BugTraq Mode:
(Page 1183 of 1748)  < Prev  1178 1179 1180 1181 1182 1183 1184 1185 1186 1187 1188  Next >
CORE-2006-0124: Cross-Site Scripting in Verisign?s haydn.exe CGI script 2006-03-20
CORE Security Technologies Advisories (advisories coresecurity com)

Core Security Technologies - Corelabs Advisory
http://www.coresecurity.com/corelabs/

Cross-Site Scripting in Verisign?s haydn.exe CGI script

Date Published: 2006-03-20

Last Update: 2006-03-20

Advisory ID: CORE-2006-0124

Bugtraq ID: None currently ass

[ more ]  [ reply ]
[ MDKSA-2006:057 ] - Updated cairo packages to address Evolution DoS vulnerability 2006-03-20
security mandriva com

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDKSA-2006:057
http://www.mandriva.com/security/
____________________________________________________________________

[ more ]  [ reply ]
Perverting Unix Processes 2006-03-20
Pluf (pluf 7a69ezine org)

Hi,

Here is a text about pitbull, a tool based on SELF.

Enjoy.
pluf

Perverting Unix Processes
by Pluf
pluf (at) 7a69ezine (dot) org [email concealed]


1. Introduction
2. MXEcution
3. Pitbull
4. Conclusion
5. References

1. Introduc

[ more ]  [ reply ]
[ MDKSA-2006:056 ] - Updated xorg-x11 packages to address local root vuln 2006-03-20
security mandriva com

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDKSA-2006:056
http://www.mandriva.com/security/
____________________________________________________________________

[ more ]  [ reply ]
DNS Amplification Attacks 2006-03-17
Gadi Evron (ge linuxbox org)
In this paper we address in detail how the recent DNS DDoS attacks work.
How they abuse name servers, EDNS, the recursive feature and UDP packet
spoofing, as well as how the amplification effect works.

Our study is based on packet captures (we provide with samples) and logs
from attacks on differ

[ more ]  [ reply ]
RE: Generically Determining the Prescence of Virtual Machines 2006-03-20
Thomas Guyot-Sionnest (Thomas zango com)
I suggest you make sure you're using the accelerator mode, which should put
qemu in "Virtualization" mode.

If you're doing full CPU emulation then the result you get was correct: you
weren't doing any virtualization inside qemu.

Thomas

> -----Original Message-----
> From: Jeff Epler [mailto:jeple

[ more ]  [ reply ]
Symantec Security Advisory, SYM06-005 2006-03-20
secure symantec com
Symantec Security Advisory
SYM06-005
17 March 2006

Veritas Backup Exec for Windows Servers: Media Server BENGINE Service Job
log Format String Overflow

Revision History
None

Severity
Low (network/system authorization and specific configuration required)

Remote Access Yes
Local Access No
Authe

[ more ]  [ reply ]
Re: Invision Power Board v2.1.4 - session hijacking 2006-03-17
exon (exon home se)
Please don't take this discussion off-list. You need to hit the "Reply
to all" button in your Mozilla mailer.

Hans Wolters wrote:
>>Hans Wolters wrote:
>>
>>>Matt,
>
>
>
>>But you still need to see the session-id to be able to hijack the
>>session, and for that you need to see someones desktop.

[ more ]  [ reply ]
Re: Re: Invision Power Board v2.1.4 - session hijacking 2006-03-17
matt invisionpower com (1 replies)
Hans,

My problem with this report is this:

1) You've not even read the IPB code. You've stated elsewhere that "using sessions in the URL may appear in JS pop-up windows". IPB does NOT do this. IPB removes the session ID for all links, including JS code when cookies are enabled.

2) You're missing

[ more ]  [ reply ]
Re: Invision Power Board v2.1.4 - session hijacking 2006-03-20
Hans Wolters (hans wolters xs4all nl)
[CVE-2006-0745] X.Org Security Advisory: privilege escalation and DoS in X11R6.9, X11R7.0 2006-03-20
Daniel Stone (daniel fooishbar org) (1 replies)
X.Org Security Advisory, March 20th 2006
Local privilege escalation in X.Org server 1.0.0 and later; X11R6.9.0
and X11R7.0
CVE-ID: CVE-2006-0745

Overview:

During the analysis of results from the Coverity code review of X.Org,
we discovered a flaw in the server that allows local users to execute
a

[ more ]  [ reply ]
IMF 2006 - 2nd Call for Papers 2006-03-18
Oliver Goebel (Goebel CERT Uni-Stuttgart DE)
Dear all,

FYI:

This is the second call for papers for the IMF Conference 2006.

Please mind the submission dead line on 2006-04-17.

Please excuse possible cross-postings.

------------------------------------------------------------------------
---

2nd CALL FOR PAPERS

[ more ]  [ reply ]
Path Disclosure and Arbitrary File Read Vulnerability in SLAB5000 2006-03-18
justint rdmail net
[Description]
SLAB500 is a complete, dynamic, modular web-system designed to your specifications, allowing you to quickly and conveniently update all your content, add new pages, upload images, sounds and video from any browser, via our front-end interface from any location that you have web access.

[ more ]  [ reply ]
Noah's Classifieds Multiple Path Disclosure and Cross Site Scripting Vulnerabilities 2006-03-20
raphael huck free fr
I have contacted PhpOutsourcing 2 weeks ago, and they didn't answer.

The mail I sent on classifieds AT phpoutsourcing DOT com bounced back in error. The one I sent on askme AT phpoutsourcing DOT com never got replied.

"Currently, we are completely overloaded with our running projects, and we don't

[ more ]  [ reply ]
phpWebsite <= SQL Injection (friend.php) & (article.php) 2006-03-18
dabdoub_mosikar forislam com
[+]phpWebsite
[+]DaBDouB-MoSiKaR [Moroccan Security Team]
[+]creetz to: Moroccan security Team[Dr.E-vil,Dr.Erase,H0550N],ToM-le-Magician[france] , ameer[egypt], Esp!onLeRaVaGe, CiM TeaM, xMs3D0,|ucifer,B6,al-houda members[nabil,sn!per,Kasparov]and all hackers musilm [morocco] and www.lezr.com
[+]spe

[ more ]  [ reply ]
[security bulletin] SSRT051251 rev.2 - Apache-based Web Server on HP-UX mod_ssl, proxy_http, Remote Execution of Arbitrary Code, Denial of Service (DoS), and Unauthorized Access 2006-03-20
security-alert hp com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c00555254

Version: 2

HPSBUX02074 SSRT051251 rev.2 - Apache-based Web Server on HP-UX
mod_ssl, proxy_http, Remote Execution of Arbitrary Code, Denial of
Service (DoS), and Unauthorized Access

NOT

[ more ]  [ reply ]
[SECURITY] [DSA 1010-1] New ilohamail packages fix cross-site scripting vulnerabilities 2006-03-20
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 1010-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
March 20th, 2006

[ more ]  [ reply ]
[security bulletin] SSRT051078 rev.1 - HP-UX usermod(1M) Local UnaUthorized Access 2006-03-20
security-alert hp com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c00614838

Version: 1

HPSBUX02102 SSRT051078 rev.1 - HP-UX usermod(1M) Local
UnaUthorized Access.

NOTICE: The information in this Security Bulletin should be acted
upon as soon as possible.

Rele

[ more ]  [ reply ]
(Page 1183 of 1748)  < Prev  1178 1179 1180 1181 1182 1183 1184 1185 1186 1187 1188  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus