BugTraq Mode:
(Page 1274 of 1748)  < Prev  1269 1270 1271 1272 1273 1274 1275 1276 1277 1278 1279  Next >
[ GLSA 200509-09 ] Py2Play: Remote execution of arbitrary Python code 2005-09-17
Thierry Carrez (koon gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200509-09
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -

[ more ]  [ reply ]
Re: PHP Nuke <= 7.8 Multiple SQL Injections 2005-09-16
Paul Laudanski (zx castlecops com)
On Fri, 16 Sep 2005, Matthias Jim Knopf wrote:

> What do you gain from that? In what way would you think your advice did
> ANYTHING GOOD?
> You did neither issue a "addslashes()" as appropriate for SQL-commands,
> nor did you explain, why a variable set by a POST or a COOKIE could be
> worse than

[ more ]  [ reply ]
Re: PHP Nuke <= 7.8 Multiple SQL Injections 2005-09-16
Daniel Bonekeeper (thehazard gmail com)
I made some tests and seems to me that just environments where
magic_quotes_gpc = 'Off' are affected (which is not default on php).
When magic_quotes_gpc = On, the query that is sent to database is
interpreted as:

SELECT active, view FROM nuke_modules WHERE title='\' OR 1=2 /*'

Which is properly s

[ more ]  [ reply ]
Possible memory corruption problems in Apple Safari 2005-09-17
Jonathan Rockway (jon jrock us)
Hello,

I was playing around with Safari the other day and noticed that it
crashes solid if you convince it to visit:

data://<h1>crash</h1>

Typing it into the address bar is sufficient for testing and crashes
the browser completely. I loaded up Safari in gdb to see where it
crashes and got the fo

[ more ]  [ reply ]
[BuHa-Security] Multiple vulnerabilities in (admincp/modcp of) vBulletin 3.0.8/9 2005-09-18
bugtraq morph3us org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
---------------------------------------------------
| BuHa Security-Advisory #3 | Sep 17th, 2005 |
| feat. SePro Bugtraq | |
---------------------------------------------------
| Vendor | vBulletin

[ more ]  [ reply ]
Dumb Question 2005-09-19
Sean Warnock (swarnock removeme warnocksolutions com)
First of all I want to say hello to the few people that I meet at
Toorcon 2005. For my first security conference you guys helped make it
magical. Also greets go out to the guys from the San Fernando Linux users
group. You guys are great and I'll have to make it your way one of these
days.

[ more ]  [ reply ]
Re: Airscanner Mobile Security Advisory #05082201: File Transfer Anywhere v3.01 Local Server Password Disclosure 2005-09-16
3APA3A (3APA3A SECURITY NNOV RU)
Dear contact (at) airscanner (dot) com [email concealed],

Wow! Local information leak for Pocket PC ;)

The problem is exploitation is not trivial - it requires local attacker
to be able to install software, because (as far as I know) there is no
default application for Windows for Mobile to browse registry. Because
Win

[ more ]  [ reply ]
Web Application Security Analyzer for PHP-Nuke/phpBB CMS 2005-09-17
Paul Laudanski (zx castlecops com)
With all the discussions surrounding the PHP-Nuke CMS wrapping phpBB2 as
its forums, I've released an application called Analyzer (version 2.0)
available from Download.com.

It checks the following versions and reports if newer versions exist:

mysql
php
apache
phpnuke
phpbb

It also checks certai

[ more ]  [ reply ]
Alstrasoft Epay Pro 2.0 and prior Directory Traversal Vulnerability 2005-09-19
h4cky0u gmail com
------------------------------------------------------
HYA-2005-008 h4cky0u.org Advisory 008
------------------------------------------------------
Date - Mon Sep 19 2005

TITLE:
======

Alstrasoft Epay Pro 2.0 and prior Directory Traversal Vulnerability

SEVERITY:
=========

Medium

SOFTWA

[ more ]  [ reply ]
[Full-disclosure] killbits? should have named them kibbles and bits 2005-09-19
Ill will (xillwillx gmail com)
Background:
Killbits are used to block certain activex controls from running within windows
It is possible using certain methods to bypass this remotely.

This goes out to my favorite company in the whole world Microsoft.
Thanks for the upcoming vacation. :)
MS security department head (Hi Terry) wi

[ more ]  [ reply ]
[ GLSA 200509-12 ] Apache, mod_ssl: Multiple vulnerabilities 2005-09-19
Thierry Carrez (koon gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200509-12
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -

[ more ]  [ reply ]
Antigen 8.0 for Exchange/SMTP Rule Vulnerability 2005-09-19
Alan Monaghan (AlanM Gardnerweb com)
======================================================================
- Sybari Antigen for SMTP / Exchange Rule / Attachment Pass through -
======================================================================
1) Affected Software

Sybari Antigen v8.0 SR2 for Exchange/SMTP

Other versions may als

[ more ]  [ reply ]
router worms and International Infrastructure [was: Re: IOS exploit] 2005-09-19
Gadi Evron (ge linuxbox org)
The text below is an email I just sent to the North American Network
Operators Group. I believe asking for bugtraq's opinion is also critical.

Thanks,

Gadi.

Michael.Dillon (at) btradianz (dot) com [email concealed] wrote:
> Reading through the original Russian posting here
> http://www.securitylab.ru/news/240415.php&direc

[ more ]  [ reply ]
ERRATA: [ GLSA 200507-20 ] Shorewall: Security policy bypass 2005-09-17
Thierry Carrez (koon gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory [ERRATA UPDATE] GLSA 200507-20:02
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -

[ more ]  [ reply ]
CuteNews 1.4.0 remote code execution 2005-09-17
retrogod aliceposta it
CuteNews 1.4.0 (possibly prior versions) remote code execution

software:

site: http://cutephp.com/

description: "Cute news is a powerful and easy for using news management
system that use flat files to store its database. It supports comments, archives,
search function, image uploading, backup

[ more ]  [ reply ]
CuteNews 1.4.0 remote code execution 2005-09-17
retrogod aliceposta it
CuteNews 1.4.0 (possibly prior versions) remote code execution

software:

site: http://cutephp.com/

description: "Cute news is a powerful and easy for using news management
system that use flat files to store its database. It supports comments, archives,
search function, image uploading, backup

[ more ]  [ reply ]
[ GLSA 200509-11 ] Mozilla Suite, Mozilla Firefox: Buffer overflow 2005-09-18
Thierry Carrez (koon gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200509-11
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -

[ more ]  [ reply ]
[ GLSA 200509-10 ] Mailutils: Format string vulnerability in imap4d 2005-09-17
Thierry Carrez (koon gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200509-10
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -

[ more ]  [ reply ]
Cisco IOS hacked? 2005-09-19
ciscoioshehehe (ciscoioshehehe yandex ru)
today news on SecurityLab.ru (only in russian):

http://www.securitylab.ru/news/240415.php

* break CRC on CISCO IOS
* Desgin Mechanism of cross-platform worm for IOS device.
* Run IRC server on 2600 CISCO.
* Found more vulnerabilities in EIGRP protocol.

and some more...

Online translate from Rus

[ more ]  [ reply ]
Re: [Full-disclosure] FireFox Host: Buffer Overflow is not just exploitable on FireFox 2005-09-16
milw0rm Inc. (milw0rm gmail com)
This problem also effects Thunderbird (tested) and im guessing
Netscape's Mail client (untested) which it really can't do much except
cause Thunderbird/Netscape to crash without javascript.

Include the linked source in an email for your testing.

http://www.milw0rm.com/down.php?id=1204

/str0ke

On

[ more ]  [ reply ]
Re: worring about YaST in SuSE 9.3 and maybe lower 2005-09-16
Marcus Meissner (meissner suse de)
On Fri, Sep 16, 2005 at 09:01:19AM -0000, innate (at) gmx (dot) de [email concealed] wrote:
> author: l0om
> email: email:l0om | a7 | excluded d07 org
> page: www.excluded.org
>
> worring about YaST in SuSE 9.3 and maybe lower
>
> iam wondering about the installation routine from SuSE linux 9.3 and maybe some lower veris

[ more ]  [ reply ]
Greyhats Security back online 2005-09-16
pvnick gmail com
It's been a while, but I have decided that because a lot of valuable information is hosted on greyhatsecurity.org, that it is within everyone's best interest to share the material.

Some things that have changed:
- The layout. The navigation system looks a lot cooler now (IMHO) and is easier to fol

[ more ]  [ reply ]
Re: [Full-disclosure] FireFox Host: Buffer Overflow is not just exploitable on FireFox 2005-09-16
Juha-Matti Laurio (juha-matti laurio netti fi)
> This problem also effects Thunderbird (tested) and im guessing
> Netscape's Mail client (untested) which it really can't do much except
> cause Thunderbird/Netscape to crash without javascript.
>
> Include the linked source in an email for your testing.
>
> http://www.milw0rm.com/down.php?id=120

[ more ]  [ reply ]
RE: [Full-disclosure] FireFox Host: Buffer Overflow is not justexploitable on FireFox 2005-09-15
Juha-Matti Laurio (juha-matti laurio netti fi)
> Hi Juha!
>
> > I have informed the vendor Netscape being affected on 9th
> > September 2005.
>
> I did the same on the 10th of September - still no reply nor official
> statement from Netscape which makes me a little worried.

Good to know. It seems that's their way to act.
They had a coverage

[ more ]  [ reply ]
Re: PHP Nuke <= 7.8 Multiple SQL Injections 2005-09-15
Paul Laudanski (zx castlecops com)
On 14 Sep 2005 evaders99 (at) gmail (dot) com [email concealed] wrote:

> I'd just like to report as a solution: the Nuke Patched files. These are being developed to cover all the latest vulnerabilities, and to fix issues with previous versions of phpNuke.
>
> These changes will be implemented to our CVS and package downloads

[ more ]  [ reply ]
CDMA1X Security 2005-09-16
pen-test securityfocus com
Hi,

Does anybody knows well known threats and vulnerabilities in the CDMA1X
system? Which technology is most security between CDMA1X and GRPS.

Thank you very much for your help me.

Carlos

[ more ]  [ reply ]
Re: PHP Nuke <= 7.8 Multiple SQL Injections 2005-09-15
Matthias Jim Knopf (jim users de)
What do you gain from that? In what way would you think your advice did
ANYTHING GOOD?
You did neither issue a "addslashes()" as appropriate for SQL-commands,
nor did you explain, why a variable set by a POST or a COOKIE could be
worse than anything you could give any URL by appending '?name=...' o

[ more ]  [ reply ]
Re: PHP Nuke <= 7.8 Multiple SQL Injections 2005-09-15
Paul Laudanski (zx castlecops com)
On Fri, 16 Sep 2005, Matthias Jim Knopf wrote:

> What do you gain from that? In what way would you think your advice did
> ANYTHING GOOD?
> You did neither issue a "addslashes()" as appropriate for SQL-commands,
> nor did you explain, why a variable set by a POST or a COOKIE could be
> worse than

[ more ]  [ reply ]
Re: PHP SESSION MODIFICATION 2005-09-16
David N Murray (dmurray jsbsystems com)
Why is this news? From the PHP docs on Session Handling Functions:

<quote>
Sessions and Security

Using sessions, does not mean, you can be absolutely sure, that the
session data can only be viewed by that user. This is important to keep in
mind, when storing and displaying sensitive information.

[ more ]  [ reply ]
TSLSA-2005-0049 - multi 2005-09-16
Trustix Security Advisor (tsl trustix org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Trustix Secure Linux Security Advisory #2005-0049

Package names: kernel, util-linux, xorg-x11
Summary: Multiple vulnerabilities
Date: 2005-09-16
A

[ more ]  [ reply ]
(Page 1274 of 1748)  < Prev  1269 1270 1271 1272 1273 1274 1275 1276 1277 1278 1279  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus