-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
- --
Trustix Secure Linux Security Advisory #2006-0054
Package names: openssh, openssl
Summary: Multiple vulnerabilities
Date: 2006-09-29
Affected
==
Secunia Research 29/09/2006
- Joomla BSQ Sitestats Component Multiple Vulnerabilities -
==
Table of Contents
Affected
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
=
FreeBSD-SA-06:23.opensslSecurity Advisory
The FreeBSD Project
Topic:
[MajorSecurity Advisory #28]ConPresso CMS - Multiple XSS and SQL Injection
Issues
Details
===
Product: ConPresso CMS
Affected Version: =4.0.4a
Immune Version: 4.0.5a
Security-Risk: moderated
Remote-Exploit: yes
Vendor-URL: http://www.conpresso.com/
Vendor-Status: informed
Hello,,
UBB.threads Multiple input validation error
Discovered By : HACKERS PAL
Copy rights : HACKERS PAL
Website : http://www.soqor.net
Email Address : [EMAIL PROTECTED]
Tested on Version 6 (6.5.1.1) and other versions maybe affected
Remote File including :
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hardened-PHP Project
www.hardened-php.net
-= Security Advisory =-
Advisory: PHProjekt (Remote) Include Vulnerabilities
Release Date: 2006/09/29
Last Modified: 2006/09/29
Hi,
There is a sql injection bug in PostNuke 0.762 admin section (and maybe
before versions) .
The hits parameter is not checked properly before be used in sql query :
File /modules/Downloads/admin.php, Line 1586 :
:: $dbconn-Execute(INSERT INTO $downtable
::
Hi Aviv/Pukhraj others:
As a security professional and researchers, our aim is to provide
more in-depth information on intrusion (security) aspects, for
example, some virus out-break, new windows vulnerability etc. Aviv is
right by saying that signatures should match the vulnerability, not
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDKSA-2006:173
http://www.mandriva.com/security/
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDKSA-2006:174
http://www.mandriva.com/security/
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDKSA-2006:175
http://www.mandriva.com/security/
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDKSA-2006:176
http://www.mandriva.com/security/
Matasano Security Advisory
MacOS X Mach Exception Server Privilege Escalation
Release Date:Fri Sep 29 2006
Affects: MacOS X 10.4 10.4.8, 10.3.*, OpenStep 4.2
Severity:High - Local root privilege escalation
Credit:
Determina has released a free, downloadable fix for the WebFolderIcon setSlice
vulnerability. This standalone fix for Internet Explorer will prevent this
critical vulnerabilty from being exploited until Microsoft is able to issue a
patch. Desktop users without proactive protection against
rPath Security Advisory: 2006-0175-2
Published: 2006-09-28
Updated:
2006-09-29 Resolved issue in patch for CVE-2006-2940
Products: rPath Linux 1
Rating: Major
Exposure Level Classification:
Remote Deterministic Unauthorized Access
Updated Versions:
openssl=/[EMAIL
rPath Security Advisory: 2006-0176-1
Published: 2006-09-29
Products: rPath Linux 1
Rating: Minor
Exposure Level Classification:
Local Deterministic Privilege Escalation
Updated Versions:
openldap=/[EMAIL PROTECTED]:devel//1/2.2.26-8.4-1
openldap-clients=/[EMAIL
Whitehat.org.uk Advisory (1)
Mercury SiteScope 8.2 (8.1.2.0) Cross Site Scripting (XSS) Vulnerability
Vulnerability Type: Active code injection (XSS)
Problem Discovered: 14 September 2006
Vendor Contacted: 14 September 2006
Advisory Published: 29 September 2006
Abstract:
Mercury
17 matches
Mail list logo