BugTraq Mode:
(Page 1723 of 1748)  < Prev  1718 1719 1720 1721 1722 1723 1724 1725 1726 1727 1728  Next >
OpenTopic security hole 2003-01-04
Frog Man (leseulfrog hotmail com)
Informations :
°°°°°°°°°°°°°°
Product : OpenTopic
Website : http://www.infopop.com
Version : 2.3.1
Problem : XSS (script injection) -> Cookies recovery

Location/Exploit :
°°°°°°°°°°°°°°°°°°
The XSS hole is in the private messages area (
http://[target]/OpenTopic?a=ugtpc ).
XSS to get cookie :
[IM

[ more ]  [ reply ]
Multiple libmcrypt vulnerabilities 2003-01-03
Ilia A. (ilia prohost org)
limbcrypt versions prior to 2.5.5 contain a number of buffer overflow
vulnerabilities that stem from imporper or lacking input validation. By
passing a longer then expected input to a number of functions (multiple
functions are affected) the user can successful make libmcrypt crash.

Another vuln

[ more ]  [ reply ]
[RHSA-2002:270-16] Updated pine packages available 2003-01-03
bugzilla redhat com
---------------------------------------------------------------------
Red Hat, Inc. Red Hat Security Advisory

Synopsis: Updated pine packages available
Advisory ID: RHSA-2002:270-16
Issue date: 2003-01-03
Updated on: 2003-01-02
Product: Red

[ more ]  [ reply ]
Another way to bypass Integrity Protection Driver ('subst' vuln) 2003-01-03
Jan Rutkowski (jkrutkowski elka pw edu pl)
Another Way To Bypass
Pedestal Software Integrity Protection Driver
('subst' vulnerability)

Jan K. Rutkowski
jkrutkowski (at) elka.pw.edu (dot) pl [email concealed]

About IPD
----------
IPD is an Open Source program to protect Windows 2000 kernel integrity.
Check the following page for more in

[ more ]  [ reply ]
Pedestal Software Security Notice 2003-01-03
Keith Woodard (kwoodard pedestalsoftware com)
Product: Integrity Protection Driver (IPD)
Version: 1.3 and earlier
Subject: New Integrity Protection Driver (IPD) Available
Date: January 3, 2003
Solution: Upgrade to version 1.4

SUMMARY

The Integrity Protection Driver (IPD) is an open source kernel
driver for Windows NT and W

[ more ]  [ reply ]
fam Vulnerability Update 2003-01-03
SGI Security Coordinator (agent99 sgi com)
-----BEGIN PGP SIGNED MESSAGE-----

________________________________________________________________________
______
SGI Security Advisory

Title : fam Vulnerability Update
Number : 20000301-03-I
Date : January 3, 2002
Reference: SGI Security Advisory 20000301-02-I
R

[ more ]  [ reply ]
Solaris 2.x /usr/sbin/wall Advisory 2003-01-03
Brant Roman (broman apollo gti net)

Affected Operating System(s): Solaris 2.x-9
Possibly others derived from AT&T source code.

Affected Program: /usr/sbin/wall

Synopsis:
Wall is a setgid tty program that broadcasts a message to every user
currently logged into the system. It can also receive messages from
remote hosts, via

[ more ]  [ reply ]
[SECURITY] [DSA 221-1] New mhonarc packages fix cross site scripting 2003-01-03
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 221-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
January 3rd, 2003

[ more ]  [ reply ]
Re: JS Bug makes it possible to deliberately crash Pocket PC IE (fwd) 2003-01-03
angus onnow net
Can you be specific about what version of PIE you tested this vulnerability on?

If you look at the following web pages you will see that PIE only supports a
few HTML tags.

http://support.microsoft.com/default.aspx?scid=kb;en-us;Q161319
http://support.microsoft.com/default.aspx?scid=kb;EN-US;158479

[ more ]  [ reply ]
JS Bug makes it possible to deliberately crash Pocket PC IE 2003-01-03
Christopher Sogge Røtnes (crotnes student sv uio no)
PROBLEM DESCRIPTION:
Calling a javascript from an object written to same page with the
object.innerHTML function causes Pocket Internet Explorer (PIE from now on)
to crash.

SOFTWARE AFFECTED:
Only PIE is affected, "regular" IE will show the pages as intented.

EXAMPLE:
<html>
<head>
<title>Crash

[ more ]  [ reply ]
ical 3.7 remote dos 2003-01-03
securma massine (securma caramail com)
hi
iCal (http://www.brownbearsw.com)is a web-based calendar
that can be used to show meetings,
events, or other schedules. calendars can be viewed,
edited,
and administered totally through the web. iCal is build
for
thin-clients, so access calendar without any plug-ins
or java interpreters.
I fo

[ more ]  [ reply ]
Re: Potential disclosure of sensitive information in Netscape 7.0 email client 2003-01-02
Blud Clot (bludclot hellokitty com) (1 replies)
I noticed this a while ago with netscape 4.x and those versions are still vulnerable as well. I've never checked 6.x.

-BludClot
--
____________________________________________________
Get your own Hello Kitty email @ www.sanriotown.com

Powered by Outblaze

[ more ]  [ reply ]
[BUGZILLA] Security Advisory - remote database password disclosure 2003-01-02
David Miller (justdave syndicomm com)
Bugzilla Security Advisory

January 2nd, 2002

Severity: major (remote database password disclosure, bug 186383)
minor (local file permissions, bug 183188)

Summary
=======

All Bugzilla installations are advised to upgrade to the latest versions
of Bugzilla, 2.14.5 and 2.16.2, both releas

[ more ]  [ reply ]
SuSE Security Announcement: fetchmail (SuSE-SA:2003:001) 2003-01-02
Thomas Biege (thomas suse de)
-----BEGIN PGP SIGNED MESSAGE-----

________________________________________________________________________
______

SuSE Security Announcement

Package: fetchmail
Announcement-ID: SuSE-SA:2003:001
Date: Thursday,

[ more ]  [ reply ]
N/X (PHP) 2003-01-02
Frog Man (leseulfrog hotmail com)
Informations :
°°°°°°°°°°°°°°
Website : http://nxwcms.sourceforge.net/
Version : 2002 PreRelease 1
Problem : Include file

PHP Code/Location :
°°°°°°°°°°°°°°°°°°°
nx/common/cds/menu.inc.php :
-----------------------------------------------------------
[...]
require_once $c_path."common/lib/launch.i

[ more ]  [ reply ]
[SECURITY] [DSA 220-1] New squirrelmail packages fix cross site scripting problem 2003-01-02
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 220-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
January 2nd, 2003

[ more ]  [ reply ]
SuSE Security Announcement: mysql (SuSE-SA:2003:003) 2003-01-02
Sebastian Krahmer (krahmer suse de)

-----BEGIN PGP SIGNED MESSAGE-----

________________________________________________________________________
______

SuSE Security Announcement

Package: mysql
Announcement-ID: SuSE-SA:2003:003
Date: Thu Jan 2 1

[ more ]  [ reply ]
GLSA: leafnode 2003-01-02
Daniel Ahlberg (aliz gentoo org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - --------------------------------------------------------------------
GENTOO LINUX SECURITY ANNOUNCEMENT 200301-2
- - --------------------------------------------------------------------

PACKAGE : leafnode
SUMMARY : denial of service
DATE    : 2003-

[ more ]  [ reply ]
GLSA: xpdf 2003-01-02
Daniel Ahlberg (aliz gentoo org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - --------------------------------------------------------------------
GENTOO LINUX SECURITY ANNOUNCEMENT 200301-1
- - --------------------------------------------------------------------

PACKAGE : xpdf
SUMMARY : integer overflow
DATE    : 2003-01-02

[ more ]  [ reply ]
SuSE Security Announcement: cups (SuSE-SA:2003:002) 2003-01-02
Thomas Biege (thomas suse de)
-----BEGIN PGP SIGNED MESSAGE-----

________________________________________________________________________
______

SuSE Security Announcement

Package: cups
Announcement-ID: SuSE-SA:2003:002
Date: Thursday, Jan

[ more ]  [ reply ]
Potential disclosure of sensitive information in Netscape 7.0 email client 2003-01-01
Michael Puchol (mpuchol sonar-security com) (1 replies)
Potential disclosure of sensitive information in Netscape 7.0 email client.

Overview:
=================

Netscape 7.0 includes, as part of it's release, an email client, capable of
handling POP3 and IMAP accounts. The method that the email client utilizes
to permanently delete email messages is not

[ more ]  [ reply ]
Re: Potential disclosure of sensitive information in Netscape 7.0 email client 2003-01-01
Bartek Raszczyk (crayfish underground org pl)
Filtering devices spotting 2003-01-01
Ed3f (ed3f overminder com) (1 replies)

************************ SECURITY ALERT ************************

Systems Affected

100% of packet filtering systems included commercial
embedded devices
(no unaffected system known at the moment)

Risk

low

Overview

Multiple vendors' implementations of a packet filtering
engine doesn't

[ more ]  [ reply ]
Re: Filtering devices spotting 2003-01-02
Darren Reed (avalon coombs anu edu au)
PEEL (PHP) 2002-12-31
Frog Man (leseulfrog hotmail com)


Informations :
°°°°°°°°°°°°°°
Version : 1.0b
Website : http://www.mapetite-entreprise.com
Problem : Include file

PHP Code/Location :
°°°°°°°°°°°°°°°°°°°
modeles/haut.php :
-----------------------------------------------------------
<?
$langfile = $dirroot."/lang/".$SESSION["lang"]."/lang.php";
re

[ more ]  [ reply ]
[SECURITY] [DSA 219-1] New dhcpcd packages fix remote command execution vulnerability 2002-12-31
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 219-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
December 31st, 2002

[ more ]  [ reply ]
Updated "Secure Programming for Linux and Unix HOWTO" now available. 2002-12-30
David Wheeler (dwheeler ida org)
The latest version of my book, "Secure Programming for Linux and Unix HOWTO",
is now available! You can freely download it in a variety of formats at:
http://www.dwheeler.com/secure-programs

This book provides a set of design and implementation guidelines for writing
secure programs for Linux a

[ more ]  [ reply ]
Wired.com: So Many Holes, So Few Hacks 2002-12-30
Richard M. Smith (rms computerbytesman com)
So Many Holes, So Few Hacks By Michelle Delio
http://www.wired.com/news/infostructure/0,1377,56955,00.html

Experts who discover and report security holes seem to be far more
industrious than the malicious hackers willing or able to exploit those
holes.

Despite the thousands of hackable holes th

[ more ]  [ reply ]
(Page 1723 of 1748)  < Prev  1718 1719 1720 1721 1722 1723 1724 1725 1726 1727 1728  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus