BugTraq Mode:
(Page 1702 of 1748)  < Prev  1697 1698 1699 1700 1701 1702 1703 1704 1705 1706 1707  Next >
GLSA: apcupsd (200302-13) 2003-02-24
Daniel Ahlberg (aliz gentoo org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ---------------------------------------------------------------------
GENTOO LINUX SECURITY ANNOUNCEMENT 200302-13
- - ---------------------------------------------------------------------

PACKAGE : apcupsd
SUMMARY : remote root

[ more ]  [ reply ]
GLSA: usermin (200302-14) 2003-02-24
Daniel Ahlberg (aliz gentoo org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ---------------------------------------------------------------------
GENTOO LINUX SECURITY ANNOUNCEMENT 200302-14
- - ---------------------------------------------------------------------

PACKAGE : usermin
SUMMARY : unauthorize

[ more ]  [ reply ]
[SNS Advisory No.62] Webmin/Usermin Session ID Spoofing Vulnerability "Episode 2" 2003-02-24
snsadv (at) lac.co (dot) jp [email concealed] (snsadv lac co jp)
----------------------------------------------------------------------
SNS Advisory No.62
Webmin/Usermin Session ID Spoofing Vulnerability "Episode 2"

Problem first discovered on: Wed, 19 Feb 2003
Published on: Mon, 24 Feb 2003
Previous Issue: http://www.lac.co.jp/security/english/snsadv_e/53_e.ht

[ more ]  [ reply ]
FreeBSD Security Advisory FreeBSD-SA-03:03.syncookies 2003-02-24
FreeBSD Security Advisories (security-advisories freebsd org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

========================================================================
=====
FreeBSD-SA-03:03.syncookies Security Advisory
The FreeBSD Project

Topic: Br

[ more ]  [ reply ]
Webmin 1.050 - 1.060 remote exploit 2003-02-24
Carl Livitt (carl learningshophull co uk)

Hi all,

Attached is an exploit for the latest Webmin vulnerability. It relies on a
non-default setting (passdelay) to be enabled.

Webmin can verify user authentication by use of a session ID (SID) that is
assigned when a user successfully authenticates to Webmin. It is possible to
inject a fak

[ more ]  [ reply ]
O UT LO OK E XPRE SS 6 .00 : broken 2003-02-23
http-equiv (at) excite (dot) com [email concealed] (http-equiv malware com)


Saturday, February 22, 2003

Technical silent delivery and installation of an executable no client
input other than reading an email or viewing a newsgroup message.
Outlook Express 6.00 SP1 Cumulative Pack 1 2 3 4 whatever.

This should not be possible.

When viewing an email message or a newsgr

[ more ]  [ reply ]
[SCSA-006] XSS & Function Execution Vulnerabilities in Nuked-Klan 2003-02-22
Grégory Le Bras (gregory lebras security-corp org)


________________________________________________________________________

Security Corporation Security Advisory [SCSA-006]

________________________________________________________________________

PROGRAM: Nuked-Klan

HOMEPAGE: http://www.nuked-klan.org

VULNERABLE VERSIONS: beta 1.3

______

[ more ]  [ reply ]
exploit for Cpanel 5 remote command execution. 2003-02-23
evilcow ig com br
a simple code for cpanel 5 remote execution :p

-- by cyzek.

_________________________________________________________
Voce quer um iGMail protegido contra vírus e spams?
Clique aqui: http://www.igmailseguro.ig.com.br

[ more ]  [ reply ]
Weak Encryption Scheme in Telindus 112x 2003-02-23
eflorio edmaster it


[-----------------------------------------------------------------------
]

Product Name: TELINDUS ADSL ROUTER 112x

Severity : Low Risk

Remote : No

Category : Trivial encryption scheme can reveal router system password

Exploit : No

Vendor URL : http://www.telindus.com

Author

[ more ]  [ reply ]
[SCSA-007] Cross Site Scripting Vulnerabilities in WWWBoard 2003-02-23
Grégory Le Bras (gregory lebras security-corp org)


________________________________________________________________________

Security Corporation Security Advisory [SCSA-007]

________________________________________________________________________

PROGRAM: WWWBoard

HOMEPAGE: http://www.scriptarchive.com

VULNERABLE VERSIONS: 2.0A2.1 and pri

[ more ]  [ reply ]
Re: phpBB Security Bugs 2003-02-22
Lucas Armstrong (lucas cgishield com)
In-Reply-To: <1045822791.7155.11.camel@fluffy>

Konrad,

This particular SQL Injection technique makes it possible to isolate each

hex digit in the md5 hash, and allows you to guess that digit's particular

value. Each digit would be guessed in 16 tries or less. Since there are 32

digits in a

[ more ]  [ reply ]
eject 2.0.10 vulnerability 2003-02-22
nordi (nordi addcom de)
######################################################################

Application: eject
Version: 2.0.10
Platforms: Linux
Distribution: SuSE 7.3, most likely other versions of SuSE Linux as well
also all distributions that make eject SUID root
Bugs: verbose error messages reveal l

[ more ]  [ reply ]
GLSA: (200302-12) 2003-02-22
Daniel Ahlberg (aliz gentoo org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ---------------------------------------------------------------------
GENTOO LINUX SECURITY ANNOUNCEMENT 200302-12
- - ---------------------------------------------------------------------

PACKAGE : webmin
SUMMARY : unauthorized

[ more ]  [ reply ]
RE: Bypassing Personal Firewalls 2003-02-22
John Howie (JHowie securitytoolkit com)
Folks,

The security model employed by the OS for calls to OpenProcess () and
the like is not radically different from that used in calls such as
CreateFile (). The true problem is the lack of understanding of process
and thread creation on Win32 systems.

A process created using CreateProcess () ca

[ more ]  [ reply ]
buffer overrun in zlib 1.1.4 2003-02-22
Richard Kettlewell (rjk greenend org uk)
zlib contains a function called gzprintf(). This is similar in
behaviour to fprintf() except that by default, this function will
smash the stack if called with arguments that expand to more than
Z_PRINTF_BUFSIZE (=4096 by default) bytes.

There is an internal #define (HAS_vsnprintf) that causes it

[ more ]  [ reply ]
Bypassing Personal Firewalls 2003-02-21
xenophi1e (oliver lavery sympatico ca) (2 replies)


[MODERATOR: posted this to vuln-dev where it recieved some interest.

Thought it might be interesting to a wider audience. Here's a revised

version of the same post]

Here's a code snippet that injects code directly into a running process

without the need for a DLL etc. I believe that it de

[ more ]  [ reply ]
Re: Bypassing Personal Firewalls 2003-02-22
Shaun Clowes (shaun securereality com au)
RE: Bypassing Personal Firewalls 2003-02-21
Drew Copley (dcopley eeye com) (1 replies)
RE: Bypassing Personal Firewalls 2003-02-21
Oliver Lavery (oliver lavery sympatico ca) (1 replies)
RE: Bypassing Personal Firewalls 2003-02-21
Drew Copley (dcopley eeye com)
Re: twlc advisory: all versions of php nuke are vulnerable... 2003-02-19
Jessica Smith (crystalsinger mail com)
In-Reply-To: <000701c1452f$7f3fc670$8119fea9@supergate>

>Systems Affected

>all the versions ARE vulnerable

>except '5.0 RC1' (i wonder why a released c. is ok while the final 5.2 is

>bugged)

<snip>

>conclusions:

>yet another bug of php nuke... this software is used by thousands of

>peo

[ more ]  [ reply ]
RE: PHPNuke SQL Injection 2003-02-21
Oriol Carreas (uri 7a69ezine org)

I don't like to claim for the authory of bugs, because It is not
possible to clarify who discovered/exploited first some bug because
some times we are too lazy to publish them for any reason. But this
is an special reason because the person that claims for the authory
of the TWO "PhpNuke SQL Inje

[ more ]  [ reply ]
Myguestbook (PHP) 2003-02-21
Frog Man (leseulfrog hotmail com)


Informations :
°°°°°°°°°°°°°°
Version : 3.0
Website : http://www.tefonline.net/
Problems :
- XSS -> admin infos recovery
- Access to admin pages

PHP Code/Location :
°°°°°°°°°°°°°°°°°°°
If pseudo = [SCRIPT],
e-mail = >[SCRIPT]
or message = </textarea>[SCRIPT]

[SCRIPT] will be executed on index.ph

[ more ]  [ reply ]
(Page 1702 of 1748)  < Prev  1697 1698 1699 1700 1701 1702 1703 1704 1705 1706 1707  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus