BugTraq Mode:
(Page 1497 of 1748)  < Prev  1492 1493 1494 1495 1496 1497 1498 1499 1500 1501 1502  Next >
Internet explorer 6 execution of arbitrary code (An analysis of the 180 Solutions Trojan) 2004-06-07
Jelmer (jkuperus planet nl)
Just when I though it was save to once more use internet explorer I received
an email bringing my attention to this webpage
http://216.130.188.219/ei2/installer.htm   that according to him used an
exploit that affected fully patched internet explorer 6 browsers. Being
rather skeptical I carelessly c

[ more ]  [ reply ]
TREND MICRO: The Protector Becomes The Vector Take II 2004-06-07
http-equiv (at) excite (dot) com [email concealed] (1 malware com)


Monday, June 07, 2004

<!--

1. When the product alerts it creates an html file in the
temporary file of the user's machine [the so-called "local zone"]

[screen shot: http://www.malware.com/weallcar.png 29KB ]

This html file is viewed from an Internet Explorer "browser
object" and
indicate

[ more ]  [ reply ]
Re: Netgear WG602 Accesspoint vulnerability 2004-06-05
Jaco Swart (jaco iblocks co uk) (1 replies)
In-Reply-To: <Pine.GSO.4.33.0406031903380.14119-100000 (at) shamal.khamsin (dot) ch [email concealed]>

I can confirm that this vulnerability still exists in the latest firmware upgrade(1.7.14) for the WG602. They've simply gone and changed the username to superman and password to 21241036.

[ more ]  [ reply ]
Re: Netgear WG602 Accesspoint vulnerability 2004-06-07
RISKO Gergely (xmicro risko hu)
[SECURITY] [DSA 515-1] New lha packages fix several vulnerabilities 2004-06-05
Matt Zimmerman (mdz debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 515-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Matt Zimmerman
June 5th, 2004

[ more ]  [ reply ]
Administrivia: Summer autoreply troll 2004-06-05
David Ahmad (da securityfocus com)

--
David Mirza Ahmad
Symantec

PGP: 0x26005712
8D 9A B1 33 82 3D B3 D0 40 EB AB F0 1E 67 C6 1A 26 00 57 12

[ more ]  [ reply ]
Re: The Linksys WRT54G "security problem" doesn't exist 2004-06-05
caldcv students fccj org
In-Reply-To: <OF573D37A2.8E5427F6-ON87256EA9.00668BEB-87256EA9.0066B037 (at) bio-rad (dot) com [email concealed]>

>> In a recent client installation I discovered that even if the remote

>> administration function is turned off, the WRT54G provides the

>> administration web page to ports 80 and 443 on the WAN.

>

>I think

[ more ]  [ reply ]
Re: [Squid 2004-Nuke-001] Inadequate Security Checking in PHPNuke v7.3 and earlier 2004-06-05
Remy Wetzels (r wetzels chello nl)
In-Reply-To: <20040601184035.31371.qmail (at) www.securityfocus (dot) com [email concealed]>

>The process consists of capturing the currently executing script's path and

>filename with the global variable $_SERVER['PHP_SELF']. Using PHP's built-in

>function eregi(), this value is then compared against the script's name

[ more ]  [ reply ]
[ GLSA 200406-03 ] sitecopy: Multiple vulnerabilities in included libneon 2004-06-05
Thierry Carrez (koon gentoo org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200406-03
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

[ more ]  [ reply ]
Bank of America security e-mail address 2004-06-05
caldcv students fccj org


I need to contact Bank of America regarding their security. Does anyone know/have an e-mail address to a live person who won't sent me an auto-reply?

Thanks,

CC.

[ more ]  [ reply ]
Re: Format String Vulnerability in Tripwire 2004-06-04
Ron Forrester (rjf tripwire com)
In-Reply-To: <20040604175112.23294.qmail (at) www.securityfocus (dot) com [email concealed]>

Okay folks, one more time.

We've identified a couple more important bits of information regarding this vulnerability, mainly that it is present only in the code for processing email reports when the MAILMETHOD is sendmail. This pr

[ more ]  [ reply ]
[ GLSA 200406-02 ] tripwire: Format string vulnerability 2004-06-04
Thierry Carrez (koon gentoo org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200406-02
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

[ more ]  [ reply ]
bss-based buffer overflow in l2tpd 2004-06-04
Thomas Walpuski (thomas-bugtraq unproved org)
All versions of l2tpd contain a bss-based buffer overflow. After
circumventing some minor obstacles (i.e., faking a L2TP tunnel
establishment) the overflow can be triggered by sending a specially
crafted packet.

The crucial code can be found in write_packet() in control.c:

static unsigned char

[ more ]  [ reply ]
Re: LinkSys WRT54G administration page availble to WAN 2004-06-04
Jerry Zwanenburg (J Zwanenburg chello nl)
In-Reply-To: <019201c4494b$9a3c1460$476ffc50@tera>

Peter,

I agree on that.

For the external loggin. Look at www.wallwatcher.com.

Its a great free tool written for linksys.

Cheers,

Jerry

>Received: (qmail 11131 invoked from network); 3 Jun 2004 19:57:09 -0000

>Received: from outgoin

[ more ]  [ reply ]
Colin McRae Rally 04 broadcast clients crash 2004-06-04
Luigi Auriemma (aluigi altervista org)

#######################################################################

Luigi Auriemma

Application: Colin McRae Rally 04
http://www.codemasters.com/colinmcraerally04/
Versions: 1.0
Platforms: Windows
Bug: bad allocation (?)
Risk:

[ more ]  [ reply ]
[SECURITY] [DSA 514-1] New Linux 2.2.20 packages fix local root exploit (sparc) 2004-06-04
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 514-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
June 4th, 2004

[ more ]  [ reply ]
The Linksys WRT54G "security problem" doesn't exist 2004-06-04
David Pipe (David_Pipe bio-rad com) (2 replies)
> In a recent client installation I discovered that even if the remote
> administration function is turned off, the WRT54G provides the
> administration web page to ports 80 and 443 on the WAN.

I think the "Independent consultant" quoted in InternetWeek is wrong. I
think he either has a defecti

[ more ]  [ reply ]
RE: The Linksys WRT54G "security problem" doesn't exist 2004-06-05
Alan W. Rateliff, II (lists rateliff net)
Re: The Linksys WRT54G "security problem" doesn't exist 2004-06-04
insecure (insecure ameritech net)
Integrigy Security Alert - Multiple SQL Injection Vulnerabilities in Oracle E-Business Suite 2004-06-04
Integrigy Security (alerts integrigy com)
______________________________________________________________________

Integrigy Security Alert
______________________________________________________________________

Oracle E-Business Suite - Multiple SQL Injection Vulnerabilities
June 3, 2004
____________________________________________________

[ more ]  [ reply ]
[ GLSA 200406-01 ] Ethereal: Multiple security problems 2004-06-04
Thierry Carrez (koon gentoo org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200406-01
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

[ more ]  [ reply ]
Re: Format String Vulnerability in Tripwire 2004-06-04
Ron Forrester (rjf tripwire com)
In-Reply-To: <20040603215236.7815.qmail (at) www.securityfocus (dot) com [email concealed]>

One more quick note -- I think I had a brain freeze and gave Paul the wrong commerical version numbers. This vulnerability exists in all currently shipping TFS releases, which means <= 4.0.1.

Sorry I didn't catch this the first tim

[ more ]  [ reply ]
[openwebmail] Fw: Re: XSS bug. 2004-06-03
A. Ramos (aramosf unsec net)

Hello all,

Its a forward message from openwebmail bugtraq system with the problem and
the solution ;-)

---------- Forwarded Message -----------
From: "openwebmail" <openwebmail (at) turtle.ee.ncku.edu (dot) tw [email concealed]>
To: "aramosf" <aramosf (at) unsec (dot) net [email concealed]>
Sent: Thu, 3 Jun 2004 20:30:07 +0800
Subject: Re: XSS bug.

[ more ]  [ reply ]
(Page 1497 of 1748)  < Prev  1492 1493 1494 1495 1496 1497 1498 1499 1500 1501 1502  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus