BugTraq Mode:
(Page 1588 of 1748)  < Prev  1583 1584 1585 1586 1587 1588 1589 1590 1591 1592 1593  Next >
Vulnerability Disclosure Formats (was "Re: Funny article") 2003-11-14
Steven M. Christey (coley mitre org)

Systems Administrator <sysadmin (at) sunet.com (dot) au [email concealed]> said:

> Quick question: would it make sense to have somewhere:
>
>- A common (computer/human readable) format for vulnerability
> disclosures
>- A common format for bugfix publications

There are a couple proposals out there, but I don't think they've

[ more ]  [ reply ]
Re: Web Wiz Forums ver. 7.01 2003-11-14
bruce webwizguide info (1 replies)
In-Reply-To: <6520144396.20031113223723 (at) hex.net (dot) ru [email concealed]>

HEX has submitted incorrect information on Web Wiz Forums (again!!!).

The values of the variables mentioned by HEX are filtered further on in the code.

The file register_new_user.asp is not a file that exsits in Web Wiz Forums version 7.01

[ more ]  [ reply ]
Re: Web Wiz Forums ver. 7.01 2003-11-14
Thor (thor hammerofgod com)
RE: [Full-Disclosure] Re: Serious flaws in bluetooth security lead to disclosure of personal data 2003-11-14
Schmehl, Paul L (pauls utdallas edu) (2 replies)
> -----Original Message-----
> From: full-disclosure-admin (at) lists.netsys (dot) com [email concealed]
> [mailto:full-disclosure-admin (at) lists.netsys (dot) com [email concealed]] On Behalf Of
> srenna (at) vdbmusic (dot) com [email concealed]
> Sent: Friday, November 14, 2003 7:30 AM
> To: Adam Laurie; Pentest Security Advisories;
> bugtraq (at) securityfocus (dot) com [email concealed]; full-disclosure@l

[ more ]  [ reply ]
Quagga remote vulnerability 2003-11-14
Paul Jakma (paul clubi ie)
Summary:
--------

All versions of Quagga (and also GNU Zebra, from which Quagga was
forked) are vulnerable to a remotely triggerable denial of
service.

Scope of vulnerability:
-----------------------

All versions of GNU Zebra and all versions of Quagga /prior/ to
0.96.4, where a daemon's vty, i

[ more ]  [ reply ]
PHPlist, file injection vulnerability 2003-11-14
Michiel Dethmers (secfoc kipu co uk)

PHPlist, http://www.phplist.com is a popular open source newsletter
application written in PHP.

Recently a file injection vulnerability has been discovered allowing
remote attackers to issue arbitrary commands on the hosted machine, as
the webserver user.
The issue has been resolved in the late

[ more ]  [ reply ]
Re: Funny article 2003-11-13
Steven M. Christey (coley mitre org) (1 replies)

It would be very interesting to see any results that try to compare
the timeliness of vendor response. I attemped to conduct such a study
a year and a half ago, but the study failed due to lack of time and a
lot of other factors such as:

- the relatively small percentage of disclosure timelines

[ more ]  [ reply ]
Re: Funny article 2003-11-13
Systems Administrator (sysadmin sunet com au) (1 replies)
Re: Funny article 2003-11-14
Doug (dmr agnosticjihad com)
[RHSA-2003:325-01] Updated glibc packages provide security and bug fixes 2003-11-13
bugzilla redhat com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ---------------------------------------------------------------------
Red Hat Security Advisory

Synopsis: Updated glibc packages provide security and bug fixes
Advisory ID: RHSA-2003:325-01
Issue date: 2003-11

[ more ]  [ reply ]
RE: Secure Network Operations SRT2003-11-13-0218, PCAnywhere allows local users to become SYSTEM 2003-11-13
Sym Security (symsecurity symantec com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Symantec Security Response Advisory

13 November 2003
Symantec pcAnywhere Service-Mode Help File Elevation of Privilege

Risk Impact
High (very dependent on product configuration and operating
environment)

Overview
Security analysts from Secure Networ

[ more ]  [ reply ]
Minor OpenSSH/pam vuln (non-exploitable) 2003-11-13
das decisionsoft com


The home page of the one time password system (or otpw -- http://www.cl.cam.ac.uk/~mgk25/otpw.html) has info about how OpenSSH doesn't correctly return PAM_CONV_ERR when a user cancels a login (but instead incorrectly calls pam_end() having the side effect that memory is not correctly scrubbed (or

[ more ]  [ reply ]
Webwasher Classic Error-Message XSS Vulnerability 2003-11-13
Oliver Karow (Oliver Karow gmx de)
Webwasher Classic Error-Message XSS Vulnerability
=================================================

Description
===========

WebWasher Classic is vulnerable to a XSS attack.

If a HTTP GET-Request, containing script code, is sent to the
proxy port (default 8080/TCP), an error page is shown, which c

[ more ]  [ reply ]
Web Wiz Forums ver. 7.01 2003-11-13
HEX (hex hex net ru)
Informations :
°°°°°°°°°°°°
Language : ASP
Bugged Version : Web Wiz Forums ver. 7.01 (and less ?)
Website : http://www.webwizforums.com
Problems : Permanent XSS

Objects :
°°°°°°°
- register_new_user.asp
- register.asp

The values variable are not filtered:

strLocation = Request.Form("location")
s

[ more ]  [ reply ]
[CLA-2003:784] Conectiva Security Announcement - postgresql 2003-11-13
Conectiva Updates (secure conectiva com br)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
CONECTIVA LINUX SECURITY ANNOUNCEMENT
- ------------------------------------------------------------------------
--

PACKAGE : postgresql
SUMMARY : Buffer overflow vulnerab

[ more ]  [ reply ]
SRT2003-11-13-0218 - PCAnywhere local SYSTEM exploit 2003-11-13
KF (dotslash snosoft com)
Big thanks to Symantec for being so responsive.
-KF

[ more ]  [ reply ]
terminatorX stack-based overflow (exploit) 2003-11-13
Li0n7 voila fr


terminatorX Exploitable Stack-Based Overflow (load_tt_part())

------------------------------------------------------------------------

SUMMARY

There is a stack-based overflow which is likely to be exploited locally

in order to cause the product to execute malicious code, allowing a

[ more ]  [ reply ]
Corsaire Security Advisory: PeopleSoft Gateway Administration servlet path disclosure issue 2003-11-13
advisories (advisories corsaire com)

-- Corsaire Security Advisory --

Title: PeopleSoft Gateway Administration servlet path disclosure issue
Date: 04.07.03
Application: PeopleTools 8.20/8.43 and prior
Environment: Various
Author: Martin O'Neal [martin.oneal (at) corsaire (dot) com [email concealed]]
Audience: General distribution
Reference: c030704-003

-- Scop

[ more ]  [ reply ]
MDKSA-2003:106 - Updated fileutils and coreutils packages fix vulnerabilities 2003-11-12
Mandrake Linux Security Team (security linux-mandrake com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandrake Linux Security Update Advisory
_______________________________________________________________________

Package name: fileutils/coreutils
Adv

[ more ]  [ reply ]
Eudora 6.0.1 attachment spoof 2003-11-13
psz maths usyd edu au (Paul Szabo)
Eudora 6.0.1 for Windows was released recently. The buffer overflow (and
code execution) with long spoofed attachment names seems to be fixed; the
spoofing itself is not, though it was known for years.

Spoofing demo (essentially identical to 6.0 version) below.

Cheers,

Paul Szabo - psz (at) maths (dot) usyd [email concealed]

[ more ]  [ reply ]
NSFOCUS SA2003-08: HP-UX libc NLSPATH Environment Variable Privilege Elevation Vulnerability 2003-11-13
NSFOCUS Security Team (security nsfocus com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

NSFOCUS Security Advisory(SA2003-08)

Topic: HP-UX libc NLSPATH Environment Variable Privilege Elevation Vulnerability

Release Date: 2003-11-13

CVE CAN ID: CAN-2003-0090

http://www.nsfocus.com/english/homepage/research/0308.htm

Affected system:
====

[ more ]  [ reply ]
[RHSA-2003:307-01] Updated zebra packages fix security vulnerabilities 2003-11-13
bugzilla redhat com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ---------------------------------------------------------------------
Red Hat Security Advisory

Synopsis: Updated zebra packages fix security vulnerabilities
Advisory ID: RHSA-2003:307-01
Issue date: 2003-11-1

[ more ]  [ reply ]
(Page 1588 of 1748)  < Prev  1583 1584 1585 1586 1587 1588 1589 1590 1591 1592 1593  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus