Captaris (Infinite) WebMail XSS

2002-12-16 Thread Pedram Amini
I figured it was about time I hopped on the XSS band-wagon. Captaris (www.captaris.com) Infinite WebMail application is vulnerable to Cross-Site Scripting (XSS) attacks. The application fails to filter the following tags that can both be used to redirect a user to an attack script: Launch on e-ma

Security Patchs for PHP Products

2002-12-16 Thread Frog Man
PHPSecure made some patchs for security holes in PHP products. Here is the list : - ALP - Banner Ad 2.0 : http://www.phpsecure.org/index.php?id=1&zone=pDl More details : http://online.securityfocus.com/search?category=22&query=ALP - Tight Auction 3.0 : http://www.phpsecure.org/index.php?id=6&zon

[CLA-2002:553] Conectiva Linux Security Announcement - kernel 2.4

2002-12-16 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : kernel 2.4 SUMMARY : Local denial of service

[CLA-2002:554] Conectiva Linux Security Announcement - fetchmail

2002-12-16 Thread secure
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - -- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -- PACKAGE : fetchmail SUMMARY : Remote vulnerability DAT

RE: PFinger 0.7.8 format string vulnerability (#NISR16122002B)

2002-12-16 Thread Stefan Esser
Hello, > Due to the way requests are logged the only way to exploit this > vulnerability is through setting the DNS name of the fingering host to the > attacker supplied format string. I really wonder how you want to exploit this... Last time I checked all tested resolvers (Linux/BSD/Solaris) di

PFinger 0.7.8 format string vulnerability (#NISR16122002B)

2002-12-16 Thread NGSSoftware Insight Security Research
NGSSoftware Insight Security Research Advisory Name: PFinger Format String vulnerability Systems: PFinger version 0.7.8 and earlier Severity: High Risk Vendor URL: http://www.xelia.ch/unix/pfinger/ Author: David Litchfield ([EMAIL PROTECTED]) Advisory URL: http://www.ngssoftware.com/advisories/pfi

zkfingerd 0.9.1 format string vulnerabilities (#NISR16122002A)

2002-12-16 Thread NGSSoftware Insight Security Research
NGSSoftware Insight Security Research Advisory Name: zkfingerd Format String vulnerability Systems: zkfingerd version 0.9.1 and earlier Severity: High Risk Vendor URL: http://sourceforge.net/projects/zkfingerd Author: David Litchfield ([EMAIL PROTECTED]) Advisory URL: http://www.ngssoftware.com/ad

Re: Cross-site scripting vulnerability in CF 5.0

2002-12-16 Thread SecurityFocus
Something to note: The 'view admin log' feature in CF tends to cause stress on the CF process, and also blocks the log file during opening. So, It's generally a better (and safer, with this cross-site scripting problem that's been around for years) to view the logs file via a text viewer on the s

Cross-site scripting vulnerability in CF 5.0

2002-12-16 Thread KiLL CoLe
Cross-site scripting vulnerability in CF 5.0. This issue was brought up to macromedia on July 22nd, 2002. Macromedia issued a fix to me, but I have not seen the fix available to the public. the coldfusion administrator allows you to view your application log via your web browser. Under certain c

RE: Cross-site scripting vulnerability in CF 5.0

2002-12-16 Thread CORREIA, PATRICK
Does anyone have information on whether the same issue affects ColdFusion MX? __ Patrick K. Correia, Web Designer Clough, Harbour & Associates LLP http://www.cha-llp.com -Original Message- From: KiLL CoLe [mailto:[EMAIL PROTECTED]] Sent: Monday, D

PHP-Nuke 6.0 : Path Disclosure & Cross Site Scripting

2002-12-16 Thread Frog Man
Informations : °° Product : PHP-Nuke Version : 6.0 Website : http://www.phpnuke.org Problems : - Path Disclosure - XSS Developpement : °°° The majority of the PHPNuke's files are includes in modules.php or index.php. To prevent the direct access, PHPNuke made two kinds o

R7-0009: Vulnerabilities in SSH2 Implementations from Multiple Vendors

2002-12-16 Thread Rapid 7 Security Advisories
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 ___ Rapid 7, Inc. Security Advisory Visit http://www.rapid7.com/ to download NeXpose(tm), our advanced vulnerability scanner. Linux and Windows 2

[OpenPKG-SA-2002.013] OpenPKG Security Advisory (mysql)

2002-12-16 Thread OpenPKG
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 OpenPKG Security AdvisoryThe OpenPKG Project http://www.openpkg.org/security.html http://www.openpkg.org [EMAIL PROTECTED]

GLSA: exim

2002-12-16 Thread Daniel Ahlberg
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - GENTOO LINUX SECURITY ANNOUNCEMENT 200212-5 - - PACKAGE : exim SUMMARY : local root vulnerability DATE    : 2

[OpenPKG-SA-2002.015] OpenPKG Security Advisory (tetex)

2002-12-16 Thread OpenPKG
Affected Releases: Affected Packages: Corrected Packages: OpenPKG 1.0 <= tetex-1.0.7-1.0.0 >= tetex-1.0.7-1.0.1 OpenPKG 1.1 <= tetex-1.0.7-1.1.0 >= tetex-1.0.7-1.1.1 OpenPKG CURRENT <= tetex-1.0.7-20021204 >= tetex-1.0.7-20021216

PHP-Nuke code execution and XSS vulnerabilities

2002-12-16 Thread Ulf Harnhammar
PHP-Nuke code execution and XSS vulnerabilities PROGRAM: PHP-Nuke VENDOR: Fransisco Burzi et al. HOMEPAGE: http://phpnuke.org/ VULNERABLE VERSIONS: 6.0 (the only supported version) IMMUNE VERSIONS: 6.0 with my patch applied LOGIN REQUIRED: no DESCRIPTION: "PHP-Nuke is a Web portal and online c

[OpenPKG-SA-2002.014] OpenPKG Security Advisory (perl)

2002-12-16 Thread OpenPKG
Affected Releases: Affected Packages: Corrected Packages: OpenPKG 1.0 <= perl-5.6.1-1.0.1 >= perl-5.6.1-1.0.2 OpenPKG 1.1 <= perl-5.6.1-1.1.0 >= perl-5.6.1-1.1.1 OpenPKG CURRENT <= perl-5.8.0-20021129 >= perl-5.8.0-20021216 Description:

Multiple vendors XML parser (and SOAP/WebServices server) Denialof Service attack using DTD

2002-12-16 Thread Amit Klein
/// >> Security Advisory << /// Multiple ven

Password Disclosure in Cryptainer

2002-12-16 Thread K. K. Mookhey
=== Advisory: Password Disclosure in Cryptainer Vendor: SecureSoft http://www.cypherix.com Download Location: http://www.cypherix.com/downloads.htm Versions affected: Cryptainer PE and Cryptainer 2.0 Date: 16th December 2002 Type of Vulnerability: Inf

GLSA: mysql

2002-12-16 Thread Daniel Ahlberg
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - GENTOO LINUX SECURITY ANNOUNCEMENT 200212-2.1 - - PACKAGE : mysql SUMMARY : remote DOS and arbitrary code exe

GLSA: squirrelmail

2002-12-16 Thread Daniel Ahlberg
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - GENTOO LINUX SECURITY ANNOUNCEMENT 200212-4 - - PACKAGE : squirrelmail SUMMARY : cross site scripting DATE   

GLSA: fetchmail

2002-12-16 Thread Daniel Ahlberg
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - GENTOO LINUX SECURITY ANNOUNCEMENT 200212-3 - - PACKAGE : fetchmail SUMMARY : buffer overflow DATE    : 2002-

GLSA: mysql

2002-12-16 Thread Daniel Ahlberg
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 - - GENTOO LINUX SECURITY ANNOUNCEMENT 200212-2 - - PACKAGE : mysql SUMMARY : remote DOS and arbitrary code execu