BugTraq Mode:
(Page 1616 of 1748)  < Prev  1611 1612 1613 1614 1615 1616 1617 1618 1619 1620 1621  Next >
PhpBB Admin smiley panel CSS 2003-09-13
Benjamin Tolman (rituel voila fr)


English version :

I found a CSS in Admin smiley panel that can be used like that :

When you're logged as admin if you put a smiley code like that :)<script>alert('Css work')</script> and then any smiley picture and description, the Admin smiley panel will show the smiley with the

[ more ]  [ reply ]
Buffer Overflow in WideChapter Browser 2003-09-13
Bahaa Naamneh (b_naamneh hotmail com)


Buffer Overflow in WideChapter Browser

Advisory Information:

=====================

Application: WideChapter Browser

Vendor Homepage: http://www.widechapter.com

Versions: 3.0 (and earlier versions)

Platforms: Windows (all)

Severity: High

Date: 12.09.03

Introduction:

============

[ more ]  [ reply ]
Windows RPC DCOM Dos exploit 2003-09-14
lion (lion cnhonker net)
/*
* Windows RPC DCOM Dos exploit
* by bkbll bkbll (at) cnhonker (dot) net [email concealed]
* http://www.cnhonker.com
* modified the code from oc192 Security
*
* Usage:
* cl dcomdos.cpp
* dcomdos -d 10.10.10.135 -n 3000
*/

Welcome to HUC website: http://www.cnhonker.com

[ more ]  [ reply ]
Re: Internet explorer 6 on windows XP allows exection of arbitrary code (Demonstration Exploit Warning) 2003-09-13
S G Masood (sgmasood yahoo com)
Hi,

Jelmer probably forgot to mention this about the
demonstration exploit[1] in his advisory[2]: Back up
"C:\Program Files\Windows Media Player\wmplayer.exe"
before using the exploit as the exploit replaces the
original wmplayer.exe(main WMP executable) with the
dropped file(also named wmplayer.ex

[ more ]  [ reply ]
exploit for mysql -- [get_salt_from_password] problem 2003-09-13
lion (lion cnhonker net)
exp for mysql ([get_salt_from_password] problem)
proof of concept
using jmp *eax
bkbll(bkbll_at_cnhonker.net,bkbll_at_tom.com) 2003/09/13
compile:gcc -o mysql mysql.c -L/usr/lib/mysql -lmysqlclient

Welcome to HUC website: http://www.cnhonker.com

[ more ]  [ reply ]
Eudora 6.0 attachment spoof, exploit 2003-09-13
psz maths usyd edu au (Paul Szabo)
Eudora 6.0 was released recently; I tested the Windows version only.
It still contains several vulnerabilities, the most serious being an
execute-any-code bug. It is distressing that the "spoof and steal" bug
was pointed out years ago; the execute-any-code bug in 5.2.1 was sent
to Qualcomm on 29 May

[ more ]  [ reply ]
[SECURITY] [DSA-381-1] New mysql packages fix buffer overflow 2003-09-14
Matt Zimmerman (mdz debian org)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 381-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Matt Zimmerman
September 13th, 2003

[ more ]  [ reply ]
Results of the vote query 2003-09-13
Alfred Huger (ah securityfocus com)

Hello,

Myself and David Ahmad (depending on the list you are on) recently sent
out mail querying all of you about instituting community voting on issues
for both the SecurityFocus website and its mailing lists. The feedback was
overwhelmingly in favor of doing so with several common caveats:

1.

[ more ]  [ reply ]
Moozatech: MyServer Buffer Overflow vulnerability 2003-09-12
Moran (moran moozatech com)
12/09/03

Moozatech Advisory http://www.moozatech.com/mt-12-09-2003.txt

-------------------------------------------------------

Application: MyServer Web Server
Web Site: http://myserverweb.sf.net
Versions: 0.4.3 and below
Platform: Windows98,Windows2000,Linux
Bug: Buffer Overflo

[ more ]  [ reply ]
Re: Wired misquote [Symantec want's to criminalize full-disclosure] 2003-09-12
Alfred Huger (alfred_huger symantec com)


I am posting this In reference to the recent Wired article which Richard

Smith posted to this list. Symantec fully supports information sharing on

threats and vulnerabilities and believes it is an important tool for

consumers and IT professionals to gain a measure of early warning of

[ more ]  [ reply ]
[SECURITY] [DSA-380-1] New xfree86 packages fix multiple vulnerabilities 2003-09-12
Matt Zimmerman (mdz debian org)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 380-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Matt Zimmerman
September 12th, 2003

[ more ]  [ reply ]
[CLA-2003:737] Conectiva Security Announcement - gtkhtml 2003-09-12
Conectiva Updates (secure conectiva com br)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
CONECTIVA LINUX SECURITY ANNOUNCEMENT
- ------------------------------------------------------------------------
--

PACKAGE : gtkhtml
SUMMARY : Buffer overflow vulnerabili

[ more ]  [ reply ]
DCOM Paper Part I 2003-09-12
dave immunitysec com


A paper I wrote last night on the new DCOM bug, containing lots of Ollydbg hints and tricks. Most likely useful to people who already are trying to exploit it, and probably not a paper for management to read. Read it now before Symantec, Microsoft, and the rest of oisaftey get this kind of informa

[ more ]  [ reply ]
Yak! 2.0.1 file trasfer exploit 2003-09-12
bil (bil_912 coolgoose com)


http://www.digicraft.com.au/yak/

yak 2.0.1 is a software for chattin in lan environment for windows

it supports file transfers. the default port it listens is 3535.

connecting at 3535

telnet localhost 3535 gives up nice :

" 220 ICS FTP Server ready. "

meaning for file tran

[ more ]  [ reply ]
Update to the Oracle EXTPROC advisory 2003-09-12
NGSSoftware Insight Security Research (nisr nextgenss com)
Hello,
Please note that Oracle has updated the extproc buffer overrun advisory.
There was some confusion caused because the intial Oracle advisory stated
that a username and password were required to exploit the overflow which was
contrary to the results of our research; we concluded that no user ID

[ more ]  [ reply ]
[CLA-2003:738] Conectiva Security Announcement - pine 2003-09-12
Conectiva Updates (secure conectiva com br)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
CONECTIVA LINUX SECURITY ANNOUNCEMENT
- ------------------------------------------------------------------------
--

PACKAGE : pine
SUMMARY : Remote vulnerabilities
DATE

[ more ]  [ reply ]
RE: Computer Sabotage by Microsoft 2003-09-12
Russ (Russ Cooper rc on ca)
I can't believe it, I was sitting there and you know what happened? I went to view the Program Guide on my PVR dish and it said it had to retrieve an update. It said I could cancel, so I did, who do they think they are! So I went back to view the guide again and the damn thing said it had to retriev

[ more ]  [ reply ]
PTms03039.zip 2003-09-11
info_sl (info securitylab ru)
Hi!

PTms03039.zip is an utility for checking Windows machine, which is
vulnerable to the RPC DCOM #2 (MS03-039). Tool can be downloaded here
http://www.securitylab.ru/?ID=40170 (in Russian!) or
http://www.securitylab.ru/_tools/PTms03039.zip.

---------------------------
Positive Technologies (http:

[ more ]  [ reply ]
4D WebSTAR FTP Buffer Overflow. 2003-09-11
B-r00t (br00t blueyonder co uk)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Remote Vulnerability in 4D WebSTAR Server Suite.
================================================

Date: 11.09.2003
Author: B-r00t. 2003.
Email: B-r00t <br00t (at) blueyonder.co (dot) uk [email concealed]>

Vendor: 4D.
Reference: http://www.4d.com/prod

[ more ]  [ reply ]
Internet explorer 6 on windows XP allows exection of arbitrary code 2003-09-11
jelmer (jkuperus planet nl) (1 replies)
Internet explorer 6 on windows XP allows exection of arbitrary code

DESCRIPTION :

Yesterday Liu Die Yu released a number series of advisories concerning
internet explorer
by combining on of these issues with an earlier issue I myself reported a
while back
You can construct a specially crafted webp

[ more ]  [ reply ]
RE: Computer Sabotage by Microsoft 2003-09-11
Thor Larholm (thor pivx com) (1 replies)
Automatic system updates are nothing new, we see it all the time with
antivirus software. Given that the enduser has agreed for his AV to be
updated automatically, none of us see any moral, ethical or legal
implications with that scenario.

The legality of this in regards to your XBox all boils down

[ more ]  [ reply ]
RE: Computer Sabotage by Microsoft 2003-09-13
achurch achurch org (Andrew Church)
MDKSA-2003:089 - Updated XFree86 packages fix multiple vulnerabilities 2003-09-12
Mandrake Linux Security Team (security linux-mandrake com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________

Mandrake Linux Security Update Advisory
________________________________________________________________________

Package name: XFree86
Advisory ID:

[ more ]  [ reply ]
(Page 1616 of 1748)  < Prev  1611 1612 1613 1614 1615 1616 1617 1618 1619 1620 1621  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus