FLEA-2007-0015-1: gimp

2007-05-01 Thread Foresight Linux Essential Announcement Service
Foresight Linux Essential Advisory: 2007-0015-1 Published: 2007-04-30 Rating: Minor Updated Versions: gimp=/[EMAIL PROTECTED]:1-devel//1/2.3.16-2-1 group-dist=/[EMAIL PROTECTED]:1-devel//1/1.2.1-0.3-3 References: https://issues.rpath.com/browse/RPL-1318 http://secunia.com/adviso

Re: GHH Portal 1.1 (passwd.txt) Remote Password Disclosure Vulnerability

2007-05-01 Thread Jamie Riden
On 30 Apr 2007 11:10:51 -, [EMAIL PROTECTED] <[EMAIL PROTECTED]> wrote: By [EMAIL PROTECTED] [EMAIL PROTECTED] Biyosecurity.Net & Expw0rm.Com Thanks : Liz0 & DarkXBoyZ & Eno7 & ApAci & Uyuss & Crackers_Child & Th3_43k1R & Xoron & Ajannn Portal : GHH Hi there, GHH is a honeypot, not a

iDefense Security Advisory 04.27.07: VMware Workstation Shared Folders Directory Traversal Vulnerability

2007-05-01 Thread iDefense Labs
VMware Workstation Shared Folders Directory Traversal Vulnerability iDefense Security Advisory 04.27.07 http://labs.idefense.com/intelligence/vulnerabilities/ Apr 27, 2007 I. BACKGROUND VMware Workstation is a software virtualization system which allows multiple virtual computers to run on a sin

ZDI-07-023: Apple QTJava toQTPointer() Pointer Arithmetic Memory Overwrite Vulnerability

2007-05-01 Thread zdi-disclosures
ZDI-07-023: Apple QTJava toQTPointer() Pointer Arithmetic Memory Overwrite Vulnerability http://www.zerodayinitiative.com/advisories/ZDI-07-023.html May 1, 2007 -- CVE ID: CVE-2007-2175 -- Affected Vendor: Apple -- Affected Products: Quicktime -- TippingPoint(TM) IPS Customer Prote

[ GLSA 200705-02 ] FreeType: User-assisted execution of arbitrary code

2007-05-01 Thread Raphael Marichez
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200705-02 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - -

[ GLSA 200705-03 ] Tomcat: Information disclosure

2007-05-01 Thread Raphael Marichez
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200705-03 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - -

[SECURITY] [DSA 1285-1] New wordpress packages fix multiple vulnerabilities

2007-05-01 Thread Noah Meyerhans
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - Debian Security Advisory DSA-1285-1[EMAIL PROTECTED] http://www.debian.org/security/ Noah Meyerhans May 01, 2007 - --

3proxy[v0.5.3g]: (linux/win32 service) remote buffer overflow exploits.

2007-05-01 Thread v9
just for fun... original exploit references: http://fakehalo.us/x3proxy-win32.c http://fakehalo.us/x3proxy.c example(win32 service): - [EMAIL PROTECTED] v9]$ gcc x3proxy-win32.c -o x3proxy-win32 [EMAIL PROTECTED] v9]$ ./

ZoneAlarm Insufficient validation of 'vsdatant' driver input buffer Vulnerability

2007-05-01 Thread Matousec - Transparent security Research
Hello, We would like to inform you about a vulnerability in ZoneAlarm 6. Description: ZoneAlarm insufficiently protects its driver \Device\vsdatant against a manipulation by malicious applications and it fails to validate its input buffer. It is possible to open the driver's device and send a

iDefense Security Advisory 04.30.07: Cerulean Studios Trillian Multiple IRC Vulnerabilities

2007-05-01 Thread iDefense Labs
Cerulean Studios Trillian Multiple IRC Vulnerabilities iDefense Security Advisory 04.30.07 http://labs.idefense.com/intelligence/vulnerabilities/ Apr 30, 2007 I. BACKGROUND Cerulean Studios Trillian is a multi-protocol chat application that supports IRC, ICQ, AIM and MSN protocols. More informat

[SECURITY] [DSA 1284-1] New qemu packages fix several vulnerabilities

2007-05-01 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 1284-1[EMAIL PROTECTED] http://www.debian.org/security/ Moritz Muehlenhoff May 1st, 2007