[ MDKSA-2006:142 ] - Updated heartbeat packages fix vulnerability

2006-08-15 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDKSA-2006:142 http://www.mandriva.com/security/

[ MDKSA-2006:141 ] - Updated gnupg packages fix vulnerability

2006-08-15 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDKSA-2006:141 http://www.mandriva.com/security/

Re: phpPrintAnalyzer = 1.1 (rep_par_rapport_racine) Remote File Inclusion Vulnerability

2006-08-15 Thread Carsten Eilers
[EMAIL PROTECTED] schrieb am Mon, 7 Aug 2006 20:19:08 +: -- Vulnerability: ~ in index.php We Found Vulnerability Script --index.php-- ?php

local file include in PHP-Nuke (autohtml.php)

2006-08-15 Thread MosT3mR
### # local file include in PHP-Nuke (autohtml.php) # # Rish : High # # Class : Local # # Script : autohtml.php # # Thanks : www.lezr.com/vb All kuwait hackers # # Link : http://www.lezr.com/vb/showthread.php?p=104324 #

Mailslot bug (MS06-035) vs non-Mailslot bug (CVE-2006-3942)

2006-08-15 Thread Gerardo Richarte
Mailslot bug (MS06-035) vs. non-Mailslot bug(MS0?-???/CVE-2006-3942) This is the story of a yet unpatched bug which is not a 0-day. Time line: 2006-07-12 - MS06-035 Published by Microsoft [1] 2006-07-12 - Windows Mailslot (MS06-035) DoS module

[XSec-06-02]: Internet Explorer (IMSKDIC.DLL) COM Object Instantiation Vulnerability

2006-08-15 Thread nop
Advisory ID: XSec-06-02 Advisory Name: Internet Explorer (IMSKDIC.DLL) COM Object Instantiation Vulnerability Release Date: 08/15/2006 Tested on: Internet Explorer 6.0 SP1 on Microsoft Windows XP SP2 CN Affected version: Internet Explorer 6.0 Author: nop nop#xsec.org http://www.xsec.org

Re: Calendarix = 0.7 (calpath) Remote File Inclusion Vulnerability

2006-08-15 Thread Carsten Eilers
Hey Steve, Steven M. Christey schrieb am Mon, 14 Aug 2006 17:54:59 -0400: Carsten Eilers said: Take a look at the top of cal_config.inc.php: # adjust the '$calpath'. # hardcode it if detection does not work and comment out the remaining # code. # # $calpath = C:\\PHP\\calendarix\\demo\\

[XSec-06-03]: Internet Explorer (CHTSKDIC.DLL) COM Object Instantiation Vulnerability

2006-08-15 Thread nop
Advisory ID: XSec-06-03 Advisory Name: Internet Explorer (CHTSKDIC.DLL) COM Object Instantiation Vulnerability Release Date: 08/15/2006 Tested on: Internet Explorer 6.0 SP1 on Microsoft Windows XP SP2 CN Affected version: Internet Explorer 6.0 Author: nop nop#xsec.org http://www.xsec.org

Koobi Pro CMS 5.6 SQL injection XSS

2006-08-15 Thread vampire_chiristof
vendor:http://www.dream4.de dork:powered by Koobi Pro 5.6 vuln : http://[host]/index.php?p=showtopictoid=[SQL] http://[host]/index.php?p=showtopictoid=[XSS] Path Disclosure:http://[host]/index.php?area=1p=' Author : Vampire [EMAIL PROTECTED] Homepage : Www.HackerZ.iR

[XSec-06-04]: Internet Explorer (msoe.dll) COM Object Instantiation Vulnerability

2006-08-15 Thread nop
Advisory ID: XSec-06-04 Advisory Name: Internet Explorer (msoe.dll) COM Object Instantiation Vulnerability Release Date: 08/15/2006 Tested on: Internet Explorer 6.0 SP1 on Microsoft Windows 2000 SP4 / XP SP2 CN Affected version: Internet Explorer 6.0 Author: nop nop#xsec.org

[SECURITY] [DSA 1151-1] New heartbeat packages fix denial of service

2006-08-15 Thread Martin Schulze
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 1151-1[EMAIL PROTECTED] http://www.debian.org/security/ Martin Schulze August 15th, 2006

[security bulletin] HPSBUX02141 SSRT51153 rev.1 - HP-UX in Trusted mode, Local Denial of Service (DoS)

2006-08-15 Thread security-alert
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c00749123 Version: 1 HPSBUX02141 SSRT51153 rev.1 - HP-UX in Trusted mode, Local Denial of Service (DoS) NOTICE: The information in this Security Bulletin should be acted upon as soon as

otopholder 1.8 suffers from a local file inclusion,XSS and directory listing vuln

2006-08-15 Thread vampire_chiristof
vendor: http://www.jakeo.com vuln : http://[host]/foto/index.php?path=../../etc/passwd http://[host]/foto/index.php?path=bxss/b http://[host]/foto/index.php?path=../../[directory listing] Author : Vampire [EMAIL PROTECTED] Homepage : Www.HackerZ.iR Www.H4ckerZ.Com Iran HackerZ

Re: Concurrency-related vulnerabilities in browsers - expect problems

2006-08-15 Thread Michal Zalewski
Here's another separate issue that typically causes fault on memory access to website-influenced memory access: http://lcamtuf.coredump.cx/ffoxdie3.html This is separate from the previously presented example (which, remarkably, also had a tendency to trigger an unrelated call stack overflow due

Lizge V.20 Web Portal File Include Vulnerability

2006-08-15 Thread crackers_child
!WWW.SiBERSAVASCiLAR.COM! Title : Lizge V.20 Web Portal File Include Vulnerability #Author: Crackers_Child

fusionnews 3,7 Remote File Inclusion

2006-08-15 Thread Outlaw
#!/usr/bin/perl ### # Aria-Security.net Advisory

CORE-2006-0714: Microsoft SRV.SYS SMB_COM_TRANSACTION Denial of Service

2006-08-15 Thread Core Security Technologies advisories
Core Security Technologies Advisory http://www.coresecurity.com Microsoft SRV.SYS SMB_COM_TRANSACTION Denial of Service Date Published: 2006-08-14 Last Update: 2006-08-14 Advisory ID: CORE-2006-0714 Bugtraq ID: 19215 CVE Name: