-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDKSA-2006:142
http://www.mandriva.com/security/
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDKSA-2006:141
http://www.mandriva.com/security/
[EMAIL PROTECTED] schrieb am Mon, 7 Aug 2006 20:19:08 +:
--
Vulnerability:
~
in index.php We Found Vulnerability Script
--index.php--
?php
###
# local file include in PHP-Nuke (autohtml.php)
#
# Rish : High
#
# Class : Local
#
# Script : autohtml.php
#
# Thanks : www.lezr.com/vb All kuwait hackers
#
# Link : http://www.lezr.com/vb/showthread.php?p=104324
#
Mailslot bug (MS06-035)
vs.
non-Mailslot bug(MS0?-???/CVE-2006-3942)
This is the story of a yet unpatched bug which is not a 0-day.
Time line:
2006-07-12 - MS06-035 Published by Microsoft [1]
2006-07-12 - Windows Mailslot (MS06-035) DoS module
Advisory ID:
XSec-06-02
Advisory Name:
Internet Explorer (IMSKDIC.DLL) COM Object Instantiation Vulnerability
Release Date:
08/15/2006
Tested on:
Internet Explorer 6.0 SP1 on Microsoft Windows XP SP2 CN
Affected version:
Internet Explorer 6.0
Author:
nop nop#xsec.org
http://www.xsec.org
Hey Steve,
Steven M. Christey schrieb am Mon, 14 Aug 2006 17:54:59 -0400:
Carsten Eilers said:
Take a look at the top of cal_config.inc.php:
# adjust the '$calpath'.
# hardcode it if detection does not work and comment out the remaining
# code.
#
# $calpath = C:\\PHP\\calendarix\\demo\\
Advisory ID:
XSec-06-03
Advisory Name:
Internet Explorer (CHTSKDIC.DLL) COM Object Instantiation Vulnerability
Release Date:
08/15/2006
Tested on:
Internet Explorer 6.0 SP1 on Microsoft Windows XP SP2 CN
Affected version:
Internet Explorer 6.0
Author:
nop nop#xsec.org
http://www.xsec.org
vendor:http://www.dream4.de
dork:powered by Koobi Pro 5.6
vuln :
http://[host]/index.php?p=showtopictoid=[SQL]
http://[host]/index.php?p=showtopictoid=[XSS]
Path Disclosure:http://[host]/index.php?area=1p='
Author : Vampire
[EMAIL PROTECTED]
Homepage : Www.HackerZ.iR
Advisory ID:
XSec-06-04
Advisory Name:
Internet Explorer (msoe.dll) COM Object Instantiation Vulnerability
Release Date:
08/15/2006
Tested on:
Internet Explorer 6.0 SP1 on Microsoft Windows 2000 SP4 / XP SP2 CN
Affected version:
Internet Explorer 6.0
Author:
nop nop#xsec.org
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- --
Debian Security Advisory DSA 1151-1[EMAIL PROTECTED]
http://www.debian.org/security/ Martin Schulze
August 15th, 2006
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c00749123
Version: 1
HPSBUX02141 SSRT51153 rev.1 - HP-UX in Trusted mode, Local Denial of Service
(DoS)
NOTICE: The information in this Security Bulletin should be acted upon as soon
as
vendor:
http://www.jakeo.com
vuln :
http://[host]/foto/index.php?path=../../etc/passwd
http://[host]/foto/index.php?path=bxss/b
http://[host]/foto/index.php?path=../../[directory listing]
Author : Vampire
[EMAIL PROTECTED]
Homepage : Www.HackerZ.iR
Www.H4ckerZ.Com
Iran HackerZ
Here's another separate issue that typically causes fault on memory access
to website-influenced memory access:
http://lcamtuf.coredump.cx/ffoxdie3.html
This is separate from the previously presented example (which, remarkably,
also had a tendency to trigger an unrelated call stack overflow due
!WWW.SiBERSAVASCiLAR.COM!
Title : Lizge V.20 Web Portal File Include Vulnerability
#Author: Crackers_Child
#!/usr/bin/perl
###
# Aria-Security.net Advisory
Core Security Technologies Advisory
http://www.coresecurity.com
Microsoft SRV.SYS SMB_COM_TRANSACTION Denial of Service
Date Published: 2006-08-14
Last Update: 2006-08-14
Advisory ID: CORE-2006-0714
Bugtraq ID: 19215
CVE Name:
17 matches
Mail list logo