GaesteChaos = 0.2 Multiple Vulnerabilities

2006-08-04 Thread Tamriel
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Advisory: GaesteChaos = 0.2 Multiple Vulnerabilities Release Date: 2006/08/04 Last Modified: 2006/08/03 Author: Tamriel [tamriel at gmx dot net] Application: GaesteChaos = 0.2 Risk: Moderate Vendor Status: not contacted

CounterChaos = 0.48c SQL Injection Vulnerability

2006-08-04 Thread Tamriel
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Advisory: CounterChaos = 0.48c SQL Injection Vulnerability Release Date: 2006/08/04 Last Modified: 2006/08/03 Author: Tamriel [tamriel at gmx dot net] Application: CounterChaos = 0.48c Risk: Moderate Vendor Status: not

GeheimChaos = 0.5 Multiple SQL Injection Vulnerabilities

2006-08-04 Thread Tamriel
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Advisory: GeheimChaos = 0.5 Multiple SQL Injection Vulnerabilities Release Date: 2006/08/04 Last Modified: 2006/08/03 Author: Tamriel [tamriel at gmx dot net] Application: GeheimChaos = 0.5 Risk: Moderate Vendor Status:

XSS in Vbulletin 3.6.0 in IE 0nly

2006-08-04 Thread Stefan
- XSS in Vbulletin 3.6.0 in IE 0nly - Author: Stefan Email: [EMAIL PROTECTED] Group: EnigmaGroup - Vulnerable: vbulletin 3.5.4 in IE Vulnerable: vbulletin 3.6.0 in IE

[SECURITY] [DSA 1141-1] New GnuPG2 packages fix denial of service

2006-08-04 Thread Martin Schulze
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 1141-1[EMAIL PROTECTED] http://www.debian.org/security/ Martin Schulze August 4th, 2006

[ GLSA 200608-05 ] LibVNCServer: Authentication bypass

2006-08-04 Thread Sune Kloppenborg Jeppesen
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200608-05 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - -

[ GLSA 200608-06 ] Courier MTA: Denial of Service vulnerability

2006-08-04 Thread Sune Kloppenborg Jeppesen
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200608-06 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - -

[ECHO_ADV_42$2006] BufferOverflow in Eremove Client

2006-08-04 Thread erdc
\_ _/\_ ___ \ / | \\_ \ |__)_ /\ \//~\/ | \ |\\ \___\Y/|\ /___ / \__ /\___|_ /\___ / \/ \/ \/ \/ .OR.ID ECHO_ADV_42$2006

[SECURITY] [DSA 1142-1] New freeciv packages fix arbitrary code execution

2006-08-04 Thread Martin Schulze
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 1142-1[EMAIL PROTECTED] http://www.debian.org/security/ Martin Schulze August 4th, 2006

[SECURITY] [DSA 1143-1] New dhcp packages fix denial of service

2006-08-04 Thread Martin Schulze
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 1143-1[EMAIL PROTECTED] http://www.debian.org/security/ Martin Schulze August 4th, 2006

[ECHO_ADV_42$2006] PHP Live Helper = 2.0 (abs_path) Remote File Inclusion

2006-08-04 Thread matdhule
___ ___ \_ _/\_ ___ \ / | \\_ \ |__)_ /\ \//~\/ | \ |\\ \___\Y/|\ /___ / \__ /\___|_ /\___ / \/ \/ \/ \/ .OR.ID

TSLSA-2006-0044 - multi

2006-08-04 Thread Trustix Security Advisor
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Trustix Secure Linux Security Advisory #2006-0044 Package names: apache, gnupg, libtiff Summary: Multiple vulnerabilities Date: 2006-08-04

CAID 34509 - CA eTrust Antivirus WebScan vulnerabilities

2006-08-04 Thread Williams, James K
Title: CA eTrust Antivirus WebScan vulnerabilities CA Vulnerability ID (CAID): 34509 CA Advisory Date: 2006-08-03 Discovered By: Matt Murphy of the TippingPoint Security Research Team Impact: Remote attacker can execute arbitrary code. Summary: Ca eTrust Antivirus WebScan is a free,

phpAutoMembersArea 3.2.5 ($installed_config_file) Remote File Inclusion

2006-08-04 Thread philipp . niedziela
+ + + phpAutoMembersArea 3.2.5 ($installed_config_file) Remote File Inclusion + + + + Affected Software .: phpAutoMembersArea 3.2.5 + Venedor ...:

Barracuda Spam Firewall: Administrator Level Remote Command Execution [ID-20060804-01]

2006-08-04 Thread Matthew Hall
Severity:High - Full system compromise possible Date:04 August 2006 Discovered by: Matthew Hall ([EMAIL PROTECTED]) (Credits for original discovery to Greg Sinclair) Discovered on: 03 Aug 2006 Summary: Lack of input sanitisation in the Linux based