|
Colapse all |
Post message
Hastymail security update 2004-08-24 Jason Munro (jason stdbev com) ---Software--- Hastymail is a web based IMAP client written in PHP4 released under the GNU GPL. More information about Hastymail can be found at our homepage: http://hastymail.sourceforge.net ---Problem--- A problem was discovered yesterday regarding the use of the "download" link to down [ more ] [ reply ] WebAPP directory traversal and ability to retrieve the DES encrypted password hash 2004-08-24 Jérôme ATHIAS (jerome athias caramail com) What A Drag! -revisited- 2004-08-24 mikx (mikx mikx de) Most people i talked to consider the Internet Explorer drag and drop vulnerability found by http-equiv not as a serious problem, because it requires some user interaction and the press pushes this topic way to much as the "first security problem in SP2". In an article on BetaNews even Microsoft [ more ] [ reply ] Window Washer 5.5: False Sense of Security 2004-08-23 First Last (wbglinks wbglinks net) Letter sent to Webroot a few weeks back, no response as of yet: Hi, I'm currently writing a tech paper on the recovery of information from used hard drives. And after doing some experimenting with different types of security/privacy software I found that your product, Window Washer 5.5, [ more ] [ reply ] Running renamed executables with CMD.EXE 2004-08-21 Geoff Vass (geoff cadzow com au) A while ago I "discovered" that CMD.EXE would launch renamed executables. I felt that this was a security problem because until fairly recently most virus scanners would be checking .exe, .com, .pif etc for viruses but would not bother scanning .txt files, and of course email attachment filtering wo [ more ] [ reply ] A word of caution on the use of suphp 2004-08-23 Steven Van Acker (deepstar ulyssis org) Hi, I've sent this "advisory" to the suphp author over 2 weeks ago and to the suphp mailinglist more than 1 week ago. Until now, I didn't get a reply so I'm assuming noone could care less. This information is intended for people who plan to use suphp as a replacement for the standard PHP module in [ more ] [ reply ] CAU-2004-0002 - imwheel Predictable PidFile Name Race Condition 2004-08-20 I)ruid (druid caughq org) Hafiye-1.0 Terminal Escape Sequence Injection Vulnerability 2004-08-23 Serkan Akpolat (sakpolat gmx net) (1 replies) +-------[ Software ]--------------+ Hafiye [1.0] "POSIX-compliant, customizable TCP/IP packet sniffer." +-------[ Tested Versions ]--------------+ Hafiye[1.0] Tested on:Linux(Hafiye compiled from tarball) FreeBSD 4.7 (Installed from CD) +-------[ Vulnera [ more ] [ reply ] Re: Hafiye-1.0 Terminal Escape Sequence Injection Vulnerability 2004-08-24 Jan Minar (jjminar fastmail fm) New google's top query? 2004-08-20 Jérôme ATHIAS (jerome athias caramail com) Hi, i don't remember to have seen this info here... If information is knowledge and knowledge is power, then Google must be all powerful. I say this because of the thing you can find on Google if you know how to look for them. A new Google hack has come to my attention that brings back some [ more ] [ reply ] MusicDaemon <= 0.0.3 /etc/shadow Stealer / DoS Exploit 2004-08-23 Tal0n (cyber_talon hotmail com) Discovered and Exploit Coded by: Tal0n [cyber_talon (at) hotmail (dot) com [email concealed]] URL: http://musicdaemon.sourceforge.net Note: This was 0day for several months.. I decided to turn it in because there may be 10 whole boxes in the world running this.. and its not very handy sitting around on my [ more ] [ reply ] [PoC] Nasty bug(s) found in Axis Network Camera/Video Servers 2004-08-22 bashis (mcw wcd se) (1 replies) /* Public disclosure due lack of responce from Axis Communications */ I have found a couple of bugs in Axis Network Camera/Video Servers. (I have all Axis stuff in one e-mail, instead of multiple, lazy me.. ;) Vulnerable: Axis 2100/2110/2120/2420/2130 Network Camera, 2400/2401 Video Server. (Ther [ more ] [ reply ] Re: [Full-Disclosure] [PoC] Nasty bug(s) found in Axis Network Camera/Video Servers 2004-08-22 morning_wood (se_cur_ity hotmail com) Bugs fixed in Version 1.4.3 2004-08-22 Joxean Koret (joxeankoret yahoo es) In-Reply-To: <20040820225036.17877.qmail (at) www.securityfocus (dot) com [email concealed]> >B. Unspecified File Download Vulnerability > >B1. An error in the MyDMS software allows to a >registered users (and only to >registered users) to download any file, such >as /etc/passwd, by inserting in a >parame [ more ] [ reply ] Re: Fwd: Re: Posible security bug in phpMyWebhosting 2004-08-20 Matias Neiff (matias neiff com ar) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi all. I test the last version that I (and everybody) can find in the web. http://sourceforge.net/projects/phpmywebhosting/ (the version 0.3.4) Please try the bug whit this version. I put this version of you panel in the page : http://www.root-solut [ more ] [ reply ] Multiple Cross Site Scripting Vulnerabilities in eGroupWare 2004-08-22 Joxean Koret (joxeankoret yahoo es) KDE Security Advisory: Konqueror Cross-Domain Cookie Injection 2004-08-23 Waldo Bastian (bastian kde org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 KDE Security Advisory: Konqueror Cross-Domain Cookie Injection Original Release Date: 2004-08-23 URL: http://www.kde.org/info/security/advisory-20040823-1.txt 0. References http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0746 1. Syste [ more ] [ reply ] [ GLSA 200408-22 ] Mozilla, Firefox, Thunderbird: New releases fix vulnerabilities 2004-08-23 Kurt Lieber (klieber gentoo org) ERRATA: [ GLSA 200408-21 ] Cacti: SQL injection vulnerability 2004-08-23 Sune Kloppenborg Jeppesen (jaervosz gentoo org) JShop Input Validation Hole in 'page.php' Permits Cross-Site Scripting Attacks 2004-08-22 Dr Ponidi (drponidi hackermail com) Indonesia Security Development Team (Indohack) http://indohack.sourceforge.net/drponidi ======================================================================== === Security Advisory Advisory Name: JShop Input Validation Hole in 'page.php' Permits Cross-Site Scripting Attacks Platform: Linux [ more ] [ reply ] ERRATA: [ GLSA 200406-14 ] aspell: Buffer overflow in word-list-compress 2004-08-23 Kurt Lieber (klieber gentoo org) |
|
Privacy Statement |
============
This vulnerability, are based on the equal characteristics discovered by the
company GreyMagic Software of Israel in some of the versions of the
navigator Opera.
This bug also is available in the popular MS Internet Explorer, which could
be operated by a remote user to ac
[ more ] [ reply ]