BugTraq Mode:
(Page 1372 of 1748)  < Prev  1367 1368 1369 1370 1371 1372 1373 1374 1375 1376 1377  Next >
RE: Avaya IP Office Phone Manager - Sensitive Information Cleartext Vulnerability 2005-02-24
PASTOR ADRIAN (M123303 Richmond ac uk)


In my case the key is stored under HKEY_LOCAL_MACHINE

Also, please let's remember that even in the case that the key was stored under HKEY_CURRENT_USER , sensitive information should NEVER be cleartext since an attacker could gain administrative privileges to a single host or even entire Windows

[ more ]  [ reply ]
In-game cl_guid crash in Soldier of Fortune II 1.03 2005-02-24
Luigi Auriemma (aluigi autistici org)

#######################################################################

Luigi Auriemma

Application: Soldier of Fortune II
http://sof2.ravensoft.com
Versions: <= 1.03 gold
Platforms: Windows, Linux and MacOS
Bug: crash caused by invalid m

[ more ]  [ reply ]
[Security Bulletin] SSRT4694 HP-UX ftpd remote unauthorized access 2005-02-24
Boren, Rich (SSRT) (rich boren hp com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

HP SECURITY BULLETIN

HPSBUX01119 REVISION: 0

SSRT4694 rev.0 - HP-UX ftpd remote unauthorized access

NOTICE:
There are no restrictions for distribution of this Security
Bulletin provided that it remains complete and intact.

The information in th

[ more ]  [ reply ]
Cisco Security Advisory: ACNS Denial of Service and Default Admin Password Vulnerabilities 2005-02-24
Cisco Systems Product Security Incident Response Team (psirt cisco com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Cisco Security Advisory: Cisco Security Advisory: ACNS Denial of
Service and Default Admin Password Vulnerabilities
======================================================================

Revision 1.0

For Public Release 2005 February 24 1600 UTC (GMT)

[ more ]  [ reply ]
iDEFENSE Security Advisory 02.23.05: Sun Solaris kcms_configure Arbitrary File Corruption Vulnerability 2005-02-23
iDEFENSE Labs (labs-no-reply idefense com)
Sun Solaris kcms_configure Arbitrary File Corruption Vulnerability

iDEFENSE Security Advisory 02.23.05
www.idefense.com/application/poi/display?id=206&type=vulnerabilities
February 23, 2005

I. BACKGROUND

The kcms_configure utility is part of the Kodak Color Management System
(KCMS) package that i

[ more ]  [ reply ]
RE: Avaya IP Office Phone Manager - Sensitive Information Cleartext Vulnerability 2005-02-24
Walton, John Michael (John) (jmwalton avaya com)
Avaya is aware and currently investigating this issue. Once our
investigation is complete we will release an Avaya Security Advisory to
address the outlined concerns. In the interim, we've asked Mitre to
assign a Common Vulnerability and Exposures (CVE) candidate number for
this issue. They have

[ more ]  [ reply ]
Multiple vulnerabilities found in CSGuestbook by CoolSerlets.com 2005-02-24
Josh884 hotmail com


Audit of the script: http://www.coolservlets.com/CSGuestbook/
About this script: This is an open source GuestBook script offered by CoolServlets.com
About the audit: This audit was performed by Daxgrapol and Dopel for RACAT (a subgroup of CASOS in the cyberarmy.net community).

Note in advance: Th

[ more ]  [ reply ]
RE: Incorrect Classification of iDownload's Product as Spyware... 2005-02-24
Roger A. Grimes (roger banneretcs com)
I've got a solution for this litigation problem for the anti-spyware
companies.

Create a new classification called Recognized Software. In the
description, tell end users that Recognize software contains both wanted
and unwanted software. The software is in this category because many
users conside

[ more ]  [ reply ]
Office 10 applications & flashdrives can be used to browse restricted drives 2005-02-23
Discini, Sonny (Sonny Discini montgomerycountymd gov)
************************************************************************

*************
Originally this issue was explained and patched here:
http://support.microsoft.com/?id=302753

SYMPTOMS
After you establish a group policy to restrict access to a drive by
selecting the Hide these specified drive

[ more ]  [ reply ]
Release of Arkeia Network Backup 5.3.5 fixes security issue [bugtraq id 12594] 2005-02-23
Arnaud Spicht (aspicht arkeia com)


After carefully examining issues recently discussed in public technical forums, Arkeia Corp. has immediately released a new version to block any potential invasion of Arkeia protected networks.

ANB 5.3.5 fixes a buffer overflow bug that could allow a remote attacker to remotely execute arbitrary

[ more ]  [ reply ]
[ GLSA 200502-29 ] Cyrus IMAP Server: Multiple overflow vulnerabilities 2005-02-23
Matthias Geerdsen (vorlon gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200502-29
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -

[ more ]  [ reply ]
Robustness patch for TWiki, vulnerability in ImageGalleryPlugin 2005-02-23
Florian Weimer (fw deneb enyo de)
* TWiki robustness patch

After CAN-2004-1037 was discovered in November 2004, I wrote a patch
which systematically replaces unsafe subprocess invocation constructs
in the TWiki source code. This patch was published, submitted to the
TWiki developers, and they ported it into the DEVELOP branch:

[ more ]  [ reply ]
Incorrect Classification of iDownload's Product as Spyware... 2005-02-23
Paul Laudanski (zx castlecops com)
In a letter received by CastleCops from a law firm representing
iDownload/iSearch Toolbar:

http://castlecops.com/article-5762-nested-0-0.html

It has been found out that another website has received a similar form.
In the next link is our response, with more information on the other
website, Sp

[ more ]  [ reply ]
[SECURITY] [DSA 689-1] New mod_python packages fix information leak 2005-02-23
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 689-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
February 23rd, 2005

[ more ]  [ reply ]
[SECURITY] [DSA 688-1] New squid packages fix denial of service 2005-02-23
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 688-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
February 23rd, 2005

[ more ]  [ reply ]
Re: Cross Site Scripting exploitation via malformed files 2005-02-23
http-equiv (at) excite (dot) com [email concealed] (1 malware com)


<!--

On many webmail systems, when the JPG file is downloaded,
then the script is executed (you can play with javascript, vbscript,...)

It was verified under IE - XP SP2

-->

This doesn't seem to be correct [or even work for that matter].

1. As an attachment in the email and received in y

[ more ]  [ reply ]
Re: Knox Arkeia remote root/system exploit 2005-02-22
Arnaud Spicht (aspicht arkeia com)
In-Reply-To: <BAY22-F8E04A402F7FD7B74F1A849C6E0 (at) phx (dot) gbl [email concealed]>

>/*
>* Knox Arkeia Server Backup
>* arkeiad local/remote root exploit
>* Targets for Redhat 7.2/8.0, Win2k SP2/SP3/SP4, WinXP SP1, Win 2003 EE
>* Works up to current version 5.3.x
>*
>* ---------------

The buffer overflow bug has been fixed

[ more ]  [ reply ]
Re: Arkeia Network Backup Client Remote Access 2005-02-22
Arnaud Spicht (aspicht arkeia com)
In-Reply-To: <20050222091943.GM76018 (at) DAPCVA (dot) da [email concealed]>

>On Sun, Feb 20, 2005 at 02:41:36PM -0600, H D Moore wrote:
>> Anyone able to connect to TCP port 617 can gain read/write access to the
>> filesystem of any host running the Arkeia agent software. This appears to
>> be an intentional design decision

[ more ]  [ reply ]
Software PBLang 4.65 pm.php XSS vulnerability 2005-02-22
Raven (raven tgs-security com)


[][][][][][][][][][][][][][][][][][][][][][][][][][]
[][][]
[]
[] HRG - Hackerlounge Research Group
[] Release: HRG003
[] Friday 11-02-05
[] Software PBLang 4.65 pm.php XSS vulnerability
[]
[] The author can't be held responsible for any
damage
[] done by a reader. You have

[ more ]  [ reply ]
Software PBLang 4.65 pmpshow.php XSS vulnerability 2005-02-23
Raven (raven tgs-security com)


[][][][][][][][][][][][][][][][][][][][][][][][][][]
[][][]
[]
[] HRG - Hackerlounge Research Group
[] Release: HRG002
[] Friday 11-02-05
[] Software PBLang 4.65 pmpshow.php XSS
vulnerability
[]
[] The author can't be held responsible for any
damage
[] done by a reader. Yo

[ more ]  [ reply ]
Software PBLang 4.65 search.php XSS vulnerability 2005-02-22
Raven (raven tgs-security com)


[][][][][][][][][][][][][][][][][][][][][][][][][][]
[][][]
[]
[] HRG - Hackerlounge Research Group
[] Release: HRG001
[] Friday 11-02-05
[] Software PBLang 4.65 search.php XSS vulnerability
[]
[] The author can't be held responsible for any
damage
[] done by a reader. You

[ more ]  [ reply ]
iDEFENSE Security Advisory 02.22.05: phpBB Group phpBB2 Arbitrary File Unlink Vulnerability 2005-02-22
iDEFENSE Labs (labs-no-reply idefense com)
phpBB Group phpBB2 Arbitrary File Unlink Vulnerability

iDEFENSE Security Advisory 02.22.05
www.idefense.com/application/poi/display?id=205&type=vulnerabilities
February 22, 2005

I. BACKGROUND

phpBB is an open source bulletin board package written in the PHP web
scripting language. More informatio

[ more ]  [ reply ]
Cross Site Scripting exploitation via malformed files 2005-02-21
Jerome ATHIAS (jerome athias free fr)


It was publicly released on different forums (http://cyruxnet.org/foro/viewtopic.php?t=559); multiple webmail systems and websites are vulnerable to Cross Site Scripting via a malformed file.

A basic PoC :

Build a text file (ie: photo.txt)

<script language="Javascript">
alert('Vulnerable!');

[ more ]  [ reply ]
paNews v2.0b4 - PHP Injection 2005-02-21
tjomka (tjomka navigator lv)
oooo oooo oooooooo8 ooooooooooo
8888o 88 888 88 888 88
88 888o88 888oooooo 888
88 8888 888 888
o88o 88 o88oooo888 o888o
********************************
**** Network security team *****
********* nst.e-nex.com ********
***************************

[ more ]  [ reply ]
[SCAN Associates Security Advisory] vbulletin 3.0.6 and below php code injection 2005-02-21
pokley (pokleyzz scan-associates net)
Summary: vbulletin 3.0.6 and below php code injection

Description
===========
vBulletin is a powerful, scalable and fully customizable forums package
for your web site. It has been written using the Web's quickest-growing
scripting language; PHP, and is complimented with a highly efficient and

[ more ]  [ reply ]
The WebConnect 6.4.4 and 6.5 contains several vulnerabilities 2005-02-20
CIRT Advisory (advisory cirt dk)
The WebConnect 6.4.4 and 6.5 contains several vulnerabilities such as:
- Denial of Service when requesting an DOS Device in Path Name
- Reading of files outside webroot (Directory traversal)

Requesting "DOS Device in Path Name" Denial of Service
When requesting a DOS device in the URL the serve

[ more ]  [ reply ]
RE: Windows Firewall Has A Backdoor 2005-02-21
Thor Larholm (thor pivx com)
XPSP2 has a software firewall which like any other firewall has a list
of exceptions, being that it is host based these exceptions are process
based. Having an exceptions list is not a backdoor.

There's no vulnerability or backdoor here, just intended functionality.
You can't add keys to this regis

[ more ]  [ reply ]
(Page 1372 of 1748)  < Prev  1367 1368 1369 1370 1371 1372 1373 1374 1375 1376 1377  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus