Enforcing Java Security Manager in Restricted Windows Environments?

2006-12-08 Thread Jan P. Monsch
Hi Lately I came across several Citrix and Terminal Server projects which provide a restricted set of applications to their users. This is achieved using Windows Software Restriction Policies or AppSense Application Manager to white or black list executables. One of these permitted binaries is of

PhpBB Toplist 1.3.7 Xss Vuln.

2006-12-08 Thread starext
# LiderHack.Org # script name : PhpBB Toplist 1.3.7 #Dork : toplist.php?f=toplistnew # Risk : High # Found By : [EMAIL PROTECTED] # Vulnerable file : Toplist.php # New add sites addres: toplist.php?f=toplistnew #Name: [xss code] & #Information: [xss code] & #Name: Your name & #Name: aler

[USN-394-1] Ruby vulnerability

2006-12-08 Thread Kees Cook
=== Ubuntu Security Notice USN-394-1 December 08, 2006 ruby1.8 vulnerability CVE-2006-6303 === A security issue affects the following Ubuntu releases: Ubuntu 5.10 Ubuntu 6.06

PHP 5.2.0 session.save_path safe_mode and open_basedir bypass

2006-12-08 Thread cxib
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 [PHP 5.2.0 session.save_path safe_mode and open_basedir bypass] Author: Maksymilian Arciemowicz (SecurityReason) Date: - - Written: 02.10.2006 - - Public: 08.12.2006 SecurityAlert Id: 43 CVE: CVE-2006-6383 SecurityRisk: High Affected Software: PHP 5.

Animated Smiley Generator File Include Vul.

2006-12-08 Thread starext
# LiderHack.Org & Trtekforum.com # script name : Animated Smiley Generator # Version : All # script sites : http://smileygenerator.us #Dork : "Smileygenerator" # Risk : High # Found By : [EMAIL PROTECTED] # Vulnerable file :final.php #Error code : require("$smiley/cmd.php"); #Exploit:

ASX Playlists and Jumping to Conclusions

2006-12-08 Thread Sûnnet Beskerming
Hi list(s), The recent coverage of ASX Playlist issues seems somewhat strange. For the uninitiated, here is a quick wrapup: XMPlay ASX buffer overflow PoC code posted to milw0rm - 21 November This PoC demonstrated an exploitable buffer overflow condition in the handling of 'ref href' URIs

LS-20061001 - Computer Associates BrightStor ARCserve Backup v11.5 Remote Buffer Overflow Vulnerability

2006-12-08 Thread advisories
LS-20061001 LSsec has discovered a vulnerability in Computer Associates BrightStor ARCserve Backup v11.5, which could be exploited by an anonymous attacker in order to execute arbitrary code with SYSTEM privileges on an affected system. The flaw specifically exists within the Tape Engine (tapee

LS-20060908 - Computer Associates BrightStor ARCserve Backup v11.5 Remote Buffer Overflow Vulnerability

2006-12-08 Thread advisories
LS-20060908 LSsec has discovered a vulnerability in Computer Associates BrightStor ARCserve Backup v11.5, which could be exploited by an anonymous attacker in order to execute arbitrary code with SYSTEM privileges on an affected system. The flaw specifically exists within the Tape Engine (tapee

Re: Internet Explorer 6 CSS "expression" Denial of Service Exploit (P.o.C.)

2006-12-08 Thread chinese soup
(waiting for the deluge of other lemmings who go: "it works on blahblah with SPblahblah" "confirmed on blahblah with blahblah language" "blablah did not work for me blahblah" can't you just find out the cause and not test EVERY version of IE that you have? I mean, yeah, ok, so you tested it on IE

[CAID 34846]: CA BrightStor ARCserve Backup Discovery Service Buffer Overflow Vulnerability

2006-12-08 Thread Williams, James K
Title: CAID 34846: CA BrightStor ARCserve Backup Discovery Service Buffer Overflow Vulnerability CA Vulnerability ID (CAID): 34846 CA Advisory Date: 2006-12-07 Discovered By: Assurent Secure Technologies (assurent.com) Impact: Remote attacker can execute arbitrary code. Summary: CA BrightSto

Midicart vulerable

2006-12-08 Thread ifx
lintah_|adv|[EMAIL PROTECTED]>=<[MidiCart]<===>[php b/d] _ ___ ___ _ ___ /___ _ / / ooo000-~-~-~-~-~-~-~-~-

Microsoft Word 0-day Vulnerability FAQ (CVE-2006-5994) written

2006-12-08 Thread Juha-Matti Laurio
I have posted Frequently Asked Questions document about the unpatched Microsoft Word zero-day vulnerability. The document entitled as Microsoft Word 0-day Vulnerability FAQ - December 2006, CVE-2006-5994 is located at my SecuriTeam Blogs section, http://blogs.securiteam.com/?p=759 The document

[SECURITY] [DSA-1230-1] new l2tpns packages fix buffer overflow

2006-12-08 Thread Steve Kemp
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - Debian Security Advisory DSA-1230-1 [EMAIL PROTECTED] http://www.debian.org/security/ Steve Kemp December 08, 2006 -

[OpenPKG-SA-2006.038] OpenPKG Security Advisory (tar)

2006-12-08 Thread OpenPKG GmbH
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Publisher Name: OpenPKG GmbH Publisher Home: http://openpkg.com/ Advisory Id (public):OpenPKG-SA-2006.038 Advisory Type: OpenPKG Security Adv

TSLSA-2006-0070 - multi

2006-12-08 Thread Trustix Security Advisor
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Trustix Secure Linux Security Advisory #2006-0070 Package names: gnupg, proftpd Summary: Multiple vulnerabilities Date: 2006-12-08 Affected version

[Aria-Security Team] cPanel BoxTrapper Cross Site Scripting

2006-12-08 Thread Advisory
#Aria-Security Team Advisory # # #Original Advisory #http://www.aria-security.com/forum/showthread.php?t=67 #--- #Software: cPanel Version 11 BoxTrapper #Method: Cross Site Scripting # #PoC: # #http://target:2082/frontend/xtest/mail/manage.ht

[Aria-Security Team] cPanel 11 pops.html Cross-Site Scripting

2006-12-08 Thread Advisory
#Aria-Security Team Advisory # # #Original Advisory: #http://www.aria-security.com/forum/showthread.php?t=68 #--- #Vulnerability: cPanel Version 11 Pops.Html Cross-Site Scripting # #PoC: # #http://target:2082/mail/pops.html?domain=XSS # #Conta

[Aria-Security Team] CentOS 4.2 i686 - WHM X v3.1.0 Cross-Site Scripting

2006-12-08 Thread Advisory
c#Aria-Security Team Advisory # # #Original Advisory: #http://www.aria-security.com/forum/showthread.php?t=44 #--- #Software: WebHost Manager (WHM) #Tested WHM X v3.1.0 (demo.cpanel.net) #Poc: # #http://target:2086/scripts2/changeemail?domain=