BugTraq Mode:
(Page 1405 of 1748)  < Prev  1400 1401 1402 1403 1404 1405 1406 1407 1408 1409 1410  Next >
Microsoft Windows Kernel ANI File Parsing Crash and DOS Vulnerability 2004-12-23
flashsky fangxing (flashsky xfocus org)


[Security Advisory]

Advisory: [AD_LAB-04005]Microsoft Windows Kernel ANI File Parsing Crash and Dos Vulnerability

Class: Design Error

DATE:12/20/2004

Remote: Yes

Vulnerable:

Windows NT

Windows 2000 SP0

Windows 2000 SP1

Windows 2000 SP2

Windows 2000 SP3

Windows 200

[ more ]  [ reply ]
[SECURITY] [DSA 616-1] New telnetd-ssl packages fix arbitrary code execution 2004-12-23
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 616-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
December 23rd, 2004

[ more ]  [ reply ]
Oracle multiple PL/SQL injection vulnerabilities (#NISR2122004H) 2004-12-23
NGSSoftware Insight Security Research (nisr nextgenss com)

NGSSoftware Insight Security Research Advisory

Name: Oracle 10g/9i Multiple PL/SQL injection vulnerabilities
Systems Affected: Oracle 10g/AS on all operating systems
Severity: High risk
Vendor URL: http://www.oracle.com/
Author: David Litchfield [ davidl at ngssoftware.com ]
Relates to: http://ww

[ more ]  [ reply ]
Microsoft Windows winhlp32.exe Heap Overflow Vulnerability 2004-12-23
flashsky fangxing (flashsky xfocus org)


Venustech AD-Lab

www.venustech.com.cn

[Security Advisory]

Advisory: [AD_LAB-04006]Microsoft Windows winhlp32.exe Heap Overflow Vulnerability

Class: Design Error

DATE:12/20/2004

Remote: Yes

Vulnerable:

Windows NT

Windows 2000 SP0

Windows 2000 SP1

Windo

[ more ]  [ reply ]
Oracle TNS Listener DoS (#NISR2122004F) 2004-12-23
NGSSoftware Insight Security Research (nisr nextgenss com)

NGSSoftware Insight Security Research Advisory

Name: Oracle 10g TNS Listener DoS
Systems Affected: Oracle 10g on all operating systems
Severity: High risk on high availability systems else low
Vendor URL: http://www.oracle.com/
Author: David Litchfield [ davidl at ngssoftware.com ]
Relates to: ht

[ more ]  [ reply ]
IBM DB2 generate_distfile buffer overflow vulnerability (#NISR2122004L) 2004-12-23
NGSSoftware Insight Security Research (nisr nextgenss com)
NGSSoftware Insight Security Research Advisory

Name: IBM DB2 generate_distfile buffer overflow
Systems Affected: DB2 8.1/7.x
Severity: High risk
Vendor URL: http://www.ibm.com/
Author: David Litchfield [ david at ngssoftware.com ]
Relates to: http://www.nextgenss.com/advisories/db2-01.txt
Date of

[ more ]  [ reply ]
IBM DB2 rec2xml buffer overflow vulnerability (#NISR2122004J) 2004-12-23
NGSSoftware Insight Security Research (nisr nextgenss com)
NGSSoftware Insight Security Research Advisory

Name: IBM DB2 rec2xml buffer overflow
Systems Affected: DB2 8.1/7.x
Severity: High risk
Vendor URL: http://www.ibm.com/
Author: David Litchfield [ mark at ngssoftware.com ]
Relates to: http://www.nextgenss.com/advisories/db2-01.txt
Date of Public Advi

[ more ]  [ reply ]
[OpenPKG-SA-2004.055] OpenPKG Security Advisory (gettext) 2004-12-23
OpenPKG (openpkg openpkg org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________

OpenPKG Security Advisory The OpenPKG Project
http://www.openpkg.org/security.html http://www.openpkg.org
openpkg-security (at) openpkg (dot) org [email concealed]

[ more ]  [ reply ]
Oracle extproc local command execution (#NISR23122004C) 2004-12-23
NGSSoftware Insight Security Research (nisr nextgenss com)

NGSSoftware Insight Security Research Advisory

Name: Oracle 10g/9i extproc local command execution
Systems Affected: Oracle 10g/9i on all operating systems
Severity: Medium Risk
Vendor URL: http://www.oracle.com/
Author: David Litchfield [ davidl at ngssoftware.com ]
Relates to: http://www.nextge

[ more ]  [ reply ]
Oracle wrapped procedure overflow (#NISR2122004J) 2004-12-23
NGSSoftware Insight Security Research (nisr nextgenss com)

NGSSoftware Insight Security Research Advisory

Name: Oracle 10g/9i wrapped procedure buffer overflow
Systems Affected: Oracle 10g/9i on all operating systems
Severity: High risk
Vendor URL: http://www.oracle.com/
Author: David Litchfield [ davidl at ngssoftware.com ]
Relates to: http://www.nextge

[ more ]  [ reply ]
Oracle extproc directory traversal (#NISR23122004B) 2004-12-23
NGSSoftware Insight Security Research (nisr nextgenss com)

NGSSoftware Insight Security Research Advisory

Name: Oracle 10g/9i extproc directory traversal
Systems Affected: Oracle 10g/9i on all operating systems
Severity: Medium Risk
Vendor URL: http://www.oracle.com/
Author: David Litchfield [ davidl at ngssoftware.com ]
Relates to: http://www.nextgenss.

[ more ]  [ reply ]
Oracle ISQLPlus file access vulnerability (#NISR2122004E) 2004-12-23
NGSSoftware Insight Security Research (nisr nextgenss com)

NGSSoftware Insight Security Research Advisory

Name: Oracle ISQL*Plus load.uix file access
Systems Affected: Oracle 10g AS on all operating systems
Severity: Medium
Vendor URL: http://www.oracle.com/
Author: David Litchfield [ davidl at ngssoftware.com ]
Relates to: http://www.nextgenss.com/advis

[ more ]  [ reply ]
Oracle clear text passwords (#NISR2122004D) 2004-12-23
NGSSoftware Insight Security Research (nisr nextgenss com)

NGSSoftware Insight Security Research Advisory

Name: Oracle 10g clear text passwords
Systems Affected: Oracle 10g on all operating systems
Severity: Medium Risk
Vendor URL: http://www.oracle.com/
Author: David Litchfield [ davidl at ngssoftware.com ]
Relates to: http://www.nextgenss.com/advisorie

[ more ]  [ reply ]
Oracle Character Conversion Bugs (#NISR2122004G) 2004-12-23
NGSSoftware Insight Security Research (nisr nextgenss com)

NGSSoftware Insight Security Research Advisory

Name: Oracle 10g character conversion bug
Systems Affected: Oracle 10g/AS on all operating systems
Severity: High risk
Vendor URL: http://www.oracle.com/
Author: David Litchfield [ davidl at ngssoftware.com ]
Relates to: http://www.nextgenss.com/advi

[ more ]  [ reply ]
Oracle extproc buffer overflow (#NISR23122004A) 2004-12-23
NGSSoftware Insight Security Research (nisr nextgenss com)

NGSSoftware Insight Security Research Advisory

Name: Oracle 10g extproc buffer overflow
Systems Affected: Oracle 10g on all operating systems
Severity: High Risk
Vendor URL: http://www.oracle.com/
Author: David Litchfield [ davidl at ngssoftware.com ]
Relates to: http://www.nextgenss.com/advisori

[ more ]  [ reply ]
Oracle Trigger Abuse (#NISR2122004I) 2004-12-23
NGSSoftware Insight Security Research (nisr nextgenss com)

NGSSoftware Insight Security Research Advisory

Name: Oracle 10g/9i Trigger Abuse
Systems Affected: Oracle 10g/9i on all operating systems
Severity: High risk
Vendor URL: http://www.oracle.com/
Author: David Litchfield [ davidl at ngssoftware.com ]
Relates to: http://www.nextgenss.com/advisories/o

[ more ]  [ reply ]
Security Advisory for ALL forum services with client-set images 2004-12-22
James Bandara (jamez1 gmail com)


Hi,

Many widely used Bullitien Board Services and Forum Services allow for Clients to set images such as avatars and in their signature/post.

Images work by the clients browser going to that address, like it would for a normal web page except after downloading the file, it tries to open it as

[ more ]  [ reply ]
2Bgal : 2.4 & 2.5.1 SQL injection Vulnerability 2004-12-22
zib zib (zibelette aol com)


2Bgal 2.5.1 SQL injection Vulnerability

(http://www.ben3w.com/)

12/22/2004

----------------------------------------------------------------------

Description:

----------------------------------------------------------------------

2Bgal is fully customizable photo gallery.

It's seems to be

[ more ]  [ reply ]
Webmin BruteForce + Command execution - By Di42lo <DiAblo_2 (at) 012.net (dot) il [email concealed]> 2004-12-23
amit sides (DiAblo_2 012 net il)


#!/usr/bin/perl

##

# Webmin BruteForce + Command execution - By Di42lo <DiAblo_2 (at) 012.net (dot) il [email concealed]>

#

# usage

# ./bruteforce.webmin.pl <host> <command>

#

#./bruteforce.webmin.pl 192.168.0.5 "uptime"

# [+] BruteForcing...

# [+] trying to enter with: admim

# [+] trying to enter with: admin

#

[ more ]  [ reply ]
MDKSA-2004:157 - Updated mplayer packages fix multiple vulnerabilities 2004-12-22
Mandrake Linux Security Team (security linux-mandrake com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandrakelinux Security Update Advisory
_______________________________________________________________________

Package name: mplayer
Advisory ID:

[ more ]  [ reply ]
Re: DJB's students release 44 *nix software vulnerability advisories 2004-12-21
Steven M. Christey (coley mitre org)

>> And this nasm bug is then called a "remotely exploitable
>> security hole".
>
>Obviously it is not. I don't think it is even locally exploitable.

Many of the DJB-reported issues deal with exploitation of errors in
parsers or converters for specific file formats. Many files are
typically "shar

[ more ]  [ reply ]
PHP v4.3.x exploit for Windows. 2004-12-22
The Warlock (thewarlock 0xf org)
Description: PHP v4.3.x openlog() Vulnerability.
Compromise: Possible remote buffer overflow in openlog().
Vulnerable Systems: PHP v4.3.1, v4.3.5, v4.3.x.
Details:
---snip---
########################################################################
####
#######
################################## PUBL

[ more ]  [ reply ]
RE: DJB's students release 44 *nix software vulnerability advisories 2004-12-21
Manning, Robert (Mission Systems) (Bob Manning ngc com)
Actually, I think this would make for a fascinating course. If I were teaching it, I don't know that I would have insisted on each student finding 10 holes, that does seem too optimistic. Rather, I would think requiring students to document their efforts at attempting to find holes, and assign extra

[ more ]  [ reply ]
(Page 1405 of 1748)  < Prev  1400 1401 1402 1403 1404 1405 1406 1407 1408 1409 1410  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus