BugTraq Mode:
(Page 1684 of 1748)  < Prev  1679 1680 1681 1682 1683 1684 1685 1686 1687 1688 1689  Next >
Beanwebb Guestbook v1.0 vulnerabilities 2003-03-29
euronymous (just-a-user yandex ru)

=:=:=::=:=:=::=:=:=::=:=:=::=:=:=::=:=:=::=:=:=::=
topic: Beanwebb Guestbook v1.0 vulnerabilities
product: Beanwebb Guestbook v1.0
vendor: http://www.adam.orientfans.co.uk
risk: high
date: 03/29/2k3
discovered by: euronymous /F0KP
advisory urls: http://f0kp.iplus.ru/bz/016.en.txt

[ more ]  [ reply ]
Netscape and Opera crash via java 2003-03-28
Marc Schoenefeld (schonef uni-muenster de) (2 replies)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi,

executing

<scr1pt language="Javascript">
t = new Packages.sun.plugin.javascript.navig5.JSObject(1,1);
</scr1pt>

crashes Netscape 7.02 and Opera 7 on Windows XP.
The active JVM in both tested browsers is Java 1.4.1_02 from Sun.

This liveconnect (

[ more ]  [ reply ]
Re: Netscape and Opera crash via java 2003-03-28
Mischa Krilov (mischa irev2 com)
Re: Netscape and Opera crash via java 2003-03-28
Wayne D. Hoxsie Jr. (wayne hoxnet com)
Clearswift MAILsweeper hotfix 2003-03-28
fwegwg dfbndebndebner (erwin_lists hotmail com)
Dear mailinglist readers,

On the 17th of March 2003 Clearswift released a hotfix (4.3.7) for
MAILsweeper version 4.3. In the accompanied Readme file
(http://www.mimesweeper.com/download/bin/Patches/MAILsweeper_Patches_301
_ReadMe.htm)
three vulnerabilities are reported. The first vulnerability is t

[ more ]  [ reply ]
Re: [SCSA-011] Path Disclosure Vulnerability in XOOPS 2003-03-28
Grégory Le Bras (gregory lebras security-corporation com)
In-Reply-To: <20030320195855.20555.qmail (at) www.securityfocus (dot) com [email concealed]>

You can fix the path disclosure problem by adding this code in all the

affected files :

---snip---

error_reporting(0);

---snip---

Greetz : Magistrat (http://www.blocus-zone.com)

>From: "Grégory" Le Bras <gregory.leb

[ more ]  [ reply ]
CORE-2003-0306: RealPlayer PNG deflate heap corruption vulnerability 2003-03-28
CORE Security Technologies Advisories (advisories coresecurity com)
Core Security Technologies Advisory
http://www.coresecurity.com

RealPlayer PNG deflate heap corruption vulnerability

Date Published: 2003-03-28

Last Update: 2003-03-27

Advisory ID: CORE-2003-0306

Bugtraq ID: 7177

CVE Name:

[ more ]  [ reply ]
Re: SNMP security issues in D-Link DSL Broadband Modem/Router 2003-03-28
Maslov, Snowy (Snowy Maslov fujitsu com au)
> From: Arhont Information Security [mailto:infosec (at) arhont (dot) com [email concealed]]
> Sent: Friday, March 28, 2003 1:32 AM
> To: bugtraq (at) securityfocus (dot) com [email concealed]
> Subject: SNMP security issues in D-Link DSL Broadband Modem/Router
>
> While performing a general security testing of a
> network, we have found several security

[ more ]  [ reply ]
Mod_Survey ENV tag vulnerability 2003-03-28
Joel Palmius (joel palmius mh se)
Attached is a security advisory for Mod_Survey, which is a mod_perl module
for apache (see attachment). The advisory was first published 2003-03-23
at http://gathering.itm.mh.se/modsurvey/SA20030323.txt

More info about Mod_Survey can be found on its home page, which is
available at http://gatherin

[ more ]  [ reply ]
MDKSA-2003:039 - Updated kernel22 packages fix multiple vulnerabilities 2003-03-28
Mandrake Linux Security Team (security linux-mandrake com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________

Mandrake Linux Security Update Advisory
________________________________________________________________________

Package name: kernel22
Advisory ID:

[ more ]  [ reply ]
[SECURITY] [DSA 272-1] New dietlibc packages fix arbitrary code execution 2003-03-28
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 272-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
March 28th, 2003

[ more ]  [ reply ]
[SECURITY] [DSA 273-1] New krb4 packages fix authentication failure 2003-03-28
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 273-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
March 28th, 2003

[ more ]  [ reply ]
Fate Research Labs Presents: Analysis of the NTDLL.DLL Exploit 2003-03-28
Eric Hines (eric hines fatelabs com) (1 replies)
Lists:

I have written a 13 page analysis of NTDLL.DLL webdav exploit, which is
located at http://www.fatelabs.com/library/fatelabs-ntdll-analysis.pdf .
This paper provides granular detail on the affected component, log
traces for log analysis, exploit output, and packet traces for those
looking to

[ more ]  [ reply ]
Re: Fate Research Labs Presents: Analysis of the NTDLL.DLL Exploit 2003-03-28
Dave Aitel (dave immunitysec com)
RE: FUD-ALARM: @(#)Mordred Labs advisory - Integer overflow in PHP memory allocator 2003-03-28
sir mordred hushmail com

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi

Stefan nicely asked me to provide real examples in the PHP source code
in which was used something like - emalloc(userinput).
In the advisory has been 2 examples, first used emalloc(userinput +1),

second - emalloc(userinput + 2). Guess that was en

[ more ]  [ reply ]
Re: D-Link DI-614 wiresless router crash/reboots 2003-03-28
Thierry Zoller (thierry sniff-em com)

>A user of ours has reported that the D-Link DI-614+

Thomas forgot to include the Firmware that machine is
running.

I am a user of the above mentioned device, new firmware for
EUROPEAN (important as the european distributors are lagging
a few versions behind) and US versions can be found here (2)

[ more ]  [ reply ]
MDKSA-2003:038 - Updated 2,4 kernel packages fix ptrace vulnerability 2003-03-28
Mandrake Linux Security Team (security linux-mandrake com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________

Mandrake Linux Security Update Advisory
________________________________________________________________________

Package name: kernel
Advisory ID:

[ more ]  [ reply ]
GLSA: zlib (200303-25) 2003-03-28
Daniel Ahlberg (aliz gentoo org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ---------------------------------------------------------------------
GENTOO LINUX SECURITY ANNOUNCEMENT 200303-25
- - ---------------------------------------------------------------------

PACKAGE : zlib
SUMMARY : buffer overrun

[ more ]  [ reply ]
CORE-2003-0304-03: Vulnerability in GNOME's Eye of Gnome 2003-03-28
CORE Security Technologies Advisories (advisories coresecurity com)
Core Security Technologies Advisory
http://www.coresecurity.com

Vulnerability in GNOME's Eye of Gnome

Date Published: 2003-03-28

Last Update: 2003-03-27

Advisory ID: CORE-2003-0304-03

Bugtraq ID: 7121

CVE Name: CAN-2003-

[ more ]  [ reply ]
RE: D-Link DI-614 wiresless router crash/reboots 2003-03-28
Rick Koenig (rk4028 exchange concordia edu)
Thomas,

I have a DI-614+ that I use at home and I have noticed a significant number
spontaneous reboots lately. A few weeks ago, I installed the beta firmware
of Dlink's website thinking that that would solve the issue but that did not
work either. I have not run any scanner on my device just eve

[ more ]  [ reply ]
[SECURITY] [DSA 274-1] New mutt packages fix arbitrary code execution 2003-03-28
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 274-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
March 28th, 2003

[ more ]  [ reply ]
Problems with Snort-1.9.1 2003-03-27
Toby Miller (toby_miller adelphia net)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Problem: Snort-1.9.1 using a default snort.conf configuration does
not detect certain crafted packets.

Details: Snort-1.9.1 does not detect packets when the SYN,FIN and ECN
echo bits set. The following is an example of a packet:

12:37:12.386797 10.1.1

[ more ]  [ reply ]
Re: PHPNuke viewpage.php allows Remote File retrieving 2003-03-26
admin gaylenandmargie com
In-Reply-To: <1048644704.1429.19.camel (at) localhost (dot) loca [email concealed]ldomain>

>From: Christopher Warner <zanee (at) kernelcode (dot) com [email concealed]>

>

>If you could follow up on this and give more details (versions affected)

>etc etc; as it stands I'm gonna confirm that viewpage.php hasn't existed

>for quite some time and that this

[ more ]  [ reply ]
PostNuke Sensitive Information Disclosure 2003-03-26
rkc (rkc uncompiled com) (1 replies)
Title: PostNuke path disclosure, and... (db name).
Version: 0.7.2.3-Phoenix (other)
Problem:

A vulnerability have been found in Postnuke (v0.7.2.3-Phoenix) which allow
users to determine the physical path of this cms.

This vulnerability would allow a remote user to determine the full path to
t

[ more ]  [ reply ]
Re: PostNuke Sensitive Information Disclosure 2003-03-28
Kilmarac Jarov - (kilmarac phreaker net)
Re: Check Point FW-1: attack against syslog daemon possible 2003-03-27
Dr. Peter Bieringer (pbieringer aerasec de)
Hi again,

now we are finished the investigation of FW-1 4.1 (SP6) with following
result:

In our lab the syslog daemon of Check Point FW-1 4.1 didn't crash in case
of sending "/dev/urandom" via "nc", but this floods the log without any
rate limiting.

Also the syslog messages were not filtered.

[ more ]  [ reply ]
[SCSA-012] Multiple vulnerabilities in Sambar Server 2003-03-27
Grégory Le Bras (gregory lebras security-corporation com)


________________________________________________________________________

Security Corporation Security Advisory [SCSA-012]

________________________________________________________________________

PROGRAM: Sambar Server

HOMEPAGE: http://www.sambar.com/

VULNERABLE VERSIONS: 5.3 and prior

[ more ]  [ reply ]
(Page 1684 of 1748)  < Prev  1679 1680 1681 1682 1683 1684 1685 1686 1687 1688 1689  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus