[ GLSA 200709-14 ] ClamAV: Multiple vulnerabilities

2007-09-20 Thread Pierre-Yves Rofes
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200709-14 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

[ MDKSA-2007:186 ] - Updated openoffice.org packages fix TIFF parser vulnerability

2007-09-20 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDKSA-2007:186 http://www.mandriva.com/security/ ___

rPSA-2007-0194-1 kdebase

2007-09-20 Thread rPath Update Announcements
rPath Security Advisory: 2007-0194-1 Published: 2007-09-20 Products: rPath Linux 1 Rating: Major Exposure Level Classification: Local Root Deterministic Unauthorized Access Updated Versions: kdebase=/[EMAIL PROTECTED]:devel//1/3.4.2-3.14-1 rPath Issue Tracking System: https://issues.rp

[ GLSA 200709-13 ] rsync: Two buffer overflows

2007-09-20 Thread Raphael Marichez
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200709-13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - -

Vigile CMS v1.8 Multiple Remote XSS Vulnerability

2007-09-20 Thread x0kster
# Name : Vigile CMS v1.8 Multiple Remote XSS Vulnerability # Download : http://www.itcms.it/ # Date : 20-09-2007 # Author : x0kster # Mail : [EMAIL PROTECTED] # Note : For works, the wiki or the download module must be installed in the site. # # PoCs : # # Wiki 1 : http://[S

Re: 0day: PDF pwns Windows

2007-09-20 Thread Aditya K Sood
pdp (architect) wrote: http://www.gnucitizen.org/blog/0day-pdf-pwns-windows I am closing the season with the following HIGH Risk vulnerability: Adobe Acrobat/Reader PDF documents can be used to compromise your Windows box. Completely!!! Invisibly and unwillingly!!! All it takes is to open a PDF

PHP-Nuke add admin ALL Versions

2007-09-20 Thread h3llcode
Paste this code into an HTML page then link it to victim (victim must be admin) http://VICTIMURL/nuke/admin.php"; target="aiuto" METHOD=POST> document.Faiuto.submit() You are admin now ;)

WebED-0.8999 Multiple Remote File Inclusion Vulnerability

2007-09-20 Thread h3llcode
--- Multiple Remote File Inclusion Vulnerability --- # Founded by : Seph1roth # Download Script: http://sourceforge.net/projects/ed-engine/ WebED-0.8999.tar.gz # Exploit:

PhpBB Xs 2 profile.php Permanent Xss Vulnerability

2007-09-20 Thread h3llcode
+++ PhpBB Xs 2 profile.php Permanent Xss Vulnerability +++ #Found By Seph1roth +++ [POST METHOD] Corrupted pa

Re: 0day: PDF pwns Windows

2007-09-20 Thread pdp (architect)
> My upcoming research feature everything regarding this and the issue you > have > already discussed. really :).. which one... the one from last year? On 9/20/07, Aditya K Sood <[EMAIL PROTECTED]> wrote: > pdp (architect) wrote: > > http://www.gnucitizen.org/blog/0day-pdf-pwns-windows > > > > I

Re: Security Advisory for Bugzilla 3.0.1 and 3.1.1

2007-09-20 Thread tkevans
What about 2.20?

Re: 0day: PDF pwns Windows

2007-09-20 Thread Gadi Evron
Impressive vulnerability, new. Not a 0day. Not to start an argument again, but fact is, people stop calling everything a 0day unless it is, say WMF, ANI, etc. exploited in the wild without being known. I don't like the mis-use of this buzzword. Gadi. On Thu, 20 Sep 2007, pdp (archi

WebBatch Applications Cross Site Scripting Vulrnability

2007-09-20 Thread DoZ
[HSC] WebBatch Applications Cross Site Scripting Vulrnability This issue is due to a failure in the application to properly sanitize user-supplied input. Attackers may exploit this issue via a web client. An attacker may leverage this issue to have arbitrary script code execute in the browser o

SimplePHPBlog Hacking

2007-09-20 Thread webmaster666
How to hack a server with Simple PHP Blog uploading an htacess file from img_upload_cgi.php page. Tested on v0.4.9 by Demential http://www.hackish.eu mailto: [EMAIL PROTECTED] video here: http://hackish.eu/video/phpblog.avi vlc download: http://www.videolan.org/vlc/

[security bulletin] HPSBUX02249 SSRT071442 rev.2 - HP-UX Running the Ignite-UX or the DynRootDisk (DRD) get_system_info Command, Local Unqualified Configuration Change

2007-09-20 Thread security-alert
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 SUPPORT COMMUNICATION - SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c01118367 Version: 2 HPSBUX02249 SSRT071442 rev.2 - HP-UX Running the Ignite-UX or the DynRootDisk (DRD) get_system_info Command, Local Unqualified Configuration Change

[SECURITY] [DSA 1364-2] New vim packages fix several vulnerabilities

2007-09-20 Thread dann frazier
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - -- Debian Security Advisory DSA 1364-2[EMAIL PROTECTED] http://www.debian.org/security/ dann frazier September 19th, 2007

VMSA-2007-0006 Critical security updates for all supported versions of VMware ESX Server, VMware Server, VMware Workstation, VMware ACE, and VMware Player

2007-09-20 Thread VMware Security team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 - - --- VMware Security Advisory Advisory ID: VMSA-2007-0006 Synopsis: Critical security updates for all supported versions of VMwar

[security bulletin] HPSBUX02251 SSRT071449 rev.2 - HP-UX Running BIND, Remote DNS Cache Poisoning

2007-09-20 Thread security-alert
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c01123426 Version: 2 HPSBUX02251 SSRT071449 rev.2 - HP-UX Running BIND, Remote DNS Cache Poisoning NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. R

[Mlabs] Scrutinising SIP Payloads : Traversing Attack Vectors in VOIP and IM

2007-09-20 Thread Aditya K Sood
Hi I have released core research paper on SIP comprising of Payload problems and Attack vectors. This research paper lays stress on the potential weaknesses present in the SIP which make it vulnerable to stringent attacks. The point of discussion is to understand the weak spots in the protocol.

0day: PDF pwns Windows

2007-09-20 Thread pdp (architect)
http://www.gnucitizen.org/blog/0day-pdf-pwns-windows I am closing the season with the following HIGH Risk vulnerability: Adobe Acrobat/Reader PDF documents can be used to compromise your Windows box. Completely!!! Invisibly and unwillingly!!! All it takes is to open a PDF document or stumble acros

Security Advisory for Bugzilla 3.0.1 and 3.1.1

2007-09-20 Thread mkanat
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Summary === Bugzilla is a Web-based bug-tracking system, used by a large number of software projects. This advisory covers a critical security issue that has recently been fixed in the Bugzilla code: * Even with account creation disabled, users