Kimson cms cross site scripting vulnerability

2008-11-18 Thread md . r00t . defacer
# # # .:Kimson Cross Site Scriptting Vulnerbility . #

rPSA-2008-0322-1 gnutls

2008-11-18 Thread rPath Update Announcements
rPath Security Advisory: 2008-0322-1 Published: 2008-11-17 Products: rPath Linux 2 Rating: Minor Exposure Level Classification: Indirect User Deterministic Weakness Updated Versions: [EMAIL PROTECTED]:2/2.2.5-1.1-1 rPath Issue Tracking System:

Re: Opera 9.6x file:// overflow

2008-11-18 Thread jplopezy
hi is very curious vulnerability... I think I found a variant of this vulnerability, if using another protocol (eg: https ://). I am sure that is an variant because providing other protocolos (eg: http://) does not work, nor the exceptions that are generated are equal to fail.

[ MDVSA-2008:227-1 ] gnutls

2008-11-18 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2008:227-1 http://www.mandriva.com/security/

[USN-672-1] ClamAV vulnerability

2008-11-18 Thread Kees Cook
=== Ubuntu Security Notice USN-672-1 November 17, 2008 clamav vulnerability CVE-2008-5050 === A security issue affects the following Ubuntu releases: Ubuntu 8.10 This

[SECURITY] [DSA 1666-1] New libxml2 packages fix several vulnerabilities

2008-11-18 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - Debian Security Advisory DSA-1666-1 [EMAIL PROTECTED] http://www.debian.org/security/ Moritz Muehlenhoff November 17, 2008

[ MDVSA-2008:230 ] firefox

2008-11-18 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDVSA-2008:230 http://www.mandriva.com/security/

[DSECRG-08-039] Local File Include Vulnerability in Pluck CMS 4.5.3

2008-11-18 Thread Digital Security Research Group
Hello, bugtraq. Digital Security Research Group [DSecRG] Advisory #DSECRG-08-039 Application:Pluck CMS Versions Affected: 4.5.3 Vendor URL: http://www.pluck-cms.org/ Bug:Local File Include Exploits:

[security bulletin] HPSBST02386 SSRT080164 rev.1 - Storage Management Appliance (SMA), Microsoft Patch Applicability MS08-067 to MS08-069

2008-11-18 Thread security-alert
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c01606691 Version: 1 HPSBST02386 SSRT080164 rev.1 - Storage Management Appliance (SMA), Microsoft Patch Applicability MS08-067 to MS08-069 NOTICE: The information in this Security Bulletin

Re: Re: Opera 9.6x file:// overflow

2008-11-18 Thread jplopezy
mmm sorry.. don't works this... :( Juan Pablo Lopez Yacubian

Black Hat November News: CFPS Now Open, Webinar 5 and Japan on-line.

2008-11-18 Thread jmoss
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Hello Bug Traq Readers, here are some updates on upcoming Black Hat briefings as well as ways to get involved. BLACK HAT FREE WEBINAR Nov 20th https://www.blackhat.com/html/webinars/clickjacking.html Black Hat Webcast #5 is scheduled for Thursday,

Re: Re: Re: Opera 9.6x file:// overflow

2008-11-18 Thread send9
For whatever reason, the file:// exploit isn't working on the version of Opera I have on this machine, but it worked on my XP SP2 machine back home. I can't get it to crash with https:// either. Both have Opera 9.62. Perhaps there's been a silent fix? I'm not sure; I wish Opera would reply.