rPSA-2006-0142-1 libtiff

2006-08-02 Thread Justin M. Forbes
rPath Security Advisory: 2006-0142-1 Published: 2006-08-01 Products: rPath Linux 1 Rating: Severe Exposure Level Classification: Remote User Deterministic Unauthorized Access Updated Versions: libtiff=/[EMAIL PROTECTED]:devel//1/3.8.2-3-0.1 References:

EEYE: research.eeye.com

2006-08-02 Thread Marc Maiffret
Hi, I am happy to announce to the first incarnation of http://research.eEye.com. On this site you can find everything from our previously released advisories to our previously unreleased research tools. A lot of these tools are seeing daylight for the first time outside of eEye so we do expect

[SECURITY] [DSA 1134-1] New Mozilla Thunderbird packages fix several vulnerabilities

2006-08-02 Thread Martin Schulze
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 1134-1[EMAIL PROTECTED] http://www.debian.org/security/ Martin Schulze August 2nd, 2006

Secunia Research: Jetbox Multiple Vulnerabilities

2006-08-02 Thread Secunia Research
== Secunia Research 02/08/2006 - Jetbox Multiple Vulnerabilities - == Table of Contents Affected

Re: SYM06-013 Symantec On-Demand Protection Encrypted Data Exposure

2006-08-02 Thread Chris Wysopal
On Tue, 1 Aug 2006 [EMAIL PROTECTED] wrote: Symantec has posted a Security Advisory for Symantec On-Demand Protection. PLease see the advisory for complete information: http://www.symantec.com/avcenter/security/Content/2006.08.01a.html This Symantec posting contains minimal security

SaveWeb Portal 3.4 - (SITE_Path) Remote File Inclusion Vulnerability

2006-08-02 Thread x0r0n
///CYBER-WARRiOR.ORG\ #SaveWeb Portal 3.4 - (SITE_Path) Remote File Inclusion Vulnerability - #Author: xoron - #script: SaveWeb Portal - #Class : Remote - [EMAIL PROTECTED]: x0r0n[at]hotmail[dot]com - #CODE:

Content Management Framework G3 - XSS Vulnerability in Search Function

2006-08-02 Thread Stefan Friedli
Content Management Framework G3 - XSS Vulnerability in Search Function INTRO According to the manufacturer, G3 is a classic content-management-system, allowing customers to manage their own websites without knowing much about webpublishing. Information about the product is available at:

rPSA-2006-0143-1 gnupg

2006-08-02 Thread Justin M. Forbes
rPath Security Advisory: 2006-0143-1 Published: 2006-08-02 Products: rPath Linux 1 Rating: Severe Exposure Level Classification: Remote User Deterministic Unauthorized Access Updated Versions: gnupg=/[EMAIL PROTECTED]:devel//1/1.4.5-1-0.1 References:

[USN-330-1] tiff vulnerabilities

2006-08-02 Thread Martin Pitt
=== Ubuntu Security Notice USN-330-1August 02, 2006 tiff vulnerabilities CVE-2006-3459, CVE-2006-3460, CVE-2006-3461, CVE-2006-3462, CVE-2006-3463, CVE-2006-3464, CVE-2006-3465

[eVuln] MyBB 'Avatar URL' XSS Vulnerability

2006-08-02 Thread alex
New eVuln Advisory: MyBB 'Avatar URL' XSS Vulnerability http://evuln.com/vulns/132/summary.html Summary eVuln ID: EV0132 Vendor: MyBB Group Vendor's Web Site: http://www.mybboard.com/ Software: MyBB Sowtware's Web Site: http://www.mybboard.com/

Re: Barracuda Vulnerability: Hardcoded Password [NNL-20060801-01]

2006-08-02 Thread pingywon
What is the purpose of this password? I do not see it documented anywhere and not only do I see no way to remove it, but I see no reason for it AT ALL Thank you for both Barracuda posts! ~pingywon MCSE www.pingywon.com www.illmob.org www.freeillwill.com - Original Message -

[security bulletin] HPSBUX02108 SSRT061133 rev.13 - HP-UX Running Sendmail, Remote Execution of Arbitrary Code

2006-08-02 Thread security-alert
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c00629555 Version: 13 HPSBUX02108 SSRT061133 rev.13 - HP-UX Running Sendmail, Remote Execution of Arbitrary Code NOTICE: The information in this Security Bulletin should be acted upon as soon

[SECURITY] [DSA 1137-1] New tiff packages fix several vulnerabilities

2006-08-02 Thread Martin Schulze
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 1137-1[EMAIL PROTECTED] http://www.debian.org/security/ Martin Schulze August 2nd, 2006

[SECURITY] [DSA 1136-1] New gpdf packages fix denial of service

2006-08-02 Thread Martin Schulze
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 1136-1[EMAIL PROTECTED] http://www.debian.org/security/ Martin Schulze August 2nd, 2006

[security bulletin] HPSBUX02124 SSRT061159 rev.1 - HP-UX Sendmail MIME Remote Denial of Service (DoS)

2006-08-02 Thread security-alert
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c00680632 Version: 1 HPSBUX02124 SSRT061159 rev.1 - HP-UX Sendmail MIME Remote Denial of Service (DoS) NOTICE: The information in this Security Bulletin should be acted upon as soon as

OZJournal v1.5 - XSS

2006-08-02 Thread luny
OZJournal v1.5 Homepage: http://ozjournals.awardspace.com/index.php Affected files: search input box index.php viewing archives show comment page XSS vulnerability via search input box: Data isn't properly sanatized before being displayed. For

[security bulletin] HPSBGN02136 SSRT061173 rev.1 - ProCurve Series 3500yl, 6200yl, and 5400zl Switches Running Software Prior to K.11.33 Remote Denial of Service (DoS)

2006-08-02 Thread security-alert
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c00732233 Version: 1 HPSBGN02136 SSRT061173 rev.1 - ProCurve Series 3500yl, 6200yl, and 5400zl Switches Running Software Prior to K.11.33 Remote Denial of Service (DoS) NOTICE: The information

Hobbit monitor security bugfix release - 4.1.2p2

2006-08-02 Thread Henrik Stoerner
Version 4.1.2p2 of Hobbit has just been uploaded to SourceForge, and is available at http://sourceforge.net/project/showfiles.php?group_id=128058package_id=140220release_id=436594 This release fixes a security bug reported by Jason Kruse earlier today: File access via the Hobbit config method

[SECURITY] [DSA 1135-1] New libtunepimp packages fix arbitrary code execution

2006-08-02 Thread Martin Schulze
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 1135-1[EMAIL PROTECTED] http://www.debian.org/security/ Martin Schulze August 2nd, 2006

Simpliciti Locked Browser Jail Breakout Vulnerability

2006-08-02 Thread EvilPacket
Simpliciti Locked Browser Jail Breakout Vulnerability ESRL Discovery Date: March 20, 2006 Discovery By: Adam Baldwin ([EMAIL PROTECTED]) Versions Effected: All versions Background: Simpliciti Locked Browser is a product that provides no-programming required PC lockdown... functionality for