|
Colapse all |
Post message
[SECURITY] [DSA 467-1] New ecartis packages fix several vulnerabilities 2004-03-24 Matt Zimmerman (mdz debian org) Immunity Advisory: Solaris local kernel root 2004-03-23 Dave Aitel (dave immunitysec com) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Immunity Research has released an Advisory from the Vulnerability Sharing Club into the public domain. This advisory can be found at http://www.immunitysec.com/downloads/solaris_kernel_vfs.sxw.pdf Technical Summary: There is a vulnerability in Solaris [ more ] [ reply ] R7-0018: OpenBSD isakmpd payload handling denial-of-service vulnerabilities 2004-03-23 advisory rapid7 com Immunity Advisory: dtlogin remote root 2004-03-23 Dave Aitel (dave immunitysec com) (1 replies) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Technical Summary: A double-free weakness in the XDMCP parser of dtlogin (CDE) results in remote code execution against popular server operating systems, such as Solaris. Linux is not vulnerable, to Immunity's knowledge. This attack is performed over UD [ more ] [ reply ] Advisory 03/2004: Multiple (13) Ethereal remote overflows 2004-03-23 Stefan Esser (s esser e-matters de) How to crash a harddisk - the Ipswitch WS_FTP Server way 2004-03-23 Hugh Mann (hughmann hotmail com) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~ Advisory Name: How to crash a harddisk - the Ipswitch WS_FTP Server way Impact : Denial of Service Discovered by: Hugh Mann hughmann (at) hotmail (dot) com [email concealed] Tested progs : Ipswitch WS_FTP Server 4.0.2.EVAL ~~~~~~~~~~~~~~~~~~~~~~~~ [ more ] [ reply ] Think of the buffers! Won't somebody think of the buffers?! 2004-03-23 Hugh Mann (hughmann hotmail com) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~ Advisory Name: Think of the buffers! Won't somebody think of the buffers?! Impact : Arbitrary code execution as SYSTEM Discovered by: Hugh Mann hughmann (at) hotmail (dot) com [email concealed] Tested progs : Ipswitch WS_FTP Server 4.0.2.EVAL ~~~~ [ more ] [ reply ] More Cpanel Vuls (cross site scripting) 2004-03-23 Fable (fable hush com) ################################################## ##Advisory Name: More Cpanel Vuls (cross site scripting) #Discovered by: Fable #Greets: 0x29A Crew, !AM Crew, Atomix, d3thstar, mgrd, rootthief.com. #Version Tested On: cPanel Build 9.1.0-STABLE 93 ##Most likely effects more ############## [ more ] [ reply ] Open the WS_FTP Server backdoor to SYSTEM 2004-03-23 Hugh Mann (hughmann hotmail com) (1 replies) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~ Advisory Name: Open the WS_FTP Server backdoor to SYSTEM Impact : Privilege escalation Discovered by: Hugh Mann hughmann (at) hotmail (dot) com [email concealed] Tested progs : Ipswitch WS_FTP Server 4.0.2.EVAL ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ more ] [ reply ] ALLO ALLO WS_FTP Server 2004-03-23 Hugh Mann (hughmann hotmail com) ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~ Advisory Name: ALLO ALLO WS_FTP Server Impact : Arbitrary code execution as SYSTEM Discovered by: Hugh Mann hughmann (at) hotmail (dot) com [email concealed] Tested progs : Ipswitch WS_FTP Server 4.0.2.EVAL ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [ more ] [ reply ] Remotely Exploitable Cross-Site Scripting in Hotmail and Yahoo (GM#005-MC) 2004-03-23 GreyMagic Software (security greymagic com) GreyMagic Security Advisory GM#005-MC ===================================== By GreyMagic Software, Israel. 23 Mar 2004. Available in HTML format at http://www.greymagic.com/security/advisories/gm005-mc/. Topic: Remotely Exploitable Cross-Site Scripting in Hotmail and Yahoo. Discovery date: 06 Ma [ more ] [ reply ] Sarca rainbow tables on-line cracking service 2004-03-22 Inode (inode wayreth eu org) Hi all, I've generated with some friends 18Gb of rainbow tables for the "instant" decryption of LanManager password hashes. Now we are offering a free on-line cracking service for Microsoft Windows NT/2000/XP/2003 passwords. It should be useful in a lot of situations, expecially during penetration [ more ] [ reply ] [waraxe-2004-SA#008 - easy way to get superadmin rights in PhpNuke 6.x-7.1.0] 2004-03-22 Janek Vind (come2waraxe yahoo com) [waraxe-2004-SA#011 - Multiple vulnerabilities in MS Analysis v2.0 module for PhpNuke] 2004-03-22 Janek Vind (come2waraxe yahoo com) [waraxe-2004-SA#009 - Non-critical Sql injection and XSS bug in PhpBB 2.0.6c] 2004-03-22 Janek Vind (come2waraxe yahoo com) RE: Fw: phpBB profile.php Cross Site Scripting Vulnerability 2004-03-22 micheal (at) michealcottingham (dot) com [email concealed] (micheal michealcottingham com) I'm going to say this again. Please contact security@ before posting here, and give them an appropriate amount of time to reply. This goes for _any_ software company. Thank you. ----- Original Message ----- From: "Cheng Peng Su" <apple_soup (at) msn (dot) com [email concealed]> To: <bugtraq (at) securityfocus (dot) com [email concealed]> Sent: Saturday, [ more ] [ reply ] Vulnerabilities in News Manager Lite 2.5 & News Manager Lite administration 2004-03-22 Manuel Lopez (mantra gulo org) #Title: Vulnerabilities in News Manager Lite 2.5 & News Manager Lite administration. #Software: News Manager Lite 2.5 & News Manager Lite administration. #Vendor: http://www.expinion.net/software/app_newsmanager.asp #Impact: Disclosure of authentication information, Disclosure of user inform [ more ] [ reply ] Vulnerabilities in Member Management System 2.1 2004-03-22 Manuel Lopez (mantra gulo org) #Title: Vulnerabilities in Member Management System 2.1 #Software: Member Management System 2.1 #Vendor: http://www.expinion.net/software/app_mms.asp #Impact: Disclosure of authentication information, Disclosure of user information, Execution of arbitrary code via network, Modification of use [ more ] [ reply ] Mod_Survey security advisory: Script injection bug 2004-03-22 Joel Palmius (joel palmius mh se) This was published on the Mod_Survey mailing list a few minutes ago. ######################################################### Mod_Survey Security Advisory 2004-03-21, Script injection ######################################################### ABOUT MOD_SURVEY ---------------- Mod_Survey is an Ap [ more ] [ reply ] Apache mod_disk_cache stores client authentication credentials on disk 2004-03-20 Andreas Steinmetz (ast domdv de) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Summary: ======== mod_disk_cache stores all client authentication credentials for cached objects on disk. This means proxy authentication credentials as well as in certain RFC2616 defined cases standard authentication credentials. In case of Basic Aut [ more ] [ reply ] |
|
Privacy Statement |
Hash: SHA1
- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 467-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Matt Zimmerman
March 23rd, 2004
[ more ] [ reply ]