BugTraq Mode:
(Page 1204 of 1748)  < Prev  1199 1200 1201 1202 1203 1204 1205 1206 1207 1208 1209  Next >
Re: Vulnerabilites in new laws on computer hacking 2006-02-17
dave (fla linux gmail com)
Marcus,

You use the analogy of trespassing to describe unauthorized access to a
computer system or it's resources. I agree with you but I think a point
was missed...

The laws being passed today against *cyber crime* far exceed the basic
property laws. If someone gains access to a system he does

[ more ]  [ reply ]
Re: Vulnerabilites in new laws on computer hacking 2006-02-16
Max Ashton (maxashton eml cc)
Here here, Paul.

Worried your test network isn't "real" enough? Make it better! Throw in IDS,
patch management, whatever.

As Paul suggested, get your buddies involved. I've seen workshops where people
are designated "attacker" and "defender", objectives are obvious.

If kids / pro's aren't smar

[ more ]  [ reply ]
Vulnerability in WinRAR - Phishing based 2006-02-16
preben watchcom no

Phishing through WinRAR 3.51
----------------------------

Credit to: Preben Nyløkken

Tested on version: 3.51
Vendors site: www.rarlabs.com
Vendor status: Tried contacting without luck.

Description:

Due to the build-up of WinRAR, some vital parts of the programs functions and url's are visible

[ more ]  [ reply ]
Re: Vulnerabilites in new laws on computer hacking 2006-02-16
Jon Gucinski (Jgucinski midwestbank com)
Wow...this is definitely a big can of worms to open...

I both agree and disagree with your stance. Hopefully I'm caffeinated
enough to express my reasoning clearly.

While I don't feel like elaborating too much, my drive to become an
InfoSec professional was driven mostly by the hacker
scene/cultu

[ more ]  [ reply ]
RE: Vulnerabilites in new laws on computer hacking 2006-02-15
Anthony Cicalla (Anthony Cicalla BankServ com)
I would have to say that I agree with you in what you have said. I am a
young security professional with a cissp, but growing up I did not have the
$ to be able to purchase vmware and all the software to setup a test
environment. I also bet that most of you between ages 12 - 16 had the
minimum 500.

[ more ]  [ reply ]
Malware that breaks SSL via Pharming {Emerging Threat} 2006-02-15
Lance James (bugtraq securescience net)
Hi all,

Secure Science's External Threat Assessment Team is issuing this malware
analysis report in an effort to shed light on emerging threats.

http://www.securescience.net/advisories/SSC_MSAT_FEB_02_2006-public.pdf

-Lance James
Secure Science Corp
www.securescience.net

[ more ]  [ reply ]
[operational update] Looking behind the smoke screen of the Internet 2006-02-18
Gadi Evron (ge linuxbox org)
In the following (quick & dirty) write-up (which is too big for sending
into bugtraq) I start by discussing some recent threats network
operators should be aware of, such as recursive DNS attacks.

Also, a bit on the state of the Internet, cooperation across different
fields and how these latest th

[ more ]  [ reply ]
[FLSA-2006:175406] Updated Apache httpd packages fix security issues 2006-02-18
Marc Deslauriers (marcdeslauriers videotron ca)
---------------------------------------------------------------------
Fedora Legacy Update Advisory

Synopsis: Updated Apache httpd packages fix security issues
Advisory ID: FLSA:175406
Issue date: 2006-02-18
Product: Red Hat Linux, Fedora Core
Keywords

[ more ]  [ reply ]
[FLSA-2006:152809] Updated squid package fixes security issues 2006-02-18
Marc Deslauriers (marcdeslauriers videotron ca)
---------------------------------------------------------------------
Fedora Legacy Update Advisory

Synopsis: Updated squid package fixes security issues
Advisory ID: FLSA:152809
Issue date: 2006-02-18
Product: Red Hat Linux, Fedora Core
Keywords:

[ more ]  [ reply ]
[FLSA-2006:168935] Updated openssh packages fix security issues 2006-02-18
Marc Deslauriers (marcdeslauriers videotron ca)
---------------------------------------------------------------------
Fedora Legacy Update Advisory

Synopsis: Updated openssh packages fix security issues
Advisory ID: FLSA:168935
Issue date: 2006-02-18
Product: Red Hat Linux, Fedora Core
Keywords:

[ more ]  [ reply ]
[ GLSA 200602-10 ] GnuPG: Incorrect signature verification 2006-02-18
Thierry Carrez (koon gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200602-10
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -

[ more ]  [ reply ]
SLQ Injection vulnerability in WPCeasy 2006-02-18
murfie gmail com
My first vulnerability report :)

Description:

"WPC.easy" is a database generated website with a dynamic on-line administration suite which allows for product updates, editing, deleting, image upload and price changes. "WPC.easy" is powered by a Secure Database.

vendor: http://www.webpagecity.com/

[ more ]  [ reply ]
[waraxe-2006-SA#045] - Bypassing CAPTCHA in phpNuke 6.x-7.9 2006-02-18
come2waraxe yahoo com


{=======================================================================
=========}
{ [waraxe-2006-SA#045] }
{=======================================================================
=========}
{

[ more ]  [ reply ]
ADOdb Library Cross Site Scripting 2006-02-18
GulfTech Security Research (security gulftech org)
##########################################################
# GulfTech Security Research February 18, 2006
##########################################################
# Vendor : John Lim
# URL : http://adodb.sourceforge.net/
# Version : ADOdb <= 4.71
# Risk : Cross Site Scripting
##########

[ more ]  [ reply ]
RCblog exploit [fun] 2006-02-18
hessam hessamx net
#!/usr/bin/perl
#
# RCBlog 1.0.3 / 1.0.2
# Exploit by Hessam-x (www.hessamx.net)
# Name : RCBlog (www.fluffington.com
# version : 1.0.3 / 1.0.2
# manual exploiting:
# index.php?%20post=../config/password
#
use LWP::Simple;

print "-------------------------------------------\n";
print "=

[ more ]  [ reply ]
[OpenPKG-SA-2006.003] OpenPKG Security Advisory (openssh) 2006-02-18
OpenPKG (openpkg openpkg org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________

OpenPKG Security Advisory The OpenPKG Project
http://www.openpkg.org/security.html http://www.openpkg.org
openpkg-security (at) openpkg (dot) org [email concealed]

[ more ]  [ reply ]
[OpenPKG-SA-2006.002] OpenPKG Security Advisory (sudo) 2006-02-18
OpenPKG (openpkg openpkg org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________

OpenPKG Security Advisory The OpenPKG Project
http://www.openpkg.org/security.html http://www.openpkg.org
openpkg-security (at) openpkg (dot) org [email concealed]

[ more ]  [ reply ]
Tasarim Rehberi Index.PHP Remote Command Exucetion 2006-02-18
botan linuxmail org
Web Site : http://www.tasarimrehberi.com [Turkish Desing]

Description : index.php remote attack

Vulnerable ; http://www.site.com/index.php?sayfaadi=" and "index.php?sayfa="

Patriotic Hackers!

Botan,B3g0k,Azad,Nistiman,Fesih :}

Freedom For Ocalan

[ more ]  [ reply ]
e107 CMS 0.7.2 Chatbox plugin XSS vulnerability 2006-02-18
ssteam pl gmail com

Software: e107 CMS 0.7.2
Software Details: Chatbox Plugin v1.0
Class: Remote
Type: XSS

========== Desription ===========
XSS vulnerability exists in e107 0.7.2 CMS.
user input is not correctly sanitized in Chatbox Plugin v1.0.

========== Exploit =============
j

[ more ]  [ reply ]
Coppermine Photo Gallery <=1.4.3 remote code execution 2006-02-18
rgod autistici org
- Coppermine Photo Gallery <= 1.4.3 arbitrary local/remote inclusion: ---------

- 18/02/2006 5.09.55 -----------------------------------------------------------
------------------------------------------------------------------------
--------
software:
site: http://coppermine-gallery.net/index.php
d

[ more ]  [ reply ]
Re: Internet Explorer Phishing mouseover issue 2006-02-18
Paul Szabo (psz maths usyd edu au)
Ken Hollis (aka Gandalf) wrote:

> Has anybody seen this before? I know that the mouseover issues ...
>
> [FORM action=http://malicious/stuff]
> [a href="https://trusted/site"]
> [INPUT ...][/a]

Does not seem to be a mouseover issue, but seems identical to

Internet Explorer/Outlook Express Res

[ more ]  [ reply ]
[ MDKSA-2006:043 ] - Updated gnupg packages fix signature file verification vulnerability 2006-02-17
security mandriva com

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDKSA-2006:043
http://www.mandriva.com/security/
____________________________________________________________________

[ more ]  [ reply ]
[ MDKSA-2006:042 ] - Updated libtiff packages fix vulnerability 2006-02-17
security mandriva com

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDKSA-2006:042
http://www.mandriva.com/security/
____________________________________________________________________

[ more ]  [ reply ]
[ MDKSA-2006:041 ] - Updated bluez-hcidump packages fix buffer overflow vulnerability 2006-02-17
security mandriva com

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDKSA-2006:041
http://www.mandriva.com/security/
____________________________________________________________________

[ more ]  [ reply ]
Re: dotproject <= 2.0.1 remote code execution 2006-02-17
milw0rm Inc. (milw0rm gmail com)
"With register_globals turned off none of these attacks are possible."

So is there going to be a update to fix the insecure code or is your
fix going to remain as so:

(register globals must be off to run dotproject)

/str0ke

On 2/15/06, Adam Donnison <adam (at) saki.com (dot) au [email concealed]> wrote:
> I responded to thi

[ more ]  [ reply ]
Re: Java script exploit 2006-02-18
Jose Nazario (jose monkey org)
ps, this decodes to the following HTML snippet (i have deliberately
obfuscated the tags):

[iframe src=http://63.134.215.88/a/ height=0 width=0][/iframe]

here's how i arrived at that. there's a free command line JavaScript
interpreter that can help with evaluating malicious javascript. i did the
po

[ more ]  [ reply ]
Re: Java script exploit 2006-02-18
Jose Nazario (jose monkey org)
On Fri, 17 Feb 2006 gandalf (at) digital (dot) net [email concealed] wrote:

> I just receieved this exploit, I have looked around and all I could find
> lately are the following Java issues: Gentoo Linux Security Advisory
> GLSA 200601-10 - Sun and Blackdown Java: Applet privilege escalation

> I don't have the Java knowledge

[ more ]  [ reply ]
Re: Java script exploit 2006-02-18
3APA3A (3APA3A SECURITY NNOV RU)
Dear gandalf (at) digital (dot) net [email concealed],

This piece of HTML has nothing to do with java. It has javascript.
Javascript generates equivalent of <IFRAME SRC="http://63.134.215.88/a/"
height="0" width="0">. It will not work for patched Outlook Express
because e-mail works in restricted hosts zone.

--Frid

[ more ]  [ reply ]
Re: Stack overflow vulnerability in Internet Explorer exploitable trough VBScript and JScript scripting engines. 2006-02-18
3APA3A (3APA3A SECURITY NNOV RU)
Dear porkythepig (at) anspi (dot) pl [email concealed],

This is a case of 'real' stack structure overflow, not stack buffer
overflow (stack overrun) as you maybe think. The process' stack is
exhausted because of recursive call. Exploitation of this situation to
execute code may be hard, if possible.

--
~/ZARAZA

[ more ]  [ reply ]
[eVuln] CALimba Authentication Bypass Vulnerability 2006-02-17
alex evuln com
New eVuln Advisory:
CALimba Authentication Bypass Vulnerability
http://evuln.com/vulns/68/summary.html

--------------------Summary----------------
eVuln ID: EV0068
CVE: CVE-2006-0693
Software: CALimba
Sowtware's Web Site: http://www.errebit.com/opensource/index.php?rb=calimba
Versions: 0.99.2, 0.99

[ more ]  [ reply ]
(Page 1204 of 1748)  < Prev  1199 1200 1201 1202 1203 1204 1205 1206 1207 1208 1209  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus