BugTraq Mode:
(Page 1525 of 1748)  < Prev  1520 1521 1522 1523 1524 1525 1526 1527 1528 1529 1530  Next >
RogerWilco: new funny bugs 2004-03-31
Luigi Auriemma (aluigi altervista org)

#######################################################################

Luigi Auriemma

Application: RogerWilco
http://rogerwilco.gamespy.com
Versions: - RogerWilco <= 1.4.1.6
- RogerWilco Base Station <= 0.30a
Platforms:

[ more ]  [ reply ]
NOT GOOD: Outlook Express 6 + Internet Explorer 6 2004-03-31
http-equiv (at) excite (dot) com [email concealed] (1 malware com)


Wednesday, March 31, 2004

This is somewhat disconcerting. Reference the recently disclosed
Internet Explorer 'bug' presently in the wild [original
discussion: http://www.securityfocus.com/archive/1/358813 with
additional input buried thereunder in subsequent threads]
allowing for complete rem

[ more ]  [ reply ]
Followup: vuln in WinBlox monitor for winnt 2004-03-30
Oliver Lavery (oliver lavery sympatico ca)
The good fellows that moderate this list pointed out to me that my
last post regarding Liu Die Yu's winblox utility was a little thin on
details and might get percieved as a bit of a pissing competition. That's
precisely what I was trying to avoid by being vague, so let's get this
clear=85

WinBlo

[ more ]  [ reply ]
RE: security enforcement - new monitor for winnt 2004-03-31
Liu Die Yu (liudieyuinchina yahoo com cn)
exploitable buffer overflow when attacker can supply arbitrary data to CreateFileW.

thanks for pointing it out.

i'll fix it and make winblox open-source later tonight(many other guys suggested me to do this
also).

you can surely find more when you have source code. please publish all of them - w

[ more ]  [ reply ]
Re: IE ms-its: and mk:@MSITStore: vulnerability 2004-03-31
roozbeh afrasiabi (roozbeh_afrasiabi yahoo com)
In-Reply-To: <BAY17-F16uCddQiqWcB0001d6bb (at) hotmail (dot) com [email concealed]>

>What, exactly, is new about this?

I did my best to explain this with different pocs and giving a lot of detail but it seems i failed to address this well.The fact that internet explorer can access chm files using the two p-handlers when hel

[ more ]  [ reply ]
Re: new internet explorer exploit (was new worm) 2004-03-31
roozbeh afrasiabi (roozbeh_afrasiabi yahoo com)


I have made little changes to the exploit jelmer coded,and now it

can run any program with parameters on victim's system (executable's path or MUICACHE name must be known)it can download other files to victim's system ,it is also possible to run files using their bond programs( if 1001001.x

[ more ]  [ reply ]
[ GLSA 200403-11 ] Squid ACL [url_regex] bypass vulnerability 2004-03-31
Kurt Lieber (klieber gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200403-11
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org
- - - - - -

[ more ]  [ reply ]
cdp buffer overflow vulnerability 2004-03-31
Shaun Colley (shaunige yahoo co uk)
~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*

Product: cdp - console cd player
Versions: All
Bug: Buffer overflow
Impact: Attackers can execute arbitrary code
Risk: Medium/High
Date: March 31, 2004
Author: Shaun Colley
Emai

[ more ]  [ reply ]
[RHSA-2004:137-01] Updated Ethereal packages fix security issues 2004-03-31
bugzilla redhat com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ---------------------------------------------------------------------
Red Hat Security Advisory

Synopsis: Updated Ethereal packages fix security issues
Advisory ID: RHSA-2004:137-01
Issue date: 2004-03-31
Upda

[ more ]  [ reply ]
[ GLSA 200403-13 ] Remote buffer overflow in MPlayer 2004-03-31
Kurt Lieber (klieber gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200403-13
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org
- - - - - -

[ more ]  [ reply ]
[ GLSA 200403-10 ] Fetchmail 6.2.5 fixes a remote DoS 2004-03-31
Kurt Lieber (klieber gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200403-10
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org
- - - - - -

[ more ]  [ reply ]
[ GLSA 200403-12 ] OpenLDAP DoS Vulnerability 2004-03-31
Joshua J. Berry (condordes gentoo org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200403-12
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

[ more ]  [ reply ]
[ GLSA 200403-14 ] Multiple Security Vulnerabilities in Monit 2004-03-31
Aida Escriva-Sammer (aescriva gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200403-14
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org
- - - - - -

[ more ]  [ reply ]
CactuSoft CactuShop v5.x shopping cart software multiple security vulnerabilities 2004-03-31
S-Quadra Security Research (research s-quadra com)
S-Quadra Advisory #2004-03-31

Topic: CactuSoft CactuShop v5.x shopping cart software multiple security
vulnerabilities
Severity: High
Vendor URL: http://www.cactushop.com
Advisory URL: http://www.s-quadra.com/advisories/Adv-20040331.txt
Release date: 31 Mar 2004

1. DESCRIPTION

CactuShop is

[ more ]  [ reply ]
MDKSA-2004:025 - Updated squid packages fix vulnerability 2004-03-31
Mandrake Linux Security Team (security linux-mandrake com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandrakelinux Security Update Advisory
_______________________________________________________________________

Package name: squid
Advisory ID:

[ more ]  [ reply ]
MDKSA-2004:024 - Updated ethereal packages fix multiple vulnerabilities 2004-03-31
Mandrake Linux Security Team (security linux-mandrake com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandrakelinux Security Update Advisory
_______________________________________________________________________

Package name: ethereal
Advisory ID:

[ more ]  [ reply ]
White Paper - Web Application Worms: Myth or Reality? 2004-03-30
Imperva Application Defense Center (adc imperva com) (1 replies)
Dear BugTraq List,

Imperva(tm)'s Application Defense Center (ADC) has released a new white
paper.

The new paper demonstrates the feasibility of launching worms that
attack custom Web application software automatically. These
methodologies leverage common Web search engine technologies to achieve
t

[ more ]  [ reply ]
Re: White Paper - Web Application Worms: Myth or Reality? 2004-03-30
Nicholas Weaver (nweaver CS berkeley edu)
phpkit suffers (reale stupid) XSS vuln. 2004-03-30
Yanosz (yanosz gmx net)
Software: phpkit
Version: 1.6.03 others are probably affected as well.
Status: Vendor has been notified weeks ago but refuses to answer or take any
actions.
phpkit[1] is a simple German cms / portal software written in php similar to
phpbb / phpnuke and is quite popular in Germany. All session inf

[ more ]  [ reply ]
NetSky.q Virus. Looking for more detailed information on how the DOS will be performed. 2004-03-30
Paul (paul edonkey2000 com) (1 replies)
Hi,

I work for one of the companies about to be hit with the dDOS attack 7-12 from the NetSky.Q virus.
http://securityresponse.symantec.com/avcenter/venc/data/w32.netsky.q@mm.
html

I am looking for more detailed information on exactly how the dDOS attack will be performed, ports used, request
typ

[ more ]  [ reply ]
Re: NetSky.q Virus. Looking for more detailed information on how the DOS will be performed. 2004-03-30
Joe Stewart (jstewart lurhq com) (1 replies)
IPv4 fragmentation --> The Rose Attack 2004-03-31
gandalf digital net
R7-0017: TCPDUMP ISAKMP payload handling denial-of-service vulnerabilities 2004-03-30
advisory rapid7 com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________
Rapid7, Inc. Security Advisory
Visit http://www.rapid7.com/ to download NeXpose,
the world's most advanced vulnerability scanner.
Linux and

[ more ]  [ reply ]
Linbit linbox Multiple Vulnerabilities 2004-03-30
Martin Eiszner (martin websec org)


============================================================
SEC-CONSULT Security Advisory - LINBIT LINBOX
============================================================

Vendor: LINBIT Information Technologies GmbH (http://www.linbit.com)
Product: LINBOX
Vendor status: vendor contacted (22.01.2004

[ more ]  [ reply ]
Problem with customized login pages for Oracle SSO 2004-03-30
advisories madison-gurkha com

Name: Problem with customized login pages for Oracle SSO
Id: MG-2004-01
Issued: 2004-03-30
Authors: Guido van Rooij (Madison Gurkha)
Arjan de Vet (Madison Gurkha)
Application: All known versions
Platforms: All supported platforms
Reference: http://www.madison-gurkha.com/advisories/MG-2004-01.t

[ more ]  [ reply ]
MPlayer Security Advisory #002 - HTTP parsing vulnerability 2004-03-30
Gabucino (gabucino-nospam mplayerhq hu)
MPlayer Security Advisory #002

Remotely exploitable vulnerability in HTTP parser

Severity:
HIGH (if playing HTTP streaming content)
LOW (if playing only normal files)

Description:
A remotely exploitable buffer overflow vulnerability was found in MPlayer.
A malicious host can craft a harmful HTTP

[ more ]  [ reply ]
Re: security enforcement - new monitor for winnt 2004-03-30
http-equiv (at) excite (dot) com [email concealed] (1 malware com)


<!--

afaik, i can stop ie 0day exploits by doing these things.

so, i made this:

http://umbrella.name/winblox/

of course, free.

-->

This is fantastic. A truly useful effort for the benefit of the
so-called "security community". And free. And from security
expert who actually finds new a

[ more ]  [ reply ]
Heap overflow in MPlayer 2004-03-30
blexim (blexim hush com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Remote heap overflow in http input module

Product: MPlayer (releases previous to 30/03/2004)
Impact: Malicious web servers may execute code
Bug class: Heap overflow
Vendor notified: Yes
Fix available: Yes

Details:
Whilst requesting a file from a webse

[ more ]  [ reply ]
(Page 1525 of 1748)  < Prev  1520 1521 1522 1523 1524 1525 1526 1527 1528 1529 1530  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus