BugTraq Mode:
(Page 1472 of 1748)  < Prev  1467 1468 1469 1470 1471 1472 1473 1474 1475 1476 1477  Next >
Sonicwall diag tool includes VPN credentlials 2004-07-30
Milton Lopez (mlopez iattc org)


Our Sonicwall Pro 300 firewall appliance includes a diagnostic tool called "Tech Support Report", which dumps the current configuration info to a plain text file. I have been asked by Sonicwall personnel to email this file as an attachment during several tech. support calls, without any additional

[ more ]  [ reply ]
Re: [Full-Disclosure] Re: Mozilla Firefox Certificate Spoofing 2004-07-31
Juan Carlos Navea (loconet gmail com)
Has anyone tried the proof of concept with a real ssl cert and get it working?

I just tried it using two different ssl urls and the page only
redirected me to the proper site. I did not see the output generated
by document.writeln even after viewing the source.

Can anyone confirm this? I haven't

[ more ]  [ reply ]
OpenServer 5.0.6 OpenServer 5.0.7 : Xsco contains a buffer overflow that could be exploited to gain root privileges. 2004-07-30
please_reply_to_security sco com

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________
______

SCO Security Advisory

Subject: OpenServer 5.0.6 OpenServer 5.0.7 : Xsco contains a buffer overflow that could be exploited to gain root privileges.
Advisory number:

[ more ]  [ reply ]
[VSA0402] OpenFTPD format string vulnerability 2004-07-29
VOID.AT Security (crew void at)
[VSA0402 - openftpd - void.at security notice]

Overview
========

We have discovered a format string vulnerability in openftpd
(http://www.openftpd.org:9673/openftpd). OpenFTPD is a free,
open source FTP server implementation for the UNIX platform.
FTP4ALL is not vulnerable (it doesnt use that mess

[ more ]  [ reply ]
OpenServer 5.0.6 OpenServer 5.0.7 : uudecode does not check for symlink or pipe 2004-07-30
please_reply_to_security sco com

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________
______

SCO Security Advisory

Subject: OpenServer 5.0.6 OpenServer 5.0.7 : uudecode does not check for symlink or pipe
Advisory number: SCOSA-2004.12
Issue date: 2004 July

[ more ]  [ reply ]
OpenServer 5.0.6 OpenServer 5.0.7 : OpenSSL Multiple Vulnerabilities 2004-07-30
please_reply_to_security sco com

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________
______

SCO Security Advisory

Subject: OpenServer 5.0.6 OpenServer 5.0.7 : OpenSSL Multiple Vulnerabilities
Advisory number: SCOSA-2004.10
Issue date: 2004 July 29
Cross r

[ more ]  [ reply ]
UnixWare 7.1.3 Open UNIX 8.0.0 : Xsco contains a buffer overflow that could be exploited to gain root privileges. 2004-07-30
please_reply_to_security sco com

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________
______

SCO Security Advisory

Subject: UnixWare 7.1.3 Open UNIX 8.0.0 : Xsco contains a buffer overflow that could be exploited to gain root privileges.
Advisory number: SCO

[ more ]  [ reply ]
Fwd: New possible scam method : forged websites using XUL (Firefox) 2004-07-30
David Ahmad (da securityfocus com) (1 replies)
----- Forwarded message from Jeff Smith -----

Mozilla Firefox allows remote sites to render XUL content that
mimics the browser's user interface. Using Javascript, the real
interface can be turned off and replaced with fake UI components.
For spoofing the UI, the effectiveness of XUL is far gr

[ more ]  [ reply ]
[ GLSA 200407-23 ] SoX: Multiple buffer overflows 2004-07-30
Thierry Carrez (koon gentoo org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200407-23
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

[ more ]  [ reply ]
Fusion News Yet Another Unauthorized Account Addition Vulnerability 2004-07-29
Joseph Moniz (r3d_5pik3 yahoo com)


-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

Product: Fusion News

vendor: FusionPHP (fusionphp.net)

Affected Versions: 3.6.1 and lower

Description: A widely used news management system

Vulnerabilities: Unauthorized Account Addition Vulnerability

Date: July 29, 2004

Vuln Fi

[ more ]  [ reply ]
[CLA-2004:855] Conectiva Security Announcement - sox 2004-07-30
Conectiva Updates (secure conectiva com br)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
CONECTIVA LINUX SECURITY ANNOUNCEMENT
- ------------------------------------------------------------------------
--

PACKAGE : sox
SUMMARY : Buffer overflow vulnerability
D

[ more ]  [ reply ]
WpQuiz Gain Admin Rightd Exploit found 2004-07-30
jonathan tough (j eyeimpressions com)


Ok so here is what I found

Authors website wireplastik.com (currently down)

php script I found exploit in wpquiz version 2.60b8 ( also tested on 2.60b 1-7)

Exploit: by default wpquiz comes with a folder called extras. This folder is not password protected nor does it require any sort

[ more ]  [ reply ]
Citadel/UX Remote DoS Vulnerability 2004-07-29
CoKi (coki nosystem com ar)


-------------------------------------------------

No System Group - Advisory #04 - 28/07/04

-------------------------------------------------

Program: Citadel/UX

Homepage: http://www.citadel.org

Operating System: Linux and Unix-Compatible

Vulnerable Versions: Citadel/UX v6.23 and prior

Risk

[ more ]  [ reply ]
MDKSA-2004:077 - Updated wv packages fix vulnerability 2004-07-30
Mandrake Linux Security Team (security linux-mandrake com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandrakelinux Security Update Advisory
_______________________________________________________________________

Package name: wv
Advisory ID:

[ more ]  [ reply ]
[CLA-2004:854] Conectiva Security Announcement - samba 2004-07-30
Conectiva Updates (secure conectiva com br)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
CONECTIVA LINUX SECURITY ANNOUNCEMENT
- ------------------------------------------------------------------------
--

PACKAGE : samba
SUMMARY : Multiple potential buffer ove

[ more ]  [ reply ]
[ GLSA 200407-22 ] phpMyAdmin: Multiple vulnerabilities 2004-07-29
Thierry Carrez (koon gentoo org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200407-22
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

[ more ]  [ reply ]
Jaws 0.4: authentication bypass 2004-07-29
Rubén Molina (ruben udea edu co)
/////////////////////////////////////////////////////

//// Vulnerable Program: JAWS
////
//// Version : 0.4
////
//// Url: http://www.jaws.com.mx
////
//// The Bug: SQL injection to allows bypass the auth.
////
//// Date: Today, July 28 off 2004
////
//// Author: Fernando Quintero (a.k.a

[ more ]  [ reply ]
File downloads in Opera at known locations 2004-07-29
Rohit Dube (rohit kritikalsolutions com) (1 replies)
Hi,
This is just a question. While using opera, I observed that as soon as it
prompts you for file download, it simultaneously starts the download with
same file extension in its %USERPROFILE/application data/opera/cache. Even
if the user afterwards chooses cancel, this temporary file does not get

[ more ]  [ reply ]
Re: File downloads in Opera at known locations 2004-07-30
Josh Tolley (josh raintreeinc com)
MDKSA-2004:076 - Updated sox packages fix buffer overflows with malicious .wav files 2004-07-28
Mandrake Linux Security Team (security linux-mandrake com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandrakelinux Security Update Advisory
_______________________________________________________________________

Package name: sox
Advisory ID:

[ more ]  [ reply ]
RE: Forward:FullDisclosure/IE - Possible Address Spoofing 2004-07-28
Michael Silk (michaels phg com au) (1 replies)
Hello,

Without knowing, it may treat some sites differently due to the time required it physically takes to download the data.

-- Michael

-----Original Message-----
From: Chenghuai Lu [mailto:luchenghuai (at) yahoo (dot) com [email concealed]]
Sent: Tuesday, 27 July 2004 1:00 AM
To: bugtraq (at) securityfocus (dot) com [email concealed]
Subject: RE: Fo

[ more ]  [ reply ]
RE: Forward:FullDisclosure/IE - Possible Address Spoofing 2004-07-28
Chenghuai Lu (luchenghuai yahoo com)
lostBook v1.1 Javascript Execution 2004-07-29
Joseph Moniz (r3d_5pik3 yahoo com)


-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

Product: lostBook

vendor: veryLost (verylost.tk)

Affected Versions: 1.1 and lower

Description: A simple flat db guestbook

Vulnerabilities: XSS

Date: July 29, 2004

Vuln Finder: r3d5pik3 (me)

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

[ more ]  [ reply ]
Linpha 0.9.4: authentication bypass 2004-07-29
Rubén Molina (ruben udea edu co)

/////////////////////////////////////////////////////

//// Vulnerable Program: Linpha
////
//// Url: http://linpha.sf.net
////
//// Version: 0.9.4 Latest version
////
//// Date: Today, July 28 of 2004
////
//// Author: Fernando Quintero (a.k.a nonroot)
//// Email: nando (at) udea (dot) edu. [email concealed]

[ more ]  [ reply ]
(Page 1472 of 1748)  < Prev  1467 1468 1469 1470 1471 1472 1473 1474 1475 1476 1477  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus