|
Colapse all |
Post message
Vulnerability in Exchange Server 5.5 Outlook Web Access Could Allow Cross-Site Scripting Attack (Microsoft Security Bulletin MS03-047) 2003-10-16 Ory Segal (ory segal sanctuminc com) From Microsoft Security Bulletin MS03-047: A cross-site scripting (XSS) vulnerability results due to the way that Outlook Web Access (OWA) performs HTML encoding in the Compose New Message form. An attacker could seek to exploit this vulnerability by having a user run script on the attacker's [ more ] [ reply ] Microsoft PCHealth 2003/XP Buffer Overflow (#NISR15102003) 2003-10-16 NGSSoftware Insight Security Research (nisr nextgenss com) NGSSoftware Insight Security Research Advisory Name: Microsoft PCHealth Buffer Overflow Vulnerability Systems Affected: Windows 2003 and XP Severity: Critical Risk Vendor URL: http://www.microsoft.com/ Author: David Litchfield [ david (at) ngssoftware (dot) com [email concealed] ] Date Vendor Notified: 23rd July 2003 Date [ more ] [ reply ] ColdFusion SQL Error Pages XSS 2003-10-15 Lorenzo Hernandez Garcia-Hierro (lorenzohgh nsrg-security com) ---------- NOTE ABOUT COLDFUSION XSS ATTACKS _______ Vendor: Macromedia Versions: MX ( 6.0 ) tested , older ? _______ PROBLEM: When you access to an error page of sql you can insert xss code to be shown in the error uotput of the sql backend. example: http://[target]/article.cfm?id=1'<script>alert [ more ] [ reply ] Microsoft Windows Security Bulletin Summary October 2003-10-15 Giovanni Campagnoli (bioia yahoo com) (1 replies) The new Security Bulletin is available at : http://www.microsoft.com/technet/treeview/default.asp?url=/technet/secur ity/bulletin/winoct03.asp In this last security bulletin Microsoft has patched 4 remote buffer overflow. Microsoft Security Bulletin MS03-041 - Vulnerability in Authenticode Verific [ more ] [ reply ] New CERT Coordination Center (CERT/CC) PGP Key 2003-10-15 CERT Advisory (cert-advisory cert org) -----BEGIN PGP SIGNED MESSAGE----- New CERT Coordination Center (CERT/CC) PGP Key The CERT/CC has generated a new PGP key. We use this key to sign all outgoing email, including documents sent to this list. Effective immediately, this new key is available and will be valid until Monday, November [ more ] [ reply ] Gaim festival plugin exploit 2003-10-15 error (error lostinthenoise net) It has come to my attention that people have actually used this example code for a gaim plugin: AIM::register("Festival TTS", "0.0.1", "goodbye", ""); AIM::print("Perl Says", "Loaded Festival TTS"); AIM::command("idle", "60000") if ($pro ne "Offline"); AIM::add_event_handler("event_im_recv", "synth [ more ] [ reply ] [CLA-2003:762] Conectiva Security Announcement - glibc 2003-10-14 Conectiva Updates (secure conectiva com br) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------ -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - ------------------------------------------------------------------------ -- PACKAGE : glibc SUMMARY : Fix for a local vulnerability [ more ] [ reply ] [SECURITY] [DSA 395-1] New tomcat4 packages fix denial of service 2003-10-15 joey infodrom org (Martin Schulze) LinkSys EtherFast Router Denial of Service Attack 2003-10-15 DigitalPranksters (secteam digitalpranksters com) DigitalPranksters Security Advisory http://www.DigitalPranksters.com LinkSys EtherFast Router Denial of Service Attack Risk: Low Product: Linksys EtherFast Cable/DSL Firewall Router BEFSX41 (Firmware 1.44.3) Product URL: http://www.linksys.com/products/product.asp?prid=433 Vendor Contacted: Se [ more ] [ reply ] Finjan Software Discovers a New Critical Vulnerability In Microsoft Hotmail 2003-10-15 Menashe Eliezer (menashe finjan com) Microsoft Hotmail Vulnerability Release Date: October 15, 2003 Severity: Critical (Potential Hotmail worm) Systems Affected: Internet Explorer and any software application used for reading Hotmail messages. Status: Microsoft has already patched the Hotmail system. Description: Finjan Software d [ more ] [ reply ] RE: What software breaks because of this DNS feature? 2003-10-14 Michael Wojcik (Michael Wojcik microfocus com) (1 replies) > From: Richard M. Smith [mailto:rms (at) computerbytesman (dot) com [email concealed]] > Sent: Monday, October 13, 2003 5:18 PM > To: BUGTRAQ@SECURITYFOCUS. COM > Subject: What software breaks because of this DNS feature? > > > Hi, > > According to RFC1034, "cnn.com" and "cnn.com." should be the > same domain names. Howe [ more ] [ reply ] What software breaks because of this DNS feature? 2003-10-13 Richard M. Smith (rms computerbytesman com) (1 replies) Hi, According to RFC1034, "cnn.com" and "cnn.com." should be the same domain names. However, it doesn't appear that programmers always understand that trailing dots can be added to domain names. For example, these two URLs both go to the CNN Web site in Internet Explorer: http://www.cnn.com [ more ] [ reply ] Re: What software breaks because of this DNS feature? 2003-10-14 Michael Sierchio (kudzu tenebras com) (1 replies) Re: What software breaks because of this DNS feature? 2003-10-14 Kevin George (kevin-bugtraq raindrop net) UK's Internet Infrastructure Open to Prying Eyes 2003-10-14 root networkpenetration com Network Penetration NetworkPenetration.com Copyright (c) 2003 Ste Jones root (at) networkpenetration (dot) com [email concealed] UK's Internet Infrastructure Open to Prying Eyes DNS Zone Transfers Allowed from First and Second Level Domains Index 1. Introduction 2. What was tested 3. Example zone transfe [ more ] [ reply ] Tool Release: Xprobe2 0.2 2003-10-13 Ofir Arkin (ofir sys-security com) We are pleased to announce the immediate availability of Xprobe2 v0.2, which has been officially released at the Blackhat Federal 2003. Xprobe2 is a remote active operating system fingerprinting tool with a different approach to operating system fingerprinting. Information on Xprobe2?s techno [ more ] [ reply ] Remote root exploit for proftpd \n bug 2003-10-13 Carl Livitt (carl learningshophull co uk) Attached is a remote root, chroot-breaking brute-force exploit for the \n processing bug in ProFTPd 1.2.7 - 1.2.9rc2. It has been tested successfully on SuSE 8.0/8.1 & RedHat 7.2 and 8.0. Note: it is noisy and leaves a lot of mess (ie, bad uploaded text files) on the target server. It is left [ more ] [ reply ] myPHPCalendar : Informations Disclosure, File Include 2003-10-12 Frog Man (leseulfrog hotmail com) Informations : °°°°°°°°°°°°° Language : PHP Version : 10192000 Build 1 Beta Website : http://myphpcalendar.sourceforge.net/ Problems : - Informations Disclosure - File Include PHP Code/Location : °°°°°°°°°°°°°°°°°°° admin.php, contacts.php, convert-date.php : ------------------------ include ("g [ more ] [ reply ] buffer overflow in IRCD software 2003-10-12 Piotr KUCHARSKI (chopin sgh waw pl) A buffer overflow bug allowing to crash the server has been discovered. It is exploitable only by local users and affects all versions of IRCnet IRCD from 2.10 series, up to 2.10.3p3. New release has been made, irc2.10.3p4, and is available from ftp://ftp.irc.org/irc/server/irc2.10.3p4.tgz Alter [ more ] [ reply ] Re: Bad news on RPC DCOM vulnerability 2003-10-11 Terence Runge (terencerunge sbcglobal net) (1 replies) I have also seen a significant rise in smb login failures with the snort signature: alert tcp any 445 -> any any (sid:10000216; msg:"SMB Login Failure"; flow:from_server,established; content:"|FF|SMB|73 6d 00 00 c0|"; offset:4 ; depth:9;) The login failures are from systems running XP and would l [ more ] [ reply ] Re: Bad news on RPC DCOM vulnerability 2003-10-10 K-OTiK Security (Special-Alerts k-otik com) In-Reply-To: <1155962754.20031010184852 (at) SECURITY.NNOV (dot) RU [email concealed]> as confirmed by 3APA3A and security labs, it seems that the public exploit *works* even if the patch MS03-039 is *installed* This is a highly critical vulnerability - users MUST block vulnerable ports ! Regards. K-OTik Staff /\\/ [ more ] [ reply ] *ADDENDUM* New AIM Expliot/Worm/Adware-script (realphx.com related) 2003-10-10 Michael A. Nunes (p pcmike net) The code from the realphx.com appears to put av.exe in C:\ which has a "COMPANY" value of www.digitalmatter.net. When going to www.digitalmatter.net you are informed that the site has no affiliation with www.realphx.com and that if you are infected you should be disinfected momentarily. So.. if yo [ more ] [ reply ] |
|
Privacy Statement |
==========================
Even though the cross-site-scripting vulnerability published under BID 7344
was fixed with
Built 0.95zxe1, the current version of Bajie HTTP Jserver is still
vulnerable to
cross-site-scripting attacks.
Vulnerable versions:
=====
[ more ] [ reply ]