BugTraq Mode:
(Page 1521 of 1748)  < Prev  1516 1517 1518 1519 1520 1521 1522 1523 1524 1525 1526  Next >
[OpenPKG-SA-2004.012] OpenPKG Security Advisory (fetchmail) 2004-04-08
OpenPKG (openpkg openpkg org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________

OpenPKG Security Advisory The OpenPKG Project
http://www.openpkg.org/security.html http://www.openpkg.org
openpkg-security (at) openpkg (dot) org [email concealed]

[ more ]  [ reply ]
LNSA-#2004-0009: GNU Automake symbolic link vulnerability 2004-04-08
Vincenzo Ciaglia (ciaglia netwosix org)
************************************************************************
************
Netwosix Linux Security Advisory #2004-0009 <http://www.netwosix.org>
------------------------------------------------------------------------
------------

Package name: automake
Summary: Automake s

[ more ]  [ reply ]
New Worm/Virus April 8th 2004-04-08
Polazzo Justin (Justin Polazzo facilities gatech edu)
Concerning the new worm type infection spreading around today (6:15am EST)

the file is called ndemon.exe (.99k) and it puts itself into c:\winnt and c:winnt\system32. Registry entries HKLM\Software|Microsoft|CurrentVersion\Run and HKLM\Software|Microsoft|CurrentVersion\RunServices (Think it creates

[ more ]  [ reply ]
Heap Overflow in Oracle 9iAS / 10g Application Server Web Cache 2004-04-08
Ioannis Migadakis (jmig mail gr)


InAccess Networks
www.inaccessnetworks.com

Security Advisory

Advisory Name: Heap Overflow in Oracle 9iAS / 10g Application Server
Web Cache
Release Date: 8 April 2004
Application: Oracle Web Cache - all

[ more ]  [ reply ]
[waraxe-2004-SA#014 - Cross-Site Scripting aka XSS in AzDGDatingLite] 2004-04-08
Janek Vind (come2waraxe yahoo com)


{=======================================================================
=========}

{ [waraxe-2004-SA#014] }

{=======================================================================
=========}

{

[ more ]  [ reply ]
SGI Advanced Linux Environment security update #17 2004-04-07
SGI Security Coordinator (agent99 sgi com)
-----BEGIN PGP SIGNED MESSAGE-----

________________________________________________________________________
____
SGI Security Advisory

Title : SGI Advanced Linux Environment security update #17
Number : 20040402-01-U
Date : April 7, 2004
Reference : Re

[ more ]  [ reply ]
Cisco Security Advisory: Cisco IPSec VPN Services Module Malformed IKE Packet Vulnerability 2004-04-08
Cisco Systems Product Security Incident Response Team (psirt cisco com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Cisco Security Advisory: Cisco IPSec VPN Services Module Malformed IKE Packet
Vulnerability

Revision 1.0

For Public Release 2004 April 8 at 1600 UTC (GMT)

------------------------------------------------------

[ more ]  [ reply ]
[ GLSA 200404-08 ] GNU Automake symbolic link vulnerability 2004-04-08
Kurt Lieber (klieber gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200404-08
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org
- - - - - -

[ more ]  [ reply ]
Phrack #62 Call for Papers 2004-04-08
Richard Miller (rm segfault net)
[-]=====================================================================
[-]

: P H R A C K - 6 2 :

CALL FOR PAPERS * CALL FOR PAPERS * CALL FOR PAPERS * CALL FOR PAPERS

---------------------------------
Deadline: 01 July 2004 at 11:

[ more ]  [ reply ]
[waraxe-2004-SA#015 - Multiple vulnerabilities in NukeCalendar v1.1.a] 2004-04-08
Janek Vind (come2waraxe yahoo com)


{=======================================================================
=========}

{ [waraxe-2004-SA#015] }

{=======================================================================
=========}

{

[ more ]  [ reply ]
Re: Symantec Virus Detection(Free ActiveX) - Remote Buffer Overflow, Apr 7 2004 2:22AM 2004-04-08
Sym Security (secure symantec com)
In Response to:

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Application: Symantec Virus Detection(Free ActiveX)
Vendors:
http://security.symantec.com/sscv6/vc_scan.asp?langid=ie&venid=sym&plfid
=23&pkj=WJDORSJRFSKLUKUMXCC&vc_scanstate=2

Platforms: Windows
Bu

[ more ]  [ reply ]
McAfee Freescan ActiveX Information Disclosure [Additional Details & PoC] 2004-04-07
S G Masood (sgmasood yahoo com)


__________________________________
Do you Yahoo!?
Yahoo! Small Business $15K Web Design Giveaway
http://promotions.yahoo.com/design_giveaway/

[ more ]  [ reply ]
Re: GNU Sharutils buffer overflow vulnerability 2004-04-07
Shaun Colley (shaunige yahoo co uk)
Several guys kindly let me know about my fook up
regarding the fix I posted for shar. Although it
prevented the overflow, in some situations, it might
cause another bug in shar (although I've never
witnessed it despite testing the patched shar).

Anyway, I've revised the patch with the kind
sugge

[ more ]  [ reply ]
Kerio Personal Firewall 4.0.13 - Remote DoS (Crash) 2004-04-07
E.Kellinis (me cipher org uk)
Formal Report
################################################
Application: Kerio Personal Firewall
Vendors: http://www.kerio.com
Version: 4.0.13
Platforms: Windows
Bug: GUI Crash(D.O.S)
Risk: Medium
Exploitation: Remote with browser
Date:

[ more ]  [ reply ]
[OpenPKG-SA-2004.011] OpenPKG Security Advisory (sharutils) 2004-04-07
OpenPKG (openpkg openpkg org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________

OpenPKG Security Advisory The OpenPKG Project
http://www.openpkg.org/security.html http://www.openpkg.org
openpkg-security (at) openpkg (dot) org [email concealed]

[ more ]  [ reply ]
RE: Kerio Personal Firewall 4 and IE 6 "Bug" 2004-04-07
Noah Dunker (ndunker jccc net)
Indeed, the following code crashes IE6 6.0.2800.1106 128bit SP1 when you
load it locally. Pulled from a webserver, however, it does not. Tags
mangled intentionally

[HTML]
[BODY][IFRAME src="?"] [/IFRAME]
[/BODY][/HTML]

Locally, it brings up a recursive IFRAME that locks up IE, and it eventually

[ more ]  [ reply ]
RE: Kerio Personal Firewall 4 and IE 6 "Bug" 2004-04-07
Noah Dunker (ndunker jccc net) (1 replies)
Tested the IE iframe "bug" on Windows 2000 with the following IE Versions:

Standard install of IE off my Windows 2000 CD (installed on one machine
earlier this week, no updates):
5.00.3700.1000 128bit
SP4

After running Windows Update on another almost identical machine (last
update was on Monday)

[ more ]  [ reply ]
Re: Kerio Personal Firewall 4 and IE 6 "Bug" 2004-04-07
E.Kellinis (me cipher org uk)
[ GLSA 200404-04 ] Multiple vulnerabilities in sysstat 2004-04-07
Kurt Lieber (klieber gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200404-04
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org
- - - - - -

[ more ]  [ reply ]
Internet Explorer 6 - Crash 2004-04-07
E.Kellinis (me cipher org uk)
Formal Report
#########################################
Application: Internet Explorer
Vendors: http://www.microsoft.com
Version: 6.0.2800
Platforms: Windows
Bug: Crash(D.O.S)
Risk: Low
Exploitation: Local with browser
Date:

[ more ]  [ reply ]
Metasploit Framework 2.0 Released! 2004-04-07
H D Moore (sflist digitaloffense net)
The Metasploit Framework is an advanced open-source platform for
developing, testing, and using exploit code. After nearly six months of
development, version 2.0 is being released to the public.

This release includes 18 exploits and 27 payloads; many of these exploits
are either the only ones pu

[ more ]  [ reply ]
Solaris vfs_getvfssw() local kernel exploit 2004-04-07
Sam (Sam 0x557 org)
full-disclosureHey, everyone.

i m comming :D, it's a lame local root exploit for Solaris.
exploit Solaris vfs_getvfssw() Loadable Kernel Module Path vulns, which found
by Dave Aitel, you can find on this link. :P
http://www.immunitysec.com/downloads/solaris_kernel_vfs.sxw.pdf

Cheers,

Sam Sam#0x

[ more ]  [ reply ]
[OpenPKG-SA-2004.010] OpenPKG Security Advisory (tcpdump) 2004-04-07
OpenPKG (openpkg openpkg org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________

OpenPKG Security Advisory The OpenPKG Project
http://www.openpkg.org/security.html http://www.openpkg.org
openpkg-security (at) openpkg (dot) org [email concealed]

[ more ]  [ reply ]
Symantec Virus Detection(Free ActiveX) - Remote Buffer Overflow 2004-04-07
Rafel Ivgi, The-Insider (theinsider 012 net il)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Application: Symantec Virus Detection(Free ActiveX)
Vendors:
http://security.symantec.com/sscv6/vc_scan.asp?langid=ie&venid=sym&plfid
=23&pkj=WJDORSJRFSKLUKUMXCC&vc_scanstate=2
Platforms: Windows
Bug:

[ more ]  [ reply ]
[ GLSA 200404-07 ] ClamAV RAR Archive Remote Denial Of Service Vulnerability 2004-04-07
Kurt Lieber (klieber gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200404-07
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org
- - - - - -

[ more ]  [ reply ]
Re: IPv4 fragmentation --> The Rose Attack 2004-04-07
Ventsislav Genchev (vigour atlantis bg)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

I've just made some tests following the described example at:
http://gandalf.home.digital.net/TestProc.txt

To use different src addresses in the attack i've used the following
example:

#!/usr/bin/perl

$src=$ARGV[1];

if($src=~ /^(\d+)\.(\d+)\.(\d+)\.

[ more ]  [ reply ]
Mcafee FreeScan - Remote Buffer Overflow and Private Information Disclosure 2004-04-07
Rafel Ivgi, The-Insider (theinsider 012 net il)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Application: Mcafee FreeScan(activex)
Vendors: http://us.mcafee.com/root/mfs/default.asp?cid=9914
Platforms: Windows
Bug: Buffer Overflow and Private Information Disclosure
Risk:

[ more ]  [ reply ]
Re: [waraxe-2004-SA#013 - Critical sql injection bug in PhpBB 2.0.8 and in older versions] 2004-04-07
T.J. Ferraro (tjtoocool phreaker net)
The combination of the original post with the couple of follow ups that
followed were quite effective. Putting the hash in the message instead
of subject worked to show the whole hash. And I can't recall if it was
discussed on this thread or not but creating the admin =
base64_encode($aid:$md5ha

[ more ]  [ reply ]
(Page 1521 of 1748)  < Prev  1516 1517 1518 1519 1520 1521 1522 1523 1524 1525 1526  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus