BugTraq Mode:
(Page 1358 of 1748)  < Prev  1353 1354 1355 1356 1357 1358 1359 1360 1361 1362 1363  Next >
[ Positive Technologies #SA] Phorum "location" HTTP Response Splitting Vulnerability 2005-03-22
Alexander Anisimov (anisimov ptsecurity com)


[ Positive Technologies SA-20050322 ]
Phorum "location" HTTP Response Splitting Vulnerability.

Release Date: 03/22/2005
Date Reported: 03/10/2005
Severity: Medium
Application: Phorum
Platform: PHP
Vendor: http://www.phorum.org

[ more ]  [ reply ]
Re: Symantec Antivirus client locally created scheduled scan is not running if the local console is logged off 2005-03-22
BoneMachine (bonemach sdf lonestar org)
Hi,
I am not sure if I understand your point.

I thought that the Symantec antivirus (and the norton/symantec corporate edition antivirus) products had (at least) two parts. One part is the scanner that runs as a service with system privileges and is meant to perform the (realtime)scans. The other p

[ more ]  [ reply ]
RUXCON 2005 Call for Papers 2005-03-22
cfp ruxcon org au (RUXCON Call for Papers)
Call For Papers

RUXCON would like to announce the call for papers for the third annual RUXCON
conference.

Breaking from the RUXCON tradition of having the conference in winter months,
this year the conference will be ran during the 1st and 2nd of October.

As with previous years, RUXCON will be

[ more ]  [ reply ]
Mac OSX[CF_CHARSET_PATH]: local root exploit. 2005-03-22
Vade 79 (v9 fakehalo deadpig org)


This is simply an exploit for the iDefense adv posted today/yesterday, exploits via /usr/bin/su.

original adv:
www.idefense.com/application/poi/display?id=219&type=vulnerabilities

original exploit:
http://fakehalo.us/xosx-cf.c

--- example usage ---

server:/tmp v9$ id
uid=502(v9) gid=502(v9) g

[ more ]  [ reply ]
Kayako eSupport Cross Site Scripting 2005-03-22
GulfTech Security Research (security gulftech org)
##########################################################
# GulfTech Security Research March 22, 2005
##########################################################
# Vendor : Kayako Web Solutions
# URL : http://www.kayako.com/
# Version : Kayako eSupport v2.3
# Risk : Cross Site Scripting

[ more ]  [ reply ]
Nortel VPN Client Issue: Clear-text password stored in memory 2005-03-22
Roy Hills (Roy Hills nta-monitor com)
Nortel VPN Client Issue: Clear-text password stored in memory

Summary:

NTA Monitor have discovered a password disclosure issue in the Nortel
Windows VPN client: The Nortel client stores the password in an obfuscated
form in the Windows registry, but it also stores the unencrypted password
in p

[ more ]  [ reply ]
MDKSA-2005:060 - Updated MySQL packages fix multiple vulnerabilities 2005-03-22
Mandrakelinux Security Team (security linux-mandrake com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandrakelinux Security Update Advisory
_______________________________________________________________________

Package name: MySQL
Advisory ID:

[ more ]  [ reply ]
[SECURITY] [DSA 696-1] New perl packages fix privilege escalation 2005-03-22
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 696-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
March 22nd, 2005

[ more ]  [ reply ]
SecurityForest Exploitation Framework Beta has been released! 2005-03-21
Alon Swartz (loni securityforest com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hey Guys,
The Security Forest Exploitation Framework Beta has been released and
is available for download:
http://www.securityforest.com/wiki/index.php/Exploitation_Framework

SecurityForest's Exploitation Framework is similar in concept to the
open-sou

[ more ]  [ reply ]
Re: [ISN] How To Save The Internet 2005-03-21
Jason Coombs (jasonc science org)
InfoSec News wrote:
> Forwarded from: security curmudgeon <jericho (at) attrition (dot) org [email concealed]>
> Cc: sberinato (at) cio (dot) com [email concealed]
> ... Big load of crap ...
> : http://www.cio.com/archive/031505/security.html
> : BY SCOTT BERINATO
> : serial numbers and control their distribution. James Whittaker says
> : programmable PCs

[ more ]  [ reply ]
iDEFENSE Security Advisory 03.21.05: Mac OS X CF_CHARSET_PATH Buffer Overflow Vulnerability 2005-03-21
iDefense Customer Service (customerservice idefense com)
Mac OS X CF_CHARSET_PATH Buffer Overflow Vulnerability

iDEFENSE Security Advisory 03.21.05
www.idefense.com/application/poi/display?id=219&type=vulnerabilities
March 21, 2005

I. BACKGROUND

Mac OS X is an operating system for the Apple family of microcomputers.

More information is available at th

[ more ]  [ reply ]
New Whitepaper: Anti Brute Force Resource Metering 2005-03-21
Gunter Ollmann (NGS) (gunter ngssoftware com)
Hi List,

It's been a couple of months since my last whitepaper, so time for a new
one. This new whitepaper focuses upon a method known as "resource metering"
to actively restrict (and possibly prevent) many brute force guessing attack
vectors that target custom web authentication processes.

The p

[ more ]  [ reply ]
phpMyFamily 1.4.0 SQL vulnerabilities 2005-03-21
kre0n mail ru


ADZ Security Team
===================
Info

Program: phpMyFamily
Version: 1.4.0
Modules: people.php, track.php, edit.php, document.php, census.php,
passthru.php and other..
Bug type: SQL Injection
Vendor site: http://www.phpmyfamily.net/
Vendor Informed: Yes
===================
Bug Info

Basic SQL

[ more ]  [ reply ]
Details of Sybase ASE bugs withheld 2005-03-21
NGSSoftware Insight Security Research (nisr nextgenss com) (1 replies)
In 2004, NGSS reported a number of serious security issues in Sybase ASE to
Sybase, which Sybase has released patches for:

http://www.sybase.com/detail?id=1034520

NGSS advise all Sybase ASE customers to review the advice that Sybase
provided in the alert above, and apply the relevant patches as so

[ more ]  [ reply ]
Re: [VulnWatch] Details of Sybase ASE bugs withheld 2005-03-21
Halvar Flake (HalVar gmx de) (1 replies)
Re: [VulnWatch] Details of Sybase ASE bugs withheld 2005-03-21
David Litchfield (davidl ngssoftware com) (1 replies)
Re: [VulnWatch] Details of Sybase ASE bugs withheld 2005-03-21
sean (infamous41md hotpop com)
[ GLSA 200503-27 ] Xzabite dyndnsupdate: Multiple vulnerabilities 2005-03-21
Thierry Carrez (koon gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200503-27
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -

[ more ]  [ reply ]
[ GLSA 200503-25 ] OpenSLP: Multiple buffer overflows 2005-03-20
Thierry Carrez (koon gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200503-25
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -

[ more ]  [ reply ]
Re: Thoughts and a possible solution on homograph attacks 2005-03-20
Duncan Simpson (dps simpson demon co uk) (1 replies)
Homograph attacks might be a closed subject but nobody has mentioned this, so
maybe I should. Surely it is possible for a web browser to apply some similar
character mapping rules and react only if it finds something.

Thus if the IDN looks like www.ebay.com on the screen the web browser will
notice

[ more ]  [ reply ]
Re: Thoughts and a possible solution on homograph attacks 2005-03-21
Nick FitzGerald (nick virus-l demon co uk)
phpMyFamily 1.4.0 SQL vulnerabilities 2005-03-20
kreon (kre0n mail ru)
ADZ Security Team
===================
Info

Program: phpMyFamily
Version: 1.4.0
Modules: people.php, track.php, edit.php, document.php, census.php,
passthru.php and other..
Bug type: SQL Injection
Vendor site: http://www.phpmyfamily.net/
Vendor Informed: Yes
===================
Bug Info

Basic SQL-I

[ more ]  [ reply ]
Re: [PersianHacker.NET 200503-10]PHP-Fusion v5.01 Html Injection Vulnerability 2005-03-19
Sheldon King (sheldon fileblitz com)
In-Reply-To: <20050319082025.28662.qmail (at) www.securityfocus (dot) com [email concealed]>

The main developer Digitanium was notified, a patch has been developed and released on the main website.

Quote from Main Developer Digitanium at http://www.php-fusion.co.uk

Pi3cH has reported a cross-site-scripting vulnerability. PHP

[ more ]  [ reply ]
Fw: [PersianHacker.NET 200503-10]PHP-Fusion v5.01 Html Injection Vulnerability 2005-03-19
Sheldon King (sheldon fileblitz com)
A patch has now been made available at php-fusion.co.uk

-Sheldon King
PHP Fusion Beta Team

----- Original Message -----
From: "PersianHacker Team" <pi3ch (at) yahoo (dot) com [email concealed]>
To: <bugtraq (at) securityfocus (dot) com [email concealed]>
Sent: Saturday, March 19, 2005 3:20 AM
Subject: [PersianHacker.NET 200503-10]PHP-Fusion v5.01 Html I

[ more ]  [ reply ]
Fw: [PersianHacker.NET 200503-10]PHP-Fusion v5.01 Html Injection Vulnerability 2005-03-19
Sheldon King (sheldon fileblitz com)
This is not part of PHP Fusion v5.01

This is an available mod addon supplied by the main developer Digitanium for
an IIS Compatibility.

This setuser.php will not implemented into PHP Fusion until v5.02 and is not
mainstream accross the fusion community. I have notified the main developer
Digitaniu

[ more ]  [ reply ]
[SECURITY] [DSA 695-1] New xli packages fix several vulnerabilities 2005-03-21
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 695-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
March 21st, 2005

[ more ]  [ reply ]
TSL-2005-0009 - multi 2005-03-21
Trustix Security Advisor (tsl trustix org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Trustix Secure Linux Security Advisory #2005-0009

Package name: kernel, mysql
Summary: Multiple security holes fixed
Date: 2005-03-21
Affected vers

[ more ]  [ reply ]
-==PVDasm Long Name Debug Vulnerability==- 2005-03-20
HaCkZaTaN (hck_zatan hotmail com)


/*
--------------------------------------------------------
[N]eo [S]ecurity [T]eam [NST]® - Advisory #10 - 19/03/05
--------------------------------------------------------
Program: PVDasm
Homepage: http://pvdasm.reverse-engineering.net/
Vulnerable Versions: v1.6b & lowers
Risk: Medium!!
Impact

[ more ]  [ reply ]
[CLA-2005:940] Conectiva Security Announcement - curl 2005-03-21
Conectiva Updates (secure conectiva com br)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
CONECTIVA LINUX SECURITY ANNOUNCEMENT
- ------------------------------------------------------------------------
--

PACKAGE : curl
SUMMARY : Fix for cURL vulnerability
DAT

[ more ]  [ reply ]
-==CoolForum Path Disclosure & Possible SQL Injection==- 2005-03-20
HaCkZaTaN (hck_zatan hotmail com)


/*
--------------------------------------------------------
[N]eo [S]ecurity [T]eam [NST]® - Advisory #11 - 20/03/05
--------------------------------------------------------
Program: CoolForum
Homepage: http://coolforum.net/
Vulnerable Versions: CoolForum v.0.8.1 beta & Lowers
Risk: Low!!
Impact

[ more ]  [ reply ]
(Page 1358 of 1748)  < Prev  1353 1354 1355 1356 1357 1358 1359 1360 1361 1362 1363  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus