BugTraq Mode:
(Page 1322 of 1748)  < Prev  1317 1318 1319 1320 1321 1322 1323 1324 1325 1326 1327  Next >
AOL AIM Instant Messenger Buddy Icon "ateimg32.dll" DoS 2005-06-07
Tom Ferris (tommy security-protocols com)
AOL AIM Instant Messenger Buddy Icon "ateimg32.dll" DoS

Release Date:
June 6, 2005

Date Reported:
June 6, 2005

Severity:
Medium? (if you can exploit it, email me. ;-])

Vendor:
AOL

Systems Affected:
AIM 5.9.3797 for Windows 98/ME/2K/XP (5.96 MB) and all prior versions.

Affected Platforms:
# Win

[ more ]  [ reply ]
[ GLSA 200506-02 ] Mailutils: SQL Injection 2005-06-06
Thierry Carrez (koon gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200506-02
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -

[ more ]  [ reply ]
[ GLSA 200506-03 ] Dzip: Directory traversal vulnerability 2005-06-06
Thierry Carrez (koon gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200506-03
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -

[ more ]  [ reply ]
SQL Injection Exploit for Portail PHP < 1.3 2005-06-06
Alberto Trivero (trivero jumpy it)
`tattle` -- automatic reporting of SSH brute-force attacks 2005-06-05
C.J. Steele, CISSP (coreyjsteele yahoo com)
Inspired by a post to the SANS Intrusions list, I have written `tattle`
to automate the reporting of SSH brute-force attacks.

`tattle` is a perl script that crawls through your sshd logs
(/var/log/messages, or wherever you tell it to look) and finds hosts
who've connected to your SSH server. All

[ more ]  [ reply ]
Server termination in Raknet 2.33 (before 30 May 2005) 2005-06-05
Luigi Auriemma (aluigi autistici org)

#######################################################################

Luigi Auriemma

Application: Raknet network library
http://www.rakkarsoft.com
Versions: <= 2.33 (before 30 May 2005)
the bug has been introduced in some recent upda

[ more ]  [ reply ]
GIPTables Firewall <= v1.1 insecure temporary file creation 2005-06-06
ZATAZ Audits (exploits zataz net)
#########################################################

GIPTables Firewall insecure temporary file creation

Vendor: http://www.giptables.org/
Advisory: http://www.zataz.net/adviso/giptables-05222005.txt
Vendor informed: yes
Exploit available: yes
Impact : medium
Exploitation : low

#############

[ more ]  [ reply ]
LutelWall <= 0.97 insecure temporary file creation 2005-06-06
ZATAZ Audits (exploits zataz net)
#########################################################

LutelWall insecure temporary file creation

Vendor: http://firewall.lutel.pl/index.php
Advisory: http://www.zataz.net/adviso/lutelwall-05222005.txt
Vendor informed: yes
Exploit available: yes
Impact : medium
Exploitation : low

#############

[ more ]  [ reply ]
Popper webmail remote code execution vulnerability - advisory fix 2005-06-06
LSS Security (exposed lss hr)
Hi,

This advisory was already released on http://security.lss.hr, but there was a
mistake in advisory page that marked vulnerable PHP line as HTML tag, so it wasn't
visible within web browser. That's why b0iler described it as a false positive
(http://lists.grok.org.uk/pipermail/full-disclosure/2

[ more ]  [ reply ]
everybuddy <= 0.4.3 insecure temporary file creation 2005-06-06
Eric Romang / DATACENTER Luxembourg (eromang dclux com)
#########################################################

everybuddy insecure temporary file creation

Vendor: http://www.everybuddy.com/ (no more vendor URL)
Advisory: http://www.zataz.net/adviso/everybuddy-06062005.txt
Vendor informed: no more vendor
Exploit available: yes
Impact : low
Exploitati

[ more ]  [ reply ]
[ GLSA 200506-04 ] Wordpress: Multiple vulnerabilities 2005-06-06
Sune Kloppenborg Jeppesen (jaervosz gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200506-04
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -

[ more ]  [ reply ]
A new whitepaper by Watchfire - HTTP Request Smuggling 2005-06-06
Ory Segal (orysegal netvision net il)
Ory Segal wrote:

> Hello,
> Today, Watchfire released a new whitepaper, titled "HTTP Request
> Smuggling". The full paper can be found in the following link:
> http://www.watchfire.com/resources/HTTP-Request-Smuggling.pdf
> <BLOCKED::http://www.watchfire.com/resources/HTTP-Request-Smuggling.pdf>

[ more ]  [ reply ]
Malicious Bundles on Mac OS X 2005-06-04
Braden Thomas (braden127 myrealbox com)
I wrote some information about Malicious Bundles on Mac OS X and
posted source code that you can find here:

http://braden.machacking.net/bundle.html

The InputManagers directory on OS X gives the user the ability to
load any bundle into any application. The Obj-C runtime environment
gives c

[ more ]  [ reply ]
[FLSA-2005:152532] Updated kernel packages fix security issues 2005-06-04
Marc Deslauriers (marcdeslauriers videotron ca)
---------------------------------------------------------------------
Fedora Legacy Update Advisory

Synopsis: Updated kernel packages fix security issues
Advisory ID: FLSA:152532
Issue date: 2005-06-04
Product: Red Hat Linux, Fedora Core
Keywords:

[ more ]  [ reply ]
Israeli industrial espionage Trojan horse sample + snort sigs 2005-06-04
Gadi Evron (ge linuxbox org)
Well, it's been few days since this story broke and amazingly only a few
AV companies detect it.

I am distributing it to the rest of the vendors with the help of a
friend, so at least that's covered, however, due to the nature of this
incident and the high interest I believe many others in the secu

[ more ]  [ reply ]
[DRUPAL-SA-2005-001] New Drupal release fixes critical security issue 2005-06-03
Uwe Hermann (uwe hermann-uwe de)
------------------------------------------------------------------------
----
Drupal security advisory DRUPAL-SA-2005-001
------------------------------------------------------------------------
----
Advisory ID: DRUPAL-SA-2005-001
Date: 2005-jun-01
Securi

[ more ]  [ reply ]
CastleCops phpBB bbcode Input Validation Disclosure 2005-06-02
Paul Laudanski (zx castlecops com)
*CASTLECOPS.COM SUMMARY

bbcode input validation

Severity: High
CastleCops: http://castlecops.com/t123194-.html
CVE: CAN-2005-1193
phpBB Security ID#: 266
Bugtraq ID#: 13545
Secunia #: 15298
US-CERT VU#: 113196
SecurityTracker #: 1013918

Vulnerable: viewtopic.php, privmsg.php for phpBB 2.0.14 (pos

[ more ]  [ reply ]
XCon¡¯2005 CALL FOR PAPER 2005-06-03
alert7 (at) xfocus (dot) org [email concealed] (bugs whitecell org)
hi all:

http://xcon.xfocus.org/cfp.html

XCon¡¯2005:

XCon is an Information Security Conference organized by the XFocus Security Team which brings together information security enthusiasts and professionals from all parts of , and the world. This year¡¯s event will be held in Beijing, , Augus

[ more ]  [ reply ]
[SECURITY] [DSA 732-1] New mailutils packages fix several vulnerabilities 2005-06-03
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 732-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
June 3rd, 2005

[ more ]  [ reply ]
RE: Backdoor in Fortinet´s firewall Fortigate 2005-06-02
Matt Gibson (Mattg blueedgetech ca)
I fail to see how this is a "backdoor".

This is how one would reset their master password on the device.

Physical access always trumps all other forms of security.

Cisco routers can have their password reset if you gain physical access to them as well.

And (if nothing else), this method is not n

[ more ]  [ reply ]
[security bulletin] SSRT5962 rev.0 HP OpenView Radia mgmt - Remote access and DoS 2005-06-02
Boren, Rich (SSRT) (rich boren hp com)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

HP SECURITY BULLETIN

HPSBMA01143 REVISION: 0

SSRT5962 rev.0 - HP OpenView Radia Management Applications - Radia
Notify Daemon Remote Unauthorized Access to Data and Denial of
Service (DoS)

NOTICE:
There are no restrictions for distribution of t

[ more ]  [ reply ]
SEC-CONSULT SA20050602-2 :: Exhibit Engine Blind SQL Injection 2005-06-02
Bernhard Müller (bmu sec-consult com)
SEC-CONSULT Security Advisory 20050602-2
========================================================================
=====
title: Exhibit Engine Blind SQL Injection
program: Exhibit Engine
vulnerable version: 1.22, 1.54 RC4
homepage: http://photograp

[ more ]  [ reply ]
SEC-CONSULT SA20050602-1 :: Arbitrary File Inclusion in phpCMS 1.2.x 2005-06-02
Bernhard Müller (bmu sec-consult com)
SEC-CONSULT Security Advisory 20050602-1
=======================================================================
title: Arbitrary File Inclusion in phpCMS 1.2.x
program: phpCMS
vulnerable version: 1.2.0, 1.2.1, 1.2.1pl1
homepage: www.phpcms.de

[ more ]  [ reply ]
HP Radia Notify Daemon: Multiple Buffer Overflow Vulnerabilities 2005-06-01
John Cartwright (johnc grok org uk)
HP Radia Notify Daemon: Multiple Buffer Overflow Vulnerabilities
John Cartwright <johnc (at) grok.org (dot) uk [email concealed]>
1st June 2005

Introduction
------------
Hewlett-Packard's (formerly Novadigm) Radia contains a component known
as the Radia Notify Daemon. This RADEXECD component is a small server
process that lis

[ more ]  [ reply ]
Backdoor in Fortinet´s firewall Fortigate 2005-06-01
Johan Andersson (andersson one se) (1 replies)
If you have console access to this box, you are able to get root access
or more by using the Username: maintainer
Password: pbcpbn[here should you type the serialnr. of the box, the
characters should be in Capital letters.]
FortiOS: 2.x

Regards
Johan Andersson
Atea Security, Sweden
Phone: +46-709

[ more ]  [ reply ]
Re: Backdoor in Fortinet´s firewall Fortigate 2005-06-02
Michael J McCafferty (mike m5computersecurity com) (1 replies)
Re: Backdoor in Fortinet´s firewall Fortigate 2005-06-03
Derek Martin (code pizzashack org)
[ECHO_ADV_14$2005] Multiple Vulnerabilities in Liberum Help Desk 2005-06-02
the_day echo or id
.OR.ID
ECHO_ADV_14$2005

------------------------------------------------------------------------
---
Multiple Vulnerabilities in Liberum Help Desk
------------------------------------------------------------------------
---

Author: Dedi Dwianto
Date: June, 02nd 2005
Location

[ more ]  [ reply ]
PHP Execution Vulnerability in CuteNews 2005-06-02
John Cantu (john cantu gmail com)
There is a vulnerability in the latest (and to the best of my
knowledge, all prior versions of) CuteNews from CutePHP.com.

CuteNews does not properly sanitize user input when an administrative
account edits the template files. CuteNews takes HTML code from a web
form and outputs it to a template fi

[ more ]  [ reply ]
(Page 1322 of 1748)  < Prev  1317 1318 1319 1320 1321 1322 1323 1324 1325 1326 1327  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus