While you were sleeping and focusing on COFEE...
Microsoft Discloses Government Backdoor on Windows Operating Systems
Wednesday, April 30th, 2008 @ 6:00 am | Privacy, News
http://www.infiltrated.net/?p=92
Microsoft may have inadvertently disclosed a potential Microsoft backdoor for
law
Hello, you inform that is the only vulnerable version 7.0. In the version with
sp is not vulnerable. I apologize if generate Confucianism. The problem was
that I did the tests only in the 7.0 and then thought were also vulnerable to
the other versions.
Fixed in 1.2.8. Trivial issue, right, and hardly worth reporting, or is there
a more significant issue that I am missing?
Script : Maian Uploader v4.0
Type : XSS Vulnerabilities
Discovered by : Khashayar Fereidani Or Dr.Crash
Our Team : IRCRASH
Script : LifeType 1.2.8
Type : XSS Vulnerability
Discovered by : Khashayar Fereidani Or Dr.Crash
Our Team : IRCRASH
===
Ubuntu Security Notice USN-606-1 May 05, 2008
cupsys vulnerability
CVE-2008-1722
===
A security issue affects the following Ubuntu releases:
Ubuntu 6.06 LTS
Ubuntu
ECHO_ADV_91$2008
-
[ECHO_ADV_91$2008] Online Rental Property Script = 4.5 (pid) Blind Sql
Injection Vulnerability
-
ECHO_ADV_92$2008
-
[ECHO_ADV_92$2008] Anserv Auction XL (viewfaqs.php cat) Blind Sql Injection
Vulnerability
-
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
-
Debian Security Advisory DSA-1567-1 [EMAIL PROTECTED]
http://www.debian.org/security/ Devin Carraway
May 05, 2008
ECHO_ADV_95$2008
-
[ECHO_ADV_95$2008] BackLinkSpider (cat_id) Blind Sql Injection Vulnerability
-
Author :
ECHO_ADV_90$2008
-
[ECHO_ADV_90$2008] PostNuke Module pnEncyclopedia = 0.2.0 (id) Blind Sql
Injection Vulnerability
-
#!/usr/bin/perl
# Scout Portal Toolkit = 1.4.0 (ParentId) Remote SQL Injection Exploit
# Discovered Coded by JosS
# Contact: sys-project[at]hotmail.com
# Spanish Hackers Team / Sys - Project / EspSeC
# http://www.spanish-hackers.com
# rgod forever :D
print
ECHO_ADV_94$2008
-
[ECHO_ADV_94$2008] Kmita Mail = 3.0 (file) Remote File Inclusion
Vulnerability
-
Author
ECHO_ADV_93$2008
-
[ECHO_ADV_93$2008] Kmita Tellfriend = 2.0 (file) Remote File Inclusion
Vulnerability
-
Author
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
-
Debian Security Advisory DSA-1569-1 [EMAIL PROTECTED]
http://www.debian.org/security/ Thijs Kinkhorst
May 05, 2008
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
-
Debian Security Advisory DSA-1568-1 [EMAIL PROTECTED]
http://www.debian.org/security/ Thijs Kinkhorst
May 05, 2008
[=] Affected software :
Editor : Novell
Name : eDirectory
Version : 8.7.3 SP 10 and 8.8.2
Services : TCP/8028 (HTTP) and TCP/8030 (HTTPS)
[=] External references :
http://www.novell.com/support/viewContent.do?externalId=3829452sliceId=1
[=] Affected software :
Editor : Novell
Name : eDirectory
Version : 8.7.x (see note) and 8.8.2
Services : TCP/8028 (HTTP) and TCP/8030 (HTTPS)
[=] External references :
http://www.novell.com/support/viewContent.do?externalId=3866911sliceId=1
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Core Security Technologies - CoreLabs Advisory
http://www.coresecurity.com/corelabs/
Wonderware SuiteLink Denial of Service vulnerability
*Advisory Information*
Title: Wonderware SuiteLink Denial of Service vulnerability
19 matches
Mail list logo