BugTraq Mode:
(Page 1312 of 1748)  < Prev  1307 1308 1309 1310 1311 1312 1313 1314 1315 1316 1317  Next >
[USN-147-1] PHP XMLRPC vulnerability 2005-07-05
Martin Pitt (martin pitt canonical com)
===========================================================
Ubuntu Security Notice USN-147-1 July 05, 2005
php4, php4-universe vulnerability
CAN-2005-1921
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 4.10 (Warty Wa

[ more ]  [ reply ]
[SECURITY] [DSA 734-1] New gaim packages fix denial of service 2005-07-05
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 734-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
July 5th, 2005

[ more ]  [ reply ]
PlanetFileServer v2.0.1.3 - Denial Of Service 2005-07-04
unsecure writeme com
Software: PlanetFileServer
Corporation: PlanetDNS Software
Version: v2.0.1.3
Vulnerability: Denial of Service - Crash Vulnerability
-------------------------------

BACKGROUND
__________

PlanetFileServer v2.0.1.3 is a BETA product
PlanetDNS provides products and services that enable you to host yo

[ more ]  [ reply ]
Re: Microsoft Internet Explorer "javaprxy.dll" Code Execution Exploit 2005-07-03
stupidfrenchdudes ripoff fr
Why don't you give Skylined credit for the exploit code instead of just ripping it off?

[ more ]  [ reply ]
Re: Access right escalation / severe permission problems on Raritan Console Servers 2005-07-03
spam drwetter org
Hi,

the second fix FCR7787 was released @ http://www.raritan.com/support/sup_upgrades.aspx.
FCR7551 was withdrawn.

As opposed to FCR7551 FCR7787 locks the remaining account sshd (with busybox' passwd -l). In fact it does a few exec calls (2xadduser,2xdeluser,2xpasswd). It doesn't resolve the permi

[ more ]  [ reply ]
[ GLSA 200507-01 ] PEAR XML-RPC, phpxmlrpc: PHP script injection vulnerability 2005-07-03
Thierry Carrez (koon gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200507-01
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -

[ more ]  [ reply ]
a new sql injection for aspjar guestbook 2005-07-04
arash_pc0 yahoo com
hello , my name is: (arash setayeshi) & my yahoo id is : arash_pc0

I found a new vulnerability in aspjar guestbook that we can control website & go to admin control panel by (sql injection).

sql injection : in login page(guestbook/admin/login.asp) , username should be blank & password is : ' or

[ more ]  [ reply ]
JBoss jBPM 2.0: Remote code execution and classloader covert channel 2005-07-03
Marc Schoenefeld (marc schoenefeld gmx org)
Security Advisory: jBPM 2.0
Date: 06/22/05
URL: http://www.illegalaccess.org/java/jbpm.php

" JBoss jBPM is a flexible, extensible workflow management system."
[jbpm.org]

Problem 1: Remote code execution possible with jBPM .
This allows an attacker to trigger an arbitrary executable on the jBPM/
J

[ more ]  [ reply ]
UPDATE: [ GLSA 200506-17 ] SpamAssassin 3, Vipul's Razor: Denial of Service vulnerability 2005-07-04
Sune Kloppenborg Jeppesen (jaervosz gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory [UPDATE] GLSA 200506-17:02
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -

[ more ]  [ reply ]
pam_ldap/nss_ldap password leak in a master+slave+start_tls LDAP setup 2005-07-04
Rob Holland (tigger gentoo org)
pam_ldap/nss_ldap fail to re-start TLS when following referred
connections. This can result in credentials being sent in clear text
when pam_ldap/nss_ldap attempt to rebind.

This affects any LDAP infrastructure which can generate referrals during
NSS or PAM operations (generally a master+slave LDAP

[ more ]  [ reply ]
[SECURITY] [DSA 725-2] New ppxp packages fix local root exploit 2005-07-04
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 725-2 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
July 4th, 2005

[ more ]  [ reply ]
Re: /dev/random is probably not 2005-07-03
Zow Terry Brugger (zow llnl gov) (1 replies)
> - Linux? (I don't think so, If we have network and other I/O device
> such as keyboard, I thought that would be used, too.
> but I want confirmation from people in the know.)

It's been a while since I looked at the /dev/random design on Linux (probably
the early 2.4 day

[ more ]  [ reply ]
Re: /dev/random is probably not 2005-07-05
Jack Lloyd (lloyd randombit net)
XMLRPC remote commands execute exploit 2005-07-03
duk3nn bk ru
Advisory : http://gulftech.org/?node=research&article_id=00088-07022005

#-------------------------------------------------------#
# /| #
# | | #
# | |

[ more ]  [ reply ]
Re: /dev/random is probably not 2005-07-03
McLain Causey (mclaincausey yahoo com)
*BSD uses Yarrow I think. Should also be safe from the concerns
mentioned.

http://www.schneier.com/yarrow.html

On Jul 2, 2005, at 9:08 AM, Thomas Wana wrote:

> OpenBSD, FreeBSD, NetBSD and the like, and of course
> Windows family OSs.
>

[ more ]  [ reply ]
Three More Vulnerable to PHPXMLRPC code injection 2005-07-03
GulfTech Security Research (security gulftech org)
The following applications have also been confirmed to use the
vulnerable PHPXMLRPC libraries

phpWiki
http://phpwiki.sourceforge.net/

Blog:CMS
http://blogcms.com/

CivicSpace
http://civicspacelabs.org/

[ more ]  [ reply ]
Re: /dev/random is probably not 2005-07-02
exon (exon home se)
Chiaki wrote:
> Charles M. Hannum wrote:
>
>> Most implementations of /dev/random (or so-called "entropy gathering
>> daemons") rely on disk I/O timings as a primary source of randomness.
>> This is based on a CRYPTO '94 paper[1] that analyzed randomness from
>> air turbulence inside the drive

[ more ]  [ reply ]
Microsoft Internet Explorer "javaprxy.dll" Code Execution Exploit 2005-07-02
team frsirt com
Microsoft Internet Explorer "javaprxy.dll" COM Object Exploit (Unpatched)

Advisory : FrSIRT/ADV-2005-0935
Rated as : Critical
Status : Unpatched
Code : http://www.frsirt.com/exploits/20050702.iejavaprxyexploit.pl.php

#!/usr/bin/perl
######################################################
#
# Micr

[ more ]  [ reply ]
Advisory 03/2005: Cacti Multiple SQL Injection Vulnerabilities [FIXED] 2005-07-02
Stefan Esser (sesser hardened-php net)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hardened - PHP Project
www.hardened-php.net

-= Security Advisory =-

Advisory: Cacti Multiple SQL Injection Vulnerabilities
Release Date: 2005/07/01
Last Modified: 2005/07/0

[ more ]  [ reply ]
Advisory 04/2005: Cacti Remote Command Execution Vulnerability 2005-07-02
Stefan Esser (sesser hardened-php net)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hardened - PHP Project
www.hardened-php.net

-= Security Advisory =-

Advisory: Cacti Remote Command Execution Vulnerability
Release Date: 2005/07/01
Last Modified: 2005/07/0

[ more ]  [ reply ]
Advisory 05/2005: Cacti Authentification/Addslashes Bypass Vulnerability 2005-07-02
Stefan Esser (sesser hardened-php net)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hardened - PHP Project
www.hardened-php.net

-= Security Advisory =-

Advisory: Cacti Authentification/Addslashes Bypass Vulnerability
Release Date: 2005/07/01
Last Modified:

[ more ]  [ reply ]
UnixWare 7.1.4 : Mozilla updated to 1.7.8 fixes security issues 2005-07-01
please_reply_to_security sco com

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________
______

SCO Security Advisory

Subject: UnixWare 7.1.4 : Mozilla updated to 1.7.8 fixes security issues
Advisory number: SCOSA-2005.29
Issue date: 2005 July 01
Cross refere

[ more ]  [ reply ]
[SECURITY ALERT] osTicket bugs 2005-07-01
ghc ghc ru
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
~ ~ RST / GHC -> OSTICKET <- ADVISORY
~ ~ Product: osTicket
~ ~ Version: <= 1.3.1 beta
~ ~ URL: http://www.osticket.com
~ ~ Risk: medium
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

[Product Description]
"osTicket is a widely-used open source support ticket sys

[ more ]  [ reply ]
TSLSA-2005-0031 - multi 2005-07-01
Trustix Security Advisor (tsl trustix org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Trustix Secure Linux Advisory #2005-0031

Package name: clamav, cpplus, dev, imagemagick, kerberos5, kernel,
openldap, pam_ldap, perl-net-server, php, p

[ more ]  [ reply ]
PEAR XML_RPC Remote Code Execution Vulnerability 2005-07-01
GulfTech Security Research (security gulftech org)
##########################################################
# GulfTech Security Research June 29th, 2005
##########################################################
# Vendor : The PEAR Group
# URL : http://pear.php.net/package/XML_RPC/
# Version : PEAR XML_RPC 1.3.0 && Earlier
# Risk

[ more ]  [ reply ]
PHPXMLRPC Remote Code Execution 2005-07-01
GulfTech Security Research (security gulftech org)
##########################################################
# GulfTech Security Research June 29th, 2005
##########################################################
# Vendor : Useful Information Inc.
# URL : http://phpxmlrpc.sourceforge.net/
# Version : PHPXMLRPC 1.1 && Earlier
# Ris

[ more ]  [ reply ]
/dev/random is probably not 2005-07-01
Charles M. Hannum (mycroft netbsd org) (2 replies)
Most implementations of /dev/random (or so-called "entropy gathering daemons")
rely on disk I/O timings as a primary source of randomness. This is based on
a CRYPTO '94 paper[1] that analyzed randomness from air turbulence inside the
drive case.

I was recently introduced to Don Davis and, being

[ more ]  [ reply ]
Re: /dev/random is probably not 2005-07-02
Chiaki (ishikawa yk rim or jp)
Re: /dev/random is probably not 2005-07-02
Thomas Wana (thomas wana at)
(Page 1312 of 1748)  < Prev  1307 1308 1309 1310 1311 1312 1313 1314 1315 1316 1317  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus