BugTraq Mode:
(Page 1498 of 1748)  < Prev  1493 1494 1495 1496 1497 1498 1499 1500 1501 1502 1503  Next >
Cross-site scripting vulnerability in Crafy Syntax Live Help 2.7.3 and below 2004-06-03
John C. Hennessy (jchennessy hnkts net)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

The problem:

Users are able to insert pieces of html both in
their name when they request livehelp and in chat sessions.
For example. If I where to input the following javascript inside a
"<"script">" tag and use it as my name.

window.location("h

[ more ]  [ reply ]
NYC Security Shindig Version 2.0 (with punch and pie!) 2004-06-04
Dave Aitel (dave immunitysec com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

New York City Security Shindig 2

Security Shindigs are ways for technical people in the Information
Security
industry to get together, view an informative technical presentation, and
otherwise have a good time.

Date/Time: Monday June 14th, 6pm
Locatio

[ more ]  [ reply ]
CPANEL Vuln : HTML injection 2004-06-04
qbann targ (web atomicrealms com)


Cpanel Resellers just can use an exploit in

the /scripts/killacct to delete one of my other customers accounts(only the

DNS info) not owned by him. All he had to do was create a fake account then

delete it and look at the source code, view his cookies and

discovered :2086/scripts/killacct?

[ more ]  [ reply ]
RE: PING: Outlook 2003 Spam 2004-06-04
Spencer, Mark (mspencer evidentdata com)
Hello,

A coworker and I spent much of the day yesterday trying to replicate
this behavior and we were not able to do so. The only time we can get
Outlook 2003 to pull anything from our server with this code is when we
send the email within our own MS Exchange. We've tried multiple
clients, multip

[ more ]  [ reply ]
HERT Relaunch 2004-06-03
gaius (gaius hert org)
HERT is please to introduce its new web site http://hert.org

Here's the agenda:

* Cover cool events such as the Ruxcon in July in Sydney, Australia.

* Announce interesting and useful tools and projects from HERT and
our friends
at VOID, The Hacker's Choice, TESO, w00w00, Phenoelit, K

[ more ]  [ reply ]
[FLSA-2004:1620] Updated cvs resolves security vulnerabilities 2004-06-04
Jesse Keating (jkeating j2solutions net)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -----------------------------------------------------------------------
Fedora Legacy Update Advisory

Synopsis: Updated cvs resolves security vulnerability
Advisory ID: FLSA:1620
Issue date: 2004-06-02
Product:

[ more ]  [ reply ]
UPDATED: MITKRB5-SA-2004-001: krb5_aname_to_localname 2004-06-03
Tom Yu (tlyu mit edu)
-----BEGIN PGP SIGNED MESSAGE-----

MIT krb5 Security Advisory 2004-001

Original release: 2004-06-01
Last update: 2004-06-02

Topic: buffer overflows in krb5_aname_to_localname

Severity: serious

SUMMARY
=======

[ patch corrected since original release ]

The krb5_aname_to_localn

[ more ]  [ reply ]
Re: Format String Vulnerability in Tripwire 2004-06-03
Ron Forrester (rjf tripwire com)
In-Reply-To: <20040602234116.9A3674A5B (at) frenchfries (dot) net [email concealed]>

Just a quick note that Tripwire confirms this vulnerability exists in our currently shipping commercial versions of Tripwire for Servers as well as the Open Source release on Sourceforge.

We have patched our commercial code base and the f

[ more ]  [ reply ]
MDKSA-2004:056 - Updated krb5 packages fix buffer overflow vulnerabilities 2004-06-03
Mandrake Linux Security Team (security linux-mandrake com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandrakelinux Security Update Advisory
_______________________________________________________________________

Package name: krb5
Advisory ID:

[ more ]  [ reply ]
NetBSD Security Advisory 2004-008: CVS server vulnerability 2004-06-03
NetBSD Security-Officer (security-officer netbsd org)

-----BEGIN PGP SIGNED MESSAGE-----

NetBSD Security Advisory 2004-008
=================================

Topic: CVS server vulnerability

Version: NetBSD-current: source prior to May 21, 2004
netBSD 1.6.2: affected
NetBSD 1.6.1: affected
NetBSD 1.6: affected
NetBSD-1.5.*: not affect

[ more ]  [ reply ]
[SECURITY] [DSA 513-1] New log2mail packages fix format string vulnerabilities 2004-06-03
Matt Zimmerman (mdz debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 513-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Matt Zimmerman
June 3rd, 2004

[ more ]  [ reply ]
RE: Remote SMTP authentication audit tool? 2004-06-03
Evans, Arian (Arian Evans fishnetsecurity com)
Just audit your local Windows accounts (or domain Windows accounts)
for password strength, if you're still worried about weak accounts. John
the Ripper, LC, etc., are all useful for this.

If you do not use SMTP relaying, then disable "allow authenticated users"
to relay in Exchange. Your internal

[ more ]  [ reply ]
Netgear WG602 Accesspoint vulnerability 2004-06-03
Tom Knienieder (knienieder khamsin ch)


KHAMSIN Security News
KSN Reference: 2004-06-03 0001 TIP
------------------------------------------------------------------------
---

Title
-----
The Netgear WG602 Accesspoint contains an undocumented
administrative account.

Date
----
2004-06-03

Description
-----------

[ more ]  [ reply ]
DOS@Orenosv 2004-06-03
CoolICE (CoolICE China com)
DOS_OrenosvHTTPd.bat

@echo on
::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
:Application: Orenosv Server
:Vendors: http://home.comcast.net/~makataoka/orenosv060.zip
:Version: <=0.6.0
:Platforms: Windows
:Bug: D.O.S
:Date: 2004-06-02
:Author: CoolICE
:E-mail: CoolICE#China

[ more ]  [ reply ]
PHP Include Exploit in Mail Manage EX v3.1.8 and maybe others. 2004-06-03
JvdR (thewarlock home nl)
Description: PHP Include Exploit in Mail Manage EX v3.1.8
Compromise: a malicious PHP script from an external host may be included and
executed.
Vulnerable Systems: all system using mmex.php v3.1.8 and maybe lower (not
tested).
Details:
The PHP Include exploit exist in de folowing code,

mmex.php--

[ more ]  [ reply ]
TREND MICRO: The Protector Becomes The Vector [technical exercise: cross-application-scripting] 2004-06-03
http-equiv (at) excite (dot) com [email concealed] (1 malware com)


Thursday, June 03, 2004

The following represents an interesting technical examination
when the so-called "Anti-Virus" protector becomes the
Virus "Vector". Naturally this is the result of relying on
the "plug and play" or "module" of one Internet Explorer browser
and operating system from a

[ more ]  [ reply ]
Simple Yahoo! Mail Cross-Site Scripting (GM#006-MC) 2004-06-03
GreyMagic Software (security greymagic com)
GreyMagic Security Advisory GM#006-MC
=====================================

GreyMagic Software, 03 Jun 2004.

Available in HTML format at
http://www.greymagic.com/security/advisories/gm006-mc/.

Topic: Simple Yahoo! Mail Cross-Site Scripting.

Discovery date: 16 May 2004.

Affected applications:
==

[ more ]  [ reply ]
Phishing for Opera (GM#007-OP) 2004-06-03
GreyMagic Software (security greymagic com)
GreyMagic Security Advisory GM#007-OP
=====================================

By GreyMagic Software, 03 Jun 2004.

Available in HTML format at
http://security.greymagic.com/security/advisories/gm007-op/.

Topic: Phishing for Opera.

Discovery date: 16 May 2004.

Affected applications:
===============

[ more ]  [ reply ]
DoS vuln in various versions of Linksys routers. 2004-06-03
b0f www.b0f.net (b0fnet yahoo com)


Denial of Service Vulnerability in

Linksys BEFSR41 - Router vuln was identified and tested on.

Linksys BEFSR41 v3

Linksys BEFSRU31

Linksys BEFSR11

Linksys BEFSX41

Linksys BEFSR81 v2/v3

Linksys BEFW11S4 v3

Linksys BEFW11S4 v4

Available from www.linksys.com

October 19, 2003 (Revised No

[ more ]  [ reply ]
Mkdir buffer overflow vulnerability in Unix Seventh Edition. 2004-06-03
Tim Newsham (newsham lava net)

Mkdir buffer overflow vulnerability in Unix Seventh Edition.
2 Jun 2004

SYNOPSIS
A vulnerability in the mkdir system utility can allow an
unprivileged user to gain root privileges in UNIX 7th
Edition systems.

DESCRIPTION
The mkdir utility (/bin/mkdir) creates directories on behal

[ more ]  [ reply ]
[Fwd: Re: [ GLSA 200405-18 ] Buffer Overflow in Firebird] 2004-06-03
KF (lists) (kf_lists secnetops com)
Format String Vulnerability in Tripwire 2004-06-02
Paul Herman (pherman frenchfries net)
SUMMARY
-------
Tripwire(tm) is a Security, Intrusion Detection, Damage Assessment
and Recovery, Forensics software.

A vulnerability in the product allows a user on the local machine
under certain circumstances to execute arbitrary code with the
rights of the user running the program (typically roo

[ more ]  [ reply ]
[SECURITY] [DSA 499-2] New rsync packages fix directory traversal bug 2004-06-02
Matt Zimmerman (mdz debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 499-2 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Matt Zimmerman
June 2nd, 2004

[ more ]  [ reply ]
Remote SMTP authentication audit tool? 2004-06-02
Byron Pezan (mbp ribbit net)
I have found that several spammers are exploiting weak or non-existent passwords on some MS Exchange servers using external SMTP authentication.  I have also found out (through Tech Net) how to turn on logging for SMTP authentication and see what account is being abused for this purpose.  However, t

[ more ]  [ reply ]
RE: LinkSys WRT54G administration page availble to WAN 2004-06-02
Humes, David G. (David Humes jhuapl edu) (1 replies)
I have a WRT54G at home. After seeing all the discussion here about the
remote administration vulnerability I tried to access the web interface
today on ports 80 and 443 from outside of my home network and was not able
to get to the web interface either.

But, having said that, I'm still fairly d

[ more ]  [ reply ]
Re: LinkSys WRT54G administration page availble to WAN 2004-06-03
Peter Becker (peter becker oberkassel de)
MS KB article suggests turning off encrypted passwords for Mac clients 2004-06-02
Steve Shockley (steve shockley shockley net)
http://support.microsoft.com/default.aspx?id=316076

"To resolve this problem, use the Apple Clear Text authentication method."

[ more ]  [ reply ]
(Page 1498 of 1748)  < Prev  1493 1494 1495 1496 1497 1498 1499 1500 1501 1502 1503  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus