BugTraq Mode:
(Page 1709 of 1748)  < Prev  1704 1705 1706 1707 1708 1709 1710 1711 1712 1713 1714  Next >
PHPMyNewsLetter 0.6.11 - customize.php include problem 2003-02-05
Ueli Kistler (iuk gmx ch)
Vulnerable : PHPMyNewsLetter 0.6.11
Vulnerability : Unauthorised file access
Product URL : http://gregory.kokanosky.free.fr/phpmynewsletter/
Contacted : 4.2.2003

Advisory by Eclipse at packx.net, visit www.packx.net.

Description
===========
PHPSecure.org's "fix" broke the functionality

[ more ]  [ reply ]
Re: Preventing exploitation with rebasing 2003-02-05
David Litchfield (david ngssoftware com) (3 replies)
Going back to exe image files and rebasing. Surely they can be rebased even
without a .reloc section? All I need to do is edit the image base in the PE
header then parse the assembly looking for absolute addresses such as
function addresses, static variables etc and modify these addresses, too.

For

[ more ]  [ reply ]
Re: Preventing exploitation with rebasing 2003-02-05
Bugtraq User (bq soft-analysts com)
Re: Preventing exploitation with rebasing 2003-02-05
Michal Zalewski (lcamtuf coredump cx)
Re: Preventing exploitation with rebasing 2003-02-05
D.C. van Moolenbroek (dc van moolenbroek chello nl)
MDKSA-2003:014 - Updated kernel packages fix a number of bugs 2003-02-05
Mandrake Linux Security Team (security linux-mandrake com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________

Mandrake Linux Security Update Advisory
________________________________________________________________________

Package name: kernel
Advisory ID:

[ more ]  [ reply ]
[CLA-2003:567] Conectiva Linux Security Announcement - mcrypt 2003-02-05
secure conectiva com br
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
CONECTIVA LINUX SECURITY ANNOUNCEMENT
- ------------------------------------------------------------------------
--

PACKAGE : mcrypt
SUMMARY : Buffer overflow and memory l

[ more ]  [ reply ]
[RHSA-2003:017-06] Updated PHP packages available 2003-02-05
bugzilla redhat com
---------------------------------------------------------------------
Red Hat, Inc. Red Hat Security Advisory

Synopsis: Updated PHP packages available
Advisory ID: RHSA-2003:017-06
Issue date: 2003-01-21
Updated on: 2003-02-04
Product: Red H

[ more ]  [ reply ]
RE: Opera: What's Next (GM#005-OP) 2003-02-05
Bjornar B. Larsen (bbl ementor no)
FYI:
Opera 7.01 is out already, fixing the vulnerabilities GreyMagic reported
yesterday. I've verified that the GreyMagic sample exploits fail.
Downloadable from opera.com.

Regards,

:) Bjørnar

[ more ]  [ reply ]
GLSA: bladeenc 2003-02-05
Daniel Ahlberg (aliz gentoo org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - --------------------------------------------------------------------
GENTOO LINUX SECURITY ANNOUNCEMENT 200302-04
- - --------------------------------------------------------------------

PACKAGE : bladeenc
SUMMARY : arbitrary code execution
DATE

[ more ]  [ reply ]
Unreal engine: results of my research 2003-02-05
Auriemma Luigi (aluigi pivx com)

After almost 3 months, I have finally decided to release the huge
advisory/paper about bugs founded in the Unreal engine and all the relative
code for the vulnerabilities exploitation (plus some tools that I have
written during the reversing of the engine).

The link for get the english advisory i

[ more ]  [ reply ]
The Advantages of Block-Based Protocol Analysis for Security Testing 2003-02-04
Dave Aitel (dave immunitysec com)
Immunity, Inc. is proud to announce both a new paper on SPIKE and
related fuzzing technology, and the release of SPIKE 2.8. Both are
available from http://www.immunitysec.com/spike.html . SPIKE is a
full-featured network protocol analysis toolkit, written in C, and
released under the GNU Public Lice

[ more ]  [ reply ]
Quake3 engine autodownload issues. 2003-02-04
Thilo Schulz (arny ats s bawue de)
Hello,

The Quake3 Engine's feature for automatically downloading modifications from
the server to the client bears great potential of abuse and could even lead
to execution of arbitrary code. Because this is quake3 engine related many
games aside from quake3 suffer from the same problem as well.

[ more ]  [ reply ]
Re: GLSA: Mail-SpamAssasin 2003-02-04
Mark Martinec (Mark Martinec ijs si)
-----BEGIN PGP SIGNED MESSAGE-----

From: Eric Vollmer
| Does anyone know if this effects the Mail::SpamAssassin
| perl libraries when used with amavisd-new?

The bug described in
http://marc.theaimsgroup.com/?l=bugtraq&m=104342896818777&w=2
is in the C code of the spamc program.
It is not in the

[ more ]  [ reply ]
TOPo 1.43 and prior - Path Disclosure (in.php, out.php) 2003-02-04
Rynho Zeros Web (hackargentino gmx net)
+ Poduct:
TOPo.

TOPo is a free TOP system written in PHP that works without MySQL database.
TOPo is specially designed for web sites hosted in web servers that not
offer a quality MySQL support.

More
info:
http://ej3scripts.loadedweb.com/modules.php?name=Info_Scripts&file=index
&func=topo

+ Web Si

[ more ]  [ reply ]
dynamic and static code injection as well as population concept 2003-02-04
Peter Huang (yinrong rogers com)
First of all, thank a lot for your comments and (dis)encouragements. I will
not trumpet my "brand-new" old idea here.

Anyway, I would like to briefly discuss the my further analysis of the SQL
Sapphire Worm.

Code Offset Functionality
; 000-060 ---- Buffer Buster
; 061-064 ---- Critical Jumping

[ more ]  [ reply ]
(Page 1709 of 1748)  < Prev  1704 1705 1706 1707 1708 1709 1710 1711 1712 1713 1714  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus