DMA[2006-0628a] - 'Apple OSX launchd unformatted syslog() vulnerability'

2006-06-29 Thread K F (lists)
You couldn't be more wrong if you called it a Canadian Goose! -KF #!/usr/bin/perl # http://www.digitalmunition.com/FailureToLaunch.pl # Code by Kevin Finisterre kf_lists[at]digitalmunition[dot]com # # This is a practical application of Non Executable Stack Lovin -

[ GLSA 200606-29 ] Tikiwiki: SQL injection and multiple XSS vulnerabilities

2006-06-29 Thread Sune Kloppenborg Jeppesen
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200606-29 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - -

CSRF in Nuked Klan 1.7 SP4.2

2006-06-29 Thread blwood
# Discovered by Blwood # http://www.blwood.net CSRF : Cross Site Request Forgery If admin click on a link like this http://www.site.com/index.php?file=Adminpage=blockop=del_blockbid=X Where X is an ID of a block Block ID X will be destroyed... Nuked Klan Website :

[ MDKSA-2006:115 ] - Updated mutt packages fix buffer overflow vulnerability

2006-06-29 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDKSA-2006:115 http://www.mandriva.com/security/

Secunia Research: phpRaid SQL Injection and File Inclusion Vulnerabilities

2006-06-29 Thread Secunia Research
== Secunia Research 29/06/2006 - phpRaid SQL Injection and File Inclusion Vulnerabilities - == Table of Contents Affected

[ GLSA 200606-28 ] Horde Web Application Framework: XSS vulnerability

2006-06-29 Thread Sune Kloppenborg Jeppesen
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200606-28 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - -

Digital Armaments Security Advisory 29.06.2006: Siemens Speedstream Wireless Router Password Protection Bypass Vulnerability

2006-06-29 Thread info
Digital Armaments advisory is 05.02.2006 http://www.digitalarmaments.com/2006290674551938.html I. Background The SpeedStream Wireless DSL/Cable Router is usually adopted for home and small business solutions. Together with an existing DSL or cable modem connection, this affordable, easy to

rPSA-2006-0116-1 mutt

2006-06-29 Thread Justin M. Forbes
rPath Security Advisory: 2006-0116-1 Published: 2006-06-29 Products: rPath Linux 1 Rating: Minor Exposure Level Classification: Remote User Deterministic Denial of Service Updated Versions: mutt=/[EMAIL PROTECTED]:devel//1/1.4.2.1-17-0.1 References:

Novell Security contact address change

2006-06-29 Thread Roman Drahtmueller
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Thu Jun 29 18:00:00 CEST 2006 The Novell Security Team wishes to update the security contact address and the corresponding pgp/gpg key. Persons or organizations who wish to get in contact with Novell Security are invited to use the new address

Softbiz Banner Exchange 1.0 XSS

2006-06-29 Thread securityconnection
Softbiz Banner Exchange Network 1.0 http://softbizscripts.com -- Cross Site Scripting (XSS) -- POST http://target.xx:80/insertmember.php HTTP/1.0 Accept: */* Content-Type: application/x-www-form-urlencoded Host: target.xx Content-Length: 152

Novell Security Announcement NOVELL-SA:2006:001

2006-06-29 Thread Jim Short
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Novell Security Announcement Product Name: Novell GroupWise Announcement ID:NOVELL-SA:2006:001 Date: Wed Jun 28 13:00:00

[security bulletin] HPSBTU02125 SSRT061105 rev.1 - HP Tru64 UNIX Running Perl 5.8.2 and earlier, Local Unauthorized Code Execution

2006-06-29 Thread security-alert
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c00686865 Version: 1 HPSBTU02125 SSRT061105 rev.1 - HP Tru64 UNIX Running Perl 5.8.2 and earlier, Local Unauthorized Code Execution NOTICE: The information in this Security Bulletin should be

[security bulletin] HPSBUX02122 SSRT061158 rev.2 - HP-UX Mozilla Remote Execution of Arbitrary Code, Denial of Service (DoS)

2006-06-29 Thread security-alert
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c00679472 Version: 2 HPSBUX02122 SSRT061158 rev.2 - HP-UX Mozilla Remote Execution of Arbitrary Code, Denial of Service (DoS) NOTICE: The information in this Security Bulletin should be acted

[ MDKSA-2006:114 ] - Updated libwmf packages fixes embedded GD vulnerability

2006-06-29 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDKSA-2006:114 http://www.mandriva.com/security/

Msie 7.0 beta Crash

2006-06-29 Thread Mr . Niega
/* * * Msie 7.0 Beta crash [Proof of concept] * Bug discovered by Mr.Niega * http://www.swerat.com/ * * Affected Software: Internet Explorer 7.0 Beta * Severity: Unknown * Impact: Crash * Solution Status: Unpatched * * E-Mail: [EMAIL PROTECTED] [EMAIL PROTECTED] * __ __ __ __

rPSA-2006-0120-1 gnupg

2006-06-29 Thread Justin M. Forbes
rPath Security Advisory: 2006-0120-1 Published: 2006-06-29 Products: rPath Linux 1 Rating: Major Exposure Level Classification: Remote User Deterministic Vulnerability Updated Versions: gnupg=/[EMAIL PROTECTED]:devel//1/1.4.4-1-0.1 References: