BugTraq Mode:
(Page 1639 of 1748)  < Prev  1634 1635 1636 1637 1638 1639 1640 1641 1642 1643 1644  Next >
Resolved - IRCX Pro 2003-07-25
morning_wood (se_cur_ity hotmail com)
It has been brought to my attention that the issues reported in
http://exploitlabs.com/files/advisories/EXPL-A-2003-002-ircxpro.txt
have been fixed as of the latest release, and all notices should be updated
reflecting this resolve.

------------------------------
From: IRCXpro Support
To: Donnie W

[ more ]  [ reply ]
Re: e107 website system Vulnerability 2003-07-25
Steve Dunstan (jalist e107 org)
In-Reply-To: <1059078080.10973.171.camel (at) tyohn.sys.alabanza (dot) com [email concealed]>

The db_dump code is protected against non-logged in users as are all

admin functions. If a registered member with full admin permissions (not

any admin, it -has- to be the main site admin who installed e107 in the

first place) i

[ more ]  [ reply ]
TEXT/PLAIN: ALERT("OUTLOOK EXPRESS") 2003-07-25
http-equiv (at) excite (dot) com [email concealed] (1 malware com) (1 replies)


Friday, July 25, 2003

Active Scripting and HTML in a plain text mail message:

MIME-Version: 1.0
Content-Type: text/plain;
Content-Transfer-Encoding: 7bit
X-Source: 25.07.03 http://www.malware.com

<img dynsrc=javascript:alert()><font color=red>foo

The above is a legitimate RFC822 mail message

[ more ]  [ reply ]
Re: TEXT/PLAIN: ALERT("OUTLOOK EXPRESS") 2003-07-25
Denis Jedig (seclists syneticon de)
XSS in e107 website system 2003-07-25
Pete Foster (petef sec-tec co uk)

Sec-Tec Advisory - Multiple XSS in e107

The most up to date version of this advisory can always be found at:
www.sec-tec.co.uk/vulnerability/e107xss.html

Advisory creation date: 14th July 2003
Product: e107 blog/portal system
Tested version: 0.554
Vulnerability: Multiple XSS
Discoverd by: Pet

[ more ]  [ reply ]
RE: Windows NT 4.0 with IBM JVM Denial of Service 2003-07-25
Angelidis, Fotis(NSASOUDABAY) (AngelidisF nsa souda navy mil)

>Microsoft has issued a bulletin and a patch. More information
>is available at:

>http://www.microsoft.com/technet/security/bulletin/MS03-029.asp

>Recommendation:

>Java developers should identify all occurances and perform data
>validation where java.io.getCanonicalPath is used.

>NT 4.0 Admin

[ more ]  [ reply ]
MS03-029 / Q823803 breaks RAS? 2003-07-25
Adam D. Barratt (security-bugtraq funky-badger org)
Hi all,

After installing MS03-029 / Q823803 on a number of our NT4 servers and
workstations (via Windows Update) yesterday, we found that RAS failed to
start on all machines on which it was installed.

Specifically, the Remote Access Connection Manager service fails to start,
due to an error loadin

[ more ]  [ reply ]
[RHSA-2003:221-01] Updated stunnel packages fix signal vulnerability 2003-07-25
bugzilla redhat com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ---------------------------------------------------------------------
Red Hat Security Advisory

Synopsis: Updated stunnel packages fix signal vulnerability
Advisory ID: RHSA-2003:221-01
Issue date: 2003-07-25

[ more ]  [ reply ]
PBLang Forum XSS Vul 2003-07-25
Quan Van Truong Bui (quan_vu_208cn yahoo com)


PBLang is a web forum written by PHP language. A security vulnerability in

the product allows posting of HTML code and JavaScript into existing web

pages thus causing it to be executed on the client end (a Cross-Site

Scripting vuln).

|--------------------------------------------|

Vulne

[ more ]  [ reply ]
ssh host key generation in Red Hat Linux 2003-07-25
Kent Borg (kentborg borg org) (1 replies)
I recently installed Red Hat Linux 9 and noticed on the first boot a
message about generating ssh host keys. Isn't that a dangerous thing
to do on the first boot? Where is the installation going to get
enough good entropy so early in its life?

Maybe the paranoid thing to do is, as part of configu

[ more ]  [ reply ]
Re: ssh host key generation in Red Hat Linux 2003-07-25
Crispin Cowan (crispin immunix com) (1 replies)
Re: ssh host key generation in Red Hat Linux 2003-07-25
Brian Hatch (bugtraq ifokr org)
MDKSA-2003:066-2 - Updated kernel packages fix multiple vulnerabilities 2003-07-25
Mandrake Linux Security Team (security linux-mandrake com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________

Mandrake Linux Security Update Advisory
________________________________________________________________________

Package name: kernel
Advisory ID:

[ more ]  [ reply ]
exp for Microsoft SQL Server DoS(MS03-031) By Xfocus 2003-07-25
benjurry (benjurry xfocus org)
////////////////////////////////////////////////////////////////////////
////////

//

// exp for Microsoft SQL Server DoS(MS03-031)

//

// By : refdom

// Email : refdom (at) xfocus (dot) org [email concealed]

// Home Page : http://www.xfocus.org

// http://www.xfocus.org/exploits/200307/expMS0331.cpp

[ more ]  [ reply ]
Emulex FibreChannel Hub Vulnerable to SNMP DoS Attack 2003-07-25
SGI Security Coordinator (agent99 sgi com)
-----BEGIN PGP SIGNED MESSAGE-----

________________________________________________________________________
______
SGI Security Advisory

Title : Emulex FibreChannel Hub Vulnerable to SNMP DoS Attack
Number : 20030703-01-I
Date : July 25, 2003
Reference

[ more ]  [ reply ]
The Analysis of LSD's Buffer Overrun in Windows RPC Interface by Xfocus [Moderator: new targets in exploit code] 2003-07-25
benjurry (benjurry xfocus org)
The Analysis of LSD's Buffer Overrun in Windows RPC Interface

Author:Flashsky

site:www.xfocus.org WWW.VENUSTECH.COM.CN WWW.SHOPSKY.COM

Email:flashsky (at) xfocus (dot) org [email concealed]

Translator:Benjurry

Email:Benjurry (at) xfocus (dot) org [email concealed]

Code by Flashsky and Benjurry

http://www.xfocus.org/documents/200307/2.html

[ more ]  [ reply ]
Oracle Extproc Buffer Overflow (#NISR25072003) 2003-07-25
NGSSoftware Insight Security Research (nisr nextgenss com)
NGSSoftware Insight Security Research Advisory

Name: Oracle Extproc Buffer Overflow
Systems Affected: Most OS platforms; Oracle9i Database Release 2 and 1, 8i
Severity: High Risk
Vendor URL: http://www.oracle.com
Authors: David Litchfield (david (at) ngssoftware (dot) com [email concealed])
Chris Anley (chris (at) ngssoftware (dot) com [email concealed])

[ more ]  [ reply ]
The Analysis of LSD's Buffer Overrun in Windows RPC Interface(code revised ) 2003-07-25
xundi (xundi xfocus org)
bugtraq

The Analysis of LSD's Buffer Overrun in Windows RPC Interface
Author:Flashsky
site:www.xfocus.org WWW.VENUSTECH.COM.CN WWW.SHOPSKY.COM
Email:flashsky (at) xfocus (dot) org [email concealed]
Translator:benjurry
Email:benjurry (at) xfocus (dot) org [email concealed]

Foreword
Jul 16th, 2003,LSD published that they had discovered a critical secur

[ more ]  [ reply ]
Certain operating systems can be sometimes locally DoSed when running on particular types of hardware with certain versions of BIOS in specific multiboot configurations (and you thought XSS is too much?) 2003-07-24
Michal Zalewski (lcamtuf ghettot org)

Yes, of course the subject line is silly... but in fact, the vulnerable
combination actually occurs quite often. Still, I'm posting it here not
because it's a very serious flaw, but because I find it amusing and
unique. It's a CPU/BIOS/OS vulnerability, of sorts, and nobody's at fault,
of course.

[ more ]  [ reply ]
Re: e107 website system Vulnerability 2003-07-24
nokio x0 (xj3wlzx hotmail com) (1 replies)
Heh, I every site that i've come across running the e107 portal seems to ask
for admin login before you could use this exploit...Are you sure all
versions are vulnerable? Doesn't even work on my own system without asking
for login.

----------------------------------------------------------------

[ more ]  [ reply ]
Re: e107 website system Vulnerability 2003-07-25
Tjebbe de Winter (Tjebbe deWinter_ nospam cysonet com)
[CLA-2003:704] Conectiva Security Announcement - apache 2003-07-24
Conectiva Updates (secure conectiva com br)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
CONECTIVA LINUX SECURITY ANNOUNCEMENT
- ------------------------------------------------------------------------
--

PACKAGE : apache
SUMMARY : Denial of service vulnerabil

[ more ]  [ reply ]
e107 website system Vulnerability 2003-07-24
Artoor Petrovich (artoor exfloyt com) (1 replies)
Informations :

Advisory Name: e107 website system Vulnerability

Author: hiruvim <artoor (at) exfloyt (dot) com [email concealed]>

Discover by: hiruvim <artoor (at) exfloyt (dot) com [email concealed]>

Website vendor : http://e107.org

Affected System(s): All versions

Severity: High

Platform(s): Windows and Unix

Issue: Security holes enable attacker

[ more ]  [ reply ]
Re: e107 website system Vulnerability 2003-07-24
Tim Yohn (tyohn alabanza com)
RE: Drivial Pursuit: Internet Explorer Browser & Your Files and Folders ! 2003-07-24
Thor Larholm (thor pivx com)
I can positively confirm this vulnerability on both WMP 7 and 8 on Windows
98, ME, 2000, XP and 2003. The default Enhanced Security Configuration of IE
on Windows 2003 does nothing to prevent automatically opening certain media
types.

The ASF file can be automatically opened through an IFRAME, both

[ more ]  [ reply ]
paFileDB 3.1 2003-07-24
Martin Eiszner (martin websec org)

hola,

paFileDB 3.1 (http://www.phparena.net) allows arbitrary file-upload and os-command execution.

(security report attached)

nice day,
mEi

--
WebSec.org / Martin Eiszner
Gurkgasse 49/Top14
1140 Vienna
Austria / EUROPE

mei (at) websec (dot) org [email concealed]
http://www.websec.org
tel: 0043 699 121772 37

[ more ]  [ reply ]
MDKSA-2003:071-1 - Updated xpdf packages fix arbitrary code execution vulnerability 2003-07-24
Mandrake Linux Security Team (security linux-mandrake com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________

Mandrake Linux Security Update Advisory
________________________________________________________________________

Package name: xpdf
Advisory ID:

[ more ]  [ reply ]
MDKSA-2003:078 - Updated mpg123 packages fix vulnerability 2003-07-24
Mandrake Linux Security Team (security linux-mandrake com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________

Mandrake Linux Security Update Advisory
________________________________________________________________________

Package name: mpg123
Advisory ID:

[ more ]  [ reply ]
(Page 1639 of 1748)  < Prev  1634 1635 1636 1637 1638 1639 1640 1641 1642 1643 1644  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus