===
Ubuntu Security Notice USN-647-1 September 26, 2008
mozilla-thunderbird, thunderbird vulnerabilities
CVE-2008-3835, CVE-2008-4058, CVE-2008-4059, CVE-2008-4060,
CVE-2008-4061, CVE-2008-4062, CVE-2008-4063, CVE-2008-4064,
Hello.
The Estonian cyber security strategy document is now available online.
I must say once again the concept of a national cyber security stance is
quite interesting.
Those who wish to download the document::
http://www.mod.gov.ee/?op=bodyid=518
My contact there specified she'd be happy
Title: CA Service Desk Multiple Cross-Site Scripting
Vulnerabilities
CA Advisory Date: 2008-09-24
Reported By:
Open Security Foundation
Impact: A remote attacker can conduct cross-site scripting attacks.
Summary: CA Service Desk contains multiple vulnerabilities that
can allow a remote
As of today 25 September 2008, I am using the latest 1.0.3.7 firmware
for my region (Singapore), US also use this version.
1/ Outdated Samba 3.0.2, vulnerable to numerous security holes.
2/ Default admin:admin user
3/ Default open guest user, noway to disable it
4/ It is impossible to disable
Hi
-
http://www.dataconline.com/software/realwin.php
RealWin is a SCADA server product which includes a FlexView HMI and
runs on current Microsoft Windows platforms (2000 and XP). It can
operate on a single PC or multiple PCs connected through a TCP/IP
network.
[~] RPG.Board = 0.0.8Beta2 Remote SQL Injection
[~] Author: 0x90
[~] HomePage: www.0x90.com.ar
[~] Contact: Guns[at]0x90[dot]com[dot]ar
[~] Script: RPG.Board
[~] site: http://rpgmaster.de/viewtopic.php?f=25t=69
[~] Vulnerability Class: SQL Injection
[~] Exploit:
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
The Gemini Portal = 4.7 / Insecure Cookie Handling Vulnerability
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Program: The Gemini Portal
Version: = 4.7
File affected: admin/*
Download:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[ multiple vendor ftpd - Cross-site request forgery ]
Author: Maksymilian Arciemowicz
securityreason.com
Date:
- - Written: 03.09.2008
- - Public: 26.09.2008
SecurityReason Research
SecurityAlert Id: 56
CVE: not assigned
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Crux Gallery = 1.32 / Insecure Cookie Handling Vulnerability
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Program: Crux Gallery
Version: = 1,32
File affected: admin/*
Download: http://www.arzdev.com/downloads/8/Crux
Does anyone know how to check the build version number on the agent?
Or is there a comparison with that build number and a x.y.z version
id?
On Thu, Sep 18, 2008 at 5:44 AM, iViZ Security Advisories
[EMAIL PROTECTED] wrote:
---
Crashing ZoneAlarm 8.0.020.000 by Checkpoint (Component : TrueVector)
==
- Keep ZoneALarm 8 running with vsmon.exe running (which runs by default)
- On System A : Run the rogue proxy (attached) za_crasher_proxy.exe and set a
port number (eg:
Nelson Brito wrote:
1. Slammer was the very first Flash Worm,
Well, no, actually, Slammer was not a flash worm. A flash worm is a worm
which follows a precomputed spreading path, by using prior knowledge of
all the systems that are vulnerable to the particular exploit in use.
And Slammer
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
___
Mandriva Linux Security Advisory MDVSA-2008:206
http://www.mandriva.com/security/
13 matches
Mail list logo