BugTraq Mode:
(Page 1611 of 1748)  < Prev  1606 1607 1608 1609 1610 1611 1612 1613 1614 1615 1616  Next >
Comment Board XSS Vulnerability 2003-09-24
Bahaa Naamneh (b_naamneh hotmail com)


Comment Board XSS Vulnerability

Published: 24 September 2003

Released: 24 September 2003

Affected Systems: Comment Board

Vendor: http://www.ymonda.co.uk

Issue: Remote attackers can inject XSS script.

Description:

============

"Comment Board works straight away with lit

[ more ]  [ reply ]
Re: [Tclhttpd-users] Re: TCLHttpd Server - Multiple Vulnerabilities 2003-09-24
Brent Welch (welch panasas com)
Here is the patch for the dirlist.tcl bug
Please note also that with this bug you can see a
directory listing, but you cannot fetch any files that
you might be able to see. The server running at www.tcl.tk
has had this patch applied to it.

*** dirlist.tcl 4 Apr 2003 04:10:54 -0000 1.10
--- d

[ more ]  [ reply ]
RE: [Fwd: Re: AIM Password theft] VU#865940 2003-09-24
CERT(R) Coordination Center (cert cert org)
-----BEGIN PGP SIGNED MESSAGE-----

Thor Larholm <thor (at) pivx (dot) com [email concealed]> writes:

> This is just a simple exploit utilizing the Object Data vulnerability
> discovered by Drew Copley, coupled with the GreyMagic no-script HTML
> rendering as demonstrated earlier on this list and others by jelmer.
>
> Tell yo

[ more ]  [ reply ]
Re-Boot Design ASP Forum SQL injection Vulnerability 2003-09-24
Bahaa Naamneh (b_naamneh hotmail com)


Re-Boot Design ASP Forum SQL injection Vulnerability

Published: 24 September 2003

Released: 24 September 2003

Affected Systems: Re-Boot Design ASP Forum Version 1.01

Vendor: http://www.re-bootd.com

Issue: attackers can access users accounts without them knowing their passwords.

[ more ]  [ reply ]
Re: [Fwd: Re: AIM Password theft] 2003-09-24
DarkKnight (mbuzz04 yahoo com)
In-Reply-To: <3F7077FE.70303 (at) uniontown (dot) com [email concealed]>

That method of stealing was taken from my website, "counter" is used to trick users into thinking that the script is just for a counter, but in reality it is just the object vulnerability. Anyways, AIM will do nothing to fix this. Why? Because it is not a

[ more ]  [ reply ]
Thread-IT Message Board XSS Vulnerability 2003-09-24
Bahaa Naamneh (b_naamneh hotmail com)


Thread-IT Message Board XSS Vulnerability

Published: 24 September 2003

Released: 24 September 2003

Affected Systems: Thread-IT Message Board

Vendor: http://www.ymonda.co.uk

Issue: Remote attackers can inject XSS script.

Description:

============

"Thread-IT is a simple

[ more ]  [ reply ]
RE: [Fwd: Re: AIM Password theft] VU#865940 2003-09-24
Thor Larholm (thor pivx com)
Art,

You are correct, I should not have replied to Mark when I had not yet had my morning coffee. The dynamic rendering of OBJECT elements still trigger the HTA functionality exposed in Windows. Personally, though, I see this as an unrelated vulnerability regarding static/dynamic code rendering

[ more ]  [ reply ]
RE: Does VeriSign's SiteFinder service violate the ECPA? 2003-09-24
Christopher Wagner (chrisw pacaids com)
Your reply is well thought-out and logical, and most certainly all admins
shouldn't be responsible for making sure typo'd URLs don't get intercepted
by their webservers.

The point I think Mr. Smith is trying to make is that Verisign seems to
*want* to intercept this private information and use it t

[ more ]  [ reply ]
NULLhttpd <= 0.5.1 XSS through Bad request 2003-09-24
Luigi Auriemma (aluigi altervista org)
#######################################################################

Luigi Auriemma

Application: NULLhttpd
http://nullhttpd.sourceforge.net/httpd/
Versions: <= 0.5.1
Platforms: All supported (Win & Unix)
Bug: Cross site scripting
Risk:

[ more ]  [ reply ]
NULLhttpd <= 0.5.1 remote resources consumption 2003-09-24
Luigi Auriemma (aluigi altervista org)
#######################################################################

Luigi Auriemma

Application: NULLhttpd
http://nullhttpd.sourceforge.net/httpd/
Versions: <= 0.5.1
Platforms: All supported (Win & Unix)
Bug: Remote resources consumpti

[ more ]  [ reply ]
Re: AIM Password theft 2003-09-24
http-equiv (at) excite (dot) com [email concealed] (1 malware com)


<!--

Out of curiosity I
followed that link which loaded start.html (attached).

-->

Caution: off-site archives will and have already stored this as:

text/plain attachment: start.txt

Tested on neohapsis

[http://archives.neohapsis.com/archives/bugtraq/2003-09/0375.html]

Due to the 'neve

[ more ]  [ reply ]
[CLA-2003:749] Conectiva Security Announcement - php4 2003-09-24
Conectiva Updates (secure conectiva com br)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
CONECTIVA LINUX SECURITY ANNOUNCEMENT
- ------------------------------------------------------------------------
--

PACKAGE : php4
SUMMARY : Integer overflow vulnerabiliti

[ more ]  [ reply ]
Denial of Service against Gauntlet-Firewall / SQL-Gateway 2003-09-24
Oliver Heinz (heinz arago de)


DOS-Attack against Gauntlet Firewall

-------------------------------------

We found out a security-issue with the Oracle-Proxy (SQL-Gateway) of Gauntlet Firewall, Version 6 (manufactured by Secure Computing/NAI, serversrunning Solaris 8, newest Patches installed).

Abstract:

---------

Sen

[ more ]  [ reply ]
Re: base64 2003-09-24
Seth Breidbart (sethb panix com)
> See the corresponding RFC. The number of characters in a base64-coded
> text must be a multiply of 4. So ='s are used if there aren't enough
> characters and are added at the end of the text.
>
> = is not a valid character inside Base64 and an encoder should stop
> with an error or stops decoding.

[ more ]  [ reply ]
Re: AIM Password theft 2003-09-24
Eric Joe (sysop tje1 com)
Mark/Brent,

I received a SPAM message that does exactly as you described. Here is the
message text
------------------------------------------------------------------------
----
You have a secret admirer
Find out who below
http://www.geocities.com/merlin54906/webcam.html

If you want further informa

[ more ]  [ reply ]
BRS WebWeaver: Anonymous Surfing 2003-09-24
euronymous (just-a-user yandex ru)
=:=:=::=:=:=::=:=:=::=:=:=::=:=:=::=:=:=::=:=:=::=
topic: BRS WebWeaver: Anonymous Surfing
product: BRS WebWeaver 1.06
vendor: http://www.brswebweaver.com
risk: high
date: 09/24/2k3
discovered by: euronymous /F0KP
advisory urls: http://f0kp.iplus.ru/bz/027_en
http://f0kp.iplus.ru/bz/

[ more ]  [ reply ]
Re: AIM Password theft 2003-09-24
jelmer (jkuperus planet nl)

That would be my ado thingie There's a temporary fix over at

http://ip3e83566f.speed.planet.nl/hacked-by-chinese/5.htm

--jelmer

On Tuesday 23 September 2003 21:13, Brent Meshier wrote:
> Mark,
> The code you just sent looks familiar to a SPAM I received
> attempting to hijack users' e-gold acco

[ more ]  [ reply ]
Re: Privacy leak in VeriSign's SiteFinder service #2 2003-09-24
der Mouse (mouse Rodents Montreal QC CA)
> Verisign does NOT reject the connection until AFTER the MAIL FROM:
> and RCPT TO: fields have been communicated by your email server.

The "server" they had completely ignored, as far as anyone could tell,
all input: you could type total garbage lines and get exactly the same
canned sequence of re

[ more ]  [ reply ]
Re: base64 2003-09-24
MightyE (trash mightye org)
I agree, I don't think it's unreasonable to reject improperly formatted
messages. Chances are much higher that they're spam or virii, and the
minority with broken clients will find their way to non-broken clients.
If you are parsing the message, particularly looking for malware, and
encounter

[ more ]  [ reply ]
Re: base64 2003-09-24
der Mouse (mouse Rodents Montreal QC CA)
> 99.99% of all software should create the standard form, so please let
> the tiny fraction of users with broken software suffer when their
> mails get rejected.

> (Note: this of course applies not only to Base64 but to all aspects
> of header-parsing, file-format guessing etc...)

I agree with you

[ more ]  [ reply ]
Re: base64 2003-09-24
David Wilson (David Wilson isode com)
>
> 99.99% of all software should create the standard form, so please
> let the tiny fraction of users with broken software suffer
> when their mails get rejected.
>
> (Note: this of course applies not only to Base64 but to all aspects
> of header-parsing, file-format guessing etc...)

I wish it

[ more ]  [ reply ]
Re: base64 2003-09-24
David Wilson (David Wilson isode com)
On Tue, 2003-09-23 at 19:10, Lothar Kimmeringer wrote:
> On Tue, 23 Sep 2003 12:18:31 -0400 (EDT), Birl wrote:
>
> >Excuse my ignorance. I tried to pook around some B64 attachements in my
> >email files for an answer.
> >
> >
> >Are you stating that an =
> >
> >1) should not appear in B64 at all
>

[ more ]  [ reply ]
Re: Privacy leak in VeriSign's SiteFinder service #2 2003-09-24
Marco Ivaldi (raptor 0xdeadbeef info)
On Wed, 24 Sep 2003, Mark Coleman wrote:

> TELNET YYAAHHOO.COM 25
>
> 220 sitefinder.verisign.com VeriSign mail rejector (Postfix)
> mail from:source (at) yahoo (dot) com [email concealed]
> 250 Ok
> rcpt to:user (at) yyaahhoo (dot) com [email concealed]
> 550 <unknown[198.252.172.254]>: Client host rejected: The domain you are
> trying
> to send mail to

[ more ]  [ reply ]
GLSA: openssh (200309-14) 2003-09-23
aliz gentoo org (Daniel Ahlberg)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - - ---------------------------------------------------------------------
GENTOO LINUX SECURITY ANNOUNCEMENT 200309-14
- - - ---------------------------------------------------------------------

          PACKAGE : openssh
          SUMMARY : multipl

[ more ]  [ reply ]
Privacy leak in VeriSign's SiteFinder service #2 2003-09-24
Mark Coleman (markc uniontown com)
More naughty Verisign deeds...

I don't know if this has been mentioned, but any mis-addressed email to
a non-existent domain will reveal the sender AND intended recipient to a
conveniently placed Verisign SMTP server where it can (and probably is)
being tracked.

For example, an email sent to us

[ more ]  [ reply ]
FreeBSD Security Advisory FreeBSD-SA-03:14.arp 2003-09-24
FreeBSD Security Advisories (security-advisories freebsd org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

========================================================================
=====
FreeBSD-SA-03:14.arp Security Advisory
The FreeBSD Project

Topic: de

[ more ]  [ reply ]
TCLHttpd Server - Multiple Vulnerabilities 2003-09-24
Phuong Nguyen (dphuong yahoo com)
Released Date 09/23/2003

TITLE
=====
TCLHttpd 3.4.2 - Multiple Vulnerabilities

DESCRIPTION
===========
"TclHttpd is used both as a general-purpose Web
server, and as a framework for building server
applications. It implements Tcl (http://www.tcl.tk),
including the Tcl Resource Center and Scriptics

[ more ]  [ reply ]
[ESA-20030924-026] 'WebTool-userpass' passphrase disclosure vulnerability. 2003-09-24
EnGarde Secure Linux (security guardiandigital com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

+-----------------------------------------------------------------------
-+
| Guardian Digital Security Advisory September 24, 2003 |
| http://www.guardiandigital.com ESA-20030924-026 |
|

[ more ]  [ reply ]
Re: [Full-Disclosure] GLSA: openssh (200309-14) 2003-09-23
Ademar de Souza Reis Jr. (ademar conectiva com br)
On Tue, Sep 23, 2003 at 10:25:37PM +0200, Daniel Ahlberg wrote:
> - - ---------------------------------------------------------------------
> GENTOO LINUX SECURITY ANNOUNCEMENT 200309-14
> - - ---------------------------------------------------------------------
>
> PACKAGE : openssh
> SUMMARY : mu

[ more ]  [ reply ]
Privacy leak in VeriSign's SiteFinder service 2003-09-23
Richard M. Smith (rms computerbytesman com)
Hi,

I just discovered that VeriSign's SiteFinder Web site is leaking data
submitted in Web forms to its marketing analysis partner, Omniture.
Forms can easily contain personal information such as an email address.
For the problem to occur, a Web form must use the GET method.

This data spill prob

[ more ]  [ reply ]
(Page 1611 of 1748)  < Prev  1606 1607 1608 1609 1610 1611 1612 1613 1614 1615 1616  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus