BugTraq Mode:
(Page 1398 of 1748)  < Prev  1393 1394 1395 1396 1397 1398 1399 1400 1401 1402 1403  Next >
Firespoofing [Firefox 1.0] 2005-01-10
mikx (mikx mikx de)
__Summary

Using javascript it is possible to spoof the content of security and
download dialogs by partly covering them with a popup window. This can fool
a user to download and automaticly execute a file (if a file extension
association exists) or to grant a script local data access (if codebas

[ more ]  [ reply ]
Portcullis Security Advisory 05-005 2005-01-10
Paul J Docherty (PJD portcullis-security com)
Portcullis Security Advisory

Vulnerable System:

Webseries Payment Application

Vulnerability Title:

Internal Path Disclosure in HTTP Variables

Vulnerability discovery and development:

Portcullis Security Testing Services

Affected systems:

Bottomline Webseries Payment Applica

[ more ]  [ reply ]
Portcullis Security Advisory 05-010 2005-01-10
Paul J Docherty (PJD portcullis-security com)
Portcullis Security Advisory

Vulnerable System:

MediaPartner 5.0

Vulnerability Title:

Directory Traversal Vulnerability and Cross Site Scripting Issue

Vulnerability discovery and development:

Portcullis Security Testing Service

Affected systems:

Emotion MediaPartner Web Ser

[ more ]  [ reply ]
[AppSecInc Team SHATTER Security Advisory] Microsoft Windows Improper Token Validation 2005-01-10
Team SHATTER (Application Security, Inc.) (vrathod appsecinc com)
Microsoft Windows Improper Token Validation

AppSecInc Team SHATTER Security Advisory
http://www.appsecinc.com/resources/alerts/general/06-0001.html
January 10, 2005

Credit: This vulnerability was discovered and researched by Cesar
Cerrudo of Application Security, Inc.

Risk Level: High

Summary:

[ more ]  [ reply ]
[AppSecInc Team SHATTER Security Advisory] Microsoft Windows LPC heap overflow 2005-01-10
Team SHATTER (Application Security, Inc.) (vrathod appsecinc com)
Microsoft Windows LPC heap overflow

AppSecInc Team SHATTER Security Advisory
http://www.appsecinc.com/resources/alerts/general/07-0001.html
January 10, 2005

Credit: This vulnerability was discovered and researched by Cesar
Cerrudo of Application Security, Inc.

Risk Level: High

Summary:
A local

[ more ]  [ reply ]
[SECURITY] [DSA 633-1] New bmv package fixes insecure temporary file creation 2005-01-11
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 633-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
January 11th, 2005

[ more ]  [ reply ]
EEYE: Windows ANI File Parsing Buffer Overflow 2005-01-11
Derek Soeder (dsoeder eeye com)
Windows ANI File Parsing Buffer Overflow

Systems Affected:
Windows Me
Windows 2000
Windows XP (SP1 and earlier)
Windows 2003

Overview:
eEye Digital Security has discovered a vulnerability in USER32.DLL's
handling of Windows animated cursor (.ani) files that will allow a
remote attacker to reliably

[ more ]  [ reply ]
VERITAS Backup Exec 8.x/9.x Remote Universal Exploit 2005-01-11
class 101 (class101 hat-squad com)
/*
VERITAS Backup Exec v9.1.4691.SP1
v9.1.4691.SP0
v8.5.3572
Agent Browser Service, Remote Stack Overflow

Highly Critical

All credits to:

-iDEFENSE(discovery-www.iDEFENSE.com),
-Thor Doomen(iat-syscall[at]inbox.lv),
-H.D. Moore(scode-www.metasploit.com),
-Matt Miller(scod

[ more ]  [ reply ]
The Misuse of RC4 in Microsoft Word and Excel 2005-01-11
Hongjun Wu (hongjun i2r a-star edu sg)


There is a serious security flaw in Microsoft Word and Excel. (To the best of my knowledge, this flaw has not been reported in public before.)

The stream cipher RC4 with key length up to 128 bits is used in Microsoft Word and Excel to encrypt the documents. But when an encrypted document gets

[ more ]  [ reply ]
applicable exploit for winxp-sp2-uptodate Internet Explorer 2005-01-11
Liu Die Yu (liudieyu umbrella name)


patch will come in hours(at least i believe so).

many people(paul of greyhats and mike, sandblad of secunia and shreddersub7) already provided proof-of-concept remote-code-execution exploit for winxp-sp2-uptodate Internet Explorer.

the problem is: their code is simply not applicable in real

[ more ]  [ reply ]
UPDATED: the insider exploit( = the latest ie 0day which involves SHOWMODALDIALOG) 2005-01-11
Liu Die Yu (liudieyu umbrella name)


the insider exploit( = the latest ie 0day involving SHOWMODALDIALOG) was verified to work on winxp-en-pro-sp1-ms04004(MS04-004 = Q832894 = KB832894), but it does not work on winxp-en-pro-sp1-noextrapatch.

jelmer's exploit is not perfect: URLs are hardcoded, and JSP is not popular. so i made thi

[ more ]  [ reply ]
Multi-vendor AV gateway image inspection bypass vulnerability 2005-01-11
Darren Bounds (lists intrusense com)
Multi-vendor AV gateway image inspection bypass vulnerability
January 10, 2005

A vulnerability has been discovered which allows a remote attacker to
bypass anti-virus
(as well other security technologies such as IDS and IPS) inspection of
HTTP image content.

By leveraging techniques described

[ more ]  [ reply ]
HylaFAX hfaxd unauthorized login vulnerability 2005-01-11
Lee Howard (faxguy howardsilvan com)
HylaFAX security advisory
11 Jan 2005

Subject: HylaFAX hfaxd unauthorized login vulnerability

Introduction:

HylaFAX is a mature (est. 1991) enterprise-class open-source software
package for sending and receiving facsimiles as well as for sending
alpha-numeric pages. It runs on a wide variety of

[ more ]  [ reply ]
[SECURITY] [DSA 634-1] New hylafax packages fix unauthorised access 2005-01-11
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 634-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
January 11th, 2005

[ more ]  [ reply ]
[ GLSA 200501-18 ] KDE FTP KIOslave: Command injection 2005-01-11
Sune Kloppenborg Jeppesen (jaervosz gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200501-18
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -

[ more ]  [ reply ]
[ GLSA 200501-17 ] KPdf, KOffice: More vulnerabilities in included Xpdf 2005-01-11
Sune Kloppenborg Jeppesen (jaervosz gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200501-17
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -

[ more ]  [ reply ]
[ GLSA 200501-16 ] Konqueror: Java sandbox vulnerabilities 2005-01-11
Sune Kloppenborg Jeppesen (jaervosz gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200501-16
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -

[ more ]  [ reply ]
[SECURITY] [DSA 631-1] New kdlibs packages fix arbitrary FTP command execution 2005-01-10
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 631-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
January 10th, 2005

[ more ]  [ reply ]
[SECURITY] [DSA 632-1] New linpopup packages fix arbitrary code execution 2005-01-10
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 632-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
January 10th, 2005

[ more ]  [ reply ]
SUSE Security Announcement: libtiff/tiff (SUSE-SA:2005:001) 2005-01-10
Thomas Biege (thomas suse de)

-----BEGIN PGP SIGNED MESSAGE-----

________________________________________________________________________
______

SUSE Security Announcement

Package: libtiff/tiff
Announcement-ID: SUSE-SA:2005:001
Date: Monda

[ more ]  [ reply ]
[SECURITY] [DSA 630-1] New lintian packages fix insecure temporary directory 2005-01-10
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 630-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
January 10th, 2005

[ more ]  [ reply ]
SQL Injection Vulnerability in Invision Community Blog 2005-01-09
darkhawk matrix (darkhawk matrix gmail com)


Invision Community Blog <http://www.invisionblog.com/>, is a powerful blogging system that will plug straight into your Invision Power Board. Allow your members to create their own individual blogs.

Invision Community Blog is a comprehensive system with a very easy to use interface.

Due to im

[ more ]  [ reply ]
[ GLSA 200501-12 ] TikiWiki: Arbitrary command execution 2005-01-10
Matthias Geerdsen (vorlon gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200501-12
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -

[ more ]  [ reply ]
Security Advisory: Woltlab Burning Board Lite formmail.php XSS 2005-01-08
Martin Heistermann (martin heistermann web de)


Advisory Information

--------------------

Advisory name : Woltlab Burning Board Lite formmail.php XSS

Discovered by : drhankey / it-security23.net

Vendor Name : Woltlab

Vendor Homepage : http://www.woltlab.de

Software : Woltlab Burning Board Lite

Vulnerability Type : Cross-Site-S

[ more ]  [ reply ]
iDEFENSE Security Advisory [IDEF0731] Exim auth_spa_server() Buffer Overflow Vulnerability 2005-01-07
customer service mailbox (customerservice idefense com)
Exim auth_spa_server() Buffer Overflow Vulnerability

iDEFENSE Security Advisory [IDEF0731]
www.idefense.com/application/poi/display?id=178&type=vulnerabilities
January 07, 2004

I. BACKGROUND

Exim is a message transfer agent developed for use on Unix systems. More

information is available at:

[ more ]  [ reply ]
iDEFENSE Security Advisory [IDEF0725] Exim host_aton() Buffer Overflow Vulnerability 2005-01-07
customer service mailbox (customerservice idefense com)
Exim host_aton() Buffer Overflow Vulnerability

iDEFENSE Security Advisory [IDEF0725]
http://www.idefense.com/application/poi/display?type=vulnerabilities
January 07, 2005

I. BACKGROUND

Exim is a message transfer agent developed for use on Unix systems. More

information is available at:

http:/

[ more ]  [ reply ]
Troj/Winser-A malware analysis 2005-01-07
Steve Friedl (steve unixwiz net)
Hello again, all,

Several days ago, Lawrence Baldwin of myNetWatchman.com captured the
WINS exploit Trojan that's running around the internet right now, and
I've been digging in with some gusto. It's not really a worm, but it
does have an "autohack" mode and a botnet capability, so it's something

[ more ]  [ reply ]
Linux kernel uselib() privilege elevation, corrected 2005-01-07
Paul Starzetz (ihaquer isec pl)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Hi all,

first of all I must comply about the handling of this vulnerability that I
reported to vendorsec. Obviously my code posted there has been stolen and
plagiarized in order to put the blame on Stefan Esser from Ematters and
disturb the security

[ more ]  [ reply ]
[SECURITY] [DSA 629-1] New kerberos packages fix arbitrary code execution 2005-01-07
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 629-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
January 7th, 2005

[ more ]  [ reply ]
Simple PHP Blog directory traversal vulnerability 2005-01-07
Madelman (madelman iname com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Title: Simple PHP Blog directory traversal vulnerability
Vulnerability discovery: Madelman <madelman AT iname.com>
Date: 02/01/2005
Severity: Moderate

Summary:
- --------

I started this project because I wanted a dead-simple blog. Something
that didn

[ more ]  [ reply ]
(Page 1398 of 1748)  < Prev  1393 1394 1395 1396 1397 1398 1399 1400 1401 1402 1403  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus