BugTraq Mode:
(Page 1229 of 1748)  < Prev  1224 1225 1226 1227 1228 1229 1230 1231 1232 1233 1234  Next >
[eVuln] ADNForum Multiple Vulnerabilities 2006-01-05
alex evuln com
New eVuln Advisory:
ADNForum Multiple Vulnerabilities

--------------------Summary----------------
Vendor: Agustin Dondo
Vendor's Web Site: http://www.agustin.co.nr/
Software: ADNForum
Sowtware's Web Site: http://adnforum.sourceforge.net/
Versions: 1.0b
Critical Level: Moderate
Type: Multiple Vulner

[ more ]  [ reply ]
Interview: Ilfak Guilfanov 2006-01-04
Matthew Murphy (mattmurphy kc rr com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: RIPEMD160

With all the misinformation and theorizing going around, I figured the
community might be interested in some... you know, accurate information.
It's really refreshing, sometimes.

So, SecuriTeam blogs has posted an interview with Ilfak Guilfanov
(a

[ more ]  [ reply ]
Windows PHP 4.x "0-day" buffer overflow 2006-01-05
mercenary hushmail com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Buffer Overflow in PHP MySQL functions

I. RISK

Low - Remote code execution on some systems
The function is not normaly exposed to external users via input data

II. AFFECTED VERSIONS

4.x Branch under Windows

III. BACKGROUND

PHP contains many built

[ more ]  [ reply ]
Re: Download Accelerator Plus can be tricked to download malicious file 2006-01-05
visitbipin hotmail com
Just n' update:
DAP searches for all its mirrors from mirrorsearch.speedbit.com

I have no knowledge about HOW the mirrors are gathered. Still waiting for DAP developers to comment on this.

regards,
-Bipin Gautam
http://bipin.tk

[ more ]  [ reply ]
[USN-235-1] sudo vulnerability 2006-01-05
Martin Pitt (martin pitt canonical com)
===========================================================
Ubuntu Security Notice USN-235-1 January 05, 2006
sudo vulnerability
CVE-2005-4158
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 4.10 (Warty Warthog)
Ubuntu 5

[ more ]  [ reply ]
[USN-236-1] xpdf vulnerabilities 2006-01-05
Martin Pitt (martin pitt canonical com)
===========================================================
Ubuntu Security Notice USN-236-1 January 05, 2006
xpdf, poppler, cupsys, tetex-bin vulnerabilities
CVE-2005-3624, CVE-2005-3625, CVE-2005-3626, CVE-2005-3627
===========================================================

A security issue a

[ more ]  [ reply ]
MS released a patch today - MS06-001 2006-01-05
Duran, Jason IT0 (jason duran gov sk ca)

Microsoft released a patch for the WMF vulnerability this afternoon.
KB912919
http://www.microsoft.com/technet/security/bulletin/ms06-001.mspx

http://www.microsoft.com/technet/security/bulletin/ms06-jan.mspx

Has anyone looked into this, tried it, or know what it modifies?

In the workarounds FAQ

[ more ]  [ reply ]
Uninformed Journal Release Announcement: Volume 3 2006-01-04
Uninformed (sflist digitaloffense net)
Uninformed is pleased to announce the release of its third volume. This
volume includes 7 articles that cover a wide array of topics including
reverse engineering, exploitation technology, rootkit technology,
fuzzing, and other areas of research. The articles included in this
volume are:

- Engi

[ more ]  [ reply ]
Contact information for Symantec Vulnerability Management 2006-01-05
secure symantec com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

This email is intended to provide contact information for reporting
vulnerabilities in Symantec products. If you believe that you have
discovered a vulnerability in one of Symantec supported products, we
encourage you to contact secure (at) symantec (dot) com. [email concealed]

I

[ more ]  [ reply ]
HylaFAX Security advisory - fixed in HylaFAX 4.2.4 2006-01-05
Aidan Van Dyk (aidan ifax com)

I'm passing this on for Patrice Fournier who is not around today.
------------------------------------------------------------------------
------

HylaFAX security advisory
4 Jan 2006

Subject: HylaFAX hfaxd and notify/faxrcvd vulnerabilities

Introduction:

HylaFAX is a mature (est. 1991) enterpri

[ more ]  [ reply ]
SysCP WebFTP local file inclusion vulnerability 2006-01-04
Thomas Henlich (thomas henlich de)
SYSCP WEBFTP LOCAL FILE INCLUSION VULNERABILITY

Thomas Henlich

DESCRIPTION

Thomas Henlich has discovered a vulnerability in WebFTP, which can be
used by remote attackers to disclose potentially sensitive information
and to compromise a vulnerable system.

Input passed to the "webftp_language" par

[ more ]  [ reply ]
What is sbininitd port 65534 ??? 2006-01-05
waltdnes waltdnes org
I've seen graphs on the sans.org site indicating that traffic on this
port has seen a major rise. It sounds like something linux might be
vulnerable to. I've tried finding out what gives, but neither Google
nor the major security sites I've tried show any hits for "sbininitd",
other than to note

[ more ]  [ reply ]
iDefense Security Advisory 01.05.06: Blue Coat Systems WinProxy Host Header Stack Overflow Vulnerability 2006-01-05
labs-no-reply (at) idefense (dot) com [email concealed] (labs-no-reply idefense com)
Blue Coat Systems WinProxy Host Header Stack Overflow Vulnerability

iDefense Security Advisory 01.05.06
http://www.idefense.com/intelligence/vulnerabilities/display.php?id=364
January 05, 2006

I. BACKGROUND

BlueCoat WinProxy is an Internet sharing proxy server designed for small
to medium busines

[ more ]  [ reply ]
CyberShop User Login Sql Injection 2006-01-05
night_warrior771 hotmail com
##Night_Warrior<Kurdihs Hacker>
##night_warrior771[at]hotmail.com
##CyberShop User Login Sql Injection
##Site:http://www.gencbeyin.gen.tr/cybershop/test

Code For User Login :

Username : ' or ''='
Password: ' or ''='

Contact :night_warrior771[at]hotmail.com
Night_Warrior<Kurdihs Hacker>

[ more ]  [ reply ]
[ECHO_ADV_25$2006] Full path disclosure on boastMachine v3.1 2006-01-05
eufrato gmail com
____________________ ___ ___ ________
\_ _____/\_ ___ \ / | \\_____ \
| __)_ / \ \// ~ \/ | \
| \\ \___\ Y / | /_______ / \______ /\___|_ /\_______ /
\/ \/ \/ \/

.OR.ID
ECHO_ADV_25$2006

--------------

[ more ]  [ reply ]
MD:Pro - Malware Distribution Project 2006-01-05
anthony aykut frame4 com
On 01 February 2006 Frame4 Security Systems will launch their Malware Distribution Project (MD:Pro) service, which will offer developers of security systems and anti-malware products a vast collection of downloadable malware from a secure and reliable source, exclusively for the purposes of analysis

[ more ]  [ reply ]
Open Letter on the Interpretation of "Vulnerability Statistics" 2006-01-05
Steven M. Christey (coley mitre org)

Open Letter on the Interpretation of "Vulnerability Statistics"
---------------------------------------------------------------
Author: Steve Christey, CVE Editor
Date: January 4, 2006

All,

As the new year begins, there will be many temptations to generate,
comment, or report on vulnerability st

[ more ]  [ reply ]
what we REALLY learned from WMF 2006-01-05
Gadi Evron (ge linuxbox org)
What we really learn from this all WMF "thingie", is that when Microsoft
wants to, it can.

Microsoft released the WMF patch ahead of schedule
( http://blogs.securiteam.com/index.php/archives/181 )

Yep, THEY released the PATCH ahead of schedule.

What does that teach us?

There are a few options:

[ more ]  [ reply ]
[eVuln] TinyPHPForum Multiple Vulnerabilities 2006-01-05
alex evuln com
New eVuln Advisory:
TinyPHPForum Multiple Vulnerabilities

--------------------Summary----------------

Software: TinyPHPForum
Sowtware's Web Site: http://www.ralpharama.co.uk/tpf/
Versions: 3.6 and earlier
Critical Level: Moderate
Type: Multiple Vulnerabilities
Class: Remote
Status: Unpatched
Explo

[ more ]  [ reply ]
iDefense Security Advisory 01.05.06: Blue Coat WinProxy Remote DoS Vulnerability 2006-01-05
labs-no-reply (at) idefense (dot) com [email concealed] (labs-no-reply idefense com)
Blue Coat WinProxy Remote DoS Vulnerability

iDefense Security Advisory 01.05.06
http://www.idefense.com/intelligence/vulnerabilities/display.php?id=363
January 05, 2006

I. BACKGROUND

BlueCoat WinProxy is an Internet sharing proxy server designed for small
to medium businesses. In addition to Inte

[ more ]  [ reply ]
Re: WTF?? 2005-12-31
anthony aykut frame4 com
Can someone *please* remove this post? The service this posting is referring to is not ready yet & I am guessing it has been leaked either via somebody working for us or as a result of the "interest" we have been getting in certain circles.

This service is not active until February 01, 2006, and we

[ more ]  [ reply ]
WMF: New Metasploit Framework Module 2005-12-31
H D Moore (sflist digitaloffense net)
We just released a new version of the Metasploit Framework exploit module
for the Escape/SetAbortFunc code execution flaw. This module now pads the
Escape() call with random WMF records. You may want to double check your
IDS signatures -- most of the ones I saw today could be easily bypassed
or

[ more ]  [ reply ]
Mapping and Remote manipulation of databases 2005-12-31
Gandalf The White (gandalf digital net)
Greetings and Salutations:

I am requesting discussion on the below idea. I have seen this (in a very
crude way, see bottom) work. I suspect, however, that this idea could be
fine tuned to produce specific results.

Abstract:
As company partnerships increase, networking, databases and information

[ more ]  [ reply ]
(Page 1229 of 1748)  < Prev  1224 1225 1226 1227 1228 1229 1230 1231 1232 1233 1234  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus