|
Colapse all |
Post message
U.S. Robotics Broadband Router 8003 admin password visible 2004-06-08 Fernando Sanchez (fer ceu fi udc es) Hello. US Robotics Broadband Router 8003 is a small home/SOHO router which is configured using a HTML interface. This interface, as usual, asks for a password in order to let you view or change configuration parameters. But the password is checked first by a javascript function that just com [ more ] [ reply ] Vulnerability: Arbitrary File Access & DoS in Crystal Reports 2004-06-08 Imperva Application Defense Center (adc imperva com) Dear List, Imperva(tm)'s Applidcation Defense Center has recently discovered a vulnerability in Business Objects' Crystal Reports Web Delivery Modules. This vulnerability may lead to arbitrary file access and denial of service. Following are the advisory's details. ================================ [ more ] [ reply ] FreeBSD Security Advisory FreeBSD-SA-04:12.jailroute 2004-06-07 FreeBSD Security Advisories (security-advisories freebsd org) Re: [SECURITY] [DSA 515-1] New lha packages fix several vulnerabilities 2004-06-06 lw wszia edu pl In-Reply-To: <20040605203922.GW19402 (at) alcor (dot) net [email concealed]> i didn't bother to check deb package, but this patch: > http://security.debian.org/pool/updates/non-free/l/lha/lha_1.14i-2woody1 .diff.gz applied to this package: > Size/MD5 checksum: 21414 0f990fd920ea4770dd088a97c1c87f18 > http://se [ more ] [ reply ] SMC 7008ABRv2 and 7004VBRv1 updated firmware corrects port 1900 issue. 2004-06-06 user86 (user86 earthlink net) SMC has released updated firmware for their 7008ABRv2 (part number: 750.9814) and 7004VBRv1 routers that permanently fixes the port 1900 issue, making port 1900 no longer be WAN (internet) accessible. The firmware update for the 7008ABRv2 (version 1.035) is available from: http://www.smc.com/inde [ more ] [ reply ] RE: [Full-Disclosure] Re: Netgear WG602 Accesspoint vulnerability 2004-06-06 Jan-Peter Koopmann (Jan-Peter Koopmann seceidos de) n0t 2004-06-05 Marcin Ulikowski (r3b00t itsec pl) Aloha, I'd like to announce version 1.86 of n0t - network 0S tracer In short n0t is an easy to use sniffer with remote OS and NAT detection, simple IDS (NMap, XMAS, NULL scans), output configuration scripts (very useful for really big traffic) and BPF filter (tcpdump-style). I believe discussion [ more ] [ reply ] RE: Linksys WRT54G - Advice for european users 2004-06-07 Connor, Ethan M. W (emconnor hendersonbrothers com) (1 replies) Another bit of warning about linksys and their inability to get the firmware release vs. hardware version worked out correctly. If you install the latest WAP54G firmware update for the v2 hardware on v1 or v1.1 hardware (which the readme says is supported)... Expect the ethernet port to disable it [ more ] [ reply ] Multiple vulnerabilities PHP-Nuke 2004-06-07 Dark Bicho (k1ll3rb0y hotmail com) (1 replies) [product-security (at) apple (dot) com [email concealed]: APPLE-SA-2004-06-07 Security Update 2004-06-07] 2004-06-07 David Ahmad (da securityfocus com) ----- Forwarded message from Apple Product Security <product-security (at) apple (dot) com [email concealed]> ----- -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 APPLE-SA-2004-06-07 Security Update 2004-06-07 Description Security Update 2004-06-07 delivers a number of security enhancements and is recommended for all Macinto [ more ] [ reply ] RE: [Full-Disclosure] Internet explorer 6 execution of arbitrary code (An analysis of the 180 Solutions Trojan) 2004-06-07 Chris Carlson (chris compucounts com) When run remotely: Line: 1 Char: 1 Error: Access is denied. Code: 0 URL: http://62.131.86.111/security/idiots/repro/installer.htm When run locally, software installation is blocked. Using IE 6.0.2900.2096 SP2, WinXP SP2 I've gotta say that SP2 has some VERY nice protection builtin. On the down [ more ] [ reply ] OBJECT Bugs or Features 2004-06-07 James C Slora Jr (Jim Slora phra com) (1 replies) Two questions about the recent OBJECT tag assault in spam messages: 1. Should an email client process an OBJECT tag that has no corresponding /OBJECT? 2. Should an email client process an OBJECT tag that is not even embedded within HTML tags? Apparently the current answer in Outlook is Yes. Two e [ more ] [ reply ] Re: [Squid 2004-Nuke-001] Inadequate Security Checking in PHPNuke v7.3 and earlier 2004-06-06 Squid (squidsecurity hushmail com) In-Reply-To: <20040605125033.11956.qmail (at) www.securityfocus (dot) com [email concealed]> > >Using eregi is NOT the problem. The problem is the usage of $_SERVER['PHP_SELF'] which can't handle URL requests which have a slash ('/') as their first character in the query_string and thinks this is part of it's path. Using SCRI [ more ] [ reply ] Linksys BEFSR41 DHCP vulnerability server leaks network data 2004-06-07 Lance Armstrong (mishlai hotmail com) On May 2nd 2004 I sent an email (detailed below) to Linksys concerning this vulnerability. Linksys has posted the vulnerability and a fix for the Revision 3 router since then here: http://linksys.custhelp.com/cgi-bin/linksys.cfg/php/enduser/std_adp.php? p_faqid=832&p_created=1086294093&p_sid=pU [ more ] [ reply ] MS ISA SP2 out last month 2004-06-07 Paul Appleby (Appleby iiss org) Without so much as whisper MS have released SP2 for their nice and tidy firewall / proxy Internet Acceleration Server 2000 last month! I'm on every MS security mailing list, or I thought I was, and I didn't see this at all, only came by it on the MS site looking for something else. http://www.micr [ more ] [ reply ] RE: [Full-Disclosure] Internet explorer 6 execution of arbitrary code (An analysis of the 180 Solutions Trojan) 2004-06-07 Jelmer (jkuperus planet nl) Most recent exploits are like vehicles, they are assembled piece by piece, you can make a virus scanner detect the wheels, but a car, a bus and a bike are most certainly entirely different things! Yet none of them are any good without wheels, oh and in this case painting the wheel another color woul [ more ] [ reply ] Linksys WRT54G - Advice for european users 2004-06-05 Christer Palm (palm nogui se) As a follow-up to the WRT54G issue... For those of you who are looking for european firmware updates for the WRT54G, a word of warning might be in order: The european firmware download pages on Linksys' homepage lists three separate downloads for the v1, v1.1 and v2 hardware revisions. The firm [ more ] [ reply ] |
|
Privacy Statement |
Affected Application:
Blosxom (http://www.blosxom.com)
Severity: Medium to high (typical XSS impacts)
Introduction:
Blosxom, a weblog tool, has an optionally-installable plugin commonly
used for allowing users to post comment
[ more ] [ reply ]