injections when magic quotes are off. Maybe you tested with them on .

Example:
view.php?gallery_id=83'

Result:

View Images in:

A database error has occured.

mySQL said: You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the

[ more ]  [ reply ]
Calendarix "yearcal.php" XSS Attacking 2006-04-16
botan linuxmail org
Website : http://www.calendarix.com

Vulnerable :

if (!isset($_GET['ycyear']))
$ycyear = $y ;
else
$ycyear = $_GET['ycyear'];

http://www.site.com/[path]/yearcal.php?ycyear=<script>alert(document.coo
kie)</script>

[ more ]  [ reply ]
FlexBB v0.5.5 BETA [SQL Inj] [XSS] [Login bypass] 2006-04-16
kr4ch web de
App: FlexBB v0.5.5 BETA
Advistory by: p0w3r - curse-crew.de

SQL Inj:
magic_quotes_gpc = off
/index.php?page=showprofile&id=1'[SQL]/*
/index.php?page=forums&forumid=1'[SQL]/*
/index.php?page=viewthread&threadid=1'[SQL]/*
/index.php?page=editpost&threadid=1'[SQL]/*

Login bypass:
magic_quotes_gpc =

[ more ]  [ reply ]
Xss In bMachine 2٫7 2006-04-16
W3 _ hotmail com


Software: bMachine

Web Site: http://boastology.com/

Versions:2٫7

Type: Xss

Exploit :

http://www.xxx.com/bmachine/search.php

serch :

<script>alert(1)</script>

|||||||||||||||||||||||||||||||||||||||||||
|/////////////////////////////////////////|
| ( almokanna ) |
|\\

[ more ]  [ reply ]
(Page 1164 of 1748)  < Prev  1159 1160 1161 1162 1163 1164 1165 1166 1167 1168 1169  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus