BugTraq Mode:
(Page 1390 of 1748)  < Prev  1385 1386 1387 1388 1389 1390 1391 1392 1393 1394 1395  Next >
Re: List of all admin accounts in phpBB 2005-01-29
Paul Laudanski (zx castlecops com)
On Wed, 26 Jan 2005, Aaron Klein wrote:

> Or just search your phpbb_users table in your database for users that
> have a user_level = 1. Those are admins. User_level of 0 coresponds
> to regular users and User_level of 2 are moderators.

Just on the comment of "phpbb_", it is always a good idea t

[ more ]  [ reply ]
SquirrelMail Security Advisory 2005-01-29
Jonathan Angliss (jon squirrelmail org)
SquirrelMail Security Advisory
==============================

SquirrelMail 1.4.4 has been released to resolve a number of security
issues disclosed below. It is strongly recommended that all running
SquirrelMail prior to 1.4.4 upgrade to the latest release.

Remote File Inclusion
-----------------

[ more ]  [ reply ]
RE: SECURITY.NNOV: Multiple applications fd_set structure bitmap array index overflow 2005-01-29
David LeBlanc (dleblanc exchange microsoft com)


-----Original Message-----
From: Damien Miller [mailto:djm (at) mindrot (dot) org [email concealed]] said:

>This effectively limits select to a maximum of FD_SETSIZE descriptors
on Windows. I don't think that this limitiation exists on other
platforms.

---------------------------

Note the bit where it says:

#ifndef FD_SE

[ more ]  [ reply ]
Re: SECURITY.NNOV: Multiple applications fd_set structure bitmap array index overflow 2005-01-28
Damien Miller (djm mindrot org)
David LeBlanc wrote:
> if (__i == ((fd_set FAR *)(set))->fd_count) { > if (((fd_set FAR *)(set))->fd_count < FD_SETSIZE) { > ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
> ((fd_set FAR *)(set))->fd_array[__i] = (fd); > ((fd_set FAR *)(set))->fd_coun

[ more ]  [ reply ]
[ GLSA 200501-40 ] ngIRCd: Buffer overflow 2005-01-28
Thierry Carrez (koon gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200501-40
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -

[ more ]  [ reply ]
Re: Unrestricted I/O access vulnerability in INCA Gameguard 2005-01-28
David Roberts (david howden demon co uk)
In-Reply-To: <000001c4fc2b$bfd81820$6101a8c0@sauron>

On January 26 2005, NCsoft updated their Lineage 2 client for the North American and European market to include the GameGuard system.

The GameGuard system includes an updated version of the NPPTNT2.SYS driver (2005.1.5.1). The updated driver no

[ more ]  [ reply ]
RE: SECURITY.NNOV: Multiple applications fd_set structure bitmap array index overflow 2005-01-28
David LeBlanc (dleblanc exchange microsoft com)

-----Original Message-----
3APA3A [mailto:3APA3A (at) security.nnov (dot) ru [email concealed]] wrote:

> For Windows fd_set is a sockets array, not bitmask and FD_SETSIZE
defines maximum number of sockets in this array. So, Windows
application may be vulnerable only if it places a large number of
sockets into same fd_set s

[ more ]  [ reply ]
Winamp Exploit (POC) 5.08 Stack Overflow 2005-01-28
Rojodos (rojo2_bugtraq yahoo es)
Hello :)

I´ve coded an exploit about this vulnerability, using the advisory "NSFOCUS SA2005-01 : Buffer Overflow in WinAMP in_cdda.dll CDA Device Name" as a guide. The advisory is very good, so it´s very easy to code the exploit.

This code:

cda://AAAABBBBCCCCDDDDEEEEFFFFGGGGHHHnT _IJJJ?å3ÿW?ìÆEø

[ more ]  [ reply ]
Multiple vulnerabilities in Icewarp Web Mail 5.3.0: New holes 2005-01-29
ShineShadow (ss_contacts hotmail com)


ShineShadow Security Report 26012005-03

TITLE: Multiple vulnerabilities in Icewarp Web Mail 5.3.0 : New holes.

BACKGROUND

Merak Mail Server, with the revolutionary Merak Mail Server GroupWare Server, cutting-edge Merak Mail Server Instant Antispam and much more, is the fastest, most stable, se

[ more ]  [ reply ]
Re: UEBIMIAU <= 2.7.2 MULTIPLES VULNERABILITIES 2005-01-28
pokley (pokleyzz scan-associates net)
I have discover this bug indipendently on March 2004. Since Uebimiua team
have a comment to change default temporary directory for security reason
in their config file this seem not critical to me and decided not to
inform the developer.

In this case this bug may lead to remote command execut

[ more ]  [ reply ]
[OpenPKG-SA-2005.004] OpenPKG Security Advisory (sasl) 2005-01-28
OpenPKG (openpkg openpkg org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________

OpenPKG Security Advisory The OpenPKG Project
http://www.openpkg.org/security.html http://www.openpkg.org
openpkg-security (at) openpkg (dot) org [email concealed]

[ more ]  [ reply ]
WebWasher Classic - HTTP CONNECT weakness 2005-01-28
Oliver Karow (Oliver Karow gmx de)
WebWasher Classic - HTTP CONNECT weakness
=========================================

WebWasher Classic
=================

WebWasher Classic is a well known HTTP-URL/Popup/Script filtering proxy
which
is free for non commercial use.
WebWasher Classic supports two modes, a client mode, where it only

[ more ]  [ reply ]
[ GLSA 200501-39 ] SquirrelMail: Multiple vulnerabilities 2005-01-28
Sune Kloppenborg Jeppesen (jaervosz gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200501-39
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -

[ more ]  [ reply ]
Multiple vulnerabilities in Alt-N WebAdmin <= 3.0.2 2005-01-28
David Alonso Pérez (kamborio gmail com)
WebAdmin is a web application to administer MDaemon and RelayFax. It
can be run on its own or as an ISAPI application under Microsoft
Internet Information Services (IIS). MDaemon is an e-mail server for
Microsoft Windows. RelayFax is a fax server also for Microsoft
Windows. Both applications have be

[ more ]  [ reply ]
MDKSA-2005:024 - Updated evolution packages fix vulnerability 2005-01-27
Mandrakelinux Security Team (security linux-mandrake com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandrakelinux Security Update Advisory
_______________________________________________________________________

Package name: evolution
Advisory ID:

[ more ]  [ reply ]
WarFTPD 1.82 RC9 DoS 2005-01-27
MC.Iglo (mc iglo gmx de)
Hello,

due to an access violation, specialy crafted CWD-Commands will exit
the FTP server when running as a NT service.
User needs to be logged on.

Vendor's report can be found at
http://support.jgaa.com/index.php?cmd=ShowReport&ID=02643

Solution: deny anonymous or untrusted logins or use patched

[ more ]  [ reply ]
[ GLSA 200501-37 ] GraphicsMagick: PSD decoding heap overflow 2005-01-26
Thierry Carrez (koon gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200501-37
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -

[ more ]  [ reply ]
[ GLSA 200501-38 ] Perl: rmtree and DBI tmpfile vulnerabilities 2005-01-26
Thierry Carrez (koon gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200501-38
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -

[ more ]  [ reply ]
[SECURITY] [DSA 661-1] New f2c packages fix insecure temporary files 2005-01-27
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 661-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
January 27th, 2005

[ more ]  [ reply ]
UEBIMIAU <= 2.7.2 MULTIPLES VULNERABILITIES 2005-01-27
Nash Leon (nashleon yahoo com br)
ADVISORE 01 15/01/2005

INTRUDERS TIGER TEAM SECURITY - SECURITY ADVISORE

http://www.intruders.com.br/
http://www.intruders.org.br/

ADVISORE/0105 - UEBIMIAU < 2.7.2 MULTIPLES
VULNERABILITIES

PRIORITY: HIGH

I - INTRODUCTION:
----------------

From http://www.uebimiau.org/

"UebiM

[ more ]  [ reply ]
[SIG^2 G-TEC] Magic Winmail Server v4.0 Multiple Vulnerabilities 2005-01-27
chewkeong security org sg


SIG^2 Vulnerability Research Advisory

Magic Winmail Server v4.0 Multiple Vulnerabilities

by Tan Chew Keong
Release Date: 27 Jan 2005

ADVISORY URL
http://www.security.org.sg/vuln/magicwinmail40.html

SUMMARY

Magic Winmail Server (http://www.magicwinmail.net/) is an enterprise class mail serv

[ more ]  [ reply ]
[Contact] Motorola broadband appliance team? 2005-01-27
William A. Rowe, Jr. (wrowe rowe-clan net)
Greetings. Does anyone have a contact for the security response
team of the Motorola wireless access point/dhcp/router broadband
appliance unit? Neither customer support nor the web proved useful
for finding this information.

TIA,

Bill

[ more ]  [ reply ]
Ingate Firewall: Removed PPTP tunnels not deactivated 2005-01-27
Per Cederqvist (ceder ingate com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Product: Ingate Firewall
Versions: 4.1.3 and earlier
Tracking ID: 1826

Summary
=======

Active PPTP tunnels in Ingate Firewall are not deactivated when a
PPTP user is disabled.

If a user has an active PPTP connection to an Ingate Firewall, and
that us

[ more ]  [ reply ]
NSFOCUS SA2005-01 : Buffer Overflow in WinAMP in_cdda.dll CDA Device Name 2005-01-27
NSFOCUS Security Team (security nsfocus com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

NSFOCUS Security Advisory(SA2005-01)

Topic: Buffer Overflow in WinAMP in_cdda.dll CDA Device Name

Release Date: 2005-01-27

CVE CAN ID: CAN-2004-1150

http://www.nsfocus.com/english/homepage/research/0501.htm

Affected systems & software
=============

[ more ]  [ reply ]
HKLM locking 2005-01-27
Vladimir Kraljevic (vladimir_kraljevic yahoo com)
NOTE: Already posted to vuln-dev. Because I'm not receiving comments, I
believe that this one is real.

Dear list,

please inspect the following, your input is welcome. Vendors (Microsoft
and unspecified AV company) are contacted two months ago, I'm not
satisfied with their response and here is the

[ more ]  [ reply ]
DMA[2005-0127a] - 'Apple OSX batch family poor use of setuid' 2005-01-27
KF (Lists) (kf_lists digitalmunition com)
NOVL-2005-10096251 GroupWise WebAccess Error modules loading(report) 2005-01-27
Ed Reed (ereed novell com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

For Immediate Disclosure

============================== Summary ==============================

Security Alert: NOVL-2005-10096251
Title: GroupWise WebAccess Error modules loading (report)
Date: 21-January-2005
Revision: Or

[ more ]  [ reply ]
Re: logwatch and logrotate might create a blind spot in reporting 2005-01-26
The Tibetan Traveller (garnet aufait net)
On Tue, 25 Jan 2005, Sami Pitko wrote:

> There are some ways to make logwatch reports more reliable:
>
> * set "Archives = yes" in logwatch.conf. You might also want to tune
> archive settings in /etc/log.d/conf/logfiles/ to prevent unnecessary
> processing of really old archives. To cove

[ more ]  [ reply ]
[CLA-2005:923] Conectiva Security Announcement - squid 2005-01-26
Conectiva Updates (secure conectiva com br)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
CONECTIVA LINUX SECURITY ANNOUNCEMENT
- ------------------------------------------------------------------------
--

PACKAGE : squid
SUMMARY : Fixes for squid vulnerabiliti

[ more ]  [ reply ]
Re: List of all admin accounts in phpBB 2005-01-26
Aaron Klein (klein aaron gmail com)
Or just search your phpbb_users table in your database for users that
have a user_level = 1. Those are admins. User_level of 0 coresponds
to regular users and User_level of 2 are moderators.

On Tue, 25 Jan 2005 23:48:20 +0100, Predrag Damnjanovic
<bugtraq (at) mycity.co (dot) yu [email concealed]> wrote:
> After discovering

[ more ]  [ reply ]
(Page 1390 of 1748)  < Prev  1385 1386 1387 1388 1389 1390 1391 1392 1393 1394 1395  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus