BugTraq Mode:
(Page 1545 of 1748)  < Prev  1540 1541 1542 1543 1544 1545 1546 1547 1548 1549 1550  Next >
AllMyGuests PHP Code Injection vulnerability 2004-02-14
Pablo Santana (m4dsk4t3r hotmail com)


******** AllMyGuests PHP Code Injection vulnerability ********

Product : AllMyGuests

Vendor : www.php-resource.net

Date : February 14, 2004

Problem : PHP Code Injection

Vendor Contacted ? : No

************************** Source ****************************

in /include/info.inc.php

-

[ more ]  [ reply ]
RE: W2K source "leaked"? 2004-02-13
LordInfidel directionweb com
Just a thought:

Has anyone given any consideration that maybe this source is trojanized?

It's obviously pirated, since MS probably did not release it to the general
public.
(At least they have not made a public announcement to that effect, unless I
am mistaken
and that is always a possibility)

No

[ more ]  [ reply ]
Fwd: Re: NT/W2K Source leak 2004-02-14
Dragos Ruiu (dr kyx net)
This was sent to ntbugtraq but it might have some usefulness for bugtraq
readers too.

--
Top security experts. Cutting edge tools, techniques and information.
Vancouver, Canada April 21-23 2004 http://cansecwest.com
pgpkey http://dragos.com/ kyxpgp

[ more ]  [ reply ]
Misinformation in Security Advisories (ASN.1) 2004-02-16
John Compton (john_compton24 yahoo com)
It seems that misinformation is included in security
advisories far too often, and for many different
reasons. I'd like to point out a couple examples, and
promote discussion as to how this misinformation
affects the security community and the non-experts who
rely on this information to be valid.

[ more ]  [ reply ]
ASP Portal Multiple Vulnerabilities 2004-02-14
Manuel López (mantra gulo org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Title: Asp Portal Multiple Vulnerabilities

By: Manuel López

Software: Asp Portal

Vendor Description:
ASP Portal is a an ASP powered portal site which uses an Access database to
store all the site info. The script also includes and easy to use A

[ more ]  [ reply ]
[SECURITY] [DSA 429-2] New gnupg packages fix cryptographic weakness 2004-02-14
Matt Zimmerman (mdz debian org)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 429-2 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Matt Zimmerman
February 13th, 2004

[ more ]  [ reply ]
Re: Microsoft ASN.1 (Half a sploit) 2004-02-15
K-OTiK Security (Special-Alerts k-otik com)
In-Reply-To: <200402132315.i1DNFYAa067379 (at) mailserver1.hushmail (dot) com [email concealed]>

Note that the SANS said "This Exploit appears to work only against Windows 2000 Professional..."

We say : works against Windows 2000 & Windows XP

other versions ? 2k3 ?

References

http://www.k-otik.com/exploits/02.14.MS0

[ more ]  [ reply ]
Xlight ftp server 1.52 RETR bug 2004-02-15
intuit e.b. (intuit linuxmail org)

Application: Xlight ftp server
http://www.xlightftpd.com/

Version: 1.52

Bug: Denial Of Service

Author: intuit
e-mail: intuit (at) linuxmail (dot) org [email concealed]
web: http://rootshells.tk/

*****************************************************************

[ more ]  [ reply ]
Buffer overflow in mnoGoSearch 2004-02-15
Jedi/Sector One (j c9x org)

Product : mnoGoSearch
Date : 02/15/2004
Author : Frank Denis <j (at) pureftpd (dot) org [email concealed]>

------------------------[ Product description ]------------------------

From the web site :

mnoGoSearch (formerly known as UdmSearch) is a full-featured web search
engine software for intranet and interne

[ more ]  [ reply ]
problems with database files in 'SignatureDB' 2004-02-15
LynX (_lynx bk ru)


-----BEGIN PGP SIGNED MESSAGE-----

Hash: SHA1

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

File: LynX-adv4_SignatureDB.txt

Date: 15/02/2004

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

o NAME: problems with

[ more ]  [ reply ]
Broadcast client buffer-overflow in Purge Jihad <= 2.0.1 2004-02-16
Luigi Auriemma (aluigi altervista org)

#######################################################################

Luigi Auriemma

Applications: Purge and Purge Jihad
http://www.purgeonline.net
Versions: Purge <= 1.4.7
Purge Jihad <= 2.0.1
Platforms: Windows
Bug:

[ more ]  [ reply ]
Exploit based on leaked code released. 2004-02-16
Christopher Carboni (ccarboni azerty com)


From securitytracker http://www.securitytracker.com/alerts/2004/Feb/1009067.html

Microsoft Internet Explorer Integer Overflow in Processing Bitmap Files Lets Remote Users Execute Arbitrary Code

SecurityTracker Alert ID: 1009067

CVE Reference: GENERIC-MAP-NOMATCH (Links to External

[ more ]  [ reply ]
Possible race condition in Symantec AntiVirus Scan Engine for Red Hat Linux during LiveUpdate 2004-02-16
Dr. Peter Bieringer (pbieringer aerasec de)
Hi,

during evaluation of Symantec AntiVirus Scan Engine for Red Hat Linux
(file: Scan_Engine_430-RedHat-1.zip) we found a race condition using
default configuration.

Like written in "Implementation_Guide.pdf" on page 134 LiveUpdate can be
triggered by cron via a shell script:

# /opt/SYMCScan/b

[ more ]  [ reply ]
Symantec FireWall/VPN Appliance model 200 leak of security 2004-02-16
Davide Del Vecchio (dante alighieri org)
============================================================
Symantec FireWall/VPN Appliance model 200 leak of security
============================================================

Davide Del Vecchio Adv#9

Discovered in: 15/01/2004
Date: 15/02/2004
Tested on FireWall/VPN Applicance model 200
Ve

[ more ]  [ reply ]
RE: EEYE: Microsoft ASN.1 Library Length Overflow Heap Corruption 2004-02-12
Bill Gallagher (Bill Gallagher augharue com)

...
> In order to trigger the ASN.1 vulnerabilities an attacker has
> to be able
> to get the target machine to invoke its BER decoding capabilities.

I have read a good number of the posts here regarding this vulnerability and
have seen references to NTLM etc. as a pathway for attack. What abou

[ more ]  [ reply ]
RE: [Full-Disclosure] Re: W2K source "leaked"? 2004-02-13
Drew Copley (dcopley eeye com)


> -----Original Message-----
> From: full-disclosure-admin (at) lists.netsys (dot) com [email concealed]
> [mailto:full-disclosure-admin (at) lists.netsys (dot) com [email concealed]] On Behalf Of
> Gadi Evron
> Sent: Friday, February 13, 2004 9:51 AM
> To: Drew Copley
> Cc: bugtraq (at) securityfocus (dot) com [email concealed]; full-disclosure (at) lists.netsys (dot) com [email concealed]
> Subject: [Full-

[ more ]  [ reply ]
Re: Round One: "DLL Proxy" Attack Easily Hijacks SSL from Internet Explorer 2004-02-13
carlo cs dartmouth edu
In-Reply-To: <DHELIJMHOLKLHKFHGGGLIEDHCAAA.disclosure (at) ossecurity (dot) ca [email concealed]>

It's nice to see this getting some attention. We've been working on some exploits in this area for the last year, and actually have been able to use and/or steal a user's private key from the CSP that IE uses.

We used DLL inje

[ more ]  [ reply ]
[FLSA-2004:1232] Updated slocate resolves security vulnerabilites 2004-02-12
Jesse Keating (jkeating j2solutions net)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -----------------------------------------------------------------------
Fedora Legacy Update Advisory

Synopsis: Updated slocate resolves security vulnerabilities
Advisory ID: FLSA:1232
Issue date: 2004-02-11
Produ

[ more ]  [ reply ]
(Page 1545 of 1748)  < Prev  1540 1541 1542 1543 1544 1545 1546 1547 1548 1549 1550  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus