BugTraq Mode:
(Page 1515 of 1748)  < Prev  1510 1511 1512 1513 1514 1515 1516 1517 1518 1519 1520  Next >
NetBSD Security Advisory 2004-005: Denial of service vulnerabilities in OpenSSL 2004-04-21
NetBSD Security-Officer (security-officer netbsd org)

-----BEGIN PGP SIGNED MESSAGE-----

NetBSD Security Advisory 2004-005
=================================

Topic: Denial of service vulnerabilities in OpenSSL

Version: NetBSD-current: source prior to March 22, 2004
NetBSD 2.0: branch unaffected, release will include the fix
NetBSD 1.6.2:

[ more ]  [ reply ]
EEYE: Yahoo! Mail Account Filter Overflow Hijack 2004-04-21
Drew Copley (dcopley eeye com)
"Yahoo! Mail" Account Filter Overflow Hijack

Release Date:
April 19, 2004

Date Reported:
March 10, 2004

Severity:
High

Vendor:
Yahoo!

Description:
"Yahoo! Mail" is one of the Internet's most popular
web based email solutions. They provide free email and
large capacity storage, as well as subs

[ more ]  [ reply ]
NetBSD Security Advisory 2004-006: TCP protocol and implementation vulnerability 2004-04-21
NetBSD Security-Officer (security-officer netbsd org)

-----BEGIN PGP SIGNED MESSAGE-----

NetBSD Security Advisory 2004-006
=================================

Topic: TCP protocol and implementation vulnerability

Version: NetBSD-current: source prior to April 22, 2004
NetBSD 2.0: branch affected, release will include the fix
NetBSD 1.6.2:

[ more ]  [ reply ]
[waraxe-2004-SA#022 - Multiple vulnerabilities in PostNuke 0.726 Phoenix - part 2] 2004-04-21
Janek Vind (come2waraxe yahoo com)


{=======================================================================
=========}

{ [waraxe-2004-SA#022] }

{=======================================================================
=========}

{

[ more ]  [ reply ]
[waraxe-2004-SA#021 - Multiple vulnerabilities in phprofession 2.5 module for PostNuke] 2004-04-21
Janek Vind (come2waraxe yahoo com)


{=======================================================================
=========}

{ [waraxe-2004-SA#021] }

{=======================================================================
=========}

{

[ more ]  [ reply ]
Advanced Guestbook 2.2 -- SQL Injection Exploit 2004-04-21
JQ (idiosyncrasie xs4all nl)


The widely-used Advanced Guestbook 2.2 webapplication (PHP, MySQL) appears vulnerable to SQL Injection granting the attacker administrator access. The attack is very simple and consists of inputting the following password string leaving the username entry blank:

') OR ('a' = 'a

Regards,

J

[ more ]  [ reply ]
Re: Idea of CAW (Creation of Attack Wood) 2004-04-21
Jan Minar (jjminar fastmail fm)
On Tue, Apr 20, 2004 at 05:58:17PM +0000, Magosányi Árpád wrote:
> -Your definition of the goal is your definition. I might have
> a goal which is very similar to yours, but have some different
> aspects.

The goals should be categorized, too, as the departing points are.
Preferably, these goals sho

[ more ]  [ reply ]
[SECURITY] [DSA 493-1] New xchat packages fix arbitrary code execution 2004-04-21
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 493-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
April 21st, 2004

[ more ]  [ reply ]
Re: ZA Security Hole 2004-04-21
Patrick Brauch (pab heisec de)
Hello,

I couldn't reproduce the errors, neither with braces () nor with unicode
characters -- all files where renamed (quarantined) even if they had some
problems with the correct display of the filename.

I tested this with a current Zone Alarm Pro (downloaded today, April
21st) and a Windows

[ more ]  [ reply ]
[RHSA-2004:166-01] Updated kernel packages resolve security vulnerabilities 2004-04-21
bugzilla redhat com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ---------------------------------------------------------------------
Red Hat Security Advisory

Synopsis: Updated kernel packages resolve security vulnerabilities
Advisory ID: RHSA-2004:166-01
Issue date: 2004

[ more ]  [ reply ]
IETF Draft on Transmission Control Protocol security considerations 2004-04-21
Thor Larholm (thor pivx com)
From the Abstract:

TCP (RFC793 [1]) is widely deployed and one of the most often used
reliable end to end protocols for data communication. Yet when it was
defined over 20 years ago the internet, as we know it, was a
different place lacking many of the threats that are now common.
Re

[ more ]  [ reply ]
[PNSA 2004-2] PostNuke Security Advisory PNSA 2004-2 2004-04-20
Valerio Santinelli (tanis altralogica it)


------------------------------------------------------------------------
---

PostNuke Security Advisory PNSA 2004-2 Mark West

http://www.postnuke.com/

April 17th, 2004

For contacts: http://news.postnuke.com/index.php?module=vpContact

-------------------------------

[ more ]  [ reply ]
Re: phpBB 2.0.8a and lower - IP spoofing vulnerability 2004-04-21
Xin LI (delphij frontfree net)
On Tue, Apr 20, 2004 at 04:15:48PM +0400, 3APA3A wrote:
> --Monday, April 19, 2004, 4:01:29 AM, you wrote to bugtraq (at) securityfocus (dot) com [email concealed]:
>
> RR> the users IP address in the common.php script. This issue is caused
> RR> by blind trust of the X-Forwarded-For HTTP header. A remote attacker
>
> This

[ more ]  [ reply ]
US-CERT Technical Cyber Security Alert TA04-111B -- Cisco IOS SNMP Message Handling Vulnerability 2004-04-21
CERT Advisory (cert-advisory cert org)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Cisco IOS SNMP Message Handling Vulnerability

Original release date: April 20, 2004
Last revised: --
Source: US-CERT

Systems Affected

* Cisco routers and switches running vulnerable versions of IOS.
Vulnerable IOS versions known

[ more ]  [ reply ]
Linux kernel setsockopt MCAST_MSFILTER integer overflow 2004-04-20
Wojciech Purczynski (cliph isec pl)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Synopsis: Linux kernel setsockopt MCAST_MSFILTER integer overflow
Product: Linux kernel
Version: 2.4.22 - 2.4.25, 2.6.1 - 2.6.3
Vendor: http://www.kernel.org/
URL: http://isec.pl/vulnerabilities/isec-0015-msfilter.txt
Author: Paul Star

[ more ]  [ reply ]
Re: NcFTP - password leaking 2004-04-20
Alex Behar (alex eclipse org il)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On Tuesday 20 April 2004 02:46, Konstantin Gavrilenko wrote:

> ncftp client does not hash the password under certain conditions. And
> such information is made available to other users through `ps aux`

> Risk Factor: High

Wget (1.8.2 and earlier) and

[ more ]  [ reply ]
Cisco Security Advisory: TCP Vulnerabilities in Multiple IOS Based Cisco Products 2004-04-20
Cisco Systems Product Security Incident Response Team (psirt cisco com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Cisco Security Advisory: TCP Vulnerabilities in Multiple IOS-Based Cisco
Products

Revision 1.0

For Public Release 2004 April 20 21:00 UTC (GMT)

- ------------------------------------------------------------------------
-
Summary
=======
A vulnerabilit

[ more ]  [ reply ]
Cisco Security Advisory: Vulnerabilities in SNMP Message Processing 2004-04-20
Cisco Systems Product Security Incident Response Team (psirt cisco com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Cisco Security Advisory: Vulnerabilities in SNMP Message Processing

Revision 1.0 INTERIM

For Public Release 2004 April 20 UTC 2100

- -----------------------------------------------------------------------

Contents
========

Summary
Affected

[ more ]  [ reply ]
WinSCP Denial of Service 2004-04-15
Luca Ercoli (luca e seeweb com)


Package: WinSCP

Auth: http://winscp.sourceforge.net

Version(s): 3.5.6 (maybe also prior versions are vulnerable)

Vulnerability: Denial of Service

What?s WinSCP:

?WinSCP is an open source SFTP (SSH File Transfer Protocol) and

SCP (Secure CoPy) client for Windows us

[ more ]  [ reply ]
Cisco Security Advisory: TCP Vulnerabilities in Multiple Non-IOS-Based Cisco Products 2004-04-20
Cisco Systems Product Security Incident Response Team (psirt cisco com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Cisco Security Advisory: TCP Vulnerabilities in Multiple Non-IOS Cisco
Products

Revision 1.0

For Public Release 2004 April 20 21:00 UTC (GMT)

- ------------------------------------------------------------------------
-

Summary
=======
A vulnerability

[ more ]  [ reply ]
Re: After Ms patches last Wed ... 2004-04-20
Greg Kujawa (greg kujawa diamondcellar com)
In-Reply-To: <2DF52978DE0D854F9435C7AA7DD51F9801F4A12D (at) atlmaiexcp01.iss (dot) loca [email concealed]l>

Don't know if this is duplicate info from another message, but there are two different issues with the KB835732 update. Specifically on Windows 2000 machines.

The first issue involves cached data in RAM. If a machine

[ more ]  [ reply ]
[cliph (at) isec (dot) pl [email concealed]: Linux kernel setsockopt MCAST_MSFILTER integer overflow] 2004-04-20
David Ahmad (da securityfocus com)
----- Forwarded message from Wojciech Purczynski <cliph (at) isec (dot) pl [email concealed]> -----

From: Wojciech Purczynski <cliph (at) isec (dot) pl [email concealed]>
Subject: Linux kernel setsockopt MCAST_MSFILTER integer overflow
To: bugtraq (at) securityfocus (dot) com [email concealed], <full-disclosure (at) lists.netsys (dot) com [email concealed]>,
<vulnwatch (at) vulnwatch (dot) org [email concealed]>
Cc: vendor-sec (at) lst (dot) de [email concealed]
Repl

[ more ]  [ reply ]
Re: Idea of CAW (Creation of Attack Wood) 2004-04-20
Magosányi Árpád (mag bunuel tii matav hu)
A levelezõm azt hiszi, hogy kincses zoli a következõeket írta:
> there is the attack tree concept of Bruce Schneier:
> http://www.schneier.com/paper-attacktrees-ddj-ft.html
> http://www.counterpane.com/attacktrees.pdf

[]
> i am working on attack tree of smartcards, and i have the
> idea of creating

[ more ]  [ reply ]
Format String in Cherokee 2004-04-20
CoKi (coki nosystem com ar)


-------------------------------------------------

No System Group - Advisory #3 - 17/04/04

-------------------------------------------------

Program: Cherokee Web Server

Homepage: http://www.0x50.org

Vulnerable Versions: Cherokee 0.4.16 and prior

Risk: Low / Medium

Impact: Local Format St

[ more ]  [ reply ]
US-CERT Technical Cyber Security Alert TA04-111A -- Vulnerabilities in TCP 2004-04-20
CERT Advisory (cert-advisory cert org)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Technical Cyber Security Alert TA04-111A archive

Vulnerabilities in TCP

Original release date: April 20, 2004
Last revised: --
Source: US-CERT

Systems Affected

* Systems that rely on persistent TCP connections, for example

[ more ]  [ reply ]
Re: ZA Security Hole 2004-04-20
David Wilson (David Wilson isode com)
On Wed, 2004-04-14 at 21:44, Damjan Kreft wrote:
> Hello!
>
> I think, I discover some kind of security hole in ZoneAlaram - any version.
> The problem is hidding in E-mail Protection. Because I'm form Slovenia (not
> Slovakia), our alphabet does have some letters with roof (c - è, s - ¹, z -
> ¾).

[ more ]  [ reply ]
Re: phpBB 2.0.8a and lower - IP spoofing vulnerability 2004-04-20
3APA3A (3APA3A SECURITY NNOV RU)
Dear Ready Response,

--Monday, April 19, 2004, 4:01:29 AM, you wrote to bugtraq (at) securityfocus (dot) com [email concealed]:

RR> the users IP address in the common.php script. This issue is caused
RR> by blind trust of the X-Forwarded-For HTTP header. A remote attacker

This issue is very common for different BBs (for e

[ more ]  [ reply ]
Re: BitDefender Scan Online(ActiveX) - Remote File Download &Execute & Private Information Disclosure 2004-04-20
Sami POTIRCA (spotirca bitdefender com)
On Mon, 2004-04-19 at 10:55, Rafel Ivgi, The-Insider wrote:
> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>
> Application: BitDefender Scan Online(ActiveX)
> Vendors: http://www.bitdefender.com/scan/Msie/index.php
> Platforms: Windows
> Bug: R

[ more ]  [ reply ]
NISCC Vulnerability Advisory 236929: Vulnerability Issues in TCP 2004-04-20
David Ahmad (da securityfocus com)
http://www.uniras.gov.uk/vuls/2004/236929/index.htm

--

NISCC Vulnerability Advisory 236929

Vulnerability Issues in TCP

Version Information

Advisory Reference 236929
Release Date 20 April 2004
Last Revision 20 April 2004
Version Number 1.0

What is Affected?

The vulnerability described

[ more ]  [ reply ]
Re: NcFTP - password leaking 2004-04-20
Frank v Waveren (fvw var cx)
On Tue, Apr 20, 2004 at 12:46:10AM +0100, Konstantin Gavrilenko wrote:
> ncftp client does not hash the password under certain conditions. And
> such information is made available to other users through `ps aux`
[snip]
> root 798 0.0 0.1 2020 1064 pts/3 S 15:04 0:00 ncftp
> ftp://t

[ more ]  [ reply ]
(Page 1515 of 1748)  < Prev  1510 1511 1512 1513 1514 1515 1516 1517 1518 1519 1520  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus