|
Colapse all |
Post message
[ GLSA 200601-17 ] Xpdf, Poppler, GPdf, libextractor, pdftohtml: Heap overflows 2006-01-30 Sune Kloppenborg Jeppesen (jaervosz gentoo org) [ GLSA 200601-16 ] MyDNS: Denial of Service 2006-01-30 Sune Kloppenborg Jeppesen (jaervosz gentoo org) New worm crawling trough blogs?! 2006-01-27 blog worm gmail com I spotted it on Christopher Boyd's Vital Security blog. Chris is a Microsoft security MVP and security research manager at FaceTime, an instant messaging security company. However, this worm appears to have spread much further and has slithered around the world. The worm is actually an animated GIF [ more ] [ reply ] [ MDKSA-2006:027 ] - Updated gzip packages fix zgrep vulnerabilities 2006-01-30 security mandriva com [ MDKSA-2006:026 ] - Updated bzip2 packages fix bzgrep vulnerabilities 2006-01-30 security mandriva com Etomite CMS "Backdoored" 2006-01-27 Luca securityfocus com, Ercoli securityfocus com,"[at]" securityfocus com, SeeWeb Com securityfocus com /****** Package: Etomite Content Management System Auth: http://www.etomite.org/ Version(s): 0.6 / previous versions may also be backdoored Vulnerability Type: Remote Code Execution *****************/ Disclaimer: --------- The information is provided "as is" without warranty of any kind. The a [ more ] [ reply ] [SECURITY] [DSA 959-1] New unalz packages fix arbitrary code execution 2006-01-30 joey infodrom org (Martin Schulze) XSS flaw in MG2 Image Gallery (v.0.5.1) 2006-01-30 preben watchcom no Users can inject XSS into the form field "Name", when adding a comment on a picture. This will lead to the execution of XSS code. Simple scripting like <script>alert('hello')</script> , and more advanced document.location, and document.cookie works. This has been tested on version 0.5.1. Other ver [ more ] [ reply ] CME-24 (BlackWorm) Users' FAQ 2006-01-30 Gadi Evron (ge linuxbox org) This FAQ was authored by members of the TISF BlackWorm task force (specifically the MWP / DA groups and the SANS ISC handlers). The purpose is both to provide with a resource for concerned users and network administrators, as well as to be a level-headed myth-free source on the subject. There s [ more ] [ reply ] MyBB 1.2 Local File Incusion 2006-01-30 o y 6 hotmail com, | securityfocus com,D3vil-0x1 securityfocus com BlackWorm: statistics and numbers 2006-01-27 Gadi Evron (ge linuxbox org) The guys over at LURHQ (Joe Stewart) produced some amazing statistics from the logs provided to the TISF BlackWorm task force by the more whitehat than whitehat RCN (.com/.net) ISP with the cooperation of the FBI. By country, de-duping, removing DDoS and other counter-poisoning attempts as best [ more ] [ reply ] Re: Airscanner Mobile Security Advisory: Remote Hard Reset Data Wipe and DoS of Pocket Controller v5.0 (#AS05080401) 2006-01-28 orambaldini soti net Nuked-klaN Cross-Site Scripting Vulnerability 2006-01-30 night_warrior771 securityfocus com, "[at]" securityfocus com,hotmail com securityfocus com sPaiz-Nuke Cross-Site Scripting Vulnerability 2006-01-29 night_warrior771 securityfocus com, "[at]" securityfocus com,hotmail com securityfocus com ##Night_Warrior<Kurdish Hacker> ##night_warrior771[at]hotmail.com ##sPaiz-Nuke Cross-Site Scripting Vulnerability ##http://www.alstrasoft.com http://www.example.com/sPaiz-Nuke/modules.php?name=Articles&file=search& query=[XSS]&type=articles&type=comments http://www.example.com/sPaiz-Nuke/mod [ more ] [ reply ] Arescom NetDSL-1000 DoS atack source 2006-01-30 framirez akori fr (1 replies) RE: Cross Site Cooking 2006-01-30 Michal Zalewski (lcamtuf dione ids pl) On Sun, 29 Jan 2006, Amit Klein (AKsecurity) wrote: > I tried setting a cookie for .com.pl, and I failed (that is, the browser > did not respect it). If you set a cookie for .kom.pl, it will be OK (if > you're in .kom.pl domain, that is). Amit, Mozilla/Firefox/Netscape are vulnerable to this flaw [ more ] [ reply ] [SECURITY] [DSA 951-2] New trac packages fix SQL injection and cross-site scripting 2006-01-30 joey infodrom org (Martin Schulze) MyBB 1.2 usercp2.php [ $url ] CrossSiteScripting ( XSS ) 2006-01-29 o y 6 hotmail com, | securityfocus com,D3vil-0x1 securityfocus com ## MyBB 1.02 usercp2.php XSS ##------------------------------## ## Devil-00 D3vil-0x1 - Attacking MyBB :)## ## ## ## devil-00 (at) s4a (dot) cc [email concealed] ## ## ## ##-----------------------------### ## ## File :- usercp2.php ## Var :- $url ## Line's :- ## -> 39 ## -> 58 ## -> 84 ## -> 108 ## -> 130 ## -> 14 [ more ] [ reply ] EasyCMS vulnerable to XSS injection. 2006-01-29 preben watchcom no The Norwegian web-publishing system EasyCMS (www.easycms.no) contains multiple input flaws letting users conduct successful XSS attacks. Both in the admin section, and the webpage that uses the system is vulnerable to XSS. It does not filter script tags and simple scripting like <script>alert(?XSS? [ more ] [ reply ] [xpl#2] MiniNuke 1.8.2 - change member's passwrod < Perl > 2006-01-29 hessam kachal667 com I create exploit for a bug at Mininuke ; this bug at "membership.asp" and you can with this exploit change members password :) if you inject: " /membership.asp&pass=[New password]&passa=[confirm new password]&x=[member name] " This bug found by nukedx & exploit by Hessam-x --------- + APP name : M [ more ] [ reply ] [ GLSA 200601-15 ] Paros: Default administrator password 2006-01-29 Sune Kloppenborg Jeppesen (jaervosz gentoo org) (1 replies) - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200601-15 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - [ more ] [ reply ] Re: [Full-disclosure] [ GLSA 200601-15 ] Paros: Default administrator password 2006-01-30 Yvan Boily (yboily gmail com) UebiMiau Webmail System Security Vulnerability 2006-01-29 M.Neset KABAKLI (neset wakiza com) I.Vulnerability UebiMiau Webmail System Cross Site Scripting Vulnerability II.Vendor Aldoir Ventura III.Affected Systems * UebiMiau 2.7.9 (latest release) and probably previous versions. IV.About UebiMiau is a simple, yet efficient mail reader (webmail) supporting both IMAP and POP3 without [ more ] [ reply ] |
|
Privacy Statement |
---------- Forwarded message ----------
From: Rick Elnor
To: moderators (at) osvdb (dot) org [email concealed]
Date: Sun, 29 Jan 2006 10:11:08 -0800
Subject: [OSVDB Mods] [Change Request] 22693: Etomite todo.inc.php cij Variable
Arbitrary Command Execution
Hello,
I am Rick Elnor, the Etomite CMS security expert and own
[ more ] [ reply ]