BugTraq Mode:
(Page 1445 of 1748)  < Prev  1440 1441 1442 1443 1444 1445 1446 1447 1448 1449 1450  Next >
RE: Diebold Global Election Management System (GEMS) Backdoor Account Allows Authenticated Users to Modify Votes 2004-09-27
Jeremy Epstein (jeremy epstein webmethods com)
That's a very interesting viewpoint, but one that's directly at odds with
the trend in America today (and probably other countries too). In the US,
corporations build nearly all the military equipment, do a lot of the
military work, transport the mail (most US mail goes on jets run by private
compa

[ more ]  [ reply ]
@lex Guestbook (PHP) Include file 2004-09-26
Himeur Nourredine (lostnoobs security-challenge com)


Informations :

°°°°°°°°°°°°°°

Website : http://www.alexphpteam.com

Version : all

Problem : Include file

PHP Code/Location :

°°°°°°°°°°°°°°°°°°°

./include/livre_include.php

------------------------------------------------------------------

if (!$no_connect).... some include()

[ more ]  [ reply ]
[ GLSA 200409-34 ] X.org, XFree86: Integer and stack overflows in libXpm 2004-09-27
Thierry Carrez (koon gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200409-34
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -

[ more ]  [ reply ]
Re: Microsoft's GDI Detetection Tool faults 2004-09-27
albatross tim it
In-Reply-To: <B7C2C6BA798F3C4DBDD78BEDC1F8AD5705D7D30D (at) nycmb01.law.sullcrom (dot) com [email concealed]>

The machine is a Windows XP SP1 completly patched with Office 2000 SP 3 completly patched.

I don't have any kind of imaging programs installed (Photoshop, Picture It, etc)

The output from the SANS tool is:

Sca

[ more ]  [ reply ]
RE: Diebold Global Election Management System (GEMS) Backdoor Account Allows Authenticated Users to Modify Votes 2004-09-27
David Brodbeck (DavidB mail interclean com) (1 replies)
> -----Original Message-----
> From: Claudius Li [mailto:aprentic (at) sectae (dot) net [email concealed]]

> So my question is, given that this seems to be a solved
> problem why is there so much debate on finding the solution?
> Surely I am missing something obvious.

You're missing the social dynamics around it. There are

[ more ]  [ reply ]
iDEFENSE Security Advisory 09.27.04 - IBM AIX ctstrtcasd Local File Corruption Vulnerability 2004-09-27
customer service mailbox (customerservice idefense com)
IBM AIX ctstrtcasd Local File Corruption Vulnerability

iDEFENSE Security Advisory 09.27.04
www.idefense.com/application/poi/display?id=144&type=vulnerabilities
September 27, 2004

I. BACKGROUND

The ctstrtcasd program is a setuid root application, installed by
default under newer versions of IBM A

[ more ]  [ reply ]
Broadcast crash in Chatman 1.5.1 RC1 2004-09-27
Luigi Auriemma (aluigi autistici org)

#######################################################################

Luigi Auriemma

Application: Chatman
http://www.vp-soft.com/software/chatman.php
Versions: <= 1.5.1 RC1
Platforms: Windows
Bug: crash
Risk: medium
Exploitatio

[ more ]  [ reply ]
RE: Diebold Global Election Management System (GEMS) Backdoor Account Allows Authenticated Users to Modify Votes 2004-09-27
Ryan_Ward Dell com
I usually lurk as well, but wanted to respond to your question.

There's so much debate for one simple reason. All the known solutions
have been ignored. This is why everyone is getting so upset on this
issue. Companies like Diebold have ignored all the previous work on
this subject, work done by

[ more ]  [ reply ]
[SECURITY] [DSA 554-1] New sendmail packages fix potential open relay 2004-09-27
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 554-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
September 27th, 2004

[ more ]  [ reply ]
Re: HTTP Response Splitting and SQL injection in megabbs forum 2004-09-26
PD9 Software (info pd9soft com)
pigrelax wrote:

>URL: http://www.pd9soft.com
>Tested megabbs 2.1
>
>1. HTTP Response Splitting
>2. HTTP Response Splitting
>3. More and more SQL injection:
>

All three issues have been addressed, and updates have been posted at
http://www.pd9soft.com/. Thank you for bringing them to my attentio

[ more ]  [ reply ]
GDI Virus in the wild. 2004-09-27
Ben (ben easynews com) (1 replies)
Allo,

There is now a GDI+ jpeg exploiting virus in the wild. It was posted
on Mon, 27 Sep 2004 01:25:52 GMT via NNTP to multiple news groups by a
single person.

See the following for details:
http://www.easynews.com/virus.txt

You can see the virus here:
http://easynews.com/test/possiblevirus.jp

[ more ]  [ reply ]
Re: GDI Virus in the wild. 2004-09-27
Gerry Eisenhaur (GEisenhaur cisco com)
(Page 1445 of 1748)  < Prev  1440 1441 1442 1443 1444 1445 1446 1447 1448 1449 1450  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus