BugTraq Mode:
(Page 1485 of 1748)  < Prev  1480 1481 1482 1483 1484 1485 1486 1487 1488 1489 1490  Next >
JS.Scob.Trojan Source Code ... 2004-06-28
K-OTiK Security (Special-Alerts k-otik com)


hello,

here is some full disclosure : below the source code of the Scob trojan downloader, if you want to know more about it.

Best Regards.

Franck Olivel - Security Engineer

K-OTik Security Survey 24/7

http://www.k-otik.com

--------------------------------------------------------------

[ more ]  [ reply ]
DoS in popclient 3.0b6 2004-06-29
Dean White (incidents oneguard com)


DoS in popclient 3.0b6

----------------------

Release Date: 29th June 2004

Discovery: Dean White <incidents (at) oneguard (dot) com [email concealed]>

Research: John Cartwright <johnc (at) grok.org (dot) uk [email concealed]>

Overview

--------

"popclient is a Post Office Protocol compliant mail retrieval client

which supports both POP2 (as

[ more ]  [ reply ]
Java applet crashing with native assertion 2004-06-28
Marc Schoenefeld (schonef uni-muenster de) (1 replies)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi,

this is a Java One special:

Three months ago I informed Sun Microsystems
about an applet alerting with a native win32 assertion
(Expression: offset < fFileSize

For information on how your program can cause an
assertion failure, see the Visual C++

[ more ]  [ reply ]
Re: Java applet crashing with native assertion 2004-06-28
Jack Lloyd (lloyd randombit net)
Scob infection statistics, etc.. 2004-06-28
Hubbard, Dan (dhubbard websense com)
If anyone is interested we have some information on the Scob Trojan
"released" last week.

* we saw customers visiting the Russian URL's starting June 22. All the
sites are down but here is a list of the sites visited with frequency
counters.

http://217.107.218.147:80/redir.php 2
http://217.107.2

[ more ]  [ reply ]
Multiple vulnerabilities PowerPortal 2004-06-28
DarkBicho (darkbicho fastmail fm)
http://www.swp-zone.org/archivos/advisory-07.txt

------------------------------------------------------------------------
-------------------------

:.: Multiple vulnerabilities PowerPortal :.:

PROGRAM: PowerPortal
HOMEPAGE: http://powerportal.sourceforge.net/
VER

[ more ]  [ reply ]
MPlayer MeMPlayer.c 2004-06-27
c0ntex open-security org


/*

************************************************************************
*****************************************

$ An open security advisory #5 - MPlayer GUI filename handling overflow

************************************************************************
****************************

[ more ]  [ reply ]
DLINK 614+ - SOHO routers, DHCP service DOS 2004-06-28
Gregory Duchemin (c3rb3r sympatico ca)
TITLE: DLINK 614+ - SOHO routers, DHCP service DOS (http://www.dlink.com)

TYPE: signedness bug

QUOTE from DLINK:

The AirPlus DI-614+ combines the latest advancements in 802.11b
silicon chip
design from Texas Instruments, utilizing their patented Digital Signal
ProcessingTM technology, and D-Link

[ more ]  [ reply ]
Full path disclosure csFAQ 2004-06-28
DarkBicho (darkbicho fastmail fm)
http://www.swp-zone.org/archivos/advisory-08.txt

------------------------------------------------------------------------
-------------------------

:.: Full path disclosure csFAQ :.:

PROGRAM: csFAQ
HOMEPAGE: http://www.cgiscript.net/
BUG: Full path disclosure
D

[ more ]  [ reply ]
ZH2004-14SA (security advisory):Sql Injection in Infinity WEB 2004-06-27
D'Amato Luigi (admin securitywireless info)
06/27/2004

Vendor contacted: June 1st 2004
Published: June 26th 2004
Title: Infinity WEB
Vulnerable versions :1.0 unpatched

Type: Sql Injection

Author: D'Amato Luigi from Zone-h Security Labs -
securitywireless (at) zone-h (dot) it [email concealed] - admin (at) securitywireless (dot) info [email concealed]

Vendor: http://www.websoft.it/

Description

[ more ]  [ reply ]
DLINK 614+ - SOHO routers, system DOS 2004-06-28
Gregory Duchemin (c3rb3r sympatico ca)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

TITLE: DLINK 614+ - SOHO routers, system DOS (http://www.dlink.com)

TYPE: ressources starvation / system denial of service

QUOTE from DLINK:

The AirPlus DI-614+ combines the latest advancements in 802.11b
silicon chip
design from Texas Instruments,

[ more ]  [ reply ]
Cross-Site Scripting CuteNews 2004-06-28
DarkBicho (darkbicho fastmail fm)
http://www.swp-zone.org/archivos/advisory-06.txt

------------------------------------------------------------------------
-------------------------

:.: Cross-Site Scripting CuteNews :.:

PROGRAM: CuteNews
HOMEPAGE: http://cutephp.com/
VERSION: v1.3.1
BUG: Cros

[ more ]  [ reply ]
ISC DHCP overflows 2004-06-28
Gregory Duchemin (c3rb3r sympatico ca)
Hi,
for those interested to reproduce the recent DOS attacks against ISC
DHCPD 3.0.1 rc12 and rc13
as described in:
http://www.kb.cert.org/vuls/id/317350
, i'm forwarding the first email i sent to ISC describing several stack
based buffer overflows occuring during the creation
of log messages and

[ more ]  [ reply ]
Lotus Notes URL argument injection vulnerability 2004-06-27
Jouko Pynnonen (jouko iki fi)


OVERVIEW
========

Lotus Notes is a groupware/e-mail system developed by Lotus Software.
Due to its security and collaboration features it's used particularly
by large organizations, government agencies, etc. IBM estimates it is
used by 60 million people.

During the client-side Windows install

[ more ]  [ reply ]
nCipher Advisory #10: Pass phrases are exposed in netHSM log files 2004-06-21
nCipher Support (technotifications us ncipher com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

nCipher Security Advisory No. 10
Pass phrases are exposed in netHSM log files
--------------------------------------------

SUMMARY
=======

Pass phrases entered by means of the nCipher netHSM front panel,
either us

[ more ]  [ reply ]
Zone Labs response to "ZoneAlarm Pro 'Mobile Code' Bypass Vulnerability" 2004-06-25
Zone Labs Product Security (Product-Security zonelabs com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

ZoneAlarm Pro, Security Suite and Integrity products which employ
Mobile Code Protection/ID Lock features do not inspect encrypted
traffic. If mobile code is downloaded via a Secure Sockets Layer
(SSL) session, it will not be inspected by these produc

[ more ]  [ reply ]
RE: Is predictable spam filtering a vulnerability? 2004-06-25
David Brodbeck (DavidB mail interclean com)
> -----Original Message-----
> From: PSE-L (at) mail.professional (dot) org [email concealed] [mailto:PSE-L (at) mail.professional (dot) org [email concealed]]

> Many sites employ SpamAssassin and the like to simply FLAG
> messages and pass them along to the intended recipient, who can then
> employ their own filter process within their email client

[ more ]  [ reply ]
RE: Microsoft and Security 2004-06-25
Drew Copley (dcopley eEye com)


> -----Original Message-----
> From: http-equiv (at) excite (dot) com [email concealed] [mailto:1 (at) malware (dot) com [email concealed]]
> Sent: Friday, June 25, 2004 11:53 AM
> To: bugtraq (at) securityfocus (dot) com [email concealed]

> Subject: Microsoft and Security

<snip>

> A vulnerability:
>
> http://www.microsoft.com/technet/archive/community/columns/securi
> ty/essa

[ more ]  [ reply ]
[SECURITY] [DSA 525-1] New apache packages fix buffer overflow in mod_proxy 2004-06-25
Matt Zimmerman (mdz debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 525-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Matt Zimmerman
June 24th, 2004

[ more ]  [ reply ]
[ GLSA 200406-20 ] FreeS/WAN, Openswan, strongSwan: Vulnerabilities in certificate handling 2004-06-25
Thierry Carrez (koon gentoo org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200406-20
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

[ more ]  [ reply ]
artmedic_links5 PHP Script (include path) vuln 2004-06-25
Adam n30n Simuntis (n30n satfilm net pl)


There's a possilbity of looking at files (with apache priviliges) using artmedic_links5 (php script).

(http://www.artmedic-phpscripts.de/artmedic_links.php).

Vulnerability (include path) is in index.php, standard use:

hostname/artmedic_links5/index.php?id=[file] or index.php?id=[url]

I n

[ more ]  [ reply ]
multiple remote & local buffer overflows discovered in Drcatd 2004-06-25
Khan Shirani (khan_shirani yahoo com)


Zone-h Security Advisory

Date of discovery : 24 june 2004

Date of release : 25 june 2004

Bug found by Khan Shirani

<shirani (at) zone-h (dot) org [email concealed]>

http://www.zone-h.org

---------------------------------------

Software : Drcatd

Bugs : Buffer Overflows , Remote and local (multiple)

Risk

[ more ]  [ reply ]
format string vulnerability in Gnats 2004-06-25
Khan Shirani (khan_shirani yahoo com)


Zone-h Security Advisory

Date of discovery : 21 june 2004

Date of release : 24 june 2004

Bug found by Khan Shirani

<shirani (at) zone-h (dot) org [email concealed]>

http://www.zone-h.org

---------------------------------------

Software : GNU Gnats 4.00

Bugs : formats string bug(s)

Risk : low/medium

Platform : *ni

[ more ]  [ reply ]
(Page 1485 of 1748)  < Prev  1480 1481 1482 1483 1484 1485 1486 1487 1488 1489 1490  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus