|
Colapse all |
Post message
Re: Trillian Ver 3.1 saves password's in plain Text 2005-08-03 Technica Forensis (forensis technica gmail com) Forwarded description of this over to Cerulean - got this reply within hours: From Scott Werndorfer Wed Aug 3 06:31:04 2005 Return-Path: <smw (at) ceruleanstudios (dot) com [email concealed]> Date: Wed, 3 Aug 2005 08:31:04 -0500 (CDT) From: "Scott Werndorfer" <smw (at) ceruleanstudios (dot) com [email concealed]> Add to Address Book Subject: Re: TRI [ more ] [ reply ] RE: On classifying attacks 2005-08-02 Tim Nelson (tim nelson webalive biz) On Fri, 29 Jul 2005, Forte Systems - Iosif Peterfi wrote: > Ok, so let's split them like this: > > 1. Simple > 1.1 Remote > 1.2 Local > 2. Compound > 2.1 Social engineered > 2.2 Technical > 2.3 Local I prefer something just as simple, but maybe more flexible: 1. Interaction level i) Autom [ more ] [ reply ] Re: Trillian Ver 3.1 saves password's in plain Text 2005-08-01 Suramya Tomar (security suramya com) Hi Bond, Thanks for confirming this on your end. The login does work, but if you are already logged in to your yahoo account when you try to use the html file to login it doesn't work. I guess it has something to do with the recent change in yahoo's authentication check as it used to work earl [ more ] [ reply ] Re: ClamAV Multiple Rem0te Buffer Overflows 2005-08-03 Steven M. Christey (coley mitre org) >The release notes for 0.86.2 say: > >"Changes in this release include fixes for three possible integer >overflows in libclamav" Simply assuming that a single-line changelog entry is sufficient acknowledgement of a published vulnerability is dangerous. Such assumptions are frequently wrong. (How [ more ] [ reply ] [security bulletin] SSRT4682 rev.0 - Oracle for Openview (OfO) Critical Patch Update July 2005 2005-08-03 security-alert hp com Silvernews 2.0.3 (possibly previous versions ) SQL Injection / Login Bypass / Remote commands execution / cross site scripting 2005-08-03 retrogod aliceposta it Silvernews 2.0.3 (possibly previous versions ) SQL Injection / Login Bypass / Remote commands execution / cross site scripting software: author site: http://www.silver-scripts.de/scripts.php?l=en&script=SilverNews SQL Injection / Login bypass: A user can bypass admin password check, if magic_quot [ more ] [ reply ] Re: CAID 33239 - Computer Associates BrightStor ARCserve/Enterprise Backup Agents buffer overflow vulnerability 2005-08-03 cybertronic gmx net Coldfusion Fusebox V4.1.0 Vulnerability 2005-08-03 N.N.P (version5 gmail com) This was discovered by myself over the weekend. I cant find out what versions of fusebox this vulnerability is in but seeing as it affects the main fusebox page I can only assume it is the latest v4.1.0 and possibly some older versions. According to the Fusebox site, What is Fusebox? Fusebox is a [ more ] [ reply ] MDKSA-2005:128 - Updated mozilla packages fix multiple vulnerabilities 2005-08-03 Mandriva Security Team (security mandriva com) [SECURITY] [DSA 772-1] New apt-cacher package fixes arbitrary command execution 2005-08-03 joey infodrom org (Martin Schulze) iDEFENSE Security Advisory 08.02.05: CA BrightStor ARCserve Backup Agent for MS SQL Server Buffer Overflow 2005-08-03 iDEFENSE Labs (labs-no-reply idefense com) CA BrightStor ARCserve Backup Agent for MS SQL Server Buffer Overflow iDEFENSE Security Advisory 08.02.05 www.idefense.com/application/poi/display?id=287&type=vulnerabilities August 2, 2005 I. BACKGROUND BrightStor ARCserve Backup for Windows delivers backup and restore protection for all Windows [ more ] [ reply ] Zip 2,31 bad default file-permissions vulnerability 2005-08-02 Imran Ghory (imranghory gmail com) ================================ Zip bad default file-permissions vulnerability ================================ Software: Zip Version: 2.31 Software URL: <http://www.info-zip.org/Zip.html> Platform: Unix, Linux. Vulnerability type: File permission, privacy. Severity: Medium. Allows local user to [ more ] [ reply ] Re: Quick 'n Easy FTP Server 3.0 pro / lite (buffer overflow vulnerabilities) 2005-08-02 brom0815 gmx de Hi I tested this server also today and the only thing that happens is that the ftpserver consumes 100% of the cpu the process don't die whatever u send 1024,2048 or more bytes. So I don't think that this is a real bof. Here is a snippet from my fuzzer, see that the server corresponds correct to any [ more ] [ reply ] [security bulletin] SSRT5998 Rev.0 HP System Management Homepage (v2.0.x) Denial of Service (DoS) & XSS 2005-08-03 security-alert hp com [NOBYTES.COM: #8] Naxtor Shopping Cart 1.0 - Information Disclosure & Possible SQL Injection 2005-08-02 John Cobb (johnc nobytes com) (1 replies) Hello All, I have discovered a couple of remote vulnerabilities in: Naxtor Shopping Cart 1.0 Authors Site: http://www.naxtor.com.au/ Naxtor is described by its authors as: Naxtor Shopping Cart is one stop solution for companies' interested in selling merchandise online. +-[Examples:]----------- [ more ] [ reply ] Re: [NOBYTES.COM: #8] Naxtor Shopping Cart 1.0 - Information Disclosure & Possible SQL Injection 2005-08-02 Patrick Morris (pmorris hermesinfotech com) CAID 33239 - Computer Associates BrightStor ARCserve/Enterprise Backup Agents buffer overflow vulnerability 2005-08-02 Williams, James K (James Williams ca com) Title: Computer Associates BrightStor ARCserve/Enterprise Backup Agents buffer overflow vulnerability CA Vulnerability ID: 33239 Discovery Date: 2005-04-25 Disclosure Date: 2005-08-02 Discovered By: iDEFENSE Impact: A remote attacker can execute arbitrary code with SYSTEM privileges. Summar [ more ] [ reply ] VBZoom Cross Site Scripting Vulnerabilities 2005-07-29 almaster hotmail com Hi All. VBzoom PROPLEM >>>THERE IS Cross site scripting IN FILE NAMED profile.php & login.php EXPLIOT >>> http://www.victim.com/vbzoom/profile.php?UserID=1&UserName=<br><script>a lert(document.cookie);</script> EXPLIOT >>> http://Victim.com/vbzoom/login.php?UserID='<br><script>alert(document.co ok [ more ] [ reply ] Quick 'n Easy FTP Server 3.0 pro / lite (buffer overflow vulnerabilities) 2005-08-02 matiteman securityfocus com, "[at]" securityfocus com,hotmail com securityfocus com Details: ======== Input to the user commands is not properly checked and/or filtered. Issuing a long argument to the user (about 1024 caracteres) commands will cause the corresponding process to die without any error message. this vulnerabilities exist in both the professionnal version 3.0 and l [ more ] [ reply ] Re: [VulnWatch] The Java applet sandbox and stateful firewalls 2005-08-01 Florian Weimer (fw deneb enyo de) * Dinis Cruz: > Is the Java Sandbox able to create outgoing connections on ports like 445? > > Also, even if it is possible, if a service like MS-SQL is already binded > to 1433, then wouldn't an error be thrown saying something like 'Port > already in use'. This doesn't matter because in the PO [ more ] [ reply ] Arab Portal 2005-08-01 ABDUCTER_MINDS YAHOO COM Class: Input Validation Error Remote: Yes Local: Yes Credit: ABDUCTER [ABDUCTER_MINDS (at) YAHOO (dot) COM [email concealed]] oR [ABDUCTER_MINDS76 (at) HOTMAIL (dot) COM [email concealed]] Vulnerable: Arab Portal v2.0 beta 2 *************************************** discussion :- ARAB PORTAL is powerful nuke designed by arabian programmers you can [ more ] [ reply ] unzip TOCTOU file-permissions vulnerability 2005-08-01 Imran Ghory (imranghory gmail com) [Another compression utility with the same race condition issue as bzip2 (CAN-2005-0953), gzip (CAN-2005-0988) and cpio (CAN-2005-1111) - the file is extracted and file descriptor closed before the file is chmod'ed] ================================ unzip TOCTOU file-permissions vulnerability ===== [ more ] [ reply ] |
|
Privacy Statement |
McAfee claims to have "Zero-day" protection against the recent
vulnerability disclosed against Cisco particularly on Shellcodes.
Their press release says, McAfee IntruShield's existing infrastructure
protection proactively covers new exploit techniques against Cisco
IOS, such as those demonstra
[ more ] [ reply ]