BugTraq Mode:
(Page 1703 of 1748)  < Prev  1698 1699 1700 1701 1702 1703 1704 1705 1706 1707 1708  Next >
Rogue buffer overflow 2003-02-21
Ulf Harnhammar (ulfh update uu se)
Rogue buffer overflow

PROGRAM: Rogue
VENDOR: Tim Stoehr et al.
DOWNLOAD URL: http://ibiblio.org/pub/Linux/games/dungeon/!INDEX.html
(any file called "*rogue*" in that directory)
DMOZ/ODP: http://dmoz.org/Games/Video_Games/Roleplaying/Rogue-like/

DESCRIPTION:

Rogue is a text-based

[ more ]  [ reply ]
Perl2Exe EXEs Can Be Decompiled (update) 2003-02-21
Domainbox, Tim Abenath (ta domainbox de)
Product:
perl2exe, http://www.indigostar.com/

Vunerability:
Perl programs "compiled" into EXEs with Perl2Exe can be decompiled and
full, unadulterated source code extracted.

Vendor Status:
Vendor has been notifyed a year ago as Simon Cozens dissected perl2exe's
version 5.x
and

[ more ]  [ reply ]
MDKSA-2003:020 - Updated openssl packages fix timing-based attack vulnerability 2003-02-21
Mandrake Linux Security Team (security linux-mandrake com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________

Mandrake Linux Security Update Advisory
________________________________________________________________________

Package name: openssl
Advisory ID:

[ more ]  [ reply ]
TSLSA-2003-0005 - openssl 2003-02-21
tsl trustix com (Trustix Secure Linux Advisor)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Trustix Secure Linux Security Advisory #2003-0005

Package name: openssl
Summary: Security fix
Date: 2003-02-20
Affected versions: TSL 1.1, 1.2, 1.5

[ more ]  [ reply ]
[SECURITY] [DSA 252-1] New slocate packages fix local root exploit 2003-02-21
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 252-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
February 21st, 2003

[ more ]  [ reply ]
[RHSA-2003:041-12] Updated VNC packages fix replay and cookie vulnerabilities 2003-02-21
bugzilla redhat com
---------------------------------------------------------------------
Red Hat, Inc. Red Hat Security Advisory

Synopsis: Updated VNC packages fix replay and cookie vulnerabilities
Advisory ID: RHSA-2003:041-12
Issue date: 2003-02-07
Updated on: 2003-02

[ more ]  [ reply ]
MDKSA-2003:021 - Updated krb5 packages fix vulnerability in FTP client 2003-02-21
Mandrake Linux Security Team (security linux-mandrake com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________

Mandrake Linux Security Update Advisory
________________________________________________________________________

Package name: krb5
Advisory ID:

[ more ]  [ reply ]
Cisco Security Advisory: Multiple Product Vulnerabilities found by PROTOS SIP Test Suite 2003-02-21
Cisco Systems Product Security Incident Response Team (psirt cisco com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Cisco Security Advisory: Multiple Product Vulnerabilities found by PROTOS SIP
Test Suite

Revision 1.0 INTERIM

For Public Release 2003 February 21 UTC 1700

- ------------------------------------------------------------------------
-------

Contents

[ more ]  [ reply ]
phpBB Security Bugs 2003-02-20
Lucas Armstrong (lucas cgishield com)


phpBB Security Bugs 2-18-2003

http://CGIshield.com

Security Issue in phpBB 2.0,2.01, 2.02 (Fixed in 2.03)

phpBB, the most popular open source bulletin board software on the net, is

vulnerable to a remotely exploitable SQL injection bug which allows

stealing an administrator's password

[ more ]  [ reply ]
[CLA-2003:569] Conectiva Linux Security Announcement - kde 2003-02-20
secure conectiva com br
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
CONECTIVA LINUX SECURITY ANNOUNCEMENT
- ------------------------------------------------------------------------
--

PACKAGE : kde
SUMMARY : Multiple vulnerabilities in KDE

[ more ]  [ reply ]
PHPNuke SQL Injection 2003-02-20
Lucas Armstrong (lucas cgishield com) (1 replies)


PHPNuke SQL Injection 2-18-2003

http://CGIshield.com

How to steal the password hash of the Admin user on PHPnuke 6.0 & 5.6

windows+linux method #1

PHPnuke, a widely used open-source web portal system, has been found to

contain a remotely exploitable SQL injection bug, which allows steal

[ more ]  [ reply ]
Re: PHPNuke SQL Injection 2003-02-21
Martin Eiszner (martin websec org)
login_ldap security announcement 2003-02-20
Peter Werner (peterw ifost org au)
Sebastian Stark from Directory Applications for Advanced Security and
Information Management (http://www.daasi.de) has found a serious issue
with login_ldap, affecting all versions. login_ldap is a BSD
Authentication module for authenticating users off an LDAP server, and
runs on OpenBSD and BSD

[ more ]  [ reply ]
[saag] Of potential interest -- Citibank tries to gag crypto bug disclosure (fwd) 2003-02-20
Dave Ahmad (da securityfocus com)


David Mirza Ahmad
Symantec

0x26005712
8D 9A B1 33 82 3D B3 D0 40 EB AB F0 1E 67 C6 1A 26 00 57 12

---------- Forwarded message ----------
Date: Thu, 20 Feb 2003 14:04:01 -0800
From: Robert Moskowitz <rgm-sec (at) htt-consult (dot) com [email concealed]>
To: saag (at) mit (dot) edu [email concealed]
Subject: [saag] Of potential interest -- Citibank tr

[ more ]  [ reply ]
GLSA: bitchx (200302-11) 2003-02-20
Daniel Ahlberg (aliz gentoo org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ---------------------------------------------------------------------
GENTOO LINUX SECURITY ANNOUNCEMENT 200302-11
- - ---------------------------------------------------------------------

PACKAGE : bitchx
SUMMARY : denial of service
DATE : 2003

[ more ]  [ reply ]
[RHSA-2003:057-06] Updated shadow-utils packages fix exposure 2003-02-20
bugzilla redhat com
---------------------------------------------------------------------
Red Hat, Inc. Red Hat Security Advisory

Synopsis: Updated shadow-utils packages fix exposure
Advisory ID: RHSA-2003:057-06
Issue date: 2003-02-12
Updated on: 2003-02-18
Product:

[ more ]  [ reply ]
GLSA: openssl (200302-10) 2003-02-20
Daniel Ahlberg (aliz gentoo org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ---------------------------------------------------------------------
GENTOO LINUX SECURITY ANNOUNCEMENT 200302-10
- - ---------------------------------------------------------------------

PACKAGE : openssl
SUMMARY : timing based attack
DATE : 2

[ more ]  [ reply ]
Cisco IOS OSPF exploit 2003-02-20
FX (fx phenoelit de)
Hi there,

attached you may find the exploit for the Cisco IOS bug ID CSCdp58462. The bug
is long fixed, so if you still run OSPF on a old version of IOS, now is a good
time to give your routers some attention.

FX

--
FX <fx (at) phenoelit (dot) de [email concealed]>
Phenoelit (http://www.phenoelit

[ more ]  [ reply ]
[ESA-20030220-004] MySQL double free vulnerability 2003-02-20
EnGarde Secure Linux (security guardiandigital com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

+-----------------------------------------------------------------------
-+
| EnGarde Secure Linux Security Advisory February 20, 2003 |
| http://www.engardelinux.org/ ESA-20030220-004 |
|

[ more ]  [ reply ]
[ESA-20030220-005] OpenSSL timing-based attack vulnerability 2003-02-20
EnGarde Secure Linux (security guardiandigital com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

+-----------------------------------------------------------------------
-+
| EnGarde Secure Linux Security Advisory February 20, 2003 |
| http://www.engardelinux.org/ ESA-20030220-005 |
|

[ more ]  [ reply ]
XSS and Path Disclosure in Sage 2003-02-19
euronymous (just-a-user yandex ru)
=:=:=::=:=:=::=:=:=::=:=:=::=:=:=::=:=:=::=:=:=::=
topic: XSS and Path Disclosure in Sage
product: Sage 1.0b3
vendor: http://sage.dev.box.sk/
risk: middle
date: 02/20/2k3
discovered by: euronymous /f0kp /r00tc0de
advisory urls: http://f0kp.iplus.ru/bz/015.en.txt
http://f0kp.iplus.ru/b

[ more ]  [ reply ]
New version of ike-scan (IPsec IKE scanner) available - v1.1 2003-02-20
Roy Hills (Roy Hills nta-monitor com)
ike-scan v1.1 has been released. Major changes are:

a) More IKE backoff patterns which allows more systems to be fingerprinted;
b) Compiles on more platforms including Windows-32 systems with Cygwin;
c) Windows-32 command line binary available (includes Cygwin DLL); and
d) Identifies systems which

[ more ]  [ reply ]
MDKSA-2003:019 - Updated php packages fix buffer overflow vulnerability 2003-02-20
Mandrake Linux Security Team (security linux-mandrake com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________

Mandrake Linux Security Update Advisory
________________________________________________________________________

Package name: php
Advisory ID:

[ more ]  [ reply ]
Fwd: CERT Advisory CA-2003-05 Multiple Vulnerabilities in Oracle Servers 2003-02-20
Muhammad Faisal Rauf Danka (mfrd priorityzero com)

*** There is an attachment in this mail. ***

_____________________________________________________________
Tenha seu E-mail Grátis @priorityzero.com
o domínio diz tudo: Urgente !!
Subscreva através do nosso site
http://priorityzero.mail.everyone.net

Subscribe for your Free URGENT @priorityzero.

[ more ]  [ reply ]
Call For Papers Announcement: Black Hat Briefings Amsterdam 2003-02-20
Jeff Moss (jmoss blackhat com)
Hello BugTraq. Lots of people on this list do good work, and so I want to
invite you all to respond to this CFP, or to the CFP for the USA or Federal
shows which will be released shortly. Thank you.

Call For Papers Announcement: Black Hat Briefings Amsterdam

Whoop! Whoop!

http://www.blackhat.co

[ more ]  [ reply ]
myphpnuke xss 2003-02-20
Tacettin Karadeniz (tacettinkaradeniz yahoo com)
Vendor:
http://www.myphpnuke.com

Subject:
myphpnuke links.php vulnerability

myphpnuke is a website portal tool written in php.
There are many Cross Site Scripting issue on myphpnuke
.

Example:
http://WEB/myphpnuke/links.php?op=MostPopular&ratenum=[scr!pt]alert(docu
ment.cookie);[/scr!pt]&ratetype

[ more ]  [ reply ]
Master Servers: yet another DDoS... 2003-02-20
Auriemma Luigi (aluigi pivx com) (1 replies)

Yeah, seems that DDoS attacks will never die and in these months seems
that every game can be used for launch DDoS attacks...

This time I want to show a problem that, for me, is very obvious but
I have not found any reference to it on Internet.

The following is my advisory about the problem:

##

[ more ]  [ reply ]
Re: Master Servers: yet another DDoS... 2003-02-20
Greg Steuck (greg-bugtraq nest cx)
[SNS Advisory No.61] Symantec Norton AntiVirus 2002 Buffer Overflow Vulnerability 2003-02-19
snsadv (at) lac.co (dot) jp [email concealed] (snsadv lac co jp)
[Moderator note: This post was withheld, with permission from SNS, to ensure that
the issue was resolved completely. ]

----------------------------------------------------------------------
SNS Advisory No.61
Symantec Norton AntiVirus 2002 Buffer Overflow Vulnerability

Problem fir

[ more ]  [ reply ]
(Page 1703 of 1748)  < Prev  1698 1699 1700 1701 1702 1703 1704 1705 1706 1707 1708  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus