BugTraq Mode:
(Page 1648 of 1748)  < Prev  1643 1644 1645 1646 1647 1648 1649 1650 1651 1652 1653  Next >
Unrealircd & Anope services - join segmentation fault in operserv.c 2003-07-08
Lethalman (lethalman libero it)


If an admin say this command: '/msg operserv raw

:nickserv join #chan' NickServ join in that chan, ok.

If the command was: '/msg operserv raw : join #chan'

ircd go to SEGFAULT. Why?

Case 1: operserv ordine to a nick (NickServ) to join #chan

Case 2: operserv ordine to server to join #chan

Irc

[ more ]  [ reply ]
Re: Trillian Remote DoS 2003-07-08
Erik Jacobson (uhlume hotmail com)
Did you even bother notifying the vendor? Or crediting the person who
originally discovered this? Unless you happen to be him, although it
doesn't appear so from your site.

Anyway, this bug has been known about for a while, and is fixed in the next
version. Unfortunately they aren't releasing

[ more ]  [ reply ]
WDAV exploit without netcat and with pretty magic number 2003-07-08
XNUXER RESEARCH (xnuxer hackermail com)
Just modified WDAV exploit without netcat or telnet and with pretty magic number as RET ;P. Create on May, 2003.

Sample action picture from this exploit can check in this link: http://www.infosekuriti.com/artikel/artikel25_files/image002.jpg

/*
* IIS 5.0 WebDAV Exploit versi Xnuxer Lab
* By Schi

[ more ]  [ reply ]
Adobe Acrobat and PDF security: no improvements for 2 years 2003-07-08
Vladimir Katalov (info elcomsoft com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: MD5

Adobe Acrobat and PDF security: no improvements for 2 years.
Software released in 2003 contains vulnerabilities disclosured in 2001

July 8, 2003

SUMMARY
======================================================================

In early 2001, we have dis

[ more ]  [ reply ]
ProductCart XSS Vulnerability 2003-07-05
atomix atomix (at0mix87 yahoo com)


#####################

# ProductCart XSS #

# Vulnerability #

# found by atomix #

#####################

i came across the fact that in an area of ProductCart you are able to

manipulate the error message, therefore allowing tags such as <script> and

<iframe> to be used:

ht

[ more ]  [ reply ]
Re: Contact information for Microsoft Security Response Center [tf] 2003-07-04
keepitsecret hush com

Why do you people insist on using such an unobvious address? Do you have
a catch-all in place?

secure (at) microsoft (dot) com [email concealed] is a whimsical address almost as silly as designating
"abuse (at) microsoft (dot) com [email concealed]" to "badstuff (at) microsoft (dot) com [email concealed]".

If check where those people you heard saying they tried to contact you
trie

[ more ]  [ reply ]
Re: [Full-Disclosure] MacOSX - crash screensaver locked with password and get the desktop back 2003-07-04
jamie rishaw (jamie arpa com)
*Not* confirmed (tried various between 500-60000 chars) on Dual Powermac G4 1.2
10.2.6

On Fri, Jul 04, 2003 at 09:42:41PM +0000, petard wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> > how? - you ask.
> > i don't know the exact amount of characters, only that if you leave a
> > key

[ more ]  [ reply ]
ICQ 2003a Password Bypass 2003-07-05
Cauã Moura Prado (mouraprado infoguerra com br)


Software: ICQ 2003a

Threat: Login password can be bypassed locally

I have found a vulnerability in ICQ Pro 2003a that

allows anyone to connect to ICQ server using any

account registered locally regardless the 'save

password' option is checked or not. High level

security password is als

[ more ]  [ reply ]
Re: Another ProductCart SQL Injection Vulnerability 2003-07-05
Massimo Arrigoni (support earlyimpact com)
In-Reply-To: <1057289439.3f04f4dfaf159 (at) webmail.bosen (dot) net [email concealed]>

Instructions on how to address this security issue:

-------------------------------------------------------------------

User of ProductCart v1.5 and before:

Please contact Early Impact ASAP to update to a later version of

ProductC

[ more ]  [ reply ]
Re: Script Injection to Custom HTTP Errors in Local Zone (GM#014-IE) 2003-07-05
Marek Blahus (marek blahus cz)
Here are some comments on the MSIE custom HTTP errors script injection
vulnerability posted by GreyMagic back on June 17th:

I had been playing with the custom HTTP errors as well, it's some two years
ago, but it still works pretty much the same. Here is my version of the URL
I figured out that time

[ more ]  [ reply ]
[OpenPKG-SA-2003.032] OpenPKG Security Advisory (php) 2003-07-07
OpenPKG (openpkg openpkg org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________

OpenPKG Security Advisory The OpenPKG Project
http://www.openpkg.org/security.html http://www.openpkg.org
openpkg-security (at) openpkg (dot) org [email concealed]

[ more ]  [ reply ]
[SECURITY] [DSA-339-1] New semi, wemi packages fix insecure temporary file creation 2003-07-07
Matt Zimmerman (mdz debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 339-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Matt Zimmerman
July 6th, 2003

[ more ]  [ reply ]
cPanel Malicious HTML Tags Injection Vulnerability 2003-07-06
Ory Segal (ory segal sanctuminc com)
------------------------------------------------------------------------
-------
-----[ cPanel Malicious HTML Tags Injection Vulnerability
------------------------------------------------------------------------
-------

--[ Author: Ory Segal, Sanctum inc. http://www.SanctumInc.com
--[ Discovery Date:

[ more ]  [ reply ]
rundll32.exe buffer overflow 2003-07-06
Rick (rikul bellsouth net)
Hi,

There is buffer overflow in rundll32.exe when it is passed big string as
routine name for a module. I've tested this on WindowsXP SP1. But other
version of windows might be vuln.

rundll32.exe advpack32.dll,<'A'x499>

advpack32.dll is just example. Any executable/dll will work.

[ more ]  [ reply ]
XSS in OWA allows stealing windows domain user credentials 2003-07-05
Hugo Vázquez Caramés (overclocking_a_la_abuela hotmail com)


-2 vulnerabilities in OWA.

-Vendor contacted

Microsoft Outlook Web Access comes with a feature that

allows script filtering on HTML formatted mail

attachments.It is possible for an attacker to make a

request in a particular way so that OWA does not filter

the attachment causing the script

[ more ]  [ reply ]
[SECURITY] [DSA-337-1] New semi, wemi packages fix insecure temporary file creation 2003-07-07
Matt Zimmerman (mdz debian org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 337-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Matt Zimmerman
July 6th, 2003

[ more ]  [ reply ]
Vulneralbility in aplication Billing Explorer 2003-07-07
XNUXER RESEARCH (xnuxer hackermail com)
XNUXER RESEARCH SECURITY REPORT:
================================================================
Aplication Name: Billing Explorer
Vendor Site : http://www.billingexplorer.com
Vendor Email : info_008 (at) yahoo (dot) com [email concealed]
Security : High Risk
Vulnerable : String command and Client Handle
without

[ more ]  [ reply ]
myServer - Remote Denial of Service 2003-07-06
morning_wood (se_cur_ity hotmail com)
------------------------------------------------------------------
- EXPL-A-2003-012 exploitlabs.com Advisory 012
------------------------------------------------------------------
-= myServer =-

Donnie Werner
July 5, 2003

Vunerability(s):
----------------
Den

[ more ]  [ reply ]
[SECURITY] [DSA-338-1] New x-face-el packages fix insecure temporary file creation 2003-07-07
Matt Zimmerman (mdz debian org)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 338-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Matt Zimmerman
July 6th, 2003

[ more ]  [ reply ]
Remote DoS on Canon GP300 2003-07-07
DOUHINE Davy (DDOUHINE fininfo fr)
Affected: Canon GP300 using WebSpooler v4.5.062 (fr), other versions ?
Risk: High
Remote: Yes

Description:
A simple http request can crash the whole print server.
Request is "GET /" on tcp/80
After sending "GET /" a reboot is needed to print again or to take hand on
the print server.

The web serve

[ more ]  [ reply ]
[CLA-2003:685] Conectiva Security Announcement - openldap 2003-07-04
Conectiva Updates (secure conectiva com br)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
CONECTIVA LINUX SECURITY ANNOUNCEMENT
- ------------------------------------------------------------------------
--

PACKAGE : openldap
SUMMARY : Denial of Service and othe

[ more ]  [ reply ]
Trillian Remote DoS 2003-07-04
flur (flur flurnet org)
Application: Trillian
Developer(s): Cerulean Studios (http://www.trillian.cc)
Scope: Remote DoS & Possible Exploit
Tested on: Trillian 1.0 Pro, 0.74 Freeware

It is possible to crash Trillian by sending a corrupt 'TypingUser' message.
Replacing any of the characters in 'TypingUse

[ more ]  [ reply ]
[CLA-2003:675] Conectiva Security Announcement - ml85p 2003-07-04
Conectiva Updates (secure conectiva com br)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
CONECTIVA LINUX SECURITY ANNOUNCEMENT
- ------------------------------------------------------------------------
--

PACKAGE : ml85p
SUMMARY : Insecure temporary file creat

[ more ]  [ reply ]
Re: [Full-Disclosure] MacOSX - crash screensaver locked with password and get the desktop back 2003-07-04
Brent J. Nordquist (b-nordquist bethel edu)
On 4 Jul 2003, Delfim Machado <bipbip (at) xpto (dot) org [email concealed]> wrote:

> i don't know the exact amount of characters, only that if you leave a
> key pressed for 5 minutes or more and then hit the enter key, you crash
> the screensaver and gain access to the desktop.

Confirmed; Mac OS X 10.2.6 on iBook (600MHz Pow

[ more ]  [ reply ]
(Page 1648 of 1748)  < Prev  1643 1644 1645 1646 1647 1648 1649 1650 1651 1652 1653  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus