BugTraq Mode:
(Page 1352 of 1748)  < Prev  1347 1348 1349 1350 1351 1352 1353 1354 1355 1356 1357  Next >
Re: cPanel/WHM demo account problems 2005-03-31
Darren (darren cpanel net)
In-Reply-To: <NGEHLEPKOGIHAIJAMDPKEEOBCIAA.bugtraq (at) secur1ty (dot) net [email concealed]>

If you read the changelog you would have noticed this was fixed over a month ago.

http://layer1.cpanel.net/ChangeLog.cgi?output=html

Laziness is no excuse for not reporting vulnerabilities to a vendor first. If you can sign up to bu

[ more ]  [ reply ]
Information leak in the Linux kernel ext2 implementation 2005-04-01
Arkoon Security Team (security arkoon net)
Description: Information leak in the Linux kernel ext2 implementation
References: CAN-2005-0400
Authors: Mathieu Lafon <mlafon (at) arkoon (dot) net [email concealed]>
Romain Francoise <rfrancoise (at) arkoon (dot) net [email concealed]>

Arkoon Security Team Advisory - March 25, 2005
http://arkoon.net/advisories/ext2-make-empty-le

[ more ]  [ reply ]
[Hat-Squad Advisory] Bakbone NetVault Heap overflow Vulnerabilities 2005-04-01
Hat-Squad Security Team (bugtraq hat-squad com)
Hat-Squad Advisory: BakBone NetVault Remote Heap and Local Buffer
Overflow
April 1, 2005

Product: BakBone NetVault
Vendor URL: http://www.bakbone.com
Version: NetVault 7.x, 6.x
Vulnerability: Remote and Local Heap Buffer overflows
Release Date:1 April 2005

Vendor Status:

17-3-2005: vendor n

[ more ]  [ reply ]
Buffer Overflow within the RUMBA product 2005-04-01
Bahaa Naamneh (b_naamneh hotmail com)


Buffer Overflow within the RUMBA product
----------------------------------------

Advisory Information:
=====================
Application: RUMBA OFFICE
Vendor Homepage: http://www.netmanage.com
Versions: 7.3 (and earlier versions)
Platforms: Windows (all)
Severity: High
Date: 15/01/05

Intr

[ more ]  [ reply ]
iDEFENSE Security Advisory 03.31.05: PHP getimagesize() Multiple Denial of Service Vulnerabilities 2005-03-31
iDEFENSE Labs (labs-no-reply idefense com)
PHP getimagesize() Multiple Denial of Service Vulnerabilities

iDEFENSE Security Advisory 03.31.05
www.idefense.com/application/poi/display?id=222&type=vulnerabilities
March 31, 2005

I. BACKGROUND

PHP is a widely-used general-purpose scripting language that is
especially suited for Web development

[ more ]  [ reply ]
[SECURITY] [DSA 702-1] New ImageMagick packages fix several vulnerabilities 2005-04-01
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 702-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
April 1st, 2005

[ more ]  [ reply ]
[SECURITY] [DSA 703-1] New krb5 packages fix arbitrary code execution 2005-04-01
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 703-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
April 1st, 2005

[ more ]  [ reply ]
(PAPER) "Vision of danger: The Firefox Greasemonkey" 2005-03-31
Piotr Bania (bania piotr gmail com)
Hi,

For thoose who would like to read some about Firefox Greasemonkey.
Here is the article: http://pb.specialised.info/all/articles/monkey.txt
have phun.

Peace,
Piotr Bania

--
--------------------------------------------------------------------
Piotr Bania - <bania.piotr (at) gmail (dot) com [email concealed]> - 0xCD, 0x19

[ more ]  [ reply ]
WindowsXP malformed .wmf files DoS 2005-03-31
liquid cyberspace org


Here is an example of malformed .wmf file which will cause DoS. Put this file in arbitrary folder (be sure that file has .wmf extension, otherwise this wouldn't work). Open that folder with Windows Explorer, and just move mouse over malformed file. CPU usage will rise to 100%, and stay that way.

[ more ]  [ reply ]
RE: eBay Account Phishing with eBay Redirect - Ebay fixed this + related XSS hole 2005-03-31
Rager, Anton (Anton) (arager avaya com)

It appears that Ebay finally removed this redirector CGI. In the process
they eliminated/fixed another flaw with that same CGI that allowed XSS
attacks. I reported this issue to Ebay around the time this redirection
CGI originally hit bugtraq, but never heard back on resolution.

The redirector CGI

[ more ]  [ reply ]
[HV-HIGH] Microsoft Jet DB engine vulnerabilities 2005-03-31
vuln hexview com (1 replies)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Microsoft Jet DB engine vulnerabilities

Classification:
===============
Level: low-med-[HIGH]-crit
ID: HEXVIEW*2005*03*31*1
URL: http://www.hexview.com/docs/20050331-1.txt

Overview:
=========
Microsoft Jet database is a lightweight database widely use

[ more ]  [ reply ]
Re: [HV-HIGH] Microsoft Jet DB engine vulnerabilities 2005-04-01
Thor (Hammer of God) (thor hammerofgod com)
Reverse shell using netcat on AS/400 2005-03-31
Shalom Carmel (shalom venera com) (1 replies)
Reverse shell using netcat on AS/400

Overview
------------
Netcat, dubbed the TCP/IP "Swiss Army knife", is a simple Unix utility
which reads and writes data across network connections,
using TCP or UDP protocol. An indispensable tool, netcat stars in network
hacking manuals as one of the most vers

[ more ]  [ reply ]
PayPal "security" measures 2005-04-01
Jeremy Rasmussen (jeremycec msn com)
Security holes in the iTunes Music Store 2005-03-31
Charles M. Hannum (abuse spamalicious com)
While inspecting the iTMS protocol with sniffers and PyMusique, I have found
what appear to be three security issues:

1) Although signup/user info, authorization, shopping cart and purchase
transactions are all sent via SSL, other transactions (such as searches and
album info requests) are not.

[ more ]  [ reply ]
MDKSA-2005:063 - Updated htdig packages fix vulnerability 2005-03-31
Mandrakelinux Security Team (security linux-mandrake com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandrakelinux Security Update Advisory
_______________________________________________________________________

Package name: htdig
Advisory ID:

[ more ]  [ reply ]
MX Shop 1.1.1 and MX Kart 1.1.2 are vulnerable to multiple SQL injection vulnerabilities 2005-04-01
dcrab (dcrab hackerscenter com)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Dcrab 's Security Advisory
http://icis.digitalparadox.org/~dcrab
http://www.hackerscenter.com/

Severity: Medium
Title: MX Shop 1.1.1 and MX Kart 1.1.2 are vulnerable to multiple SQL injection vulnerabilities
Date: 1/04/2005

Vendor: InterAKT
Vendor W

[ more ]  [ reply ]
Bay Technical Associates telnet server logon bypass 2005-03-31
nolimit bugtraq (nolimit bugtraq gmail com) (1 replies)
Vulnerability found by Flare@CiSO
Greets to nolimit, COREiSO, #news, and class101.

Versions Tested:
RPC-3 Telnet Host - Revision F 3.05, (C) 1998

This is a basic login-bypass vulnerability found in the RPC-3 Telnet
Host v 3.05 made by "Bay Technical Associates". This telnet daemon is
used by many

[ more ]  [ reply ]
Re: Bay Technical Associates telnet server logon bypass 2005-03-31
Michael Brennen (mbrennen fni com)
[ GLSA 200503-37 ] LimeWire: Disclosure of sensitive information 2005-03-31
Thierry Carrez (koon gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200503-37
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -

[ more ]  [ reply ]
MDKSA-2005:064 - Updated libexif packages fix vulnerability 2005-03-31
Mandrakelinux Security Team (security linux-mandrake com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandrakelinux Security Update Advisory
_______________________________________________________________________

Package name: libexif
Advisory ID:

[ more ]  [ reply ]
MDKSA-2005:062 - Updated ipsec-tools packages fix vulnerability 2005-03-31
Mandrakelinux Security Team (security linux-mandrake com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandrakelinux Security Update Advisory
_______________________________________________________________________

Package name: ipsec-tools
Advisory ID

[ more ]  [ reply ]
[ GLSA 200503-36 ] netkit-telnetd: Buffer overflow 2005-03-31
Thierry Carrez (koon gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200503-36
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -

[ more ]  [ reply ]
RE: Portcullis Security Advisory 05-011 ACPI 1.6 BIOS 2005-03-31
Paul J Docherty (PJD portcullis-security com)
Perhaps you are! The MBR is not being corrupted, it is intact and
perfectly in order (if an MBR RFC existed it would be fully compliant).
Whilst I agree, with privileged access you can DoS a system in many
ways, all the ones you note would be obvious to a user and can be
recovered from using common

[ more ]  [ reply ]
Vendor Response to Portculis Advisory 05-002: Spectrum Cash Receipting System 2005-03-31
Paul J Docherty (PJD portcullis-security com)
Portcullis have received a response from the vendor to the advisory we
released on January 24 2005.

For completeness the vendor response has been included in its entirety,
and demarked via <VENDOR RESPONSE> TEXT <VENDOR RESPONSE> markers.

Portcullis Security Advisory

Spectrum Cash Receipting Syst

[ more ]  [ reply ]
cPanel/WHM demo account problems 2005-03-30
Richard Stanway (bugtraq secur1ty net) (1 replies)
Background
----------
cPanel & WebHost Manager (WHM) is a next generation web hosting control
panel system. Both cPanel & WHM are extremely feature rich as well as
include an easy to use web based interface (GUI). The cPanel demo account
feature creates a restricted username/password to the cPanel w

[ more ]  [ reply ]
Re: cPanel/WHM demo account problems 2005-03-31
Beau Henderson (silentbob gmail com)
(Page 1352 of 1748)  < Prev  1347 1348 1349 1350 1351 1352 1353 1354 1355 1356 1357  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus