BugTraq Mode:
(Page 1510 of 1748)  < Prev  1505 1506 1507 1508 1509 1510 1511 1512 1513 1514 1515  Next >
Multible Vulnerabilites in Aldos Webserver 2004-05-03
oliver greyhat de

Multible Vulnerabilites in Aldos Webserver
==========================================

Aldo's Web Server is a super-compact Web service daemon that not only
let you share easily your files, it also acts as a Advertisment or
site blocker.

Version:
========

1.5 on Windows Platform

Vulnerabilities

[ more ]  [ reply ]
Serv-U LIST -l Parameter Buffer Overflow 2004-05-03
Aviram Jenik (aviram beyondsecurity com)

Serv-U LIST -l Parameter Buffer Overflow
------------------------------------------------------------------------

Article reference:
http://www.securiteam.com/windowsntfocus/5ZP0G2KCKA.html

SUMMARY

<http://www.serv-u.com/> Serv-U is a "powerful, easy-to-use, award-winning FTP
server" creat

[ more ]  [ reply ]
X-Chat[v1.8.0-v2.0.8]: socks-5 remote buffer overflow exploit. 2004-05-03
Vade 79 (v9 fakehalo deadpig org)


X-Chat socks-5 exploit/explaination(in header).

Original exploit url:

http://fakehalo.deadpig.org/xxchat-socks5.c

------------------------ exploit: example usage ------------------------

# ./xxchat-socks5 2600

[*] X-Chat[v1.8.0-v2.0.8]: socks-5 remote buffer overflow exploit.

[*] by

[ more ]  [ reply ]
Re: Will the Sasser worm become the next Blaster? 2004-05-02
Damian Menscher (menscher uiuc edu)
Gadi Evron <ge linuxbox org> wrote:
> if you simply port scan for Sasser you get many false positives, as
> that port (5554) is also used by Oracle. If you get "200 OK" as a
> reply though in the first packet, it's Sasser.

Another false positive is IRIX boxes which listen to port 5554/tcp for
esp-h

[ more ]  [ reply ]
[waraxe-2004-SA#026 - Multiple vulnerabilities in Coppermine Photo Gallery for PhpNuke] 2004-05-02
Janek Vind (come2waraxe yahoo com)


{=======================================================================
=========}

{ [waraxe-2004-SA#026] }

{=======================================================================
=========}

{

[ more ]  [ reply ]
Vulnerability in YaBB forum (Perl version without SQL) 2004-05-02
Dmitry Shurupov (root nixp ru)


There's a vulnerability in non-SQL version of YaBB forum (I've checked it with YaBB 1 Gold - SP 1.2 written in Perl -- it's not new, but is in use even nowadays).

You can input almost anything into .txt file from boards directory. The "subject" form field isn't checked for "\n" symbols, so crea

[ more ]  [ reply ]
Crystal Reports Vulnerabilities 2004-05-02
Imperva Application Defense Center (adc imperva com)
Dear List,

Imperva(tm)'s Application Defense Center has discovered several
vulnerabilities in BusinessObject's Crystal Reports' Web Interface.
These vulnerabilities allow a potential hacker to retrieve and delete
any file from the file system of the server on which it runs, as well as
causing a com

[ more ]  [ reply ]
W32/Sasser a and b SNORT Sigs 2004-05-02
Martin Overton (martin arachnophiliac com)
Hi,

To save my SNORT sigs board going into meltdown, I sm posting my Sasser
snort sigs here for all interested parties.

alert tcp $EXTERNAL_NET any -> $HOME_NET any (msg:"W32/Sasser.worm.a
[NAI])"; content:"|BC 3B 74 0B 50 8B 3D E8 46 A7 3D 09 85 B8 F8 CD 76 40
DE 7C 5B 5C D7 2A A8 E8 58 75 62

[ more ]  [ reply ]
EEYE: Apple QuickTime (QuickTime.qts) Heap Overflow 2004-05-02
Marc Maiffret (mmaiffret eeye com)
Apple QuickTime (QuickTime.qts) Heap Overflow

Release Date:
May 02, 2004

Date Reported:
February 18, 2004

Severity:
High (Code Execution)

Vendor:
Apple

Systems Affected:
Apple QuickTime 6.5
Apple iTunes 4.2.0.72

Description:
The Apple QuickTime media player is used for playing, interacting wit

[ more ]  [ reply ]
PaX Linux Kernel 2.6 Patches DoS Advisory 2004-05-02
chris (chris cr-secure net)


http://www.cr-secure.net

Found by: borg (ChrisR-)

A small bug in PaX was found.

What is PaX?

-----------------------

PaX is a collection of intrusion prevention patches for the Linux Kernel

2.2, 2.4, and 2.6.

This advisory only affects the PaX patches for the 2.6 linux kernel.

PaX i

[ more ]  [ reply ]
[SECURITY] [DSA 500-1] New flim packages fix insecure temporary file creation 2004-05-02
Matt Zimmerman (mdz debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 500-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Matt Zimmerman
May 1st, 2004

[ more ]  [ reply ]
[SECURITY] [DSA 499-1] New rsync packages fix directory traversal bug 2004-05-02
Matt Zimmerman (mdz debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 499-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Matt Zimmerman
May 1st, 2004

[ more ]  [ reply ]
Will the Sasser worm become the next Blaster? 2004-05-02
kers0r (root asylum-nz com) (1 replies)


The LSASS Sasser worm is spreading through the documented MS04-011 (LSASS) vulnerability. Presently this worm has not gotten to plague proportions but statistically it may well.

Apart from the Sasser worm problem, there also remains the problem of human hackers exploiting this hole. Warez ftp

[ more ]  [ reply ]
Re: Will the Sasser worm become the next Blaster? 2004-05-01
Gadi Evron (ge linuxbox org)
New LSASS-based worm finally here (Sasser) 2004-05-01
Ben Ryan (ben bssc edu au) (1 replies)
As expected, LSASS exploit-based worm seems to have arrived. Fasten your
seatbelts, those unpatched please use the spew bags provided :)
I hope PSS resolves the issues discussed in KB835732.

Sasser Worm: http://isc.sans.org/diary.php?date=2004-04-30

"ISC is aware of the LSASS Sasser worm. This w

[ more ]  [ reply ]
Re: New LSASS-based worm finally here (Sasser) 2004-05-03
Javier Fernandez-Sanguino (jfernandez germinus com)
LNSA-#2004-0014: X-Chat vulnerability in Socks-5 proxy 2004-05-01
Vincenzo Ciaglia (ciaglia netwosix org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

************************************************************************
************
Netwosix Linux Security Advisory #2004-0014 <http://www.netwosix.org>
- ------------------------------------------------------------------------
-----------

Package nam

[ more ]  [ reply ]
Props 0.6.1 XSS and Remote File Viewing Vulnerability 2004-05-01
Manuel Lopez (mantra gulo org)
#Title: Props 0.6.1 XSS and Remote File Viewing Vulnerability.

#Software: Props 0.6.1
#Vendor: http://props.sourceforge.net/
#Platform: PHP4 and MySQL

#Description:

PROPS is an open, extensible Internet publishing system designed
specifically for periodicals

such as newspapers and magazine

[ more ]  [ reply ]
RE: IE Certificate Stealing (Phising) bug 2004-05-01
Michael Wojcik (Michael Wojcik microfocus com)
> From: E.Kellinis [mailto:me (at) cipher.org (dot) uk [email concealed]]
> Sent: Friday, April 30, 2004 11:09 AM
>
> If inside the index page links and forms use virtual
> pointers to directories or files
> (e.g. images/ or form/submit.php) we can use the trust
> of the visitor and steal information.

Those aren't called

[ more ]  [ reply ]
LNSA-#2004-0013: Multiple Vulnerabilities in Samba 2004-05-01
Vincenzo Ciaglia (ciaglia netwosix org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

************************************************************************
************
Netwosix Linux Security Advisory #2004-0013 <http://www.netwosix.org>
- ------------------------------------------------------------------------
-----------

Package nam

[ more ]  [ reply ]
[product-security (at) apple (dot) com [email concealed]: APPLE-SA-2004-04-30 QuickTime 6.5.1] 2004-05-01
David Ahmad (da securityfocus com)
----- Forwarded message from Apple Product Security <product-security (at) apple (dot) com [email concealed]> -----

From: Apple Product Security <product-security (at) apple (dot) com [email concealed]>
Subject: APPLE-SA-2004-04-30 QuickTime 6.5.1
To: <security-announce (at) lists.apple (dot) com [email concealed]>
Date: Fri, 30 Apr 2004 16:07:57 -0700
User-Agent: Microsoft-Outlook-E

[ more ]  [ reply ]
RE: Multi stage attacks on networks? 2004-04-30
Shaun Bertrand (sbertrand cbihome com)
Dude this happens all the time. It's the essense of a hack.

Case 1.

1. Webserver on the DMZ is running an older version of IIS that is
vulnerable to *insert your buffer overflow here* Attacker inserts trojan
and creates some variable that will either force the server to reboot
or make the admin

[ more ]  [ reply ]
(Page 1510 of 1748)  < Prev  1505 1506 1507 1508 1509 1510 1511 1512 1513 1514 1515  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus