|
Colapse all |
Post message
Re: Microsoft Windows 2000 RPC DCOM Interface DOS AND Privilege Escalation Vulnerability 2003-07-22 benjurry (benjurry xfocus org) Apache 1.3.27 mod_proxy security issue 2003-07-22 Jason Robertson (jason ifuture com) I have found that recently a spammer has been using a mod_proxy configuration, (that was meant to allow for an easier transition to a new naming scheme, as well as changes to a backend software) as a spam relay. The spammer has been using HTTP POST requests to send these messages with POST HTTP [ more ] [ reply ] RE: Disclosure-for-pay? 2003-07-22 Rikhardur EGILSSON oecd org This is apparenty what happened with Serge Humpich, France's famous engineer (At least in France :-), a true hacker (in the original meaning of the word). He was passionate about the French credid card system and how it worked, and spent four years studying the system and even bought one teller ma [ more ] [ reply ] Re: Microsoft Windows 2000 RPC DCOM Interface DOS AND Privilege Escalation Vulnerability 2003-07-22 flashsky fangxing (flashsky xfocus org) In-Reply-To: <003b01c34ef1$4a8486f0$64064a0a@homedudu> The reason for this is that __RemoteGetClassObject intface passed a NULL point to PerformScmStage Function; Author e-mail: fangxing (at) venustech.com (dot) cn [email concealed] flashsky (at) xfocus (dot) org [email concealed] Thanks: Test and translate for Benjerry (at) xfocus (dot) org [email concealed] We [ more ] [ reply ] Re: Microsoft Windows 2000 RPC DCOM Interface DOS AND Privilege Escalation Vulnerability 2003-07-22 voleur speakeasy net Security Update: [ CSSA-2003-SCO.12 ] OpenServer 5.0.6, OpenServer 5.0.7 : Security vulnerability in Merge prior to Release 5.3.23a 2003-07-22 security sco com To: bugtraq (at) securityfocus (dot) com [email concealed] announce (at) lists.caldera (dot) com [email concealed] -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ________________________________________________________________________ ______ SCO Security Advisory Subject: UnixWare 7.1.x : Security vulnerability in Merge prior to Release 5.3. [ more ] [ reply ] [CLA-2003:700] Conectiva Security Announcement - nfs-utils 2003-07-22 Conectiva Updates (secure conectiva com br) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------ -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - ------------------------------------------------------------------------ -- PACKAGE : nfs-utils SUMMARY : Buffer overflow vulnerabi [ more ] [ reply ] [CLA-2003:698] Conectiva Security Announcement - apache 2003-07-21 Conectiva Updates (secure conectiva com br) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------ -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - ------------------------------------------------------------------------ -- PACKAGE : apache SUMMARY : Denial of service vulnerabil [ more ] [ reply ] ActiveX security resources 2003-07-21 Michael Howard (mikehow microsoft com) Following recent emails about securing ActiveX controls, we would like to bring the following resources to developers' attentions: _Designing Secure ActiveX Controls_ Guidelines for building security ActiveX controls, especially controls marked safe for scripting. http://msdn.microsoft.com/workshop [ more ] [ reply ] RE: Re: FW: Windows Update - Unsafe ActiveX control (fwd) 2003-07-20 liudieyuinchina vip sina com >if there is some XSS hole in > Windows Update site or if there is a bug in IE that > allows to trick the URL, then the attacker can use Windows Update ActiveX to: reboot your machine; get detailed information on computer - computer name, hardware, isAdmin, etc. BUT it's hard for the atta [ more ] [ reply ] WebCalendar Include File 2003-07-21 noconflic (nocon texas-shooters com) Webcalendar 0.9.41 and below. http://webcalendar.sourceforge.net/ Since this appears to be public info now. Problem: http://sourceforge.net/forum/forum.php?thread_id=901234&forum_id=11588 Exploit: http://www.some.host/webcalendar/[filename].php?user_inc=../../../../../ etc/passwd - [ more ] [ reply ] RE: Cisco IOS exploit (44020) 2003-07-21 Donahue, Pat (PDonahue acmicorp com) (1 replies) Here's a much simpler shell script that produces the same result: --- BEGIN SHELL SCRIPT --- #!/bin/tcsh -f if ($1 == "" || $2 == "") then echo "usage: $0 <router hostname|address> <ttl>" exit endif foreach protocol (53 55 77 103) /usr/local/sbin/hping $1 --rawip --rand-source --ttl $2 -- [ more ] [ reply ] Path disclosure and file retrieving in AtomicBoard-0.6.2 2003-07-21 gr00vy (groovy2600 yahoo com ar) Vendors has been contacted. Main WEB: http://cal007300.student.utwente.nl/atomicboard/ DESCRIPTION: ======================================================================== = What is AtomicBoard? "An object oriented framework for building forums/weblogs" AtomicBoard is an Open Source web applicati [ more ] [ reply ] RE: Disclosure-for-pay? 2003-07-21 Martin Walker (martin walker ctg com) (1 replies) NOTE: that the individual is not saying "Pay me or I'll tell everyone about it". He's just saying "Pay me or I WON'T tell you about it". There is a subtle but critical difference. Your example is incorrect from that standpoint. Personally I don't think it is very good business, but it is not as d [ more ] [ reply ] Drupal XSS Vulnerability (main page and sub pages) 2003-07-21 Ferruh Mavituna (ferruh mavituna com) ------------------------------------------------------ Drupal XSS Vulnerability (main page and sub pages) ------------------------------------------------------ Any kind of XSS attacks possibility. An attacker could access other users/admin drupal accounts. ----------------------------------------- [ more ] [ reply ] Cisco IOS exploit (44020) 2003-07-21 Martin Kluge (martin elxsi de) Hi, I'd like to submit a DoS attack against the recently found bug in almost all Cisco IOS versions (Cisco document ID 44020). The exploit can be found here (and it is included as attachment): http://www.elxsi.de/cisco-bug-44020.tar.gz This exploit is NOT broken (like the shadowchode.tar.gz exp [ more ] [ reply ] CGI.pm vulnerable to Cross-site Scripting 2003-07-20 obscure (dontreply eyeonsecurity org) (1 replies) Advisory Title: CGI.pm vulnerable to Cross-site Scripting. Release Date: July 19 2003 Application: CGI.pm - which is by default included in many common Perl distributions. Platform: Most platforms. Tested on Apache and IIS. Version: CGI.pm Severity: Effects scripts which make use of start_f [ more ] [ reply ] Re: CGI.pm vulnerable to Cross-site Scripting 2003-07-21 Erwann CORVELLEC (Erwann Corvellec free fr) (1 replies) Microsoft Windows 2000 RPC DCOM Interface DOS AND Privilege Escalation Vulnerability 2003-07-20 benjurry (benjurry xfocus org) Microsoft Windows 2000 RPC DCOM Interface DOS AND Privilege Escalation Vulnerability 1.Description: There is a vulnerability in the part of RPC that deals with message exchange over TCP/IP. The failure results because of incorrect handling of malformed messages. By sending a malformed me [ more ] [ reply ] [RHSA-2003:162-02] Updated Mozilla packages fix security vulnerability. 2003-07-21 bugzilla redhat com Simpnews include file Vulnerability 2003-07-19 pupet cahyo (pupet cosmo com) original File name : PUPET-simpnews.txt date releases : july 15, 2003 Informations : ========================= Advisory Name: Simpnews include file Vulnerability Author: PUPET <pupet (at) cosmo (dot) com [email concealed]> Discover by: PUPET <pupet (at) cosmo (dot) com [email concealed]> Website vendor : http://www.boesch-it.de/ Versions : [ more ] [ reply ] Re: Microsoft ISA Server HTTP error handler XSS (TL#007) 2003-07-19 http-equiv (at) excite (dot) com [email concealed] (1 malware com) > > <A href="http://%09%09%09%09%09%09%09 > 09www.malware.com">http://www.microsoft.com</A> The following will represent a true status and a false destination: <A href="http://www.microsoft.com%09%09%09@%09%09%09%09%09%09 09www.malware.com">http://www.microsoft.com</A> -- http://www.ma [ more ] [ reply ] |
|
Privacy Statement |
benjurry
-----------------------------
天è¡?å¥ï¼?å?å以è?ªå¼ºä¸æ¯
å?°å?¿å¤ï¼?å?å以å??å¾·è½½ç?©
---------------------------
[ more ] [ reply ]