BugTraq Mode:
(Page 1505 of 1748)  < Prev  1500 1501 1502 1503 1504 1505 1506 1507 1508 1509 1510  Next >
RE: Microsoft Internet Explorer ImageMap URL Spoof Vulnerability 2004-05-17
Drew Copley (dcopley eeye com)
This bug is identical to malware's, which he posted five days
ago.

http://securityfocus.com/archive/1/362800/2004-05-07/2004-05-13/0

They both utilize the map object to the same end.

This "finding" even uses the same name for the same gif as Malware's
did.

It does appear to have obfuscated the

[ more ]  [ reply ]
oscommerce 2.2 file_manager.php file browsing 2004-05-17
Rene (l0om excluded org)


l0om - l0om[at]excluded.org - www.excluded.org

greets,

while i was "warsearching" with google i suddenly

have been on the admin interfaces of many oscommerce

sites. i made a:

allinurl:admin/file_manager.php

for nomal you can only view your oscommerce

directorys, but if you type

[ more ]  [ reply ]
RE: Still Vulnerable in MSIE 2004-05-17
Drew Copley (dcopley eeye com)


> -----Original Message-----
> From: Thor Larholm [mailto:thor (at) pivx (dot) com [email concealed]]
> Sent: Friday, May 14, 2004 3:45 PM
> To: Greg Kujawa; bugtraq (at) securityfocus (dot) com [email concealed]
> Subject: RE: Still Vulnerable in MSIE
>

<snip>

>
> which uses the Object Data vulnerability to change your startpage to
>
> http://def

[ more ]  [ reply ]
[waraxe-2004-SA#029 - Possible remote file inclusion in PhpNuke 6.x - 7.3] 2004-05-17
Janek Vind (come2waraxe yahoo com)


{=======================================================================
=========}

{ [waraxe-2004-SA#029] }

{=======================================================================
=========}

{

[ more ]  [ reply ]
Microsoft Internet Explorer ImageMap URL Spoof Vulnerability 2004-05-17
Kurczaba Associates advisories (advisories kurczaba com)
Microsoft Internet Explorer ImageMap URL Spoof Vulnerability

http://www.kurczaba.com/securityadvisories/0405132.htm
-------------------------------------------------------------

Vulnerability ID Number:
0405132

Overview:
A vulnerability has been found in Microsoft Internet Explorer. A
specially

[ more ]  [ reply ]
Safari remote arbitrary code execution 2004-05-17
kang (kang insecure ws)
Adv: safari_0x04

Release Date: 10/05/04
Affected Products: Safari =< 1.2
Fixed in: Not fixed.
Impact: Remote code execution.
Severity: High.
Vendor: Notified (23/02/04)
Author: fundisom.com

Apple uses a special function to execute scripts and applications from
his Help system. Unfortunatly, this

[ more ]  [ reply ]
KDE Security Advisory: URI Handler Vulnerabilities 2004-05-17
Waldo Bastian (bastian kde org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

KDE Security Advisory: URI Handler Vulnerabilities
Original Release Date: 2004-05-17
URL: http://www.kde.org/info/security/advisory-20040517-1.txt

0. References

http://www.idefense.com/application/poi/display?id=104
http://cve.mitre.org/cgi-b

[ more ]  [ reply ]
[slackware-security] mc (SSA:2004-136-01) 2004-05-17
Slackware Security Team (security slackware com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security] mc (SSA:2004-136-01)

New mc packages are available for Slackware 9.0, 9.1, and -current to
fix security issues that These could lead to a denial of service or the
execution of arbitrary code as the user running mc.

Sites that us

[ more ]  [ reply ]
Multiple TTT-C XSS vulnerabilities 2004-05-17
Kaloyan Georgiev (spam icefire org)


--------------------------------------------------------

Subject: Multiple TTT-C (Turbo Traffic Trader C) XSS vulnerabilityes.

Author: Kaloyan Olegov Georgiev (ICEFIRE)

Package name: Turbo Traffic Trader C (TTT-C or TTT3)

Sumary: Multiple XSS issues

Date: 2004-05-16

Affected versions: Latest

[ more ]  [ reply ]
WebCT: Cross Site Scripting Vulnerability 2004-05-17
spiffomatic 64 (spiffomatic64 hotmail com)
Vendor : WEBCT
URL : http://webct.com/
Version : WebCT Campus Edition
Risk : Cross site scripting

Description: WebCT is the world's leading provider of e-learning systems for
educational institutions.

WebCT's vision is to deliver innovative e-learning solutions to help
institutions improve educ

[ more ]  [ reply ]
NetChat HTTP Server Stack Overflow 2004-05-17
dbd hushmail com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

NetChat HTTP Server Stack Overflow

RELEASE DATE: May 16, 2004

DATE REPORTED: May 12, 2004

RISK: Medium

IMPACT: Attackers may be able to execute
arbitrary code with the privileges
of the user running the applicaton.

VERSIONS: <= 7.3

OVERVIEW:

[ more ]  [ reply ]
Wget race condition vulnerability 2004-05-16
Hugo Vázquez Caramés (overclocking_a_la_abuela hotmail com)


Tested software: Wget 1.9, Wget 1.9.1

Wget checks for the presence of a file with the same name of the one invoqued at the command line, if the file exists, then it saves the downloaded file with a different name. The problem is that Wget does not lock the file, and directly writes to it. So th

[ more ]  [ reply ]
RE: Remote Buffer Overflow in MailEnable HTTPMail 2004-05-16
MailEnable Sales (info mailenable com)
Hi,

Thanks for the email. This error was not an overflow issue but a bug in the
service (i.e. the error would cause the service to stop, but could the
exploiter could not exploit this further or run code on the server).

A fix for the bug can be found at:

http://www.mailenable.com/hotfix

Thanks
P

[ more ]  [ reply ]
CiSCO IOS 12.* source code stolen 2004-05-15
Alexander Antipo (alexander Antipov info)
More information (in Russian, of course) and some little stolen code can be
found here:

http://www.securitylab.ru/45221.html

[ more ]  [ reply ]
more simple and flexible WinBlox(GET CONTROL OF WINNT SYSTEM) 2004-05-14
Liu Die Yu (liudieyuinchina yahoo com cn)
SUBJECT : more simple and flexible WinBlox(GET CONTROL OF WINNT SYSTEM)
TO : bugtraq and dm (at) securityfocus (dot) com [email concealed]
FROM : Liu Die Yu

tell me why the following message didn't get thru and there is no notification about rejection.

***** ***** ***** ***** *****

expected readers
================

[ more ]  [ reply ]
lha buffer overflow(s) again 2004-05-15
lw wszia edu pl


i posted it yesterday to bugs (at) redhat (dot) com [email concealed] but mailbox is disabled for that recipient :-/

Date: Sat, 15 May 2004 00:24:09 +0200 (CEST)

From: Lukasz Wojtow <gnz (at) student.wszia.edu (dot) pl [email concealed]>

To: bugs (at) redhat (dot) com [email concealed]

Subject: LHA buffer overflow (not the last one already fixed)

it seems that lha is quite

[ more ]  [ reply ]
Denial of Service Vulnerability in IEEE 802.11 Wireless Devices 2004-05-15
albatross tim it (1 replies)
As requeste I repost it as attachment with the AUSCert PGP Pubblic Key.

[ more ]  [ reply ]
Re: Denial of Service Vulnerability in IEEE 802.11 Wireless Devices 2004-05-15
Casper Dik (casper holland sun com) (1 replies)
Re[2]: Denial of Service Vulnerability in IEEE 802.11 Wireless Devices 2004-05-16
Jason Ostrom (jpo pobox com) (1 replies)
Re: Denial of Service Vulnerability in IEEE 802.11 Wireless Devices 2004-05-17
Niels Bakker (niels-bugtraq bakker net)
[ GLSA 200405-06 ] libpng denial of service vulnerability 2004-05-14
Thierry Carrez (koon gentoo org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200405-06
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

[ more ]  [ reply ]
RE: Still Vulnerable in MSIE 2004-05-14
Thor Larholm (thor pivx com)
Nothing new here, it's just one of the remaining IE vulnerabilities that
are not yet patched. If I dare allow a small product pitch, the publicly
available version of Qwik-Fix ( http://qwik-fix.net ) has protected
against threats such as this for more than half a year now, without
requiring any sign

[ more ]  [ reply ]
[ GLSA 200405-07 ] Exim verify=header_syntax buffer overflow 2004-05-14
Thierry Carrez (koon gentoo org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200405-07
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

[ more ]  [ reply ]
(Page 1505 of 1748)  < Prev  1500 1501 1502 1503 1504 1505 1506 1507 1508 1509 1510  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus