BugTraq Mode:
(Page 1214 of 1748)  < Prev  1209 1210 1211 1212 1213 1214 1215 1216 1217 1218 1219  Next >
RE: Buffer Overflow /Font on mIRC 2006-01-26
Krpata, Tyler (tkrpata bjs com)
I'm not following your English...are you saying you believe that this IS
or is NOT an exploitable bug?

-----Original Message-----
From: Crowdat Kurobudetsu [mailto:crowdat (at) gmail (dot) com [email concealed]]
Sent: Tuesday, January 24, 2006 6:24 AM
To: bugtraq (at) securityfocus (dot) com [email concealed]
Subject: Buffer Overflow /Font on mIRC

- 1

[ more ]  [ reply ]
iDefense Security Advisory 02.01.06: Winamp m3u Parsing Stack Overflow Vulnerability 2006-02-01
labs-no-reply (at) idefense (dot) com [email concealed] (labs-no-reply idefense com)
Winamp m3u Parsing Stack Overflow Vulnerability

iDefense Security Advisory 02.01.06
http://www.idefense.com/intelligence/vulnerabilities/display.php?id=377
February 1, 2006

I. BACKGROUND

Winamp is a popular media player for Windows which supports many
audio/video file formats.

More information c

[ more ]  [ reply ]
iDefense Security Advisory 02.01.06: Winamp m3u/pls .WMA Extension Buffer Overflow Vulnerability 2006-02-01
labs-no-reply (at) idefense (dot) com [email concealed] (labs-no-reply idefense com)
Winamp m3u/pls .WMA Extension Buffer Overflow Vulnerability

iDefense Security Advisory 02.01.06
http://www.idefense.com/intelligence/vulnerabilities/display.php?id=378
February 1, 2006

I. BACKGROUND

Winamp is a popular media player for Windows which supports many
audio/video file formats.

More i

[ more ]  [ reply ]
Database Manager Default pass 2006-01-31
fireboynet webmails com
Tunis the 31/jan/2006
bug found by Fireboy
fireboynet (at) webmails (dot) com [email concealed]

Product affected:DBMan for Windows and Unix
Product vendor: http://www.gossamer-threads.com

the problem with DBman is default passwords

these are default pass :

admin/admin,author/author,guest/guest

if the admin not change the

[ more ]  [ reply ]
Verified evasion in Snort 2006-01-26
a securityfocus com, non securityfocus com,poet securityfocus com, in securityfocus com (at),connu securityfocus com, dot_ securityfocus com,isu securityfocus com, d_ot securityfocus com, edu security (1 replies)
<pre>
Dan Kaminsky gave a presentation at shmoocon and mentioned using
ip fragmentation timers to evade intrusion detection systems. It's
a pretty straightforward technique and easy to code up so we
decided to look and see if Snort was vulnerable.

------------------------------------------------

[ more ]  [ reply ]
Re: Verified evasion in Snort 2006-02-01
Thierry Zoller (Thierry Zoller lu)
Internet Explorer remotely exploitable vulnerability in JScript's document.write() method 2006-01-31
porkythepig anspi pl
There is a remotely exploitable vulnerability in the Internet Explorer in the JScripting/Flash plugin section.

The problem lies in bad scripting of document.write() method being executed trough VBscript procedure triggered from ActionScript code within the crafted flash animation.
While exiting the

[ more ]  [ reply ]
Re: Workaround for unpatched Oracle PLSQL Gateway flaw 2006-01-31
x x com
just a note that this rewrite rule causes things in htmldb not to work anymore...

[ more ]  [ reply ]
DISIT - OPEN SOURCE DISASSEMBLER ENGINE 2006-01-31
Piotr Bania (bania piotr gmail com)
Hi,

If someone is interrested I have released beta version of my
disassembler engine, available here:
http://www.piotrbania.com/all/disit/

best regards,
Piotr Bania

--
--------------------------------------------------------------------
Piotr Bania - <bania.piotr (at) gmail (dot) com [email concealed]> - 0xCD, 0x19
Fingerp

[ more ]  [ reply ]
[security bulletin] SSRT051007 rev.1 - HP Tru64 UNIX Running DNS BIND Remote Unauthorized Privileged Access 2006-02-01
security-alert hp com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: c00595837

Version: 1

HPSBTU02095 SSRT051007 rev.1 - HP Tru64 UNIX Running DNS BIND
Remote Unauthorized Privileged Access

NOTICE: The information in this Security Bulletin should be acted
upon as

[ more ]  [ reply ]
[SECURITY] [DSA 962-1] New pdftohtml packages fix arbitrary code execution 2006-02-01
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 962-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
February 1st, 2006

[ more ]  [ reply ]
[SECURITY] [DSA 961-1] New pdfkit.framework packages fix arbitrary code execution 2006-02-01
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 961-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
February 1st, 2006

[ more ]  [ reply ]
[eVuln] SZUserMgnt Authentication Bypass 2006-02-01
alex evuln com
New eVuln Advisory:
SZUserMgnt Authentication Bypass
http://evuln.com/vulns/53/summary.html

--------------------Summary----------------

Software: SZUserMgnt
Sowtware's Web Site: http://www.subzane.com
Versions: 1.4
Critical Level: Moderate
Type: SQL Injection
Class: Remote
Status: Unpatched
Exploi

[ more ]  [ reply ]
[eVuln] Calendarix SQL Injection & Authorization Bypass Vulnerabilities 2006-02-01
alex evuln com
New eVuln Advisory:
Calendarix SQL Injection & Authorization Bypass Vulnerabilities
http://evuln.com/vulns/52/summary.html

--------------------Summary----------------

Software: Calendarix
Sowtware's Web Site: http://www.calendarix.com/
Versions: 0.6.20050830
Critical Level: Moderate
Type: SQL Inje

[ more ]  [ reply ]
ZRCSA-200601: SPIP - Multiple Vulnerabilities 2006-01-31
research zone-h fr
Zone-H Research Center Security Advisory 200601
http://www.zone-h.fr

Date of release: 31/01/2006
Software: SPIP (http://www.spip.net)
Affected versions: < 1.8.2-e , < 1.9 Alpha 2 (5539)
Risk: Medium
Discovered by: Kevin Fernandez "Siegfried" and Benoît Sklénard "netcraft" from the Zone-H Research T

[ more ]  [ reply ]
Blackboard Authentication Error 2006-02-01
jdo24 cornell edu (1 replies)
Hello,

Here at my university we use Blackboard as the chosen tool for having online class websites, grading, chatrooms, announcements, quizzing, etc., in a convenient fashion.

Blackboard works alongside our Kerberos authentication to be sure that the person who is accessing the information is the

[ more ]  [ reply ]
Re: Blackboard Authentication Error 2006-02-01
George (ggal-security vsecurity com)
Windows Access Control Demystified 2006-01-31
sudhakar+bugtraq cs princeton edu

Hello everybody,

We have constructed a logical model of Windows XP access control, in a declarative but executable (Datalog) format. We have built a scanner that reads access-control configuration information from the Windows registry, file system, and service control manager database, and feeds

[ more ]  [ reply ]
[SECURITY] [DSA 960-2] New libmail-audit-perl packages fix insecure temporary file use 2006-01-31
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 960-2 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
January 31st, 2006

[ more ]  [ reply ]
Xmame 0.102 local vulnerability proof-of-concept 2006-01-31
Rafael San Miguel Carrasco (smcsoc yahoo es)

The following proof-of-concept demonstrates the existence of the local
vulnerability found in xmame 0.102.
It uses the brute-force technique. The RET address interval works on
Intel Debian GNU/Linux.
To test for the vulnerability, run "gcc exploit-c -o exploit" and then
"perl fb.pl".

exploit.c:

[ more ]  [ reply ]
Nmap 4.00 Released 2006-01-31
Fyodor (fyodor insecure org)
Bugtraqers,

Insecure.Org is pleased to announce the immediate, free availability
of the Nmap Security Scanner version 4.00 from
http://www.insecure.org/nmap/ .

I try not to burden the Bugtraq list with more than one Nmap
announcement per year. So I encourage those of you who would like to
hear abo

[ more ]  [ reply ]
[SECURITY] [DSA 960-1] New libmail-audit-perl packages fix insecure temporary file use 2006-01-31
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 960-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
January 31st, 2006

[ more ]  [ reply ]
FarsiNews 2.1 PHP Remote File Inclusion 2006-01-31
h e (het_ebadi yahoo com)
Remote File Inclusion in FarsiNews 2.1 and below
Credit:
The information has been provided by Hamid Ebadi
(Hamid Network Security Team) :admin (at) hamid (dot) ir. [email concealed]
The original article can be found at :
http://hamid.ir/security

Vulnerable Systems:
FarsiNews 2.1 Beta 2 and below

Vulnerable Code:
The fo

[ more ]  [ reply ]
[SECURITY] [DSA 957-2] New ImageMagick packages fix arbitrary command execution 2006-01-31
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 957-2 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
January 31st, 2006

[ more ]  [ reply ]
MyCO multiple vulnerabilities 2006-01-31
revnic gmail com
MyCO multiple vulnerabilities

Software:
MyCO guestbook 1.0
www.punctweb.com

Credit:
Revnic Vasile
revnic (at) gmail (dot) com [email concealed]

Description:
MyCO is a PHP guestbook that uses a MySQL database

Vulnerability:
the /admin directory is accessible by everyone.

XSS can be injected into the field "Name" when regist

[ more ]  [ reply ]
Proof of concept for CommuniGate Pro Server vulnerability 2006-01-31
Evgeny Legerov (research gleg net)
Hi all,

The simple code below can be used to reproduce one of CommuniGate 5.0.6 LDAP vulnerabilities
(http://www.gleg.net/cg_advisory.txt)

#!/usr/bin/env python
# Use this code at your own risk.
# It may crash your server!
# Author: Evgeny Legerov

import sys
import socket

HELP="""
CommuniGate P

[ more ]  [ reply ]
Re: EasyCMS vulnerable to XSS injection. 2006-01-31
kim easycms no
Kind of you to notice, our system will during the next week be patched for XSS flaws in the different input fields which might be of concern for XSS. The rest of the system will also be checked to reensure that all user-input is processed securely.

We take this matter seriusly, and would like to in

[ more ]  [ reply ]
Re: Re: Winamp 5.12 - 0day exploit - code execution through playlist 2006-01-31
Juha-Matti Laurio (juha-matti laurio netti fi)
Nullsoft has released a fixed version 5.13 now. Internet Storm Center
shared the information last night at
http://isc.sans.org/diary.php?storyid=1080
An official download link is
http://www.winamp.com/player/

- Juha-Matti

>
> You can disable auto launching Winamp for playlist files as a workar

[ more ]  [ reply ]
Cerberus Helpdesk vulnerable to XSS 2006-01-30
preben watchcom no
Inputs in the Cerberus Helpdesk is not properly sanitized, and XSS is possible in a lot of the systems input fields and url parameters.

You can add XSS that will hit every user of the system, and even simple scripting tags like <script>alert(?f?)</script> is allowed

PoC: http://www.SITE.example/tt

[ more ]  [ reply ]
BrowserCRM vulnerable for XSS 2006-01-31
preben watchcom no
Inputs in the BrowserCRM is not properly sanitized, and XSS is possible in a lot of the systems input fields and url parameters.

Some fields have been filtered in a basic form, so that simple scripting like "<script>alert('XSS')</script>" is not possible. Howevere, since the filtering is not based

[ more ]  [ reply ]
(Page 1214 of 1748)  < Prev  1209 1210 1211 1212 1213 1214 1215 1216 1217 1218 1219  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus