BugTraq Mode:
(Page 1216 of 1748)  < Prev  1211 1212 1213 1214 1215 1216 1217 1218 1219 1220 1221  Next >
Winamp 5.12 - 0day exploit - code execution through playlist 2006-01-30
Process (processtree rootonfire org)
The current version of winamp contains an error in its playlist parsing allowing malicious users to
execute code via a prepared playlist.

This bug can even be triggered through a website - without user interaction - by linking to a pls
file in an IFRAME tag.

Windows DEP (Data Execution Prevention)

[ more ]  [ reply ]
[ GLSA 200601-14 ] LibAST: Privilege escalation 2006-01-29
Sune Kloppenborg Jeppesen (jaervosz gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200601-14
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -

[ more ]  [ reply ]
Re: Re: IndonesiaHack Advisory HTML injection in PHP Fusebox 2006-01-29
pr1nce_empire yahoo com
I don't think so, this is a vulneralability since the "scriptProtect" isn't applied to this variable

$FB_["rawFA"] = $attributes["fuseaction"];

simple example :

I have "scriptProtect" like this :

function validate($char)

{

if(preg_match('/[\'\"%|*(){}~`!@#$;\\/=+-_^]/',$char))

die("We ha

[ more ]  [ reply ]
Cross Site Cooking 2006-01-29
Michal Zalewski (lcamtuf dione ids pl)

(Why, yes, I came up with the name, and had to find some bugs to be able
to post this.)

Summary
-------

There are three fairly interesting flaws in how HTTP cookies were
designed and later implemented in various browsers; these shortcomings
make it possible (and alarmingly easy) for malicio

[ more ]  [ reply ]
Re: MySQL 5.0 information leak? 2006-01-28
Duncan Simpson (dps simpson demon co uk)

Nobody has mentioned this yet, so maybe I should. Accpording to the MySQL
documentation the infromation schema is database and there is no suggestion
that the access controls do not work. You should be able to determine who has
what access to the information schema using standard grant and revok

[ more ]  [ reply ]
zbattle.net 2006-01-28
c_lispfedora yahoo com
Zbattle client has denial of service by game create and closing real fast. The maker was told about the denial of service. Not action has been taken.

zbattle commands

login send - "@109" + 0x0A

login name - '2' + name + 0x0A + '7' + 0x0A

make game - '3' + gamename + 0x0A

join game -

close g

[ more ]  [ reply ]
[SECURITY] [DSA 951-1] New trac packages fix SQL injection and cross-site scripting 2006-01-23
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 951-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
January 23rd, 2006

[ more ]  [ reply ]
CAID 33778 - CA iGateway Content-Length Buffer Overflow Vulnerability 2006-01-23
Williams, James K (James Williams ca com)

Title: CAID 33778 - CA iGateway Content-Length Buffer Overflow
Vulnerability

CA Vulnerability ID: 33778

CA Advisory Date: 2006-01-23

Discovered By: Erika Mendoza reported this issue to iDefense.

Impact: Remote attacker can execute arbitrary code with SYSTEM
privileges.

Summary: The CA iGa

[ more ]  [ reply ]
BlackWorm technical information 2006-01-24
Gadi Evron (ge linuxbox org)
Technical information on the worm itself can be found here:
http://www.f-secure.com/v-descs/nyxem_e.shtml
and http://blogs.securiteam.com/index.php/archives/229

Gadi.

[ more ]  [ reply ]
[FLSA-2006:152845] Updated perl packages fix security issues 2006-01-24
Marc Deslauriers (marcdeslauriers videotron ca)
---------------------------------------------------------------------
Fedora Legacy Update Advisory

Synopsis: Updated perl packages fix security issues
Advisory ID: FLSA:152845
Issue date: 2006-01-24
Product: Red Hat Linux, Fedora Core
Keywords:

[ more ]  [ reply ]
[eVuln] Pixelpost Photoblog XSS Vulnerability 2006-01-23
alex evuln com
New eVuln Advisory:
Pixelpost Photoblog XSS Vulnerability
http://evuln.com/vulns/45/summary.html

--------------------Summary----------------

Software: Pixelpost Photoblog
Sowtware's Web Site: http://www.pixelpost.org/
Versions: 1.4.3
Critical Level: Moderate
Type: Cross-Site Scripting
Class: Remot

[ more ]  [ reply ]
BlackWorm naming confusing [CME entry now available] 2006-01-24
Gadi Evron (ge linuxbox org)
The CME entry should appear on their site shortly:
http://cme.mitre.org

Gadi.

[ more ]  [ reply ]
[USN-246-1] imagemagick vulnerabilities 2006-01-24
Martin Pitt (martin pitt canonical com)
===========================================================
Ubuntu Security Notice USN-246-1 January 24, 2006
imagemagick vulnerabilities
CVE-2005-4601, CVE-2006-0082, http://bugs.debian.org/345595
===========================================================

A security issue affects the following

[ more ]  [ reply ]
LibAST 0.7 Release Fixes Security Vulnerability 2006-01-23
Michael Jennings (mej eterm org)
I am pleased to announce the release of LibAST 0.7. The release
summary is below. Please note that this release contains an important
security fix; all users of LibAST are STRONGLY encouraged to update to
this latest version immediately.

The latest version can be obtained in source, RPM, and SRPM

[ more ]  [ reply ]
Ege Internet Web Desing Remote Command Exucetion 2006-01-28
botan linuxmail org
Web Page :

http://www.egeinternet.com/v1/tr/portfoy.php

vulnerable :

http://www.site.com/index.php?key=evilcode?&cmd=id

Greetz : Patriotic Hackers memberz , and all kurdish defacers..

[ more ]  [ reply ]
Multiple vulnerabilities in CommuniGate Pro Server 2006-01-28
Evgeny Legerov (research gleg net)
I. DESCRIPTION

CommuniGate Pro Core Server from CommuniGate Systems provides robust cross-platform
groupware applications, enabling a cost effective, easy to manage communications platform.

For more info visit http://www.stalker.com

II. DETAILS

During testing of CommuniGate Pro Server 5.0.6 us

[ more ]  [ reply ]
[CORRECTIONS AND ADDITIONS ]Azbb v1.1.00 Cross-Site Scripting 2006-01-28
roozbeh_afrasiabi yahoo com
PoC :

--------------------

1)

This flaw exists because the application does not validate the "nickname"

variable upon submission to the post.php script via the POST method.

h**p://www.[target]/post.php?nickname="><script>alert('XSS')</script><!-
-

--------------------

[ more ]  [ reply ]
The WorldsEnd.NET - Free Ping Script, written in PHP (2 vulns) 2006-01-23
cvh kapda ir
[KAPDA::#23] - The WorldsEnd.NET - Free Ping Script, written in PHP (2 vulns)

KAPDA New advisory

Vulnerable products : The WorldsEnd.NET - Free Ping Script
Vendor: http://www.theworldsend.net/
Risk: Low
Vulnerabilities: Restriction Bypass

Date :
--------------------
Found : Aug 2005
Vendor Conta

[ more ]  [ reply ]
Azbb v1.1.00 Cross-Site Scripting 2006-01-23
roozbeh_afrasiabi yahoo com
[KAPDA::#22] - Azbb v1.1.00 Cross Site Scripting

KAPDA New advisory

Vulnerable products : Azbb <= 1.1.00
Vendor: www.azbb.org
Risk: Low
Vulnerabilities: Cross Site Scripting

Date :
--------------------
Found : Jan 20 2006
Vendor Contacted : Jan 21 2006
Release Date : Jan 21 2006

About :
-------

[ more ]  [ reply ]
Shareaza P2P Remote Vulnerability 2006-01-27
Ryan Smith (whatstheaddress gmail com)
Abstract:
There is a vulnerability present in the latest version of the Shareaza
P2P file trading software. At a minimum, this vulnerability would
easily allow parties (RIAA) to disrupt P2P services. Remote code
execution is also possible.

Products affected:
Shareaza
eTomi

Vulnerability Impact:

[ more ]  [ reply ]
[ MDKSA-2006:024 ] - Updated ImageMagick packages fix vulnerabilities 2006-01-26
security mandriva com

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDKSA-2006:024
http://www.mandriva.com/security/
____________________________________________________________________

[ more ]  [ reply ]
[SECURITY] [DSA 958-1] New drupal packages fix several vulnerabilities 2006-01-27
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 958-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
January 27th, 2006

[ more ]  [ reply ]
[ MDKSA-2006:025 ] - Updated net-snmp packages fix vulnerabilities 2006-01-27
security mandriva com

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDKSA-2006:025
http://www.mandriva.com/security/
____________________________________________________________________

[ more ]  [ reply ]
CAID 33778 - CA iGateway Content-Length Buffer Overflow Vulnerability [v1.1] 2006-01-27
Williams, James K (James Williams ca com)

Please see below for important changes to CAID 33778.
Changelog is near end of advisory.

Regards,
Ken Williams

Title: CAID 33778 - CA iGateway Content-Length Buffer Overflow
Vulnerability [v1.1]

CA Vulnerability ID: 33778

CA Advisory Date: 2006-01-23
Updated Advisory [v1.1]: 2006-01-26

Disco

[ more ]  [ reply ]
hello 2006-01-27
code shell yahoo com

ASPThai Forums Version 8.0 & Lower Sql Injection Vulnerability
ASPThai is Prudoct of www.ASPThai.net and Made in Thailand
author : code.shell , <code.shell (at) yahoo (dot) com [email concealed]>

########################################################
Target:

http://www.example.com/[Forum target]/login.asp

username: admi

[ more ]  [ reply ]
[ MDKSA-2006:023 ] - Updated perl-Net_SSLeay packages fix vulnerability 2006-01-26
security mandriva com

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDKSA-2006:023
http://www.mandriva.com/security/
____________________________________________________________________

[ more ]  [ reply ]
[Argeniss] Oracle Database Buffer overflows vulnerabilities in public procedures of XDB.DBMS_XMLSCHEMA{_INT} 2006-01-26
Cesar (cesarc56 yahoo com)
Argeniss Security Advisory

Name: Oracle Database Buffer overflows
vulnerabilities in public procedures of
XDB.DBMS_XMLSCHEMA{_INT}
Affected Software: Oracle Database Server versions
9iR2 and 10gR1
Severity: High
Remote exploitable: Yes (Authentication to Database
Server is needed)
Credits: Es

[ more ]  [ reply ]
[SECURITY] [DSA 952-1] New libapache-auth-ldap packages fix arbitrary code execution 2006-01-23
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 952-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Moritz Muehlenhoff
January 23rd, 2006

[ more ]  [ reply ]
(Page 1216 of 1748)  < Prev  1211 1212 1213 1214 1215 1216 1217 1218 1219 1220 1221  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus