|
Colapse all |
Post message
RE: Writing Trojans that bypass Windows XP Service Pack 2 Firewall 2004-10-15 Polazzo Justin (Justin Polazzo facilities gatech edu) I am sorry, I thought (from a previous email in this or another list, I am getting forgetful in my old age) that editing these two registry entries would allow an app to, well if not bypass, at least be allowed thru the firewall. Application Exceptions: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Ser [ more ] [ reply ] [SECURITY] [DSA 567-1] New libtiff packages fix remote code execution 2004-10-15 joey infodrom org (Martin Schulze) Clientexec Billing Software 2004-10-12 bugtraq rloxy com Clientexec is a php billing software with a target audience of webhosts. By default there is a file called phpinfo.php in the main clientexec directory. This can be access by anyone with a web browser. I looked through the documentation and didn't find any reference to it. I then checked several d [ more ] [ reply ] Eudora 6.2.0.7 attachment spoof 2004-10-10 psz maths usyd edu au (Paul Szabo) Eudora 6.2.0.7 for Windows is in beta testing since 8 Oct 2004. The release notes http://www.eudora.com/download/eudora/windows/6.2/Betas/RelNotes.txt say: > SECURITY > -------- > Fixed cases where attachments could be spoofed via base64 or quoted-printable > encoded (plain-text, inline) MIME parts [ more ] [ reply ] Norton AntiVirus 2004 Script Blocking Failure (Includes PoC and rant) 2004-10-15 Daniel Milisic (dmilisic myrealshoebox com) Hi All, For the last couple of week's I've been hands-and-face into a project that is based heavily on .HTA apps. Basically, the VBScript embedded in the HTA handles the front-end for some basic console-driven tools. It was also designed to be very simple as to work equally well under 95+IE5. [ more ] [ reply ] Multiple Cross Site Scripting Vulnerabilities in FuseTalk 2004-10-13 steven (steven lovebug org) Date: October 12, 2004 Vendor: FuseTalk Issue: Multiple Cross Site Scripting Vulnerabilities URL: http://www.fusetalk.com Advisory: http://www.lovebug.org/fusetalk_advisory.txt Notes: The vendor was contacted last month and responded that: "all of these issues below were fixed in "Se [ more ] [ reply ] Microsoft Windows NetDDE Service Buffer Overflow 2004-10-13 NGSSoftware Insight Security Research (nisr ngssoftware com) John Heasman of NGSSoftware has discovered a high risk vulnerability in the NetDDE service. This vulnerability has now been fixed by Microsoft, and a fix can be downloaded from the Microsoft Security website: http://www.microsoft.com/technet/security/bulletin/MS04-031.mspx NGSSoftware are going t [ more ] [ reply ] Bypass of Antivirus software with GDI+ bug exploit Mutations 2004-10-13 Andrey Bayora (andrey hiddenbit org) Bypass of Antivirus software with GDI+ bug exploit Mutations. HiddenBit.org Security Advisory. Date: October 14, 2004 Author: Andrey Bayora BACKGROUND While performing research paper for SANS GCIH practice I have found this issue and it seems to me enough critical to warn readers about this. [ more ] [ reply ] Re: EEYE: Windows Shell ZIP File Decompression DUNZIP32.DLL Buffer Overflow Vulnerability 2004-10-14 Bipin Gautam (visitbipin hotmail com) In-Reply-To: <19F34051C5BB60429ACD1BF01338C5987EC511 (at) av-mail01.corp.int-eeye (dot) com [email concealed]> >---Description--- >Win xp default zip manager can't handle long file names properly... > >---Bug Demonstration--- >Create a new file with very long file name... in your c: [ say: >1.111111111111111111111111111 [ more ] [ reply ] Writing Trojans that bypass Windows XP Service Pack 2 Firewall 2004-10-12 americanidiot hushmail com Writing Trojans that bypass Windows XP Service Pack 2 Firewall Windows XP Service Pack 2 incorporates many enhancements to try to better protect systems from malware and other forms of attacks. One of those layers of protection is the Windows XP SP2 Firewall. One of the features of this firewall is [ more ] [ reply ] [OpenPKG-SA-2004.044] OpenPKG Security Advisory (modssl) 2004-10-15 OpenPKG (openpkg openpkg org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ________________________________________________________________________ OpenPKG Security Advisory The OpenPKG Project http://www.openpkg.org/security.html http://www.openpkg.org openpkg-security (at) openpkg (dot) org [email concealed] [ more ] [ reply ] a path disclosure and a posibility file inclusion and vulneability in thepeak file upload v1.3 2004-10-15 keitel andres ortega (justint rdmail net) Justin_T #NT - Undernet justint (at) orangemail.com (dot) do [email concealed] hi, there is a posiblity path disclosure and run commands on a server usint thepeak File Upload v1.3 searching for /fileupload/index.php an attacker can upload a malicious jpg of gif and can execute commands or make a file inclusion, but it [ more ] [ reply ] Re: Format String Vulnerability in Valve's CS-Source 2004-10-14 Luigi Auriemma (aluigi autistici org) > if u type '%n' (without ') to in-game-console, your game crashes > instantly. > > So far, i was not able, to do this remotely with rcon %n e.g., but this > does not mean, it is not possible. If this is the same bug I reported over one year ago http://aluigi.altervista.org/adv/hlclientfs-adv.txt [ more ] [ reply ] [FLSA-2004:2102] Updated samba packages fix security vulnerability [updated] 2004-10-14 Dominic Hargreaves (dom earth li) Re: Adobe acrobat / Adobe Reader 6 can read local files 2004-10-14 Nick Leoncavallo (nleoncavallo yahoo com) In-Reply-To: <0I5H001195EBYO (at) smtp13.wxs (dot) nl [email concealed]> This can be defeated by disallowing multimedia operations in the "Trust Manager" settings. I'm not sure I want to the other setting labeled "Allow documents to open other files and launch other applications" either, but it doesn't have an affect on J [ more ] [ reply ] UPDATE: Format String Vulnerability in Valve's CS-Source 2004-10-14 Some One (mc iglo ddclan de) In-Reply-To: <20041013154826.13068.qmail (at) www.securityfocus (dot) com [email concealed]> Hi, i just found out, that u can also use it remotely against the server without any knowledge of the rcon-password! just do the following: type 'name "%n"' (without ') to console and wait until you get killed. The server will be [ more ] [ reply ] ACROS Security: Session Fixation in JRun Management Console 2004-10-14 ACROS Security (lists acros si) =====[BEGIN-ACROS-REPORT]===== PUBLIC ======================================================================== = ACROS Security Problem Report #2004-10-14-2 ------------------------------------------------------------------------ - ASPR #2004-10-14-2: Session Fixation in JRun Management Console === [ more ] [ reply ] ACROS Security: HTML Injection in JRun Management Console 2004-10-14 ACROS Security (lists acros si) =====[BEGIN-ACROS-REPORT]===== PUBLIC ======================================================================== = ACROS Security Problem Report #2004-10-14-1 ------------------------------------------------------------------------ - ASPR #2004-10-14-1: HTML Injection in JRun Management Console ====== [ more ] [ reply ] [ GLSA 200410-10 ] gettext: Insecure temporary file handling 2004-10-10 Luke Macken (lewk gentoo org) ACROS Security: Unsanitized Session ID Cookie Allows Modifying Server Response 2004-10-14 ACROS Security (lists acros si) =====[BEGIN-ACROS-REPORT]===== PUBLIC ======================================================================== = ACROS Security Problem Report #2004-10-14-3 ------------------------------------------------------------------------ - ASPR #2004-10-14-3: Unsanitized Session ID Cookie Allows Modifying S [ more ] [ reply ] New Remote Microsoft JPEG DoS Vulnerability + Other Potential Security Vulnerabilitys in asycpict.dll 1.0 Advisory 2004-10-14 John Bissell (monkey321_1 hotmail com) 3COM Wireless router (3CRADSL72) information disclosure 2004-10-13 Karb0nOxyde - (karb0noxyde gmail com) The router gives you a web page with user name, password, primary and secondary DNS, default gateway, etc, if you access http://[routerIP]/app_sta.stm without athentification of any kind. Router details: Runtime Code Version 1.05 (Jan 27 2004 14:58:25) Boot Code Version V1.3d Hardware Vers [ more ] [ reply ] |
|
Privacy Statement |
Version: 6.0.2900.2180.xpsp_sp2_rtm.040803-2158
OS: Windows XP Home SP2
I was just messing around with IE, playing with JavaScript.
It's a well known fact that IE lets you run javascript from the address bar:
e.g Type the following into the address bar: javascript:alert('IE Sucks
[ more ] [ reply ]