BugTraq Mode:
(Page 1500 of 1748)  < Prev  1495 1496 1497 1498 1499 1500 1501 1502 1503 1504 1505  Next >
Possible bug in PHPNuke and other CMS 2004-05-30
Luca Falavigna (fala83 libero it)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

There is a vulnerability in PHPNuke that permits execution of arbitrary
SQL queries on a database located in the same server of an attacker's
account. This is the procedure: first of all attacker must create a
symlink pointing to victim's db directory i

[ more ]  [ reply ]
Looking for a security contact of RealNetworks Live Rhapsody 2004-05-27
Philip Stoev (philip stoev org)
Hello,

I need to report a fairly substantial security vulnerability in RealNetworks
Live Rhapsody. Any pointers?

Sincerely,

Philip Stoev

[ more ]  [ reply ]
Users who have expired passwords can still log on to the domain if the FQDN is exactly eight characters long in Windows 2000 2004-05-31
albatross tim it


SYMPTOMS

Users who have expired passwords can unexpectedly log on to the Microsoft Windows 2000 domain.

CAUSE

This issue occurs if the fully qualified domain name (FQDN) is exactly eight characters long.

RESOLUTION

Hotfix information

A supported hotfix is now available from Microsoft, bu

[ more ]  [ reply ]
[ GLSA 200405-25 ] tla: Heap-based buffer overflow in included libneon 2004-05-30
Thierry Carrez (koon gentoo org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200405-25
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

[ more ]  [ reply ]
[SECURITY] [DSA 511-1] New ethereal packages fix buffer overflows 2004-05-30
Matt Zimmerman (mdz debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 511-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Matt Zimmerman
May 30th, 2004

[ more ]  [ reply ]
[SECURITY] [DSA 510-1] New jftpgw packages fix format string vulnerability 2004-05-29
Matt Zimmerman (mdz debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 510-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Matt Zimmerman
May 29th, 2004

[ more ]  [ reply ]
[Full-Disclosure] iDEFENSE Security Advisory 05.27.04: 3Com OfficeConnect Remote 812 ADSL Router Authentication Bypass Vulnerability 2004-05-27
idlabs-advisories idefense com (1 replies)
3Com OfficeConnect Remote 812 ADSL Router Authentication Bypass
Vulnerability

iDEFENSE Security Advisory 05.27.04
www.idefense.com/application/poi/display?id=106&type=vulnerabilities
May 27, 2004

I. BACKGROUND

The 3Com OfficeConnect Remote 812 ADSL Router is a standalone
bridge/router, with inter

[ more ]  [ reply ]
[SECURITY] [DSA 509-1] New gatos packages fix privilege escalation 2004-05-29
Matt Zimmerman (mdz debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 509-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Matt Zimmerman
May 29th, 2004

[ more ]  [ reply ]
[waraxe-2004-SA#031 - Multiple vulnerabilities in e107 version 0.615] 2004-05-29
Janek Vind (come2waraxe yahoo com)


{=======================================================================
=========}

{ [waraxe-2004-SA#031] }

{=======================================================================
=========}

{

[ more ]  [ reply ]
LDU (land down under) xss vulnerability 2004-05-29
tim de gier (timdegier home nl)


About Product

=============

LDU is a php/mysql website engine.

Description

===========

A cross site scripting vulnerability exist in the BBcodes of the LDU forum.

When you add a image to your message on the forum, the script doesn't check if it is javascript.

I will give the follo

[ more ]  [ reply ]
EnderUNIX Security Anouncement (Isoqlog and Spamguard) 2004-05-28
Murat Balaban (murat enderunix org)

______________________________________________________________
Package : isoqlog
Date :
Affected products : isoqlog is available
for a wide variety of products,
and distrubuted as a FreeBSD
port/package.
Vulnerability type : both local and remote

1. Isoqlog

Isoqlog is

[ more ]  [ reply ]
Mollensoft ftp Server ver 3.6 Buffer overflow 2004-05-28
Chintan Trivedi (chesschintan hotmail com)


[ Mollensoft ftp Server ver 3.6 Buffer overflow ]

-----------------------------------------------------

EOS Advisory - http://www.eos-india.net

-----------------------------------------------------

Vendor : http://www.mollensoft.com

Version : 3.6 (latest)

Vulnerabilit

[ more ]  [ reply ]
SGI Advanced Linux Environment 3 Security Update #2 2004-05-28
SGI Security Coordinator (agent99 sgi com)
-----BEGIN PGP SIGNED MESSAGE-----

________________________________________________________________________
______
SGI Security Advisory

Title : SGI Advanced Linux Environment 3 Security Update #2
Number : 20040509-01-U
Date : May 28, 2004
Fixed in :

[ more ]  [ reply ]
SGI Advanced Linux Environment security update #20 2004-05-28
SGI Security Coordinator (agent99 sgi com)
-----BEGIN PGP SIGNED MESSAGE-----

________________________________________________________________________
______
SGI Security Advisory

Title : SGI Advanced Linux Environment security update #20
Number : 20040508-01-U
Date : May 28, 2004
Fixed in : P

[ more ]  [ reply ]
JPortal SQL Injects 2004-05-28
Maciek Wierciski (ziemni risp pl)


Jportal is a portal system, quite commonly used:

(Google)

Results 1 - 10 of about 56,100 for "powered by jportal". (0.22 seconds)

Homepage:

http://jportal2.com/

I've read its code and found:

in module/print.inc.php:

function art_print() {

....

$query = "SELECT * FROM $art_tbl W

[ more ]  [ reply ]
[ GLSA 200405-24 ] MPlayer, xine-lib: vulnerabilities in RTSP stream handling 2004-05-28
Thierry Carrez (koon gentoo org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200405-24
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

[ more ]  [ reply ]
Re: Microsoft Internet Explorer ImageMap URL Spoof Vulnerability 2004-05-27
http-equiv (at) excite (dot) com [email concealed] (1 malware com)


<!--

<a onmouseover="window.status='http://www.the-url-you-
see.com;return true"
title="The Link"
onmouseout="window.status='Whatever-you-like-here';return true"
href='http://www.some-other-url.com'>The link</a>

-->

the point of the exercise is that default settings for the most
popular MU

[ more ]  [ reply ]
[PHP] include() bypassing filter with php://input 2004-05-27
Himeur Nourredine (lostnoobs security-challenge com) (1 replies)


Informations :

°°°°°°°°°°°°°°

Website : http://www.php.net

Version : PHP 3.0.13 =>

Problem : Inlude() bypassing filter

Proof of concept:

°°°°°°°° Exploit °°°°°°°°°

<------------ cut here ---------------->

<form action="" methode="post" >

target server : <input type="text" name="serv

[ more ]  [ reply ]
Re: [PHP] include() bypassing filter with php://input 2004-05-28
Keary Suska (hierophant pcisys net) (1 replies)
Re: [PHP] include() bypassing filter with php://input 2004-05-28
clez (bt_sf_com_20040528 clez net) (2 replies)
Re: [PHP] include() bypassing filter with php://input 2004-05-28
bugtraq subscriber (bugtraq theorb net)
Re: [PHP] include() bypassing filter with php://input 2004-05-28
Ali Campbell (bugtraq alicampbell org uk)
(Page 1500 of 1748)  < Prev  1495 1496 1497 1498 1499 1500 1501 1502 1503 1504 1505  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus