|
Colapse all |
Post message
WMV (Windows Media Player) trojan in wild 2005-01-11 Marc Bejarano (bugtraq beej org) from http://www.pandasoftware.com/about/press/viewNews.aspx?noticia=5818 === Video files appear that download malicious application when they are run 01/10/2005. These files are .wmv files infected by Trj/WmvDownloader.A and Trj/WmvDownloader.B, two Trojans that take advantage of a new technology [ more ] [ reply ] [USN-59-1] mailman vulnerabilities 2005-01-10 Martin Pitt (martin pitt canonical com) =========================================================== Ubuntu Security Notice USN-59-1 January 10, 2005 mailman vulnerabilities CAN-2004-1177, http://bugs.debian.org/285839 =========================================================== A security issue affects the following Ubuntu releases: [ more ] [ reply ] [ GLSA 200501-13 ] pdftohtml: Vulnerabilities in included Xpdf 2005-01-10 Thierry Carrez (koon gentoo org) [NILESA-20050101]: Denial of Service vulnerability due to the mountd bug 2005-01-11 Jonglim Yun (abc nilesoft co kr) Re: [Full-Disclosure] Multi-vendor AV gateway image inspection bypass vulnerability 2005-01-11 Danny (nocmonkey gmail com) (1 replies) On Mon, 10 Jan 2005 14:08:11 -0500, Darren Bounds <dbounds (at) intrusense (dot) com [email concealed]> wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > Multi-vendor AV gateway image inspection bypass vulnerability > January 10, 2005 > > A vulnerability has been discovered which allows a remote attacker to > bypas [ more ] [ reply ] Re: [Full-Disclosure] Multi-vendor AV gateway image inspection bypass vulnerability 2005-01-11 Darren Bounds (lists intrusense com) Re: DSL- Router Teledat 530 DoS 2005-01-11 Stefan S. (webmaster adnix de) In-Reply-To: <3F13EFFD.6050402 (at) t-online (dot) de [email concealed]> Hi, Same here. And there are two other issues: 1. If you continuously send "empty" data like "word wraps" from the interior network to the printer port 515 it causes the router to crash completely. You'll have to shut it down. 2. If you continuou [ more ] [ reply ] Fwd: APPLE-SA-2005-01-11 iTunes 4.7.1 2005-01-11 David Ahmad (da securityfocus com) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 APPLE-SA-2005-01-11 iTunes 4.7.1 iTunes 4.7.1 is now available and delivers the following security enhancement: CVE-ID: CAN-2005-0043 Impact: Malicious playlists can cause iTunes to crash and could execute arbitrary code Description: iTunes suppo [ more ] [ reply ] IlohaMail Insecure Configuration Files 2005-01-11 wang readyresponse org ------------------------------------------------ Advisory Name : IlohaMail Insecure Configuration Files Release Date : 10 January, 2004 Application : IlohaMail (http://ilohamail.org/) Vulnerable: IlohaMail-0.8.14-rc1 and lower Not Vulnerable: IlohaMail-0.8.14-rc2 Author : SRR Project G [ more ] [ reply ] [ GLSA 200501-20 ] o3read: Buffer overflow during file conversion 2005-01-11 Thierry Carrez (koon gentoo org) [ GLSA 200501-22 ] poppassd_pam: Unauthorized password changing 2005-01-11 Thierry Carrez (koon gentoo org) [ GLSA 200501-21 ] HylaFAX: hfaxd unauthorized login vulnerability 2005-01-11 Thierry Carrez (koon gentoo org) [USN-58-1] MIT Kerberos server vulnerability 2005-01-10 Martin Pitt (martin pitt canonical com) =========================================================== Ubuntu Security Notice USN-58-1 January 10, 2005 krb5 vulnerability CAN-2004-1189 =========================================================== A security issue affects the following Ubuntu releases: Ubuntu 4.10 (Warty Warthog) The fol [ more ] [ reply ] Woltlab Burning Book addentry.php SQL Injection 2005-01-10 Martin Heistermann (martin heistermann web de) Metasploit Framework v2.3 2005-01-11 H D Moore (sflist digitaloffense net) The Metasploit Framework is an advanced open-source exploit development platform. The 2.3 release includes three user interfaces, 46 exploits and 68 payloads. The Framework will run on any modern operating system that has a working Perl interpreter. The Windows installer includes a slimmed-down ver [ more ] [ reply ] [OpenPKG-SA-2005.001] OpenPKG Security Advisory (perl) 2005-01-11 OpenPKG (openpkg openpkg org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ________________________________________________________________________ OpenPKG Security Advisory The OpenPKG Project http://www.openpkg.org/security.html http://www.openpkg.org openpkg-security (at) openpkg (dot) org [email concealed] [ more ] [ reply ] |
|
Privacy Statement |
Vulnerable System:
Webseries Payment Application
Vulnerability Title:
Poor Password Change Implementation
Vulnerability discovery and development:
Portcullis Security Testing Services
Affected systems:
Bottomline Webseries Payment Application
[ more ] [ reply ]