TSLSA-2006-0054 - multi

2006-09-29 Thread Trustix Security Advisor
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Trustix Secure Linux Security Advisory #2006-0054 Package names: openssh, openssl Summary: Multiple vulnerabilities Date: 2006-09-29 Affected

Secunia Research: Joomla BSQ Sitestats Component Multiple Vulnerabilities

2006-09-29 Thread Secunia Research
== Secunia Research 29/09/2006 - Joomla BSQ Sitestats Component Multiple Vulnerabilities - == Table of Contents Affected

FreeBSD Security Advisory FreeBSD-SA-06:23.openssl [REVISED]

2006-09-29 Thread FreeBSD Security Advisories
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 = FreeBSD-SA-06:23.opensslSecurity Advisory The FreeBSD Project Topic:

[MajorSecurity Advisory #28]ConPresso CMS - Multiple Cross Site Scripting and SQL Injection Issues

2006-09-29 Thread admin
[MajorSecurity Advisory #28]ConPresso CMS - Multiple XSS and SQL Injection Issues Details === Product: ConPresso CMS Affected Version: =4.0.4a Immune Version: 4.0.5a Security-Risk: moderated Remote-Exploit: yes Vendor-URL: http://www.conpresso.com/ Vendor-Status: informed

UBB.threads Multiple input validation error

2006-09-29 Thread security
Hello,, UBB.threads Multiple input validation error Discovered By : HACKERS PAL Copy rights : HACKERS PAL Website : http://www.soqor.net Email Address : [EMAIL PROTECTED] Tested on Version 6 (6.5.1.1) and other versions maybe affected Remote File including :

Advisory 06/2006: PHProjekt (Remote) Include Vulnerabilities

2006-09-29 Thread Stefan Esser
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hardened-PHP Project www.hardened-php.net -= Security Advisory =- Advisory: PHProjekt (Remote) Include Vulnerabilities Release Date: 2006/09/29 Last Modified: 2006/09/29

Sql injection in PostNuke [Admin section]

2006-09-29 Thread Omid
Hi, There is a sql injection bug in PostNuke 0.762 admin section (and maybe before versions) . The hits parameter is not checked properly before be used in sql query : File /modules/Downloads/admin.php, Line 1586 : :: $dbconn-Execute(INSERT INTO $downtable ::

Re: [Full-disclosure] VML Exploit vs. AV/IPS/IDS signatures

2006-09-29 Thread SanjayR
Hi Aviv/Pukhraj others: As a security professional and researchers, our aim is to provide more in-depth information on intrusion (security) aspects, for example, some virus out-break, new windows vulnerability etc. Aviv is right by saying that signatures should match the vulnerability, not

[ MDKSA-2006:173 ] - Updated ffmpeg packages fix buffer overflow vulnerabilities

2006-09-29 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDKSA-2006:173 http://www.mandriva.com/security/

[ MDKSA-2006:174 ] - Update gstreamer-ffmpeg packages fix buffer overflow vulnerabilities

2006-09-29 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDKSA-2006:174 http://www.mandriva.com/security/

[ MDKSA-2006:175 ] - Updated mplayer packages fix buffer overflow vulnerabilities

2006-09-29 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDKSA-2006:175 http://www.mandriva.com/security/

[ MDKSA-2006:176 ] - Updated xine-lib packages fix buffer overflow vulnerabilities

2006-09-29 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDKSA-2006:176 http://www.mandriva.com/security/

Matasano Advisory: MacOS X Mach Exception Server Privilege Escalation

2006-09-29 Thread Matasano Advisories
Matasano Security Advisory MacOS X Mach Exception Server Privilege Escalation Release Date:Fri Sep 29 2006 Affects: MacOS X 10.4 10.4.8, 10.3.*, OpenStep 4.2 Severity:High - Local root privilege escalation Credit:

Determina zero-day fix for CVE-2006-3730 (WebViewFolderIcon setSlice Integer Overflow)

2006-09-29 Thread Alexander Sotirov
Determina has released a free, downloadable fix for the WebFolderIcon setSlice vulnerability. This standalone fix for Internet Explorer will prevent this critical vulnerabilty from being exploited until Microsoft is able to issue a patch. Desktop users without proactive protection against

rPSA-2006-0175-2 openssl openssl-scripts

2006-09-29 Thread rPath Update Announcements
rPath Security Advisory: 2006-0175-2 Published: 2006-09-28 Updated: 2006-09-29 Resolved issue in patch for CVE-2006-2940 Products: rPath Linux 1 Rating: Major Exposure Level Classification: Remote Deterministic Unauthorized Access Updated Versions: openssl=/[EMAIL

rPSA-2006-0176-1 openldap openldap-clients openldap-servers

2006-09-29 Thread rPath Update Announcements
rPath Security Advisory: 2006-0176-1 Published: 2006-09-29 Products: rPath Linux 1 Rating: Minor Exposure Level Classification: Local Deterministic Privilege Escalation Updated Versions: openldap=/[EMAIL PROTECTED]:devel//1/2.2.26-8.4-1 openldap-clients=/[EMAIL

Mercury SiteScope 8.2 (8.1.2.0) Cross Site Scripting (XSS) Vulnerability

2006-09-29 Thread ozkan . aziz
Whitehat.org.uk Advisory (1) Mercury SiteScope 8.2 (8.1.2.0) Cross Site Scripting (XSS) Vulnerability Vulnerability Type: Active code injection (XSS) Problem Discovered: 14 September 2006 Vendor Contacted: 14 September 2006 Advisory Published: 29 September 2006 Abstract: Mercury