BugTraq Mode:
(Page 1695 of 1748)  < Prev  1690 1691 1692 1693 1694 1695 1696 1697 1698 1699 1700  Next >
xscreensaver exploit for Redhat 7.3 2003-03-06
Angelo Rosiello (guilecool usa com)


I think you don't need other comments:

/*

**

** Tested on rh 7.3 using XFree86

** xscreensaver vulnerability

** AUTHORS: Angelo Rosiello (Guilecool) & deka

** REQUIRES: X must be run!

** EFFECTS: local root exploit!

**

** deka is leet brother, thank you :>

** MAIL: guilecool (at) usa (dot) com [email concealed]

*

[ more ]  [ reply ]
[sorcerer-spells] BIND-SORCERER2003-03-06 2003-03-06
Michael Walton (mwalton abilene com)

--
Michael Walton

Asst-Manager Tech Support
mwalton (at) abilene (dot) com [email concealed]

(915)677-7900

[ more ]  [ reply ]
[New Research Paper] Bound by Tradition: A sampling of the security posture of the Internet's DNS servers 2003-03-06
Mike Schiffman (mike infonexus com)
Hello. I just put the finishing touches on a whitepaper detailing the
security posture of the Internet's DNS infrastructure. To wit:

"DNS servers across the Internet running BIND are not up to date with
security patches and software updates. As a result, a significant
fraction of the Internet's DNS

[ more ]  [ reply ]
New HP Jetdirect SNMP password vulnerability when using Web JetAdmin 2003-03-06
Sven Pechler (helpdesk tm tue nl)


Hello,

During an analysis of some HP Jetdirect cards I discovered a security

issue that could lead to full access to a networked printer.

It looks like the vulnerability described in

http://www.securityfocus.com/bid/5331, but the OID is different and you

can only obtain one specific p

[ more ]  [ reply ]
file(1) exploit code 2003-03-06
Crazy Einstein (crazy_einstein yahoo com)
Just for fun... ;)

__________________________________________________
Do you Yahoo!?
Yahoo! Tax Center - forms, calculators, tips, more
http://taxes.yahoo.com/

[ more ]  [ reply ]
Security Update: [CSSA-2003-SCO.4] UnixWare 7.1.1 Open UNIX 8.0.0 UnixWare 7.1.3 : Lax permissions on /dev/X 2003-03-05
security caldera com
To: bugtraq (at) securityfocus (dot) com [email concealed] announce (at) lists.caldera (dot) com [email concealed] scoannmod (at) xenitec.on (dot) ca [email concealed] full-disclosure (at) lists.netsys (dot) com [email concealed]

________________________________________________________________________
______

SCO Security Advisory

Subject: UnixWare 7.1.1 Open UNIX 8.0.0 UnixWare 7.1.3 : Lax permissions on /d

[ more ]  [ reply ]
ILLC 2003-03-06
Hugo Vázquez Caramés (overclocking_a_la_abuela hotmail com)


We would like to clarify some points on our previous post about Inverse

Lookup Log Corruption.

"ILLC" has nothing to do with CERT advisory "CA-2000-02"

(http://www.cert.org/advisories/CA-2000-02.html). With our technique an

attacker can spoof the IP on web server logs...(completely on Ip

[ more ]  [ reply ]
[SCSA-009] Remote Command Execution Vulnerability in PHP Ping 2003-03-06
Grégory Le Bras (gregory lebras security-corp org)


________________________________________________________________________

Security Corporation Security Advisory [SCSA-009]

________________________________________________________________________

PROGRAM: PHP Ping

HOMEPAGE: http://www.phpapps.org/

VULNERABLE VERSIONS: v0.1 and prior

____

[ more ]  [ reply ]
GLSA: snort (200303-6) 2003-03-06
Daniel Ahlberg (aliz gentoo org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ---------------------------------------------------------------------
GENTOO LINUX SECURITY ANNOUNCEMENT 200303-6
- - ---------------------------------------------------------------------

PACKAGE : snort
SUMMARY : remote dos

[ more ]  [ reply ]
[RHSA-2003:039-06] Updated im packages fix insecure handling of temporary files 2003-03-06
bugzilla redhat com
---------------------------------------------------------------------
Red Hat, Inc. Red Hat Security Advisory

Synopsis: Updated im packages fix insecure handling of temporary files
Advisory ID: RHSA-2003:039-06
Issue date: 2003-02-07
Updated on: 2003-

[ more ]  [ reply ]
[RHSA-2003:062-11] Updated OpenSSL packages fix timing attack 2003-03-06
bugzilla redhat com
---------------------------------------------------------------------
Red Hat, Inc. Red Hat Security Advisory

Synopsis: Updated OpenSSL packages fix timing attack
Advisory ID: RHSA-2003:062-11
Issue date: 2003-02-19
Updated on: 2003-03-06
Product:

[ more ]  [ reply ]
PHP-Nuke 6.0 (& 6.5?) : Serious SQL Injection Security Holes 2003-03-06
Frog Man (leseulfrog hotmail com)

Informations :
°°°°°°°°°°°°°°
Language : PHP
Website : http://www.phpnuke.org
Versions : 6.0 (& 6.5?)
Modules : Members_List, Your_Account
Problem : SQL Injection
PHP Configuration : This will work if magic_quotes_gpc=OFF.

PHP Code/Location :
°°°°°°°°°°°°°°°°°°°
/modules/Members_List/index.php :

[ more ]  [ reply ]
potential buffer overflow in lprm (fwd) 2003-03-05
Dave Ahmad (da securityfocus com)


David Mirza Ahmad
Symantec

"sabbe dhamma anatta"

0x26005712
8D 9A B1 33 82 3D B3 D0 40 EB AB F0 1E 67 C6 1A 26 00 57 12

[ more ]  [ reply ]
Re: SA-03:04.sendmail Bin Update 2003-03-05
Charles M. Richmond (cmr iisc com)

The following exchange covers a method of upgrading the sendmail
binaries while postponing redoing the CFs. If you have a bunch
of systems with varying configs then it might be a useful way
of getting the security fix in place with your old CFs.

It will also allow you to test the install of the n

[ more ]  [ reply ]
3Com SuperStack 3 Firewall Content Filter Exploitable Via Telnet 2003-03-04
bit_logic s-mail com (2 replies)


The following exploit presumably applies to all versions of the 3COM web

content filtering software, and possibly web filtering devices of other

makers.

Many businesses, schools, libraries, and other public places providing

Internet access to customers implement web content filters to min

[ more ]  [ reply ]
Re: 3Com SuperStack 3 Firewall Content Filter Exploitable Via Telnet 2003-03-05
Niels Bakker (niels=bugtraq bakker net) (1 replies)
Re: 3Com SuperStack 3 Firewall Content Filter Exploitable Via Telnet 2003-03-06
der Mouse (mouse Rodents Montreal QC CA)
Re: 3Com SuperStack 3 Firewall Content Filter Exploitable Via Telnet 2003-03-05
David G. Andersen (dga lcs mit edu)
Sendmail exploit released??? 2003-03-05
Kryptik Logik (kryptiklogik hushmail com)


Folks:

Refer to this article in ComputerWorld

http://www.computerworld.com/securitytopics/security/holes/story/0,10801
,79

021,00.html about some Russian Hacker site releasing Sendmail exploit

code. Is it any different than the LSD exploit code or is is a "security-

guru-security-know-all"

[ more ]  [ reply ]
(Page 1695 of 1748)  < Prev  1690 1691 1692 1693 1694 1695 1696 1697 1698 1699 1700  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus