BugTraq Mode:
(Page 1291 of 1748)  < Prev  1286 1287 1288 1289 1290 1291 1292 1293 1294 1295 1296  Next >
[security bulletin] SSRT051005 rev.0 - HP ProLiant DL585 Servers Unauthorized Remote Access 2005-08-10
security-alert hp com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

HP SECURITY BULLETIN

HPSBMA01220 REVISION: 0

SSRT051005 rev.0 - HP ProLiant DL585 Servers Unauthorized Remote
Access

NOTICE:
The information in this Security Bulletin should be acted upon
as soon as possible.

INITIAL RELEASE:

[ more ]  [ reply ]
Design Flaw at Microsoft's AntiSpyware 2005-08-05
manolisgavriil hotmail com
Hi,

A possible design flaw i encountered during my research on Microsoft's AntiSpyware(Beta Version).

Summary:
Bypassing Microsoft's AntiSpyware alerting system on programs trying to access Registry.

Details:
When a program is trying to write to Registry Startup Keys like for example HKEY_LOCAL_M

[ more ]  [ reply ]
BID 14355, VERITAS NetBackup 5.1 Time Stamp Vulnerability 2005-08-09
secure symantec com

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Reference: BID 14355, http://www.securityfocus.com/bid/14355,

Risk: Very Low to minimal

Affected product: Veritas NetBackup minimal impact only

This issue does NOT affect Veritas Backup Exec

Symantec engineers have thoroughly reviewed the issu

[ more ]  [ reply ]
[security bulletin] SSRT5940 rev.1 - HP-UX Mozilla remote, unauthorized user may execute privileged code 2005-08-09
security-alert hp com
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

HP SECURITY BULLETIN

HPSBUX01133 REVISION: 1

SSRT5940 rev.1 - HP-UX Mozilla remote, unauthorized user may
execute privileged code

NOTICE:
The information in this Security Bulletin should be acted upon
as soon as possible.

INITIA

[ more ]  [ reply ]
iDEFENSE Security Advisory 08.09.05: AWStats ShowInfoURL Remote Command Execution Vulnerability 2005-08-09
iDEFENSE Labs (labs-no-reply idefense com)
AWStats ShowInfoURL Remote Command Execution Vulnerability

iDEFENSE Security Advisory 08.09.05
www.idefense.com/application/poi/display?id=290&type=vulnerabilities
August 09, 2005

I. BACKGROUND

AWStats is a free tool that generates web, streaming, ftp or mail
server statistics, graphically. It

[ more ]  [ reply ]
Mozilla Firefox up to 1.0.6 and Mozilla Thunderbird up to 1.0 url string obfuscation 2005-08-09
Marc Ruef (maru scip ch)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Dear lists,

During a web application audit for a customer I detected a design error in the applications of the Mozilla suite. I was testing very long URL requests what I am usually do with a terminal emulation (e.g. Telnet or NetCat) or tools as like

[ more ]  [ reply ]
Bugtraq ID: 14460 : Coldfusion Fusebox V4.1.0 Vulnerability 2005-08-09
Adrocknaphobia (adrocknaphobia gmail com)
The following vulnerability is inaccurate. Fusebox is a framework
popular with ColdFusion developers. The cross-site scripting
vulnerability is not specific to the framework, and is clearly an
implementation issue.

Fusebox, as a framework, does not output any URL parameters to HTML.
The output is c

[ more ]  [ reply ]
Apple Safari & Javascript - KERN_INVALID_ADDRESS (0x0001) 2005-08-09
Patrick Webster (pwebster ausgeo com au)
Hi Guys,

Was trying to work out some code and came across a bug. Was wondering if
it can be of any use ;-), or just a DoS?

I'm running OS X 1.3.9 & Safari 1.3 (132)

Create a HTML document, with the code below:

<html>
<script name="JavaScript">
<!--

function tickTock()
{
setTimeout("tic

[ more ]  [ reply ]
Sql injection and global variables poisoning in XMB Forum 1.9.1 2005-08-09
heintz hotmail com
Vendor notified at and partial patch:
http://forums.xmbforum.com/viewthread.php?tid=754523

firstly the input validation at xmb.php:

foreach ($global as $num => $array) {
if (is_array($array)) {
extract($array, EXTR_OVERWRITE);
}
}

this should put to not overwrite any variables cause
it overwrite

[ more ]  [ reply ]
[USN-163-1] xpdf vulnerability 2005-08-09
Martin Pitt (martin pitt canonical com)
===========================================================
Ubuntu Security Notice USN-163-1 August 09, 2005
xpdf vulnerability
CAN-2005-2097
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 4.10 (Warty Warthog)
Ubuntu 5

[ more ]  [ reply ]
[AppSecInc Advisory MYSQL05-V0003] Multiple Issues with MySQL User Defined Functions 2005-08-08
Team SHATTER (shatter appsecinc com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Multiple Issues with MySQL User Defined Functions

AppSecInc Team SHATTER Security Advisory MYSQL05-V0003
http://www.appsecinc.com/resources/alerts/mysql/2005-003.html
August 08, 2005

Risk level: LOW

Credits: This vulnerability was discovered and res

[ more ]  [ reply ]
[AppSecInc Advisory MYSQL05-V0001] Improper Filtering of Directory Traversal Characters in MySQL User Defined Functions 2005-08-08
Team SHATTER (shatter appsecinc com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Improper Filtering of Directory Traversal Characters in MySQL User
Defined Functions

AppSecInc Team SHATTER Security Advisory MYSQL05-V0001
http://www.appsecinc.com/resources/alerts/mysql/2005-001.html
August 08, 2005

Risk level: LOW

Credits: This v

[ more ]  [ reply ]
FunkBoard V0.66CF (possibly prior versions) cross site scripting, possible database username/password disclosure & board takeover,possible remote code execution 2005-08-08
retrogod aliceposta it
FunkBoard V0.66CF (possibly prior versions) cross site scripting,
possible database username/password disclosure & board takeover,
possible remote code execution

software:
author site: http://www.[path_to_funkboard].co.uk/

xss:
http://[target]/[path_to_funkboard]/editpost.php?fbusername="><scrip

[ more ]  [ reply ]
Re: GNU tar and the setuid bit 2005-08-06
David Watson (baikie ehwhat freeserve co uk)
On Saturday 06 Aug 2005 4:22 pm, David Watson wrote:
> (By the way, -o is broken in version 1.14 at least, but --no-same-owner
> works.)

Sorry, I just noticed that that last comment was entirely misleading! In all
versions, using --no-same-owner without --no-same-permissions *will* cause
the setu

[ more ]  [ reply ]
Re: Trillian Ver 3.1 saves password's in plain Text 2005-08-06
Suramya Tomar (security suramya com)
Hi Patrick,

> I'd just like to add that, while it may not be relevant, but Gaim does
> the same thing (in Window$). It stores the passwords in plain text, in
> the User accounts directory (ie. c:\documents and settings\user123).
> More on that here. <http://gaim.sourceforge.net/plaintextpasswords.p

[ more ]  [ reply ]
Re: tar preserves setuid bit 2005-08-05
Imran Ghory (imranghory gmail com) (1 replies)
On 8/5/05, Neil McKellar <mckellar (at) telusplanet (dot) net [email concealed]> wrote:
> Imran Ghory <imranghory (at) gmail (dot) com [email concealed]> wrote:
> > If running as the root user tar restores the original permissions to
> > extracted files, this includes the setuid bit. No warning is given to
> > the user that this has happened.
>
> From the

[ more ]  [ reply ]
Re: tar preserves setuid bit 2005-08-09
Jeremy C. Reed (reed reedmedia net)
Re: Zip 2,31 bad default file-permissions vulnerability 2005-08-05
Imran Ghory (imranghory gmail com)
On 8/5/05, Lupe Christoph <lupe (at) lupe-christoph (dot) de [email concealed]> wrote:
>
> I still don't understand why this is a problem. If it were a problem, it
> would be one of humongous dimensions because it affects all programs
> that use open(..., 0666) to create non-executable files potentially
> containing sensitive

[ more ]  [ reply ]
nbSMTP v0.99 remote format string exploit 2005-08-05
coki nosystem com ar
/* nbSMTP_fsexp.c
*
* nbSMTP v0.99 remote format string exploit
* by CoKi <coki (at) nosystem.com (dot) ar [email concealed]>
*
* root@nosystem:/home/coki/audi# ./nbSMTP_fsexp
*
* nbSMTP v0.99 remote format string exploit
* by CoKi <coki (at) nosystem.com (dot) ar [email concealed]>
*
* Use: ./nbSMTP_fsexp [options]
*
* options:
*

[ more ]  [ reply ]
Nate User Password Disclosed By Anonymous 2005-08-05
saintlinu null2root org
Title: Nate User Password Disclosed By Anonymous
Discoverer: PARK, GYU TAE (saintlinu (at) null2root (dot) org [email concealed])
Advisory No.: NRVA05-06
Critical: High Critical
Impact: User Information disclosed by unauthorized user
Where: From remote
Operating System: N

[ more ]  [ reply ]
Creating a secret web site on IIS 5.x using Alternative Data Streams 2005-08-04
inge_eivind henriksen chello no (1 replies)
** Inge Henriksen Security Advisory http://ingehenriksen.blogspot.com/ **

Creating a secret web site on IIS 5.x using Alternative Data Streams
--------------------------------------------------------------------

Using a little known feature of the Windows NT file system (NTFS) one can create a se

[ more ]  [ reply ]
RE: Creating a secret web site on IIS 5.x using Alternative Data Streams 2005-08-09
James C Slora Jr (Jim Slora phra com)
(Page 1291 of 1748)  < Prev  1286 1287 1288 1289 1290 1291 1292 1293 1294 1295 1296  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus