php download local file include

2006-09-06 Thread ali
script name : php download vendor : www.threesquared.net By : s3rv3r_hack3r u can include local file www.victim.com/download/index.php?file=[file path] +

[OpenPKG-SA-2006.018] OpenPKG Security Advisory (openssl)

2006-09-06 Thread OpenPKG
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 OpenPKG Security AdvisoryThe OpenPKG Project http://www.openpkg.org/security/ http://www.openpkg.org [EMAIL PROTECTED]

[USN-340-1] imagemagick vulnerabilities

2006-09-06 Thread Martin Pitt
=== Ubuntu Security Notice USN-340-1 September 06, 2006 imagemagick vulnerabilities CVE-2006-3743, CVE-2006-3744 === A security issue affects the following Ubuntu releases:

Details for BID 18428

2006-09-06 Thread shulman
DB2 UDB - Unauthenticated Buffer Overflow and DoS (BID 18428) Background: DB2 Universal Database (UDB)™ is a popular database software package from IBM available for legacy platforms as well as open systems (Unix and Windows). Clients use a protocol called DRDA to communicate with the DB2 UDB

Details for BID 19586

2006-09-06 Thread shulman
DB2 UDB - Handshake Protocol DoS Attack (BID 19586) Background: DB2 Universal Database (UDB)™ is a popular database software package from IBM available for legacy platforms as well as open systems (Unix and Windows). Clients use a protocol called DRDA to communicate with the DB2 UDB server.

release uhooker v1.2

2006-09-06 Thread Hernan Ochoa
uhooker v1.2 out. What's new?: http://oss.coresecurity.com/uhooker/release/1.2/WHATSNEW_1.2.txt gzip'd tarball: http://oss.coresecurity.com/uhooker/release/1.2/uhooker_v1.2.tgz zip file: http://oss.coresecurity.com/uhooker/release/1.2/uhooker_v1.2.zip documentation:

Canon ImageRunner reveals SMB, IPX, and FTP username/passwords

2006-09-06 Thread gunrnr
The Canon ImageRunner multi-function device’s Remote UI web interface software will reveal username and password pairs contained in address book entries when the address book is exported. These address book entries are used for scanning to SMB, FTP, or IPX shares. In addition, passwords for

[SECURITY] [DSA 1170-1] New fastjar packages fix directory traversal

2006-09-06 Thread Martin Schulze
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- Debian Security Advisory DSA 1170-1[EMAIL PROTECTED] http://www.debian.org/security/ Martin Schulze September 6th, 2006

[security bulletin] HPSBUX02102 SSRT051078 rev.4 - HP-UX usermod(1M) Local Unauthorized Access.

2006-09-06 Thread security-alert
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c00614838 Version: 4 HPSBUX02102 SSRT051078 rev.4 - HP-UX usermod(1M) Local Unauthorized Access. NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.

[ GLSA 200609-04 ] LibXfont: Multiple integer overflows

2006-09-06 Thread Sune Kloppenborg Jeppesen
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200609-04 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - -

[ GLSA 200609-03 ] OpenTTD: Remote Denial of Service

2006-09-06 Thread Sune Kloppenborg Jeppesen
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200609-03 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - -

[ GLSA 200609-01 ] Streamripper: Multiple remote buffer overflows

2006-09-06 Thread Sune Kloppenborg Jeppesen
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200609-01 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - -

Sql Injection and Path Disclosoure Wordpress v2.0.5

2006-09-06 Thread vannovax
Version Afected: v2.0.5 - v2.0.2 For Version v2.0.2 index.php?paged=-25633header.php?=-id For Version v2.0.5 index.php?paged=/archive/-1-5-2-Create%20Table PATH DISCLOSOURE /wp-settings.php /wp-admin/admin-footer.php /wp-admin/admin-functions.php /wp-admin/edit-form.php

[ GLSA 200609-02 ] GTetrinet: Remote code execution

2006-09-06 Thread Sune Kloppenborg Jeppesen
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200609-02 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - -

IBM Lotus Notes DUNZIP32.dll Buffer Overflow Vulnerability

2006-09-06 Thread Juha-Matti Laurio
Networksecurity.fi Security Advisory (06-09-2006) Title: IBM Lotus Notes DUNZIP32.dll buffer overflow vulnerability Criticality: High (3/3) Affected software: IBM Lotus Notes versions 6.5.4, 5.0.10 and prior Author: Juha-Matti Laurio juha-matti.laurio [at] netti.fi Date: 6th September, 2006

Microsoft confirmed Word 0-day vulnerability

2006-09-06 Thread Juha-Matti Laurio
This zero-day vulnerability and related attacks has been confirmed by Microsoft today. This issue affects to Word version 2000. It is also reported that Word Viewer application is not affected. As a workaround it is possible to avoid opening Word files from unrusted sources, including e-mail,

WDT :-phpopenchat-3.0.* ($sourcedir) Remote File Inclusion Exploit

2006-09-06 Thread stormhacker
[W]orld [D]efacers Team Summary eVuln ID: WD23 Vendor: phpopenchat-3.0.* Vendor's Web Site: http://phpopenchat.org Class: Remote PoC/Exploit: Available Solution: Not Available Discovered by: rUnViRuS ( wdzone.net worlddefacers.de )