BugTraq Mode:
(Page 1469 of 1748)  < Prev  1464 1465 1466 1467 1468 1469 1470 1471 1472 1473 1474  Next >
Remote Command Execution 2004-08-06
Francisco Alisson (dominusvis click21 com br)


Script affected: page.cgi - content/template merging CGI

Author: Andrew Kilpatrick

We can execute arbitrary commands with same id of the webserver:

http://www.vulnerable.com/page.cgi?url=.html|id|

Thanks :)

<Dominus_Vis>

[Infektion Group]

irc.phey.net -j #infektion

[ more ]  [ reply ]
[OpenPKG-SA-2004.036] OpenPKG Security Advisory (cvstrac) 2004-08-06
OpenPKG (openpkg openpkg org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________

OpenPKG Security Advisory The OpenPKG Project
http://www.openpkg.org/security.html http://www.openpkg.org
openpkg-security (at) openpkg (dot) org [email concealed]

[ more ]  [ reply ]
RE: [Full-Disclosure] Clear text password exposure in Datakey'stokens and smartcards 2004-08-06
Bart Lansing kohls com

Guys...

RSA has been doing PIN cards for ages...I don't get the hangup on
SmartCards vs "plain old" something you have/something you know two factor

http://www.rsasecurity.com/node.asp?id=1311

Cost of entry/ownership is nothing remotely close to the $1000 you mention
Lyal...in fact, it's under

[ more ]  [ reply ]
GNU/Linux 'info Buffer Overflow 2004-08-06
Josh Martin (skizzles gmail com)


Package: info

Version: 4.7-2.1

Severity: grave

Tags: security

Justification: user security hole

-- System Information:

Debian Release: 3.1

APT prefers unstable

APT policy: (500, 'unstable')

Architecture: i386 (i686)

Kernel: Linux 2.6.7

Locale: LANG=C, LC_CTYPE=C

Versions of

[ more ]  [ reply ]
[security bulletin] SSRTSSRT4778 Rev.0 Mozilla Application Suite for HP Tru64 UNIX libpng Potential Overflows 2004-08-06
Boren, Rich (SSRT) (rich boren hp com)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

HP SECURITY BULLETIN

HPSBTU01063 REVISION: 0

SSRTSSRT4778 - rev.0 Mozilla Application Suite for HP Tru64 UNIX -
libpng Potential Overflows

NOTICE: There are no restrictions for distribution of this
Bulletin provided that it remains complete

[ more ]  [ reply ]
[security bulletin] SSRT4777 HP-UX Apache, PHP remote code execution, Denial of Service 2004-08-06
Boren, Rich (SSRT) (rich boren hp com)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

HP SECURITY BULLETIN

HPSBUX01064 REVISION: 0

SSRT4777 rev. 0 HP-UX Apache, PHP remote code execution,
Denial of Service

NOTICE:

There are no restrictions for distribution of this Bulletin
provided that it remains complete and i

[ more ]  [ reply ]
Re: Microsoft Internet Explorer 6 Protocol Handler Vulnerability 2004-08-06
Jouko Pynnonen (jouko iki fi)

Hi,

On Thu, Aug 05, 2004 at 03:33:38PM -0400, Robillard, Nicolas wrote:
> Description : Protocol Handler allow arbitrary switch to be passed to the
> associated program.

I found this vulnerability (or class of them) in July 2003 and
described it on several security lists on March 9th, 2004. Fo

[ more ]  [ reply ]
[security bulletin] SSRT4782 rev. 1 HP-UX CIFS Server potential remote root access 2004-08-06
Boren, Rich (SSRT) (rich boren hp com)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

HP SECURITY BULLETIN

HPSBUX01062 REVISION: 1

SSRT4782 rev. 1 HP-UX CIFS Server potential remote root access

-----------------------------------------------------------------
NOTICE:
There are no restrictions for distribution of this Bullet

[ more ]  [ reply ]
Opera: Location, Location, Location (GM#008-OP) 2004-08-06
GreyMagic Software (security greymagic com)
GreyMagic Security Advisory GM#008-OP
=====================================

By GreyMagic Software, 05 Aug 2004.

Available in HTML format at
http://www.greymagic.com/security/advisories/gm008-op/.

Topic: Location, Location, Location.

Discovery date: 19 Jul 2004.

Affected applications:
==========

[ more ]  [ reply ]
[CLA-2004:856] Conectiva Security Announcement - libpng 2004-08-06
Conectiva Updates (secure conectiva com br)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
CONECTIVA LINUX SECURITY ANNOUNCEMENT
- ------------------------------------------------------------------------
--

PACKAGE : libpng
SUMMARY : Several vulnerabilities in l

[ more ]  [ reply ]
[CLA-2004:857] Conectiva Security Announcement - apache 2004-08-06
Conectiva Updates (secure conectiva com br)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
CONECTIVA LINUX SECURITY ANNOUNCEMENT
- ------------------------------------------------------------------------
--

PACKAGE : apache
SUMMARY : Format string vulnerability

[ more ]  [ reply ]
[ GLSA 200408-05 ] Opera: Multiple new vulnerabilities 2004-08-05
Thierry Carrez (koon gentoo org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200408-05
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

[ more ]  [ reply ]
Microsoft Internet Explorer 6 Protocol Handler Vulnerability 2004-08-05
Robillard, Nicolas (nicolas robillard snclavalin com) (1 replies)
Description : Protocol Handler allow arbitrary switch to be passed to the
associated program.<BR>

Exploit :

The protocol handler are defined in HKEY_CLASSES_ROOT. We will use the MMS
protocol for this exemple. In the HKEY_CLASSES_ROOT\MMS\SHELL\OPEN\COMMAND
Registry key you can see that the prog

[ more ]  [ reply ]
Re: Microsoft Internet Explorer 6 Protocol Handler Vulnerability 2004-08-06
Uday Moorjani (umoorjani wanadoo fr)
RE: International DNS compromise? 2004-08-05
travis alexander lacamas org
I got six different results, meaning six different server IP's.

1. 64.33.99.47
2. 207.12.88.98
3. 208.56.31.43
4. 216.221.188.182
5. 65.160.219.113
6. 65.104.202.252

All US owned IP addresses. Yes this is very interesting. So what
does this mean, or potentially mean...?

Travis.

-----Original Mes

[ more ]  [ reply ]
CVStrac Remote Arbitrary Code Execution exploit 2004-08-05
Richard Ngo (rtngo yahoo com)
Hi, Im Richard Ngo, this is the first time i report an
exploit and found a remote exploit that could allow
arbitrary code execution in CVStrac.

sample exploit

filediff?f=CVSROOT/rcsinfo&v1=1.1&v2=1.2;w;

All versions vulnerable. I have not contacted
cvstrac.org since i cant find their email addres

[ more ]  [ reply ]
local denial of Service, Yellowdog linux to 3.0.1 2004-08-05
pmoses physics ucsd edu


Since they are releasing a new version....

Title: Local Denial of Service/render system unusable YelloDog Linux

Author: Phil Moses pmoses (at) physics.ucsd (dot) edu [email concealed]

Date: June 4, 2004

------------------------------------------------

Summary:

Currently it seems that YellowDog is fairly easy to render

[ more ]  [ reply ]
(Page 1469 of 1748)  < Prev  1464 1465 1466 1467 1468 1469 1470 1471 1472 1473 1474  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus