BugTraq Mode:
(Page 1577 of 1748)  < Prev  1572 1573 1574 1575 1576 1577 1578 1579 1580 1581 1582  Next >
NetGear WAB102 2003-12-10
Jon Kamm @hotmail (jonkamm hotmail com)
The NetGear WAB102 (running firmware v1.2.3) is a dual band wireless access
point. After a recent power outage I noticed that the unit reset its
password to the default of '1234'. Obviously this makes it possible for
someone to reconfigured it meet their needs... a significant security risk.
After f

[ more ]  [ reply ]
RE: Internet Explorer URL parsing vulnerability 2003-12-09
http-equiv (at) excite (dot) com [email concealed] (1 malware com)


The following works on Outlook Express 6 latest everything. Running
on XP.

http://cert.uni-stuttgart.de/archive/bugtraq/2003/07/msg00249.html

09% pushes malware.com out of sight in the task bar, and %01 leaves
microsoft.com intact in the address bar:

<A
href="http://www.microsoft.com%01%09%0

[ more ]  [ reply ]
SGI Advanced Linux Environment security update #6 2003-12-10
SGI Security Coordinator (agent99 sgi com)
-----BEGIN PGP SIGNED MESSAGE-----

________________________________________________________________________
______
SGI Security Advisory

Title : SGI Advanced Linux Environment security update #6
Number : 20031202-01-U
Date : December 10, 2003
Reference

[ more ]  [ reply ]
RE: Internet Explorer URL parsing vulnerability 2003-12-09
http-equiv (at) excite (dot) com [email concealed] (1 malware com)


Here's a fully functional self-explanatory demo:

http://www.malware.com/hole-e-day.zip

functional from these quarters on fully patched IE6 / OE6

No doubt many will receive nice holiday greetings soon enough

END CALL

The following works on Outlook Express 6 latest everything. Running
on XP.

[ more ]  [ reply ]
Visitorbook LE Multiple Vulnerabilities 2003-12-10
Paul Johnston (paul westpoint ltd uk)
Westpoint Security Advisory

Title: VisitorBook LE Mail Relay and Cross Site Scripting
Risk Rating: Moderate
Software: FreeScripts VisitorBook LE
Platforms: Most Unix
Vendor URL: http://www.freescripts.com/
Author: Paul Johnston <paul (at) westpoint.ltd (dot) uk [email concealed]>
Date: 10th Decem

[ more ]  [ reply ]
Multiple Vulnerabilities Sybase Anywhere 9 2003-12-10
Next Generation Insight Security Research (NGS Software) (mark ngssoftware com)
NGSSoftware Insight Security Research Advisory

Name: Multiple Vulnerabilities in Adaptive Server Anywhere Network Server
Version 9.0.0
Systems Affected: SQL Anywhere 9 Windows 2000 / XP (Have not been verified
on UNIX)
Severity: Critical
Vendor URL: http://www.sybase.com
Authors: Sherief Hammad

[ more ]  [ reply ]
Cisco Security Advisory: Unity Vulnerabilities on IBM-based Servers 2003-12-10
Cisco Systems Product Security Incident Response Team (psirt cisco com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Cisco Security Advisory: Unity Vulnerabilities on IBM-based Servers

Revision Numeral 1.0

For Public Release 2003 December 10 17:00 UTC (GMT)

========================================================================

Contents
========

Summary
Affe

[ more ]  [ reply ]
Cisco Security Advisory: Vulnerability in Authentication Library for ACNS 2003-12-10
Cisco Systems Product Security Incident Response Team (psirt cisco com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Cisco Security Advisory: Vulnerability in Authentication Library for ACNS

Revision 1.0

For Public Release 2003 December 10 16:00 UTC (GMT)

- ------------------------------------------------------------------------
--

Summary
=======
By entering an o

[ more ]  [ reply ]
Dell BIOS DoS 2003-12-09
Ross Draper (Ross Draper musicradio com) (2 replies)
I agree with your points Jon, but lets be fair here, BIOS passwords do
have a use - especially on laptops.

Although nobody in there right mind would rely on them as the sole
protection for a machine, they are certainly worthwhile both as a
deterrant to the casual snooper and as a delaying tactic to

[ more ]  [ reply ]
Re: Dell BIOS DoS 2003-12-10
Seth Arnold (sarnold wirex com)
Mobile Device Security, Was: Re: Dell BIOS DoS 2003-12-10
Karsten W. Rohrbach (karsten rohrbach de)
Re: Internet Explorer URL parsing vulnerability 2003-12-09
Eric \MightyE\ Stevens (trash mightye org)
IE 6.0.2800.1106.xpsp2.030422-1633 with all the latest updates (SP1;
Q822925; Q330994; Q828750; Q824145) is vulnerable. Works like a charm.

-Eric "MightyE" Stevens
http://lotgd.net

soulshok (at) hippie (dot) dk [email concealed] wrote:

>In-Reply-To: <20031209144416.31613.qmail (at) sf-www2-symnsj.securityfocus (dot) com [email concealed]>
>
>
>
>>#

[ more ]  [ reply ]
Internet Explorer URL parsing vulnerability 2003-12-09
John W. Noerenberg II (jwn2 qualcomm com) (1 replies)
This exploit also applies to the Macintosh version of Explorer v5.2.3(5815.1)

>From: <bugtraq (at) zapthedingbat (dot) com [email concealed]>
>To: bugtraq (at) securityfocus (dot) com [email concealed]
>Subject: Internet Explorer URL parsing vulnerability
>
>
>
>Internet Explorer URL parsing vulnerability
>Vendor Notified 09 December, 2003
>
># Vulnerabil

[ more ]  [ reply ]
Re: Internet Explorer URL parsing vulnerability 2003-12-10
Pedro Castro (noupy mail telepac pt)
RE: Dell BIOS DoS 2003-12-09
David Brodbeck (DavidB mail interclean com) (3 replies)


> -----Original Message-----
> From: jon schatz [mailto:jon (at) divisionbyzero (dot) com [email concealed]]

> seriously, bios passwords are worthless. there are numerous
> ways to get
> around them. most motherboards have a jumper that you can set
> to reset
> your cmos / bios (probably misusing one of those terms) to

[ more ]  [ reply ]
Re: Dell BIOS DoS 2003-12-09
Jim Paris (jim jtan com)
Re: Dell BIOS DoS 2003-12-09
Craig Paterson (craigp tippett com) (2 replies)
Re: Dell BIOS DoS 2003-12-10
Eric Anderson (anderson cs uoregon edu)
RE: Dell BIOS DoS 2003-12-10
Lyal Collins (lyalc ozemail com au)
Re: Dell BIOS DoS 2003-12-09
Alexandros Papadopoulos (apapadop cmu edu)
Re: Internet Explorer URL parsing vulnerability 2003-12-09
soulshok hippie dk
In-Reply-To: <20031209144416.31613.qmail (at) sf-www2-symnsj.securityfocus (dot) com [email concealed]>

># Exploit ##########

>By opening a window using the http://user@domain nomenclature an attacker can hide the real location of the page by including a 0x01 character after the "@" character.

>Internet Explorer doesn't disp

[ more ]  [ reply ]
[CLA-2003:798] Conectiva Security Announcement - gnupg 2003-12-09
Conectiva Updates (secure conectiva com br)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
CONECTIVA LINUX SECURITY ANNOUNCEMENT
- ------------------------------------------------------------------------
--

PACKAGE : gnupg
SUMMARY : GnuPG's ElGamal signing keys

[ more ]  [ reply ]
(Page 1577 of 1748)  < Prev  1572 1573 1574 1575 1576 1577 1578 1579 1580 1581 1582  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus