• Skip to main content
  • Skip to footer

Audit My PC - Free Internet Security Audit

Firewall Test and web tools to check your security and privacy

  • Firewall Test
  • Anti Spam
  • Internet Speed Test
  • Sitemap Generator
  • Whats My IP

Mac OS X Server AFP Server Reconnect Key Disclosure

Network Security News – Tuesday, August 15, 2006 Events

Mac OS X Server AFP Server Reconnect Key Disclosure

Mac OS X Server contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered when the AFP server stores client reconnect keys as world-readable files, which will disclose client session information resulting in a loss of confidentiality.. Read more at osvdb.org/27732

Mac OS X LaunchServices Download Validation Bypass

Mac OS X contains a flaw that may allow a malicious user to execute arbitrary Javascript code. The issue is triggered when LaunchServices identifies certain HTML files as "safe," and Safari's "open 'safe' files after downloading" option is enabled, which may allow Javascript code in the file to run locally and bypass restrictions placed on remote code. It is possible that the flaw may allow arbitrary Javascript code execution resulting in a loss of integrity.. Read more at osvdb.org/27743

Mac OS X dyld Error Output Local Information Disclosure

Mac OS X contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered when a malicious local user specifies dynamic linker options that cause privileged applications to display information to standard output which the user is not authorized to view, resulting in a loss of confidentiality.. Read more at osvdb.org/27737

eDonkey ed2k: URL Overflow

A local overflow exists in Edonkey2000. The Edonkey2000 software fails to handle specially crafted links (using 'ed2k:' protocol scheme ) resulting in a stack-based buffer overflow. By tricking the user into clicking a specially crafted ed2K link, an attacker can execute arbitrary code resulting in a loss of integrity.. Read more at osvdb.org/5042

Cacti graph_image.php graph_start Variable Arbitrary Command Execution

Cacti contains a flaw that may allow a malicious user to execute arbitrary commands. The issue is triggered when calling cacti/graph_image.php with a specially crafted 'graph_start' parameter. It is possible that the flaw may allow execution of arbitrary code resulting in a loss of integrity.. Read more at osvdb.org/17539

Cisco CallManager Express SIP Message User Enumeration

CME (CallManager Express) contains unspecified flaw(s) that may lead to an unauthorized information disclosure. Өe issue is triggered when receiving specially crafted SIP (Session Initiation Protocol) messages, which will disclose usernames from the SIP user directory resulting in a loss of confidentiality.. Read more at osvdb.org/27760

InnoMedia VideoPhone Trailing Slash Authentication Bypass

Axis Network Camera contains a flaw that may allow a malicious user to bypass authentication. The issue is triggered when requesting a "protected" URL with a trailing slash. It is possible that the flaw may grant access to "protected" parts of the Web Interface resulting in a loss of confidentiality.. Read more at osvdb.org/4809

Axis Network Camera HTTP Authentication Bypass

Axis Network Camera contains a flaw that may allow a malicious user to bypass authentication. The issue is triggered when using double slashes to access a "protected" URL. It is possible that the flaw may allow access to protected parts of the web interface resulting in a loss of confidentiality.. Read more at osvdb.org/4804

abarcar Realty Portal content.php cat Variable SQL Injection

abarcar Realty Portal contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to content.php not properly sanitizing user-supplied input to the 'cat' variable. This may allow an attacker to inject or manipulate SQL queries in the backend database.. Read more at osvdb.org/26226

Mac OS X dyld Search Path Subversion Arbitrary Code Execution

Mac OS X contains a flaw that may allow a malicious user to execute arbitrary code. The issue is triggered when some dynamic linker options are used to read user-specified search paths and may allow user-specified output to be parsed by privileged applications. It is possible that the flaw may allow arbitrary code execution resulting in a loss of integrity.. Read more at osvdb.org/27738

Vuln: GnuPG Parse_Comment Remote Buffer Overflow Vulnerability

GnuPG Parse_Comment Remote Buffer Overflow Vulnerability. Read more at securityfocus.com/bid/19110

Vuln: Microsoft Windows Server Service Remote Buffer Overflow Vulnerability

Microsoft Windows Server Service Remote Buffer Overflow Vulnerability. Read more at securityfocus.com/bid/19409

Vuln: Linux-HA Heartbeat Remote Denial of Service Vulnerability

Linux-HA Heartbeat Remote Denial of Service Vulnerability

. Read more at securityfocus.com/bid/19516

Vuln: Ruby on Rails Routing Denial of Service Vulnerability

Ruby on Rails Routing Denial of Service Vulnerability. Read more at securityfocus.com/bid/19454

[ MDKSA-2006:142 ] – Updated heartbeat packages fix vulnerability

[ MDKSA-2006:142 ] – Updated heartbeat packages fix vulnerability. Read more at securityfocus.com/archive/1/443229

Re: Calendarix <= 0.7 (calpath) Remote File Inclusion Vulnerability

Re: Calendarix <= 0.7 (calpath) Remote File Inclusion Vulnerability

. Read more at securityfocus.com/archive/1/443225

[ MDKSA-2006:141 ] – Updated gnupg packages fix vulnerability

[ MDKSA-2006:141 ] – Updated gnupg packages fix vulnerability. Read more at securityfocus.com/archive/1/443231

Re: phpPrintAnalyzer <= 1.1 (rep_par_rapport_racine) Remote File Inclusion Vulnerability

Re: phpPrintAnalyzer <= 1.1 (rep_par_rapport_racine) Remote File Inclusion Vulnerability. Read more at securityfocus.com/archive/1/443224

Reader Interactions

Leave a Reply

Your email address will not be published. Required fields are marked *

Footer

Miscellaneous

  • Free Address Finder
  • HTML Encoder Decoder
  • Website Monitoring
  • Whats My IP Address?
  • Yes or No

Copyright © 2001-2024 Audit My PC .com All Rights Reserved. Our Privacy Policy and TOS

  • About
  • Acronyms
  • DLL Files
  • Ports
  • Computer Security News
  • Email Scams & Spam
  • Internet Safety
  • Free Software