BugTraq Mode:
(Page 1572 of 1748)  < Prev  1567 1568 1569 1570 1571 1572 1573 1574 1575 1576 1577  Next >
XSS vulnerability in XOOPS 2.0.5.1 2003-12-21
Chintan Trivedi (chesschintan hotmail com)


====================================================================

Advisory by Eye On Security Research Group - India www.eos-india.net

====================================================================

1.==============================================================Product

2.====

[ more ]  [ reply ]
Internet Explorer file downloading security alerts bypass 2003-12-22
Hugo Vázquez Caramés (overclocking_a_la_abuela hotmail com)


#####################################################

Vendor contacted via spanish Microsoft Gold Partner.

Status: No response.

#####################################################

1- File downloading security alerts bypass.

Affected software: Internet Explorer (tested on Win2

[ more ]  [ reply ]
phpBB v2.06 search_id sql injection exploit 2003-12-20
"f3sy1 f3sy1" (f3sy1 mail ru)
#!/usr/bin/perl -w
use IO::Socket;
## PROOF-OF-CONCEPT
## * work only with mysql ver > 4.0
## * work only with post #1
##
## Example:
## C:\>r57phpbb-poc.pl 127.0.0.1 phpBB2 2 2
## [~] prepare to connect...
## [+] connected
## [~] prepare to send data...
## [+] OK
## [

[ more ]  [ reply ]
PHP-NUKE version <= 6.9 'cid' sql injection exploit 2003-12-20
r00t rsteam ru


PHP-NUKE version <= 6.9 'cid' sql injection exploit

----------------------
RusH security team
http://rst.void.ru
http://www.rsteam.ru
----------------------

mailto:r00t (at) rsteam (dot) ru [email concealed]

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: PGP 8.0.2

mQGiBD8+oMARBADX7sY86saLDTZXF

[ more ]  [ reply ]
[SCSA-024] BES-CMS including file vulnerability 2003-12-20
Security Corporation Security Advisory (advisory security-corporation com)
======================================================================
Security Corporation Security Advisory [SCSA-024]

BES-CMS including file vulnerability
======================================================================

PROGRAM: BES-CMS
HOMEPAGE: http://bes.h6p.org
VULNERABLE VERSIONS: 0.

[ more ]  [ reply ]
Multicast from Orinoco wireless stations 2003-12-20
Andrew Daviel (advax triumf ca)

It seems that some Orinoco 802.11 base stations
send multicast packets on 224.0.1.76/2313 (IAPP.MCAST.NET).

By sending a multicast join (opening a socket with netcat or other tool)
to this group, one can discover other base stations on multicast-enabled
portions of the Internet, such as the acade

[ more ]  [ reply ]
Re: Security bug in Xerox Document Centre 2003-12-20
brandon pierce (brandonp insynclh com)
In-Reply-To: <20031219141657.A1147 (at) shiva.cps.unizar (dot) es [email concealed]>

Just tested this out on a few different models of Xerox multifunction devices of ours as well, and all three were vulnerable. Following systems apply:

Document Centre 440DC

Document Centre 480DC

Document Centre 425ST

>TECHNICAL INFO

[ more ]  [ reply ]
Remote crash in tcpdump from OpenBSD 2003-12-20
Przemyslaw Frasunek (venglin freebsd lublin pl) (1 replies)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -------- Original Message --------
Subject: user/3610: repetable tcpdump remote crash
Resent-Date: Sat, 20 Dec 2003 08:55:02 -0700 (MST)
Resent-From: gnats (at) cvs.openbsd (dot) org [email concealed] (GNATS Filer)
Resent-To: bugs (at) cvs.openbsd (dot) org [email concealed]
Date: Sat, 20 Dec 2003 16:42:25

[ more ]  [ reply ]
Re: Remote crash in tcpdump from OpenBSD 2003-12-20
Henning Brauer (hb-bugtraq bsws de) (1 replies)
Re: Remote crash in tcpdump from OpenBSD 2003-12-20
Przemyslaw Frasunek (venglin freebsd lublin pl)
MDKSA-2003:118 - Updated XFree86 packages fix xdm vulnerability 2003-12-19
Mandrake Linux Security Team (security linux-mandrake com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandrake Linux Security Update Advisory
_______________________________________________________________________

Package name: XFree86
Advisory ID:

[ more ]  [ reply ]
RE: Edonkey/Overnet Plugins capable of Virus/Worm behavior 2003-12-19
Andre Lorbach (alorbach ro1 adiscon com)
> -----Original Message-----
> From: Max [mailto:max (at) maxandcarrie (dot) com [email concealed]]
> Sent: Thursday, December 18, 2003 9:32 PM
> To: ashton; 'Pavel Kankovsky'
> Cc: bugtraq (at) securityfocus (dot) com [email concealed]
> Subject: RE: Edonkey/Overnet Plugins capable of Virus/Worm behavior
>
> Does this same plugin system also apply to em

[ more ]  [ reply ]
Directory traversal and XSS in Active Webcam <= 4.3 2003-12-19
Luigi Auriemma (aluigi altervista org)

#######################################################################

Luigi Auriemma

Application: Active Webcam
http://www.pysoft.com/ActiveWebCamMainpage.htm
Versions: <= 4.3 before 17 Dec 2003
Platforms: Windows
Bugs: directory traver

[ more ]  [ reply ]
Re: Buffer overflow/privilege escalation in MacOS X - hfs.util also 2003-12-19
KF (dotslash snosoft com)
The funny thing is that I have reported this to apple more than once if
I remember correctly... first in 10.1 and recently in 10.3, I have yet
to hear back on the issue. As a side note apple has a no talky / no
verify policy until the bug is fixed... they just keep you pretty much
100% in the d

[ more ]  [ reply ]
[Exploit]: DameWare Mini Remote Control Server Overflow Exploit 2003-12-19
Adik (netninja hotmail kg)
DameWare Mini Remote Control Server Exploit

C:\xploits\dmware>dmware

...oO DameWare Remote Control Server Overflow Exploit Oo...

-( by Adik netmaniac[at]hotmail.KG )-

- Versions vulnerable: <= DWRCS 3.72.0.0
- Tested on: DWRCS ver: 3.72.0.0 Win2k SP3 & WinXP SP1

Usage

[ more ]  [ reply ]
AOL Instant Messanger - Buddy Icon Warn Exploit 2003-12-19
Josh Camacho (sfocus ceromus com)


AOL Instant Messanger - Buddy Icon Warn Exploit

"Discovered by Robbie Saunders, it allows you to warn somebody if they have a buddy icon, but they don't have to send you an Instant Message. This has to be done using a program though, it just sends the user an IM, but request's their buddy icon

[ more ]  [ reply ]
Security bug in Xerox Document Centre 2003-12-19
J.A. Gutierrez (spd shiva cps unizar es)


CONTACT INFORMATION
========================================================================
=======

Name : J.A. Gutierrez
E-mail : spd (at) shiva.cps.unizar (dot) es [email concealed]

Reported this to the vendor on Mon Dec 15 2003 using feedback form
at http://www.xerox.com, since I co

[ more ]  [ reply ]
Re: Edonkey/Overnet Plugins capable of Virus/Worm behavior 2003-12-19
nagual bluemail ch
In-Reply-To: <20031217015930.29190.qmail (at) sf-www1-symnsj.securityfocus (dot) com [email concealed]>

Once you allow native code on a Windows machine, there is no limit to what it can access within its user rights, same with Unix. Even as a non root process any program can do a lot of obnoxious things.

Any native code com

[ more ]  [ reply ]
Re: Cross-site scripting vulnerability in SARA v<=4.2.7 2003-12-18
bugtraq saintcorporation com

On Thu, 18 Dec 2003, toddr arc com wrote:

> 1. CSS: Tom indicates that SATAN and older versions of SAINT are not
> vulnerable to CSS. Tom is incorrect as all used the SATAN engine
> which did not tranlate "<" and ">" to their html codes "<" and
> "> I suspect that SAINT has f

[ more ]  [ reply ]
Subscribe Me Pro/Enterprise - Remote Code Execution via Backticked Perl Variable Injection. 2003-12-18
Paul Craig - Pimp Industries (headpimp pimp-industries com)

Pimp industries.
"Its all about the Bling, Bitches and Fame!"

Subscribe Me Pro/Enterprise (All recent versions of Pro/Enterprise)
Remote Code Execution via Backticked Perl Variable Injection.
(C) Paul Craig
Pimp Industries 2003
This advisory is also online at: http://w

[ more ]  [ reply ]
RE: Edonkey/Overnet Plugins capable of Virus/Worm behavior 2003-12-17
Aaron_Yemm NAI com (1 replies)
I do believe that several kazaa virus/plugins are engineered in the same
fashion and advertised through the kazaa network as "skins" or "theme
pack" plugins.

-Aaron

-----Original Message-----
From: Julian Ashton [mailto:ashton (at) joltmedia (dot) com [email concealed]]
Sent: Tuesday, December 16, 2003 9:00 PM
To: bugtraq@se

[ more ]  [ reply ]
RE: Edonkey/Overnet Plugins capable of Virus/Worm behavior 2003-12-18
ashton (ashton joltmedia com)
Multiple Vulnerabilities In ASPapp Products 2003-12-18
JeiAr (security gulftech org)


Vendor : ASPapp.com
URL : http://www.aspapp.com
Version : PortalApp - IntranetApp - ProjectApp
Risk : Multiple Vulnerabilities

Description:
A complete, easy-to-modify .asp portal system. With this portal you can manage
users, content, links, files, forums, surveys, product catalog, sho

[ more ]  [ reply ]
Autorank PHP SQL Injection Vulnerabilities 2003-12-18
JeiAr (security gulftech org)


Vendor : JMB Software

URL : http://www.jmbsoft.com

Version : AutoRank PHP 2.0.4 && Others?

Risk : SQL Injection Vulnerability

Description:

The description as taken from the Autorank website "AutoRank PHP is our

next generation toplist software, written completely in PHP and ba

[ more ]  [ reply ]
(Page 1572 of 1748)  < Prev  1567 1568 1569 1570 1571 1572 1573 1574 1575 1576 1577  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus