BugTraq Mode:
(Page 1699 of 1748)  < Prev  1694 1695 1696 1697 1698 1699 1700 1701 1702 1703 1704  Next >
typo3 issues 2003-02-28
Martin Eiszner (martin websec org)

hola, ...

2002 (at) WebSec (dot) org [email concealed]/Martin Eiszner

=====================
Security REPORT TYPO3
=====================

this document: http://www.websec.org/adv/typo3.html

Product: Typo3 (Version 3.5b5 / Earlier versions are possibly vulnerable too)

Vendor: Typo3 (http://www.typo3.com)
Vendor-Status: kasp

[ more ]  [ reply ]
axis2400 webcams 2003-02-28
Martin Eiszner (martin websec org)


2002 (at) WebSec (dot) org [email concealed]/Martin Eiszner

==================================
Security REPORT axis webcam 2400.?
==================================

this document: http://www.websec.org/adv/axis2400.txt.html

Product: Axis Webserver for 2400 ??
Vulnerablities: denial of service, information disclosure, non-c

[ more ]  [ reply ]
ftp.exe anf tftp.exe buffer overflows 2003-02-28
Max (rusmir tula net)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hello there,

ftp.exe and tftp.exe both have the same problem with unchecked hostname length.

Description:
ftp.exe and tftp.exe do not check the length of hostname parameter before
passing it to gethostbyname(). This makes possible to crash the

[ more ]  [ reply ]
Netscape Communicator 4.x sensitive informations in configuration file 2003-02-28
Marc Ruef (marc ruef computec ch) (1 replies)
Hi!

It seems that I'm one of the last Netscape 4.x users. During my research
for using roaming profiles I've checked a file named prefs.js in my
netscape folder (C:\Program Files\Netscape\Users\mruef).

The following paste shows the IMAP mail part of this configuration file.
You can see that the li

[ more ]  [ reply ]
Re: Netscape Communicator 4.x sensitive informations in configuration file 2003-02-28
Byron York (byron benefitrecovery com)
JRun: The Easiness of Session Fixation 2003-02-28
Christoph Schnidrig (christoph schnidrig csnc ch)
Hi all

The the Session-ID Fixation paper available from
http://www.acros.si/papers/session_fixation.pdf mentions that JRun
accepts abritrary Session-ID's and create new sessions with the proposed
Session-ID. This means that it is possible to send the following URL
http://foo/bar?jsessionid=foo123 a

[ more ]  [ reply ]
NetPBM, multiple vulnerabilities 2003-02-28
Alan Cox (alan lxorguk ukuu org uk)
NetPBM contains large numbers of maths overflow errors, some of which
are deeply theoretical as they involve passing 2Gb file names, others
of which are straight forward x * y * depth type overflows, of the
kind which have shown up in numerous other imaging libraries. Finally
there are a couple of s

[ more ]  [ reply ]
[SECURITY] [DSA 256-1] New mhc-utils packages fix predictable temporary file 2003-02-28
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 256-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
February 28th, 2003

[ more ]  [ reply ]
[SECURITY] [DSA 255-1] New tcpdump packages fix denial of service vulnerability 2003-02-27
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 255-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
February 27th, 2003

[ more ]  [ reply ]
Mandrake 9.0 local root exploit 2003-02-27
Priv8 Security (xtc priv8security com) (1 replies)


------------------------------------------------------------------------
------------------------------------------

Priv8 Security - www.priv8security.com

priv8mdk90.tar.gz - Mandrake 9.0 local root exploit

Based on Idefense adv.

http://www.idefense.com/advisory/01.21.03.txt

Greets

[ more ]  [ reply ]
Re: Mandrake 9.0 local root exploit 2003-02-28
KF (dotslash snosoft com)
Re: MS-Windows ME IE/Outlook/HelpCenter critical vulnerability 2003-02-27
Fozzy (fozzy dmpfrance com)
Hi,

My post entitled "MS-Windows ME IE/Outlook/HelpCenter critical vulnerability" was parsed incorrectly by the securityfocus mailing-list manager, giving me a From: adress "fozzy (at) securityfocus (dot) com [email concealed]".

My contact e-mail is fozzy (at) dmpfrance (dot) com. [email concealed] I am not, in any way, a member of securityfocus.com.

Th

[ more ]  [ reply ]
Invision Power Board (PHP) 2003-02-27
Frog Man (leseulfrog hotmail com)


Informations :
°°°°°°°°°°°°°°
Website : http://www.invisionboard.com
--------------------------
Version : 1.0.1
Problem : phpinfo()
--------------------------
Version : 1.1.1
Problem : File Including

PHP Code/Location :
°°°°°°°°°°°°°°°°°°°
v1.0.1 :
phpinfo.php :
----------
<?php
phpinfo();
?>
--

[ more ]  [ reply ]
iDEFENSE Security Advisory 02.27.03: TCPDUMP Denial of Service Vulnerability in ISAKMP Packet Parsing 2003-02-27
iDEFENSE Labs (labs idefense com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

iDEFENSE Security Advisory 02.27.03:
http://www.idefense.com/advisory/02.27.03.txt
TCPDUMP Denial of Service Vulnerability in ISAKMP Packet Parsing
February 27, 2003

I. BACKGROUND

TCPDUMP is a widely used network debugging tool that prints out the
he

[ more ]  [ reply ]
SuSE Security Announcement: hypermail (SuSE-SA:2003:0012) 2003-02-27
Thomas Biege (thomas suse de)
-----BEGIN PGP SIGNED MESSAGE-----

________________________________________________________________________
______

SuSE Security Announcement

Package: hypermail
Announcement-ID: SuSE-SA:2003:0012
Date: Thursday

[ more ]  [ reply ]
Re: poc zlib sploit just for fun :) 2003-02-27
Ralf S. Engelschall (rse engelschall com)

In article <200302241751.25591.kelledin+BTQ (at) skarpsey.dyndns (dot) org [email concealed]> you wrote:

> [...]
> Attached below is a patch RK and I whipped up yesterday, after I
> caught wind of this problem sometime in the afternoon.
> [...]

Thanks for your efforts. We've reviewed your patch for inclusion into
our OpenPK

[ more ]  [ reply ]
ISMAIL (All Versions) Remote Buffer Overrun 2003-02-27
NGSSoftware Insight Security Research (mark ngssoftware com)
NGSSoftware Insight Security Research Advisory

Name: ISMAIL v 1.25 & v 1.4.3 Remote Buffer Overrun
Systems Affected: WinNT, Win2K, XP
Severity: High Risk
Category: Remote Buffer Overrun
Vendor URL: http://instantservers.com/ismail.html
Autho

[ more ]  [ reply ]
MS-Windows ME IE/Outlook/HelpCenter critical vulnerability 2003-02-27
Fozzy (at) securityfocus (dot) com [email concealed],[Hackademy Audit]@securityfocus.com (fozzy dmpfrance com)
--[ Summary ]--

From the Microsoft Security Bulletin MS03-006:
" A security vulnerability is present in the Windows Me version of Help
and Support Center [...]. An attacker could exploit the vulnerability by
constructing a URL that, when clicked on by the user, would execute code
of the attacker's

[ more ]  [ reply ]
MDKSA-2003:025 - Updated webmin packages fix session ID spoofing vulnerability 2003-02-26
Mandrake Linux Security Team (security linux-mandrake com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________

Mandrake Linux Security Update Advisory
________________________________________________________________________

Package name: webmin
Advisory ID:

[ more ]  [ reply ]
Buffer Overrun Vulnerability in /sbin/ps on IRIX 2003-02-26
SGI Security Coordinator (agent99 sgi com)
-----BEGIN PGP SIGNED MESSAGE-----

________________________________________________________________________
______
SGI Security Advisory

Title : Buffer Overrun Vulnerability in /sbin/ps
Number : 20030202-01-I
Date : February 26, 2003
Reference: CVE-1999-0301
Refer

[ more ]  [ reply ]
[SECURITY] [DSA 254-1] New NANOG traceroute packages fix buffer overflow 2003-02-27
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 254-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
February 27th, 2003

[ more ]  [ reply ]
Ecardis Password Reseting Vulnerability 2003-02-27
Haluk AYDIN (haydin biznet com tr)


Hi,

I don't know if someone has discovered this before but Ecartis 1.0.0

(former listar) contains a vulnerability that enables an attacker to reset

passwords of any user defined on the list server, including the list

admins.

After logging on as a non-priviledged user, Ecartis enables

[ more ]  [ reply ]
MDKSA-2003:026 - Updated shadow-utils packages fix improper mailspool ownership 2003-02-27
Mandrake Linux Security Team (security linux-mandrake com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________

Mandrake Linux Security Update Advisory
________________________________________________________________________

Package name: shadow-utils
Advisory ID:

[ more ]  [ reply ]
./makeunicode2.py release announcement 2003-02-26
0 0 (daveaitel hotmail com)


Immunity, Inc. is pleased to announce the availability of
makeunicode2.py - a Python program that will encode arbitrary x86
shellcode into a valid unicode string. This program is available from
the BlackHat web site at
http://www.blackhat.com/html/win-usa-03/win-usa-03-speakers.html#David%2
0Ait

[ more ]  [ reply ]
RE: Self-Executing HTML: Internet Explorer 5.5 and 6.0 Part II 2003-02-26
Dike (Dike tarita co id) (1 replies)
Confirmed on IE 5.0 too :(

Sorry One Liner,
Dike

> -----Original Message-----
> From: http-equiv (at) excite (dot) com [email concealed] [mailto:http-equiv (at) malware (dot) com [email concealed]]
> Sent: Wednesday, February 26, 2003 4:45 AM
> To: bugtraq (at) securityfocus (dot) com [email concealed]
> Subject: Self-Executing HTML: Internet Explorer 5.5 and 6.0 Part II
> Tuesday,

[ more ]  [ reply ]
Re: Self-Executing HTML: Internet Explorer 5.5 and 6.0 Part II 2003-02-28
D'Amato Luigi (luigidamato networkingitalia it)
(Page 1699 of 1748)  < Prev  1694 1695 1696 1697 1698 1699 1700 1701 1702 1703 1704  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus