BugTraq Mode:
(Page 1375 of 1748)  < Prev  1370 1371 1372 1373 1374 1375 1376 1377 1378 1379 1380  Next >
cfengine rsa heap remote exploit: part of PTjob project 2005-02-19
yan feng (jsk ph4nt0m net)


/* _ ________ _____ ______
*
* cfengine rsa heap remote exploit part of PTjob project / \ / "fuck mm"
* by jsk:exworm(http://exworm.hostrocket.com) \/
* bug found by core
* yep ta mei dayong ..hehe..so pub it..
* my home: www.ph4nt0m.

[ more ]  [ reply ]
webfsd fun. opensource is god .lol windows 2005-02-19
yan feng (jsk ph4nt0m net)


webfsd fun. opensource is god .lol windows

pst.security advisory 2005-2-20

Systems affected:
unstable webfsd 1.21
stable wenfsd 1.17.2

no affected

no..all remote exploitable

1: why advisory? this bug is found two years ago ,yea

[ more ]  [ reply ]
[Hat-Squad] Findjmp2 Tool 2005-02-19
Hat-Squad Security Team (bugtraq hat-squad com)


Findjmp is a Tiny tool originally released by Eeye, it's used to scan
call/jmp/pushret offsets.
Findjmp2 additions by Hat-Squad : pop/pop/ret scanner , logging to
file.
get sources and binary at http://class101.org/

[ more ]  [ reply ]
exwormshoucast part of PTjob project: SHOUTcast v1.9.4 remote exploit 2005-02-19
yan feng (jsk ph4nt0m net)


/* _ ________ _____ ______
*
* exwormshoucast part of PTjob project SHOUTcast v1.9.4 remote exploit / \ / "fuck mm"
* by jsk exworm (exworm.hostrocket.com) \/
* my home www.ph4nt0m.org
* bug found by pucik_at_cc-team.org
* test it

[ more ]  [ reply ]
3com 3CDaemon FTP Unauthorized "USER" Remote BOverflow 2005-02-18
class 101 (class101 hat-squad com)
Hat-Squad.com set a proper on that 5years old hole.
Clean code class101.org, class101.hat-squad.com
Here it is for a quick view on the list:

/*
3com 3CDaemon FTP Unauthorized "USER" Remote BOverflow

The particularity of this exploit is to exploits a FTP server
without the need of any authorization

[ more ]  [ reply ]
Thomson TCW690 POST Password Validation Vulnerability 2005-02-19
MurDoK (murdok lnx gmail com)
I found a vulnerability in this cablemodem which a malicious user inside *LAN
can get the control of the cablemodem easily.
This cablemodem model is given by the spanish ISP "AUNA".

Details
=======

Product: Thomson TCW690 cablemodem
Affected Version: ST42.03.0a (not tested in minor versions

[ more ]  [ reply ]
[FLSA-2005:2137] Updated cyrus-sasl resolves security vulnerabilities 2005-02-17
Dominic Hargreaves (dom earth li)
-----------------------------------------------------------------------
Fedora Legacy Update Advisory

Synopsis: Updated cyrus-sasl resolves security vulnerabilities
Advisory ID: FLSA:2137
Issue date: 2005-02-17
Product: Red Hat Linux

[ more ]  [ reply ]
Knox Arkeia remote root/system exploit 2005-02-18
John Doe (guldens111 hotmail com)
0day cuz i'm bored

/*
* Knox Arkeia Server Backup
* arkeiad local/remote root exploit
* Targets for Redhat 7.2/8.0, Win2k SP2/SP3/SP4, WinXP SP1, Win 2003 EE
* Works up to current version 5.3.x
*
* ---------------
*
* Linux x86:
* ./arksink2 <arkeia_host> <target_type> <display>
*
* Exports an xter

[ more ]  [ reply ]
[ GLSA 200502-27 ] gFTP: Directory traversal vulnerability 2005-02-19
Matthias Geerdsen (vorlon gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200502-27
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -

[ more ]  [ reply ]
Multiples vulnerability in ZeroBoard, 2005-02-19
albanian haxorz (asc albanianhaxorz org)
".,-*'^'~*-,._.,-*'^'~*-,._.,-*'^'~*-,._.,-*'^'~*-,._.,-*'^'~*-,._.,-
*'^'~*-,._."
".,-*-
,._
-.,-*-,."
".,-*-,._ ALBANIA SECURITY
CLAN -.,-*-,."
".,-*-
,._

[ more ]  [ reply ]
Joint encryption? 2005-02-18
John Richard Moser (nigelenki comcast net) (3 replies)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

I'd post this to security-basics, but I've tried subscribing to that
list through the web interface 3 times and still only managed to get
linux-focus and bugtraq.

I'm trying to solve a problem where I want to control access to highly
sensitive data in

[ more ]  [ reply ]
Re: Joint encryption? 2005-02-19
devnull Rodents Montreal QC CA
Re: Joint encryption? 2005-02-19
Casper Dik Sun COM
Re: Joint encryption? 2005-02-19
Damian Menscher (menscher uiuc edu) (1 replies)
Re: Joint encryption? 2005-02-19
John Richard Moser (nigelenki comcast net)
Multiple vulnerabilities in Glftpd v1.26 - v2.00 default zip based plug-ins 2005-02-18
headpimp pimp-industries com
Pimp industries.
"Its all about the Bling, B^!%@s and Fame!"

Multiple vulnerabilities in Glftpd v1.26 - v2.00 default zip based plug-ins
: sitenfo.sh, sitezipchk.sh, siteziplist.sh

(C) Paul Craig - Pimp Industries 2005

Background
-------------
glftpd is an open s

[ more ]  [ reply ]
MDKSA-2005:041 - Updated cups packages fix vulnerabilities on 64 bit platforms 2005-02-18
Mandrakelinux Security Team (security linux-mandrake com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandrakelinux Security Update Advisory
_______________________________________________________________________

Package name: cups
Advisory ID:

[ more ]  [ reply ]
Re: AWStats <= 6.4 Multiple vulnerabilities - can't reproduce in 6.3? 2005-02-18
newbug Tseng (newbug chroot org)
In-Reply-To: <eb743f98050217110164a4bcc8 (at) mail.gmail (dot) com [email concealed]>

Hi.
Please check http://packetstormsecurity.org/0501-exploits/AWStatsVulnAnalysis.pdf
there're some code analysis for awstats.

>Received: (qmail 27381 invoked from network); 17 Feb 2005 23:09:56 -0000
>Received: from outgoing.securityfocus.c

[ more ]  [ reply ]
[ GLSA 200502-25 ] Squid: Denial of Service through DNS responses 2005-02-18
Sune Kloppenborg Jeppesen (jaervosz gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200502-25
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -

[ more ]  [ reply ]
MDKSA-2005:044 - Updated tetex packages fix vulnerabilities on 64 bit platforms 2005-02-18
Mandrakelinux Security Team (security linux-mandrake com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandrakelinux Security Update Advisory
_______________________________________________________________________

Package name: tetex
Advisory ID:

[ more ]  [ reply ]
Multiple vulnerabilities in TrackerCam 5.12 2005-02-18
Luigi Auriemma (aluigi autistici org)

#######################################################################

Luigi Auriemma

Application: TrackerCam
http://www.trackercam.com
Versions: <= 5.12
Platforms: Windows
Bugs: A] User-Agent buffer-overflow
B] PHP argumen

[ more ]  [ reply ]
Re: SHA-1 broken 2005-02-18
Michael Silk (michaelsilk gmail com)
Michael,

But with such functions the point is that "input" isn't a function,
it's a string - and it can only be the inverse of one, not both; i.e.
the result of "invHashFunc1( foo )" _wont_ equal "invHashFunc2( foo
)".

So if the user is attempting to break a login screen with his
invHashFunc's,

[ more ]  [ reply ]
(Page 1375 of 1748)  < Prev  1370 1371 1372 1373 1374 1375 1376 1377 1378 1379 1380  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus