BugTraq Mode:
(Page 1658 of 1748)  < Prev  1653 1654 1655 1656 1657 1658 1659 1660 1661 1662 1663  Next >
PHP XSS exploit in phpinfo() 2003-06-03
silent needle (silentneedle hotmail com)


PHP XSS exploit in phpinfo() by Silent Needle

A: BACKGROUND(from php.net)

int phpinfo ( [int what])

Outputs a large amount of information about the current state of PHP. This

includes information about PHP compilation options and extensions, the PHP

version, server information and environ

[ more ]  [ reply ]
Xpressions Software: Multiple SQL Injection Attacks To Manage WebStore 2003-06-04
Paul Craig (pimp brainwave net nz)
/------------------------
Pimp industries.
--------------------------/

Xpressions Software : Multiple SQL Injection Attacks To
Manage WebStore(s).

BackGround
-------------

When your suppliers and trading partners can interact with your
organization as a seamless extension of your internal

[ more ]  [ reply ]
public comment period for the Draft Security Vulnerability Reporting and Responding Process (OISAFETY) 2003-06-04
Craig Ozancin (cozancin symantec com)
The Organization for Internet Safety is pleased to announce the
beginning of the public comment period for the Draft Security
Vulnerability Reporting and Responding Process. This draft process is
the result of a lengthy collaboration between leading security
researchers and software vendors. We h

[ more ]  [ reply ]
MegaBrowser HTTP and FTP Vulnerabilities 2003-06-04
JeiAr (jeiar kmfms com)


Description

-----------------------------------------------------------

Megabrowser is a free standalone program that enables you to host

websites and FTP sites by utilizing its powerful advanced peer-to-peer

features. You can now host websites and FTP sites without paying any

hosting fees.

[ more ]  [ reply ]
Immunix Secured OS 7+ wget update 2003-06-04
Immunix Security Team (security immunix com)
-----------------------------------------------------------------------
Immunix Secured OS Security Advisory

Packages updated: wget
Affected products: ImmunixOS 7+
Bugs fixed: CAN-2002-1344
Date: Tue Jun 3 2003
Advisory ID: IMNX-2003-7+-011-01
Author: Seth Arnold <sarnold (at) immunix (dot) com [email concealed]>
-----

[ more ]  [ reply ]
Immunix Secured OS 7+ file update 2003-06-04
Immunix Security Team (security immunix com)
-----------------------------------------------------------------------
Immunix Secured OS Security Advisory

Packages updated: file
Affected products: Immunix OS 7+
Bugs fixed: CAN-2003-0102
Date: Tue Jun 3 2003
Advisory ID: IMNX-2003-7+-012-01
Author: Seth Arnold <sarnold (at) wirex (dot) com [email concealed]>
------

[ more ]  [ reply ]
CA Unicenter Password Recovery Tool 2003-06-04
Tor Houghton (info kufumo com)

List,

The following can also be found at:

http://www.kufumo.com/releases/ca-passwordrecover.txt

Thanks,

Tor Houghton

;

$Id: ca-passwordrecover.txt,v 1.3 2003/05/20 10:46:51 torh Exp $

Computer Associates "Asset Manager" Password Recovery Tool

(c) 2003 Tor Houghton (th

[ more ]  [ reply ]
Updated SGI Apache Version Available for IRIX 2003-06-03
SGI Security Coordinator (agent99 sgi com)
-----BEGIN PGP SIGNED MESSAGE-----

________________________________________________________________________
______
SGI Security Advisory

Title : Updated SGI Apache Version Available
Number : 20021105-02-I
Date : June 3, 2003
Reference : SGI Security Adviso

[ more ]  [ reply ]
kon2 exploit!! 2003-06-03
wsxz (wsxz terra com br)
I look kon2 source and -Console arg is the problem,

so here go the PoC.

----cut here--------

#!/usr/bin/perl

########################################################################
############

#Priv8security.com kon2 version 0.3.9b-16 and < local root exploit.

#

# Tested on Redhat

[ more ]  [ reply ]
Vulnerabilities In Pablo Software Solutions FTP Service 1.2 2003-06-03
JeiAr (jeiar kmfms com)


Plaintext Password Vulnerability

------------------------------------

User info is stored in users.dat in plaintext. If the

anonymous account is present (it is by default) the

entire FTP server can be compromised

ftp://somewhere/program files/pablo's ftp service/users.dat

Default Anony

[ more ]  [ reply ]
CERT Summary CS-2003-02 2003-06-03
CERT Advisory (cert-advisory cert org)


-----BEGIN PGP SIGNED MESSAGE-----

CERT Summary CS-2003-02

June 3, 2003

Each quarter, the CERT Coordination Center (CERT/CC) issues the CERT
Summary to draw attention to the types of attacks reported to our
incident response team, as well as other noteworthy incident and

[ more ]  [ reply ]
[RHSA-2003:187-01] Updated 2.4 kernel fixes vulnerabilities and driver bugs 2003-06-03
bugzilla redhat com
---------------------------------------------------------------------
Red Hat Security Advisory

Synopsis: Updated 2.4 kernel fixes vulnerabilities and driver bugs
Advisory ID: RHSA-2003:187-01
Issue date: 2003-05-22
Updated on: 2003-06-03
Product:

[ more ]  [ reply ]
IRCXpro 1.0 - Clear local and default remote admin passwords 2003-06-03
morning_wood (se_cur_ity hotmail com)
------------------------------------------------------------------
- EXPL-A-2003-002 exploitlabs.com Advisory 002
------------------------------------------------------------------
-=- IRCXpro 1.0 -=-

Vunerability(s):
----------------
1.local clear passwords
2.r

[ more ]  [ reply ]
[RHSA-2003:047-01] Updated kon2 packages fix buffer overflow 2003-06-03
bugzilla redhat com
---------------------------------------------------------------------
Red Hat Security Advisory

Synopsis: Updated kon2 packages fix buffer overflow
Advisory ID: RHSA-2003:047-01
Issue date: 2003-06-03
Updated on: 2003-06-03
Product: Red Hat

[ more ]  [ reply ]
Re: Tornado www-server v1.2: directory traversal, buffer overflow 2003-06-02
Berend-Jan Wever (SkyLined edup tudelft nl)
I've done a quick debugging session: The overflow does not seem exploitable
other then a DoS.
What happens is that there is not enough heap to hold the long strings so it
writes past the heap to a location where no memory is allocated. This will
cause an unhandled exception.

Kind regards,

Berend-J

[ more ]  [ reply ]
[OpenPKG-SA-2003.030] OpenPKG Security Advisory (ghostscript) 2003-06-03
OpenPKG (openpkg openpkg org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________

OpenPKG Security Advisory The OpenPKG Project
http://www.openpkg.org/security.html http://www.openpkg.org
openpkg-security (at) openpkg (dot) org [email concealed]

[ more ]  [ reply ]
Tripbit Advisory TA-2003-05 Buffer Overflow Vulnerability in Pi3 Web Server v2.0.2 Beta 1 2003-06-02
Rushjo (at) tripbit (dot) org [email concealed] (rushjo tripbit org)
Tripbit Advisory TA-2003-05 Buffer Overflow Vulnerability in Pi3 Web
Server v2.0.2 Beta 1
========================================================================
=================

PROGRAM: Pi3 Web Server
HOMEPAGE: http://pi3web.sourceforge.net/pi3web/
VULNERABLE VERSIONS: v2.0.2 Beta 1
RISK: M

[ more ]  [ reply ]
b2 cafelog: remote command execution, sql injection and another flaw. 2003-06-02
FraMe (frame hispalab com)
Products: b2 cafelog 0.6.1 with ljupdate
b2 cafelog 0.6.2 and prior
Author: FraMe ( frame at kernelpanik.org )
URL: http://www.kernelpanik.org

CONTENTS

1. Overview
2. Description.
3. Details.
4. Vendor Response

1. Overview.

b2 is a news/weblog tool written in php. b2 uses My

[ more ]  [ reply ]
Re: b2 cafelog 0.6.1 remote command execution. 2003-06-02
Cheng-Jih Chen (cjc cjc org)
On Fri, 30 May 2003, mike little wrote:

> Secondly, has anyone tried this? The fact is that b2config.php defines
> $b2inc with no test before hand. So that, whilst for the duration of the
> parsing of b2config.php, $b2inc could indeed be set to some value from
> the outside world. It is immediat

[ more ]  [ reply ]
Re: URLScan detection 2003-06-02
M. Burnett (mb xato net)
One problem with using UseFastPathReject, as Microsoft recommends, is
that it too can be used to identify URLScan. UseFastPathReject just
sends back a generic 404 message. However, If a site normally uses a
custom 404 message, but rejects attacks with a generic message, it
will be pretty easy to

[ more ]  [ reply ]
Some Network Drivers May Leak Data on IRIX 2003-06-02
SGI Security Coordinator (agent99 sgi com)
-----BEGIN PGP SIGNED MESSAGE-----

________________________________________________________________________
______
SGI Security Advisory

Title: Some Network Drivers May Leak Data
Number : 20030601-01-A
Date : June 2, 2003
Reference: CERT Vulnerability Note VU#41

[ more ]  [ reply ]
Format String Vulnerability in Crob Ftp Server 2003-06-02
Luca Ercoli (luca ercoli inwind it)


Package: Crob Ftp Server

Auth: Crob Software Studio (www.crob.net/studio/ftpserver/)

Version: 2.50.4 Build 228

Vulnerability: Format String

Risk: High

Vulnerability

Description:

A format string flaw in the authentication process allows remote attackers

without val

[ more ]  [ reply ]
[Windows XP] ntdll.dll Buffer Overflow Vulnerability - Yet Another MS03-007 2003-06-01
:: Operash :: (nesumin softhome net)

------------------------------------------------------------------------
---
SUMMARY : [Windows XP] ntdll.dll Buffer Overflow Vulnerability
PRODUCT : Windows XP ntdll.dll
VERSIONS : 5.1.2600.1106
VENDOR : Microsoft Corporation (http://www.microsoft.com/)
SEVERITY :

[ more ]  [ reply ]
IIS WebDav Denial of Service attacks - Update to SPI Dynamics 2003-06-02
Mark Litchfield (mark ngssoftware com)
In SPI Dynamics own advisory it mentions that IIS will restart itself -
whilst this is true, by supplying a specific number of bytes, we can
terminate all the threads, but leaving INETINFO still alive. Despite
INETINFO not dying, the process will no longer serve any requests.

This provides a more

[ more ]  [ reply ]
Mod_gzip Debug Mode Vulnerabilities 2003-06-01
Matthew Murphy (mattmurphy kc rr com)
Multiple Vulnerabilities in mod_gzip Debugging Routines

I. Synopsis

Affected Systems: mod_gzip 1.3.26.1a and prior
Risk:
* Development: High
* Production: Minimal
Developer URL: http://www.sourceforge.net/projects/mod-gzip
Status: Vendor is not supporting project at this time.

II. Product

[ more ]  [ reply ]
xmame gain root exploit 2003-05-31
Gabriel A. Maggiotti (gmaggiot ciudad com ar)
[ PHP-Nuke :] Multiple vulnerabilities in SPChat 2.0 for PHP-Nuke & SPChat 0.8.0 2003-05-31
Rynho Zeros Web (hackargentino gmx net)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Topic: Multiple vulnerabilities in SPChat 2.0 for PHP-Nuke & SPChat 0.8.0
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Systems Affected: Web Chat 2.0 for PHP-Nuke & SPChat 0.8.0
Vendor URL: http://www.saarport.net
Vuln Type:

[ more ]  [ reply ]
IIS Web DAV exploit new release 2003-05-30
Alumni Alumni (alumni ok kz)


/*~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~*/

/* 29/05/2003 - The Matrix Reloaded - */

/* Proof of concept exploit by Alumni */

/*-\--/--\--/--\--/--\--/--\--/--\--/--\--/--\--/-*/

/* In brief: */

/* 1) spawns shell on port 32768; */

/* 2) the byte

[ more ]  [ reply ]
Yahoo! Security Advisory: Yahoo! Voice Chat 2003-05-30
Yahoo!Security Contact (security yahoo-inc com)
---------------------------------------------------------------------
Yahoo! Security Advisory

Subject: Yahoo! Voice Chat Control: buffer overflow
Announced: 2003-05-30
Affects: Yahoo! Audio Conferencing versions prior to 1,0,0,45
running on any version of Microsoft Windows
Corre

[ more ]  [ reply ]
Internet Explorer URL spoofing threat 2003-05-30
M. Burnett (mb xato net)
Recently I advised Microsoft of a vulnerability in Internet Explorer
that would cause the browser to browse to one web site but display a
completely different URL in the address bar. Due to inconsistent
handling of authentication credentials in a URL, IE will parse the
URL one way when browsing and

[ more ]  [ reply ]
(Page 1658 of 1748)  < Prev  1653 1654 1655 1656 1657 1658 1659 1660 1661 1662 1663  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus