BugTraq Mode:
(Page 1729 of 1748)  < Prev  1724 1725 1726 1727 1728 1729 1730 1731 1732 1733 1734  Next >
Adelphia Powerlink service vulnerable to man in the middle attacks by cable modem users. 2002-12-12
0x90 (0x90 invisiblenet net)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ----------------------------------------------------------------------
- ----

InvisibleNet Security Advisory ISA 1-1a security (at) invisiblenet (dot) com [email concealed]

http://www.invisiblenet.com

December 12th, 2002 - report issued by 0x90

- -----------------------------

[ more ]  [ reply ]
[SECURITY] [DSA-209-1] two wget problems 2002-12-12
Wichert Akkerman (wichert wiggy net)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------

Debian Security Advisory DSA-209-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Wichert Akkerman
December 12, 2002
- ------------

[ more ]  [ reply ]
Password Hole Found In Webshots 2002-12-12
Brian Carpenter (brian carpenter wosc edu)
I have descovered a hole in the webshots screensave program. On either
a Win2K or xp machine that has it installed you can bypass the password
on the screen saver by pressing Ctrl+Alt+Del wich brings up the Windows
box that contains logout lockcomputer shutdown ect: Then you will hit
cancel and boo

[ more ]  [ reply ]
Advisory 04/2002: Multiple MySQL vulnerabilities 2002-12-12
Stefan Esser (s esser e-matters de)
e-matters GmbH
www.e-matters.de

-= Security Advisory =-

Advisory: Multiple MySQL vulnerabilities
Release Date: 2002/12/12
Last Modified: 2002/12/12
Author: Stefan Esser [s.esser (at) e-matters (dot) de [email concealed]]

Application:

[ more ]  [ reply ]
[RHSA-2002:222-21] Updated apache, httpd, and mod_ssl packages available 2002-12-12
bugzilla redhat com
---------------------------------------------------------------------
Red Hat, Inc. Red Hat Security Advisory

Synopsis: Updated apache, httpd, and mod_ssl packages available
Advisory ID: RHSA-2002:222-21
Issue date: 2002-12-12
Updated on: 2002-11-25
P

[ more ]  [ reply ]
VisNetic WebSite XSS vulnerability through HTTP referer header 2002-12-12
Ory Segal (ory segal sanctuminc com)
Visnetic WebSite XSS vulnerability through HTTP Referer header
------------------------------------------------------------------------
---------------------

=> Author: Ory Segal - Sanctum inc. http://www.sanctuminc.com/

=> Release date: 09/12/2002

=> Vendor: Deerfield ( http://www.deerfield.com )

[ more ]  [ reply ]
[SECURITY] [DSA 208-1] New Perl packages correct Safe handling 2002-12-12
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 208-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
December 12th, 2002

[ more ]  [ reply ]
Multiple Mambo Site Server sec-weaknesses 2002-12-12
euronymous (just-a-user yandex ru)
=:=:=::=:=:=::=:=:=::=:=:=::=:=:=::=:=:=::=:=:=::=
topic: Multiple Mambo Site Server sec-weaknesses
product: Mambo Site Server 4.0.11
vendor: http://sourceforge.org/projects/mambo
risk: high
date: 12/12/2k2
discovered by: euronymous /F0KP /HACKRU Team
advisory urls: http://f0kp.iplus.ru/bz/010.en.tx

[ more ]  [ reply ]
PNG (Portable Network Graphics) Deflate Heap Corruption Vulnerability 2002-12-12
Marc Maiffret (marc eeye com)
PNG (Portable Network Graphics) Deflate Heap Corruption Vulnerability

Release Date:
December 11, 2002

Severity:
High (Code Execution)

Systems Affected:
We have specifically tested the following software and verified the
potential for exploitation:
Microsoft Internet Explorer 5.01
Microsoft Intern

[ more ]  [ reply ]
MDKSA-2002:086 - Updated wget packages fix directory traversal vulnerability 2002-12-12
Mandrake Linux Security Team (security linux-mandrake com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________

Mandrake Linux Security Update Advisory
________________________________________________________________________

Package name: wget
Advisory ID:

[ more ]  [ reply ]
CERT Advisory CA-2002-35 Vulnerability in RaQ 4 Servers (fwd) 2002-12-12
Muhammad Faisal Rauf Danka (mfrd attitudex com)
-----BEGIN PGP SIGNED MESSAGE-----

CERT Advisory CA-2002-35 Vulnerability in RaQ 4 Servers

Original release date: December 11, 2002
Last revised: --
Source: CERT/CC

A complete revision history can be found at the end of this file.

Systems Affected

* Sun Cobalt RaQ 4

[ more ]  [ reply ]
Security Update: [CSSA-2002-SCO.44] UnixWare 7.1.1 Open UNIX 8.0.0 : uudecode performs inadequate checks on user-specified output files 2002-12-11
security caldera com
To: bugtraq (at) securityfocus (dot) com [email concealed] announce (at) lists.caldera (dot) com [email concealed] scoannmod (at) xenitec.on (dot) ca [email concealed] full-disclosure (at) lists.netsys (dot) com [email concealed]

________________________________________________________________________
______

SCO Security Advisory

Subject: UnixWare 7.1.1 Open UNIX 8.0.0 : uudecode performs inadequate checks

[ more ]  [ reply ]
Denial of Service vulnerability in VisNetic Website 2002-12-11
Peter Kruse (kruse krusesecurity dk)
Name: VisNetic WebSite Denial of Service
Date: 12th of December 2002
Software affected: VisNetic WebSite 3.5.13.1
(prior versions are vulnerable)
Advisory: http://www.krusesecurity.dk/advisories/vis0102.txt
Risk: Medium

Legal Notice

[ more ]  [ reply ]
MTPSR1-120 Firewall Proxy configuration software 2002-12-11
UkR security team? (cuctema ok ru)
Product : MTPSR1-120 Firewall Proxy configuration
software
Version : 3.0
Vendor : Multi-Tech Systems, Inc.
(http://www.multitech.com)
Remote : Yes
Author : UkR-XblP (cuctema (at) ok (dot) ru [email concealed])/ UkR security team

Overview:
Firewall Proxy configuration software default do not set a

[ more ]  [ reply ]
Enceladus Server Suite traversal directory vulnerability 2002-12-08
luca.ercoli (at) inwind (dot) it [email concealed] (luca ercoli inwind it)
Summary: Enceladus Server Suite is an internet/intranet lightweight web

and ftp server for windows.

Details: The web server has been found to contain a security flaw that

allows attackers to travers up the root directory and view/download

files on the system.

Vulnerable System: Enceladus Se

[ more ]  [ reply ]
proftpd <=1.2.7rc3 DoS 2002-12-08
Rob klein Gunnewiek (rmkleing hio hen nl)
Hello,

proftpd is vulnerable to denial of service similar to the list
*/../*/../*/../*.

#!/bin/sh
#
# proftpd <=1.2.7rc3 DoS - Requires anonymous/ftp login at least
# might work against many other FTP daemons
# consumes nearly all memory and alot of CPU
#
# tested against slackware 8.1 - proftpd 1

[ more ]  [ reply ]
Remote multiple vulnerability in apt-www-proxy. 2002-12-08
dong-h0un U (xploit hackermail com)


========================================
INetCop Security Advisory #2002-0x82-009
========================================

* Title: Remote multiple vulnerability in apt-www-proxy.

0x01. Description

__
bash$ lynx -dump http://ironsides.terrabox.com/~ahzz/apt-www-proxy/

[ more ]  [ reply ]
Security Update: [CSSA-2002-058.0] Linux: buffer overflow in nss_ldap DNS SRV 2002-12-11
security caldera com
To: bugtraq (at) securityfocus (dot) com [email concealed] announce (at) lists.caldera (dot) com [email concealed] security-alerts (at) linuxsecurity (dot) com [email concealed] full-disclosure (at) lists.netsys (dot) com [email concealed]

________________________________________________________________________
______

SCO Security Advisory

Subject: Linux: buffer overflow in nss_ldap DNS SRV
Advisory number:

[ more ]  [ reply ]
Directory Traversal Vulnerabilities in FTP Clients 2002-12-11
Steven M. Christey (coley linus mitre org) (1 replies)


___ Summary __________________________________________________________

Title: Directory Traversal Vulnerabilities in FTP Clients
Date: December 10, 2002
Author: Steve Christey (coley (at) mitre (dot) org [email concealed])
Revision: 1.3

Product: Multiple FTP and web clients
OS/Platform:

[ more ]  [ reply ]
Re: Directory Traversal Vulnerabilities in FTP Clients 2002-12-12
Stephen Samuel (samuel bcgreen com)
[SECURITY] [DSA 207-1] New tetex-lib packages fix arbitrary command execution 2002-12-11
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 207-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
December 11th, 2002

[ more ]  [ reply ]
Cisco Security Advisory: OSM Line Card Header Corruption Vulnerability 2002-12-11
Cisco Systems Product Security Incident Response Team (psirt cisco com)
-----BEGIN PGP SIGNED MESSAGE-----

Cisco Security Advisory: OSM Line Card Header Corruption Vulnerability
========================================================================

Revision 1.0 FINAL

For Public Release 2002 December 11 16:00 UTC

- -----------------------------------------------

[ more ]  [ reply ]
Directory traversing bug in 'myServer' webserver. 2002-12-11
dong-h0un U (xploit hackermail com)


=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
INetCop Security Advisory #2002-0x82-010
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
- Our 10th advisory does self-congratulation.

* Title: Directory traversing bug in 'myServer' webserver.

0x01. Description

It's very useful Windows webserver that is

[ more ]  [ reply ]
RE: Sygate Personal Firewall can be shut down without a need to supply a password - although one is required 2002-12-09
Seth Knox (seth knox sygate com) (1 replies)
Eitan,

You are welcome. Thank you for taking the time to test Sygate Personal
Firewall. However, in this case, I think you are making an issue out
something that is trivial to anyone who understands the use of rights and
privileges within the Windows Operating Systems. I suggest that in the
future

[ more ]  [ reply ]
Re: XSS and Path Disclosure in UPB 2002-12-09
Frog Man (leseulfrog hotmail com)


Anything about UPB was already wrote (1.1 & 1.0beta) :
http://www.frogsecure.com/tutos/UPB.txt

>From: "euronymous" <just-a-user (at) yandex (dot) ru [email concealed]>
>Reply-To: just-a-user (at) yandex (dot) ru [email concealed]
>To: bugtraq (at) securityfocus (dot) com [email concealed], vulnwatch (at) vulnwatch (dot) org [email concealed]
>Subject: XSS and Path Disclosure in UPB
>Date: Sat, 7 Dec 2002 20:

[ more ]  [ reply ]
(Page 1729 of 1748)  < Prev  1724 1725 1726 1727 1728 1729 1730 1731 1732 1733 1734  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus