rPath Security Advisory: 2006-0142-1
Published: 2006-08-01
Products: rPath Linux 1
Rating: Severe
Exposure Level Classification:
Remote User Deterministic Unauthorized Access
Updated Versions:
libtiff=/[EMAIL PROTECTED]:devel//1/3.8.2-3-0.1
References:
Hi,
I am happy to announce to the first incarnation of
http://research.eEye.com. On this site you can find everything from our
previously released advisories to our previously unreleased research
tools. A lot of these tools are seeing daylight for the first time
outside of eEye so we do expect
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- --
Debian Security Advisory DSA 1134-1[EMAIL PROTECTED]
http://www.debian.org/security/ Martin Schulze
August 2nd, 2006
==
Secunia Research 02/08/2006
- Jetbox Multiple Vulnerabilities -
==
Table of Contents
Affected
On Tue, 1 Aug 2006 [EMAIL PROTECTED] wrote:
Symantec has posted a Security Advisory for Symantec On-Demand Protection.
PLease see the advisory for complete information:
http://www.symantec.com/avcenter/security/Content/2006.08.01a.html
This Symantec posting contains minimal security
///CYBER-WARRiOR.ORG\
#SaveWeb Portal 3.4 - (SITE_Path) Remote File Inclusion Vulnerability
-
#Author: xoron
-
#script: SaveWeb Portal
-
#Class : Remote
-
[EMAIL PROTECTED]: x0r0n[at]hotmail[dot]com
-
#CODE:
Content Management Framework G3 - XSS Vulnerability in Search Function
INTRO
According to the manufacturer, G3 is a classic content-management-system,
allowing customers to manage their own websites without knowing much about
webpublishing.
Information about the product is available at:
rPath Security Advisory: 2006-0143-1
Published: 2006-08-02
Products: rPath Linux 1
Rating: Severe
Exposure Level Classification:
Remote User Deterministic Unauthorized Access
Updated Versions:
gnupg=/[EMAIL PROTECTED]:devel//1/1.4.5-1-0.1
References:
===
Ubuntu Security Notice USN-330-1August 02, 2006
tiff vulnerabilities
CVE-2006-3459, CVE-2006-3460, CVE-2006-3461, CVE-2006-3462,
CVE-2006-3463, CVE-2006-3464, CVE-2006-3465
New eVuln Advisory:
MyBB 'Avatar URL' XSS Vulnerability
http://evuln.com/vulns/132/summary.html
Summary
eVuln ID: EV0132
Vendor: MyBB Group
Vendor's Web Site: http://www.mybboard.com/
Software: MyBB
Sowtware's Web Site: http://www.mybboard.com/
What is the purpose of this password?
I do not see it documented anywhere and not only do I see no way to remove
it, but I see no reason for it AT ALL
Thank you for both Barracuda posts!
~pingywon MCSE
www.pingywon.com
www.illmob.org
www.freeillwill.com
- Original Message -
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c00629555
Version: 13
HPSBUX02108 SSRT061133 rev.13 - HP-UX Running Sendmail,
Remote Execution of Arbitrary Code
NOTICE: The information in this Security Bulletin should be acted upon as soon
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- --
Debian Security Advisory DSA 1137-1[EMAIL PROTECTED]
http://www.debian.org/security/ Martin Schulze
August 2nd, 2006
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- --
Debian Security Advisory DSA 1136-1[EMAIL PROTECTED]
http://www.debian.org/security/ Martin Schulze
August 2nd, 2006
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c00680632
Version: 1
HPSBUX02124 SSRT061159 rev.1 - HP-UX Sendmail MIME Remote Denial of Service
(DoS)
NOTICE: The information in this Security Bulletin should be acted upon as soon
as
OZJournal v1.5
Homepage:
http://ozjournals.awardspace.com/index.php
Affected files:
search input box
index.php
viewing archives
show comment page
XSS vulnerability via search input box:
Data isn't properly sanatized before being displayed. For
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c00732233
Version: 1
HPSBGN02136 SSRT061173 rev.1 - ProCurve Series 3500yl, 6200yl, and 5400zl
Switches Running Software Prior to K.11.33 Remote Denial of Service (DoS)
NOTICE: The information
Version 4.1.2p2 of Hobbit has just been uploaded to SourceForge,
and is available at
http://sourceforge.net/project/showfiles.php?group_id=128058package_id=140220release_id=436594
This release fixes a security bug reported by Jason Kruse earlier
today: File access via the Hobbit config method
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- --
Debian Security Advisory DSA 1135-1[EMAIL PROTECTED]
http://www.debian.org/security/ Martin Schulze
August 2nd, 2006
Simpliciti Locked Browser Jail Breakout Vulnerability
ESRL
Discovery Date: March 20, 2006
Discovery By: Adam Baldwin ([EMAIL PROTECTED])
Versions Effected: All versions
Background:
Simpliciti Locked Browser is a product that provides no-programming
required PC lockdown... functionality for
20 matches
Mail list logo