BugTraq Mode:
(Page 1482 of 1748)  < Prev  1477 1478 1479 1480 1481 1482 1483 1484 1485 1486 1487  Next >
backdoor menu on conexant chipset dsl router (Zoom X3) 2004-07-06
Adam Laurie (adam algroup co uk)
i have just installed an adsl modem sold under the brand of Zoom X3

http://www.zoom.com/products/adsl_overview.html

and was apalled to find that an nmap scan of the external address
immediately came up with the following:

PORT STATE SERVICE
23/tcp open telnet
80/tcp open http

[ more ]  [ reply ]
Re: [ISN] E-Mail Snooping Ruled Permissible 2004-07-06
Jason Coombs (jasonc science org)
Anyone who has not read this appeals court decision should do so now.

http://www.ca1.uscourts.gov/pdf.opinions/03-1383-01A.pdf

The stipulated facts make it clear that the government failed to hire an
expert witness who knows how SMTP, POP3, sendmail, procmail, DNS, MTA,
MUA, HTTP, Web browsers,

[ more ]  [ reply ]
[OpenPKG-SA-2004.030] OpenPKG Security Advisory (png) 2004-07-06
OpenPKG (openpkg openpkg org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________

OpenPKG Security Advisory The OpenPKG Project
http://www.openpkg.org/security.html http://www.openpkg.org
openpkg-security (at) openpkg (dot) org [email concealed]

[ more ]  [ reply ]
xingtone opens server on desktop using undocumented protocol (probably http) 2004-07-06
Burton M. Strauss III (BStrauss acm org)
xingtone (www.xingtone.com) is a popular accessory for mobile phone ring
tone creation and download:

"Xingtone's desktop software is easy-to-use, legal, and allows you to create
mobile phone ringtones using digital audio files on your computer - music
clips, sound effects, your child's laugh, your

[ more ]  [ reply ]
RE: Registry Fix For Variant of Scob 2004-07-06
Drew Copley (dcopley eEye com)
> -----Original Message-----
> From: Thor Larholm
> Sent: Saturday, July 03, 2004 3:47 PM
> To: 'Drew Copley'; 'Windows NTBugtraq Mailing List';
> 'bugtraq (at) securityfocus (dot) com [email concealed]'
> Subject: RE: Registry Fix For Variant of Scob
>
>
> Setting the kill bit on the "Shell.Application" ActiveX object, or

[ more ]  [ reply ]
RE: Microsoft technologies. By default, non-HIPAA compliant? 2004-07-06
Anything But Microsoft (abm anythingbutmicrosoft org) (1 replies)
Out of all the replies, both on and off-list, I believe this quote is
the best to work with at this point.

>>> "Alun Jones" <alun (at) texis (dot) com [email concealed]> 7/4/2004 12:05:51 PM >>>
> Whenever you advocate a switch from Microsoft to another platform,
whether
> it's an operating system platform, or merely a browse

[ more ]  [ reply ]
RE: Microsoft technologies. By default, non-HIPAA compliant? 2004-07-06
Tina Bird (tbird precision-guesswork com)
Do not adopt OIS standards (Was: Public Review of OIS Security Vulnerability Reporting and Response Guidelines) 2004-07-05
Ferguson, Ann (annfer duck wafel com)
Here is my plea: do not adopt OIS standards, and do not advance OIS
legitimacy by submitting official feedback. This is not a beginning of an
angry rant - please allow me to explain.

I think that OIS guidelines are quite good in suggesting how the
disclosure process should look like. I also think t

[ more ]  [ reply ]
[ GLSA 200407-05 ] XFree86, X.org: XDM ignores requestPort setting 2004-07-05
Thierry Carrez (koon gentoo org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200407-05
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

[ more ]  [ reply ]
RE: Registry Fix For Variant of Scob 2004-07-03
Thor Larholm (thor pivx com) (1 replies)
Setting the kill bit on the "Shell.Application" ActiveX object, or any
other ActiveX, is a system wide configuration change. This is also the
reason for the incompatibility issues you are mentioning, but there is
no reason to kill the bird to secure the nest.

The problem here is not the ADODB.Strea

[ more ]  [ reply ]
RE: Registry Fix For Variant of Scob 2004-07-06
Jelmer (jkuperus planet nl)
MySQL Authentication Bypass 2004-07-05
NGSSoftware Insight Security Research (nisr nextgenss com) (1 replies)
NGSSoftware Insight Security Research Advisory

Name: MySQL Authentication Bypass / Buffer Overflow
Systems Affected: MySQL 4.1 prior to 4.1.3, and MySQL 5.0.
Severity: High
Vendor URL: http://www.mysql.com
Author: Chris Anley [ chris (at) ngssoftware (dot) com [email concealed] ]
Date of Advisory: 1st July 2004

Whitepaper
***

[ more ]  [ reply ]
Fastream NETFile FTP/Web Server Input validation Errors 2004-07-04
at4r (at4r haxorcitos com)
Fastream NETFile FTP/Web Server Input validation Errors
--------------------------------------------------------

Release Date: 4 July 2004

Severity: High

Systems Affected: Fastream NETFile FTP/Web Server <=v.6.7.2.1085

Systems Not Affected: Fastream NETFile FTP/Web Server v6.7.3

Vendor URL: htt

[ more ]  [ reply ]
unreal ircd ip cloaking subsystem vulnerability 2004-07-05
bartavelle (bartavelle bandecon com)
Software name: Unreal ircd
Vulnerable versions: 3.2 and probably previous versions
Problem nature: Information disclosure

Summary:
Unreal ircd is a popular irc server. One of the features it provides is
called 'ip cloaking'. The purpose of this system is to prevent hostile
irc u

[ more ]  [ reply ]
[ GLSA 200407-03 ] Apache 2: Remote denial of service attack 2004-07-04
Thierry Carrez (koon gentoo org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200407-03
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

[ more ]  [ reply ]
XSS in 12Planet Chat Server 2.9 2004-07-05
Donato Ferrante (fdonato autistici org)

Donato Ferrante

Application: 12Planet Chat Server
http://www.12planet.com

Version: 2.9

Bug: cross site scripting

Date: 05-Jul-2004

Author: Donato Ferrante
e-mail: fdonato (at) autistici (dot) org [email concealed]
web: ww

[ more ]  [ reply ]
[ GLSA 200407-04 ] Pure-FTPd: Potential DoS when maximum connections is reached 2004-07-04
Thierry Carrez (koon gentoo org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200407-04
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

[ more ]  [ reply ]
Linux Virtual Server/Secure Context procfs shared permissions flaw 2004-07-04
Veit Wahlich (cru zodia de)
Linux Virtual Server/Secure Context procfs shared permissions flaw
==================================================================

2004-07-02, Veit Wahlich <cru (at) zodia (dot) de [email concealed]>

Official location of this document: http://ircnet.de/article.shtml?vsproc

Product|
-------+

Linux Virtual Server extends

[ more ]  [ reply ]
Re: DLINK 614+ - SOHO routers, system DOS 2004-07-03
Gregory Duchemin (c3rb3r sympatico ca)
Hello,
a followup concerning the two DOSes that were found affecting DLINK's DI
614+ model.
I finally got a chance to test a DI624 revision B and i can confirm that
this model is affected by the exact
same flaws. (signedness bug/service DOS and flood/system DOS)
While it is not quite a surprise, i

[ more ]  [ reply ]
(Page 1482 of 1748)  < Prev  1477 1478 1479 1480 1481 1482 1483 1484 1485 1486 1487  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus