Ref: Bugtraq message, Multiple Vendor PC firewall remote denial of
services Vulnerability,
Date: Oct 8 2002 2:16AM
Author: Yiming Gong <[EMAIL PROTECTED]>
Message-ID: <002701c26e70$a882eba0$f8ff1dda@penetrat>
Overview
In a default installation, some personal firewall software will work
with
-
Red Hat, Inc. Red Hat Security Advisory
Synopsis: Updated packages fix PostScript and PDF security issue
Advisory ID: RHSA-2002:207-14
Issue date:2002-09-23
Updated on:2002-10-0
Hi!
I was checking the vulnerability "NETGEAR FVS318 Firewall Router
Username/Password Disclosure"[1] on my NetGear FM114P. My little box
doesn't store the web login username and password in plain text.
But the DDNS (DynDNS) account data is stored in plaintext; this problem
seems to be existent
Issues
MIME-Version: 1.0
From: "Rapid 7 Security Advisories" <[EMAIL PROTECTED]>
Message-ID:
<[EMAIL PROTECTED]>
Date: Wed, 2 Oct 2002 22:48:29 -0700
X-MIMETrack: Serialize by Router on Zion/Rapid7/US(Release 5.0.5
|September 22, 2000) at
10/03/2002 01:48:36 AM,
Serialize complet
Vulnerable systems:
Zorum 2.4
Exploit:
z_user_show.php?method=showuserlink&class=javascript:alert
(document.cookie)&rollid=admin&x=3da59a9da8825&
(without "*")
Solution:
i think that will work , but im not sure
open dbtreelistproperty_method.php and put this code in line 7:
$c
PACKAGE : syslog-ng
VERSION : -1.4.15 (stable) and -1.5.20 (development)
SUMMARY : buffer overflow
TYPE : remote exploit
VULNERABLE: : exploitable (not in default configura
Try putting a snooper (ethereal or even just tcpdump) on the outside of
your netgear (if you have a spare hub handy). From those *extremely*
varied hit counts needed to crash the box, I'm guessing that something
else is needed to trigger a failure besides just massive connects.
It may be a race c
A damage could be alot more than assessed by hish in his last email, and not just
infecting the visitors of the forum, but a critical server risk.
For instance if an attacker makes a perl/php script of malicious code,
he could takeover the server with httpd-user id.
An attacker could create file
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Product : phpRank
Date: 10/10/2002
Author : Frank Denis <[EMAIL PROTECTED]>
[ Product description ]
phpRank is a popular set of PHP script to easily create and maintain
top-lists of web lin
MondoSearch show the source of all files
Affected Program: MondoSearch 4.4
(possibly earlier versions too, but not tested)
Vendor: http://www.mondosoft.com
Vendor Status: not informed yet
Discovery Date: 10 oct 2002
Problem
---
You ca
Dear bugtraq@,
I found this bug in nylon 0.2, but according to CVS logs it was already
fixed in nylon project Tue Jun 25 00:27:07 2002 UTC (3 months, 2 weeks
ago), http://mesh.eecs.umich.edu/cvsweb/nylon/ So, just update to newer
version.
Details:
#if defined(SENDN) || defined(RECVN)
ssize_
It also works with version 2.0.2.
Greetz,
Gerben
- Original Message -
From: "Priamus" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Wednesday, October 09, 2002 2:52 PM
Subject: phpBB2 Showing users ip adresses
>
>
> phpBB2 Showing users ip adresses
> ---
Hi!
I've got a lot of availability trouble with my NetGear FM114P. After
asking the support and no good answer I started doing some test for
myself. It seems possible to crash the NetGear FM114P with many TCP
connects. I did some tests on my FM114P firmware Version 1.3 Release 05
and these are th
phpBBmod (http://phpbbmod.sourceforge.net), an enhanced version of phpBB
contains an open phpinfo.php file.
Going to phpinfo.php on any board using phpBBmod (googling for "Boosted by
phpBBmod" is around ~48,000 results, i tried a few from google search and
they all had a phpinfo.php file)
Soluti
version tested: 2.24
pwd shows absolute path instead of relative ( ie. drive:/folder instead of
/ )
ls ../ will let a user get a dirlisting above his home directory.
mkdir ../folder will let a user create folders outside his home
directory.[1]
put file ../file will let users create files outside h
Vulnerable systems:
1.2.7pl1
Exploit:
forums/browse.php?fid=3&tid=46&go=JavaScript:alert
('Hi');
(with out "*")
Solution:
i thought this but i am not sure
open browse.php and add this code in line 52:
$go = HTMLSpecialChars($go);
$go = PREG_Replace("/[A-Z&.;:()~!@#$%^''*\{\}\
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Name: ypxfrd
Version:read the details
CERT vulnerability note:http://www.kb.cert.org/vuls/id/538033
Author: Janusz Niewiadomski <[EMAIL PROTECTED]>
Date:
17 matches
Mail list logo