BugTraq Mode:
(Page 1280 of 1748)  < Prev  1275 1276 1277 1278 1279 1280 1281 1282 1283 1284 1285  Next >
[SECURITY] [DSA 799-1] New webcalendar packages fix remote code execution 2005-09-02
Michael Stone (mstone klecker debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 798-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Michael Stone
September 2, 2005

[ more ]  [ reply ]
[SECURITY] [DSA 798-1] New phproupware packages fix several vulnerabilities 2005-09-02
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 798-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
September 2nd, 2005

[ more ]  [ reply ]
[SECURITY] [DSA 800-1] New pcre3 packages fix arbitrary code execution 2005-09-02
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 800-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
September 2nd, 2005

[ more ]  [ reply ]
CYBSEC - Multiple Vendor Web Vulnerability Scanner Arbitrary Script Injection Vulnerability 2005-09-01
Mariano Nuñez Di Croce (mnunez cybsec com)
CYBSEC S.A.
www.cybsec.com

Advisory Name: Multiple Vendor Web Vulnerability Scanner Arbitrary
============= Script Injection Vulnerability

Vulnerability Class: Script Injection
====================

Release Date: 09.01.2005
=============

Affected Applications:
======================
* N-Stealth

[ more ]  [ reply ]
[SECURITY] [DSA 794-1] New polygen packages fix denial of service 2005-09-01
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 794-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
September 1st, 2005

[ more ]  [ reply ]
RE: Re: secure client-side platform 2005-09-01
Mark Senior (Mark Senior gov ab ca)
Your attack tree below is of the form:
A and ( B or C or D) and E

I submit a simpler one of the form:
A or (B and C)

A - there is an exploitable vulnerability (in the remote-code-execution
sense) in the DNS response handling code on your livecd. You send out a
query, a malicious response reache

[ more ]  [ reply ]
iDEFENSE Security Advisory 09.01.05: Novell NetMail IMAPD Command Continuation Request Heap Overflow 2005-09-01
iDEFENSE Labs (labs-no-reply idefense com)
Novell NetMail IMAPD Command Continuation Request Heap Overflow

iDEFENSE Security Advisory 09.01.05
www.idefense.com/application/poi/display?id=301&type=vulnerabilities
September 1, 2005

I. BACKGROUND

Novell NetMail is an e-mail and calendaring system that is based on
Internet-standard messaging

[ more ]  [ reply ]
iDEFENSE Security Advisory 09.01.05: 3Com Network Supervisor Directory Traversal Vulnerability 2005-09-01
iDEFENSE Labs (labs-no-reply idefense com)
3Com Network Supervisor Directory Traversal Vulnerability

iDEFENSE Security Advisory 09.01.05
www.idefense.com/application/poi/display?id=300&type=vulnerabilities
September 9, 2005

I. BACKGROUND

3Com Network Supervisor is a network monitoring application which allows

monitoring services on mult

[ more ]  [ reply ]
SUSE Security Announcement: kernel multiple security problems (SUSE-SA:2005:050) 2005-09-01
Marcus Meissner (meissner suse de)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________
______

SUSE Security Announcement

Package: kernel
Announcement ID: SUSE-SA:2005:050
Date:

[ more ]  [ reply ]
[security bulletin] SSRT051005 rev.1 - HP ProLiant DL585 Servers Unauthorized Remote Access 2005-09-01
Boren, Rich (HP SSRT) (rich boren hp com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

HP SECURITY BULLETIN

HPSBMA01220 REVISION: 1

SSRT051005 rev.1 - HP ProLiant DL585 Servers Unauthorized Remote
Access

NOTICE:
The information in this Security Bulletin should be acted upon
as soon as possible.

INITIAL RELEASE:

[ more ]  [ reply ]
silc server and toolkit insecure temporary file creation 2005-09-01
Eric Romang / ZATAZ.com (eromang zataz com)
#########################################################

silc server and toolkit insecure temporary file creation

Vendor: http://silcnet.org/
Advisory: http://www.zataz.net/adviso/silc-server-toolkit-06152005.txt
Vendor informed: yes
Exploit available: yes
Impact : low
Exploitation : low

#######

[ more ]  [ reply ]
[SECURITY] [DSA 779-2] New Mozilla Firefox packages fix several vulnerabilities 2005-09-01
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 779-2 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
September 1st, 2005

[ more ]  [ reply ]
re: Ariba Spend Management System 2005-09-01
gerald626 gmail com
I would like to clarify some things.

First, I would like to apologize for any mis-representaiton due to a lack of proper explanation on my part.

My previous post was essentially true, that the username/password is being transmitted in clear text. However, it is not in the URL as I previously clai

[ more ]  [ reply ]
[SECURITY] [DSA 793-1] New sqwebmail packages fix cross-site scripting 2005-09-01
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 793-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
September 1st, 2005

[ more ]  [ reply ]
File aribitary read access in frox 2005-09-01
un4m31 gmail com
=( c1zc0 Security advisory #1 )=
=( Frox transparent froxy / cache )=
=( found by rotor irc.efnet.org #c1zc0 )=
=( http://c1zc0.com - c1zc0 Security 2005 )=

Package: frox
Frox Author: James Hollingshead
Download Site: http://frox.sourceforge.net
Vulnrability: File aribitary read access

Frox is a

[ more ]  [ reply ]
Re: secure client-side platform 2005-09-01
liudieyu umbrella name (2 replies)


#1, we are talking about how to do critical secret communication in a secure
way, right? so forget about those putting win9x 24/7 on DSL ... let them
continue contributing to the spam and zombie business ;-)

imagine i'm going to access an e-gold acocunt of $1M ...
first i unplug the network

[ more ]  [ reply ]
Re: secure client-side platform 2005-09-01
Keith Oxenrider (koxenrider sol-biotech com)
Re: secure client-side platform 2005-09-01
devnull Rodents Montreal QC CA
[SecuriWeb.2005.1] - Barracuda SPAM firewall advisory 2005-09-01
Francois Harvey (fharvey securiweb net)
ID : 2005.1
Product : Barracuda Spam Firewall Appliance
Vendor : Barracuda networks
Affected product : firmware <= 3.1.17
Class : Directory Traveral, Remote Execution, Password
Retrieving
Remote : yes
local : na
Author :

[ more ]  [ reply ]
RE: Ariba password exposure vulnerability 2005-09-01
Craig Kennedy (CKennedy ariba com)
Gerald626,

I read your post on bugtraq and needed to respond to clear up some
inaccuracies and misrepresentations.

Ariba's "Spend management" software is a suite of web based applications
that enable customers to more effectively manage their spend.

I'm not quite sure what you mean by "... transm

[ more ]  [ reply ]
UMN gopher[v3.0.9+] multiple(2) client buffer overflows. 2005-09-01
v9 (v9 fakehalo us)
1. BACKGROUND

The Internet Gopher Client is based on the UMN Gopher/Gopherd 2.3.1 code. Gopher
is an Internet technology that predates the Web. It presents information as a virtual
network-wide filesystem. Modern browsers such as Konqueror can display gopherspace as
if it contained files on your lo

[ more ]  [ reply ]
Adobe Version Cue exploits. 2005-09-01
v9 (v9 fakehalo us)
exploits for the vulnerabilies referenced in the iDefense advisory.

---------------------- xosx-adobe-vcnative-dyld.c ----------------------

/*[ Adobe Version Cue VCNative[OSX]: local root exploit. (dyld) ]*
* *
* by: vade79/v9 v9@fak

[ more ]  [ reply ]
SimplePHPBlog Arbitrary File Deletion and Sample Exploit 2005-08-29
'ken'@FTU (ken ftusecurity com)
SimplePHPBlog has a vulnerability in its comment_delete_cgi.php.

The PHP script allows for the arbitrary deletion of files.

Attached is an perl script to demonstrate the exploit.

This vulnerability, in combination with the fact that the installation
scripts are left on the server after installat

[ more ]  [ reply ]
[ GLSA 200509-01 ] MPlayer: Heap overflow in ad_pcm.c 2005-09-01
Thierry Carrez (koon gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200509-01
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -

[ more ]  [ reply ]
[USN-173-4] PCRE vulnerabilities 2005-08-31
Martin Pitt (martin pitt canonical com)
===========================================================
Ubuntu Security Notice USN-173-4 August 31, 2005
python2.1, python2.2, python2.3, gnumeric vulnerabilities
CAN-2005-2491
===========================================================

A security issue affects the following Ubuntu r

[ more ]  [ reply ]
Re: Vulnerability in Symantec Anti Virus Corporate Edition v9.x] 2005-08-31
secure symantec com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Symantec is aware of and is currently investigating this issue.

Symantec Product Security Team
Symantec takes the security of our products seriously and is a
responsible disclosure company. You can view our response policies
at http://www.symantec.com

[ more ]  [ reply ]
Ariba password exposure vulnerability 2005-08-31
gerald626 gmail com
The Ariba Spend Mangement System, which is a web-based application, appears to transmit the username and password of the user to the server via the URL in plain text. Packet capture is available for analysis upon request.

This may enable a malicious user to sniff the username/password for accounts

[ more ]  [ reply ]
Vulnerability in Symantec Anti Virus Corporate Edition v9.x 2005-08-31
golovast gmail com (2 replies)
The vulnerability has been identified and confirmed in versions 9.0.1.x and 9.0.4.x. I am fairly certain that it exists in all releases of version 9 and possibly other versions as well.

Essentially, the program can be configured to receive updates via Symantec's or an Internal Live update server.

[ more ]  [ reply ]
RE: Vulnerability in Symantec Anti Virus Corporate Edition v9.x 2005-09-01
James C Slora Jr (Jim Slora phra com)
(Page 1280 of 1748)  < Prev  1275 1276 1277 1278 1279 1280 1281 1282 1283 1284 1285  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus