BugTraq Mode:
(Page 1203 of 1748)  < Prev  1198 1199 1200 1201 1202 1203 1204 1205 1206 1207 1208  Next >
how to crash apache/php in cpanel 2006-02-20
Ed Wiget (ewiget rhpstudios com)
I am really not sure if this is a cpanel, php, or apache problem but will let
others find out. This is the entire reason I am supplying this
information....

In a recent post concerning a mambo error message:
Warning: ob_start(): output handler 'ob_gzhandler' cannot be used after
'URL-Rewriter'

[ more ]  [ reply ]
[BuHa-Security] DoS Vulnerability in Firefox <= 1.0.7 2006-02-20
bugtraq morph3us org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: RIPEMD160

---------------------------------------------------
| BuHa Security-Advisory #8 | Feb 15th, 2006 |
---------------------------------------------------
| Vendor | Mozilla Firefox |
| URL | http://www.mozilla.co

[ more ]  [ reply ]
grab cookie information with Melange Chat Server 1.10 2006-02-21
Nexus (nexus logik gmail com)
A common problem has been found by many sites running the Melange Chat
Server (Here on out states as m-chat). M-Chat is a simple IRC like chat
program for private websites. it can be ran from a java script, by using
the browser to connect to the host on port 6666 (hence
www.host.com:6666). Howev

[ more ]  [ reply ]
Re: Invision Power Board Army System Mod <= 2.1 SQL Injection Exploit 2006-02-21
Crispin Cowan (crispin novell com)
Cristian Stoica wrote:
> I have a question:
> If you use an ecryption algorithm to store/get data into/from the
> database you will not be able to do SQL injections ?
> With a simple encryption algorithm, I do with php explode,
> transform the string into an array and run the algorithm on e

[ more ]  [ reply ]
[USN-255-1] openssh vulnerability 2006-02-21
Martin Pitt (martin pitt canonical com)
===========================================================
Ubuntu Security Notice USN-255-1 February 21, 2006
openssh vulnerability
CVE-2006-0225
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 4.10 (Warty Warthog)
Ubunt

[ more ]  [ reply ]
[AJECT] TrueNorth IA eMailserver 5.3.4 buffer overflow vulnerability 2006-02-20
João Antunes (jantunes di fc ul pt)
----------------------------------------
Synopsis
----------------------------------------
TrueNorth IA eMailserver 5.3.4 is prone to a remote buffer overflow
vulnerability in the IMAP server.
Product: Internet Anywhere eMailserver Corporate Edition
Version: 5.3.4 and probably the older versions
Ven

[ more ]  [ reply ]
Re: Not completely fixed? 2006-02-21
Werner Koch (wk gnupg org)
On Mon, 20 Feb 2006 17:14:52 +0100, Marcus Meissner said:

> While files with other content report:
> $ gpg -o xx xx.any
> gpg: no valid OpenPGP data found.
> gpg: processing message failed: eof
> $ echo $?
> 2
> $

Just to explain this one: The code uses a heuristic to test whether it
is a binary o

[ more ]  [ reply ]
[BUGZILLA] Security Advisory for Bugzilla 2.20, 2.21.1, and 2.18.4 2006-02-21
mkanat bugzilla org
Summary
=======

Bugzilla is a Web-based bug-tracking system, used by a large number of
software projects.

This advisory covers three security bugs that have recently been
discovered and fixed in the Bugzilla code:

+ The 'whinedays' and 'mostfreqthreshold' parameters are not correctly
validated

[ more ]  [ reply ]
[myimei]CuteNews1.4.1~ Add Comment For Protected UserNames~ XSS Attack 2006-02-21
addmimistrator gmail com
Hello Everybody
???Summary???
Software: CuteNews
Sowtware?s Web Site: http://cutephp.com
Versions: 1.4.1
Class: Remote
Status: Unpatched
Exploit: Available
Solution: NotAvailable
Discovered by: imei addmimistrator
Risk Level: Mediume&High
??-Description??-
There is a security bug in CuteNews version

[ more ]  [ reply ]
SUSE Security Announcement: gpg,liby2util signature checking problems (SUSE-SA:2006:009) 2006-02-20
Marcus Meissner (meissner suse de)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________
______

SUSE Security Announcement

Package: gpg,liby2util
Announcement ID: SUSE-SA:2006:009
Date:

[ more ]  [ reply ]
[waraxe-2006-SA#046] - Critical sql injection in phpNuke 7.5-7.8 2006-02-19
come2waraxe yahoo com


{=======================================================================
=========}
{ [waraxe-2006-SA#046] }
{=======================================================================
=========}
{

[ more ]  [ reply ]
Geeklog Remote Code Execution 2006-02-19
GulfTech Security Research (security gulftech org)
##########################################################
# GulfTech Security Research February 19, 2006
##########################################################
# Vendor : Geeklog
# URL : http://www.geeklog.net/
# Version : All Versions
# Risk : Multiple Vulnerabilities
##############

[ more ]  [ reply ]
[eVuln] Time Tracking Software Multiple Vulnerabilities 2006-02-19
alex evuln com
New eVuln Advisory:
Time Tracking Software Multiple Vulnerabilities
http://evuln.com/vulns/69/summary.html

--------------------Summary----------------
eVuln ID: EV0069
CVE: CVE-2006-0689 CVE-2006-0690 CVE-2006-0691
Vendor: TTS Software
Software: Time Tracking Software
Sowtware's Web Site: http://sc

[ more ]  [ reply ]
[TZO-062006] Safe'nVulnerable 2006-02-19
Thierry Zoller (Thierry Zoller lu)
_______________________________________________________________________

Safe'nSec - Insecure File execution and Auto-startup
_______________________________________________________________________

Ref : TZO-062006-SafenSec
Author : Thierry Zoller
WWW : http://secdev.zoller.lu
Art

[ more ]  [ reply ]
Re: First WMF mass mailer ItW (phishing Trojan) 2006-02-20
Lance James (bugtraq securescience net)
Lance James wrote:
> Gadi Evron wrote:
>
>> The first worm (mass mailer) to (ab)use the WMF 0day is now spreading in
>> Australia.
>>
>>
Also to quickly reply to my own post (sorry) - but a quick historical analysis of the exploit and trojan itself demonstrates this:

Bulk Mailing via a m

[ more ]  [ reply ]
Secunia Research: NJStar Word Processor Font Name Buffer Overflow 2006-02-20
Secunia Research (remove-vuln secunia com)
======================================================================

Secunia Research 20/02/2006

- NJStar Word Processor Font Name Buffer Overflow -

======================================================================
Table of Contents

Affected Software........

[ more ]  [ reply ]
Guestbox XSS/an admin bypass 2006-02-20
innate gmx de
author.: l0om - www.excluded.org
product: guestbox (latest non-BETA) 0.6
page: http://spring.realone.ch
dork: "Login - Guestbox 0.6" inurl:guestbox.php

someone asked me to check the guestbook named "guestbox" and thats
the advisory based on my checks.

1.0 everyone can set admin comments to al

[ more ]  [ reply ]
More info: gBook Multiple Unspecified Cross-Site Scripting Vulnerabilities 2006-02-20
mkproductions users sourceforge net
Some additional information about http://www.securityfocus.com/bid/14725 has been disclosed.

http://gbook.sourceforge.net/sec/14725

[ more ]  [ reply ]
[eVuln] Magic Calendar Lite Authentication Bypass 2006-02-20
alex evuln com
New eVuln Advisory:
Magic Calendar Lite Authentication Bypass
http://evuln.com/vulns/71/summary.html

--------------------Summary----------------
eVuln ID: EV0071
CVE: CVE-2006-0673
Vendor: Reamday Enterprises
Vendor's Web Site: http://reamdaysoft.com
Software: Magic Calendar Lite
Sowtware's Web Sit

[ more ]  [ reply ]
update on the linux worm 2006-02-19
Gadi Evron (ge linuxbox org)
A quick digest of some updates from the last few hours on this issue:

1. The worm is based on 'kaiten', which has been going around in
different variants for a long time now.

2. This worm is new.

3. The first part exploits PHP applications, like these variants
normally do.

4. The second part s

[ more ]  [ reply ]
Re: Vulnerability in WinRAR - Phishing based 2006-02-19
Andreas Beck (becka-list-bugtraq bedatec de)
preben (at) watchcom (dot) no [email concealed] wrote:
> Phishing through WinRAR 3.51
> Due to the build-up of WinRAR, some vital parts of the programs
> functions and url's are visible through a simple HEX editor.

This is not specific to WinRAR. It is true for almost every usual
binary. Exceptions are only those using a comp

[ more ]  [ reply ]
new linux malware 2006-02-18
Gadi Evron (ge linuxbox org)
Today, we received a notification about a new Linux malware ItW (In the
Wild).

Chas Tomlin (http://www.ecs.soton.ac.uk/~cet/) provided Shadowserver
(http://www.shadowserver.org/) and Nicholas Alright who notified the
relevant operational communities, with the information on the binaries.
He cap

[ more ]  [ reply ]
[OpenPKG-SA-2006.005] OpenPKG Security Advisory (tin) 2006-02-19
OpenPKG (openpkg openpkg org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________

OpenPKG Security Advisory The OpenPKG Project
http://www.openpkg.org/security.html http://www.openpkg.org
openpkg-security (at) openpkg (dot) org [email concealed]

[ more ]  [ reply ]
[OpenPKG-SA-2006.004] OpenPKG Security Advisory (postgresql) 2006-02-19
OpenPKG (openpkg openpkg org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________

OpenPKG Security Advisory The OpenPKG Project
http://www.openpkg.org/security.html http://www.openpkg.org
openpkg-security (at) openpkg (dot) org [email concealed]

[ more ]  [ reply ]
Re: First WMF mass mailer ItW (phishing Trojan) 2006-02-17
Lance James (bugtraq securescience net)
Gadi Evron wrote:
> The first worm (mass mailer) to (ab)use the WMF 0day is now spreading in
> Australia.
>
Respectfully speaking:

There are a few corrections to this that need to be expressed.

The language you're using describing it as a mass-mailing worm is coming
off confusing to some. The W

[ more ]  [ reply ]
Re: Internet Explorer remotely exploitable vulnerability in JScript's document.write() method 2006-02-17
temp mihopahost com
That's not crashing my fully updated Internet Explorer.Just the "Crash" text is flashing in that example but my internet explorer keep working properly.Am I missing something?

[ more ]  [ reply ]
Re: Vulnerabilites in new laws on computer hacking 2006-02-17
Ansgar -59cobalt- Wiechers (bugtraq planetcobalt net)
Paul,

On 2006-02-15 Paul Schmehl wrote:
> --On Saturday, February 11, 2006 16:35:20 +0000 self-destruction (at) itsbest (dot) com [email concealed] wrote:
>> New generations of teenagers will be scared of doing online
>> exploration. I'm not talking about damaging other companies' computer
>> systems. I'm talking about accessi

[ more ]  [ reply ]
Re: Vulnerabilites in new laws on computer hacking 2006-02-17
ArkanoiD (ark eltex net)
nuqneH,

I'd even say, if you hire someone whose security knowledge is based solely
on breaking into systems, this guy will not able to produce valuable reports
for customers because his viewpoint is likely to be flawed; his knowledge on
protecting system usually falls into "patch-this-hole" pattern

[ more ]  [ reply ]
Re: Vulnerabilites in new laws on computer hacking 2006-02-17
Seth Breidbart (sethb panix com)
"Marcus J. Ranum" <mjr (at) ranum (dot) com [email concealed]> wrote:

> If you're trying to understand the security properties of a
> system by breaking into it, you not producing valuable
> reports, anyhow. All you are doing is telling them where
> to put the next band-aid.

I know of too many (more than none is too many) exa

[ more ]  [ reply ]
Re: Vulnerabilites in new laws on computer hacking 2006-02-16
Sysmin Sys73m47ic (sysmin systematic gmail com)
> > "Advanced societies" are updating computer crime laws faster than the
> > rest of the world. This means that new generations of these more
> > "advanced societies" will have no clue about how remote computer attacks
> > are carried out. Future generations of security "experts" will be among
> >

[ more ]  [ reply ]
(Page 1203 of 1748)  < Prev  1198 1199 1200 1201 1202 1203 1204 1205 1206 1207 1208  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus