BugTraq Mode:
(Page 1437 of 1748)  < Prev  1432 1433 1434 1435 1436 1437 1438 1439 1440 1441 1442  Next >
[IE 6 SP2] Possible URL Spoofing 2004-10-15
Andrew Hunter (andiroohunter msn com)
Program: IE 6 Sp2
Version: 6.0.2900.2180.xpsp_sp2_rtm.040803-2158
OS: Windows XP Home SP2

I was just messing around with IE, playing with JavaScript.
It's a well known fact that IE lets you run javascript from the address bar:

e.g Type the following into the address bar: javascript:alert('IE Sucks

[ more ]  [ reply ]
RE: Writing Trojans that bypass Windows XP Service Pack 2 Firewall 2004-10-15
Polazzo Justin (Justin Polazzo facilities gatech edu)
I am sorry, I thought (from a previous email in this or another list, I
am getting forgetful in my old age) that editing these two registry
entries would allow an app to, well if not bypass, at least be allowed
thru the firewall.

Application Exceptions:
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Ser

[ more ]  [ reply ]
More details on BID 11408 (3com 3cradsl72 wireless router) 2004-10-15
Ivan Casado (casadoi ya com)
Hi,

I'm writing regarding BID 11408. I have this router at home for my ADSL
connection. The software versions of my router are:

Runtime Code Version 1.05 (Jan 27 2004 14:58:25)
Boot Code Version V1.3d
Hardware Version 01A
ADSL Modem Code Version 13.9.38

(taken from http://192.168

[ more ]  [ reply ]
[SECURITY] [DSA 567-1] New libtiff packages fix remote code execution 2004-10-15
joey infodrom org (Martin Schulze)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Debian Security Advisory DSA 567-1 security (at) debian (dot) org [email concealed]
http://www.debian.org/security/ Martin Schulze
October 15th, 2004

[ more ]  [ reply ]
Clientexec Billing Software 2004-10-12
bugtraq rloxy com


Clientexec is a php billing software with a target audience of webhosts. By
default there is a file called phpinfo.php in the main clientexec directory.
This can be access by anyone with a web browser. I looked through the
documentation and didn't find any reference to it. I then checked several
d

[ more ]  [ reply ]
Eudora 6.2.0.7 attachment spoof 2004-10-10
psz maths usyd edu au (Paul Szabo)
Eudora 6.2.0.7 for Windows is in beta testing since 8 Oct 2004. The release
notes
http://www.eudora.com/download/eudora/windows/6.2/Betas/RelNotes.txt
say:

> SECURITY
> --------
> Fixed cases where attachments could be spoofed via base64 or quoted-printable
> encoded (plain-text, inline) MIME parts

[ more ]  [ reply ]
Directory traversal in Yak! 2.1.2 2004-10-15
Luigi Auriemma (aluigi autistici org)

#######################################################################

Luigi Auriemma

Application: Yak!
http://www.digicraft.com.au/yak/
Versions: <= 2.1.2
Platforms: Windows
Bug: directory traversal (upload)
Exploitation: remote
Date:

[ more ]  [ reply ]
Norton AntiVirus 2004 Script Blocking Failure (Includes PoC and rant) 2004-10-15
Daniel Milisic (dmilisic myrealshoebox com)
Hi All,

For the last couple of week's I've been hands-and-face into a project
that is based heavily on .HTA apps. Basically, the VBScript embedded in
the HTA handles the front-end for some basic console-driven tools. It
was also designed to be very simple as to work equally well under
95+IE5.

[ more ]  [ reply ]
ProFTPD 1.2.x remote users enumeration bug 2004-10-15
LSS Security (exposed lss hr)

LSS Security Advisory #LSS-2004-10-2

http://security.lss.hr


---

Title : ProFTPD 1.2.x remote users enumeration bug
Advisory ID : LSS#2004-10-2
Date : October 14th, 2004
Advisory URL: : http://security.lss.hr/index.php?page=details&ID=LSS-2004-10-02
Impact

[ more ]  [ reply ]
Multiple Cross Site Scripting Vulnerabilities in FuseTalk 2004-10-13
steven (steven lovebug org)
Date: October 12, 2004
Vendor: FuseTalk
Issue: Multiple Cross Site Scripting Vulnerabilities
URL: http://www.fusetalk.com
Advisory: http://www.lovebug.org/fusetalk_advisory.txt

Notes:

The vendor was contacted last month and responded that:
"all of these issues below were fixed in "Se

[ more ]  [ reply ]
Microsoft Windows NetDDE Service Buffer Overflow 2004-10-13
NGSSoftware Insight Security Research (nisr ngssoftware com)
John Heasman of NGSSoftware has discovered a high risk vulnerability in
the NetDDE service.

This vulnerability has now been fixed by Microsoft, and a fix can be
downloaded from the Microsoft Security website:

http://www.microsoft.com/technet/security/bulletin/MS04-031.mspx

NGSSoftware are going t

[ more ]  [ reply ]
Bypass of Antivirus software with GDI+ bug exploit Mutations 2004-10-13
Andrey Bayora (andrey hiddenbit org)
Bypass of Antivirus software with GDI+ bug exploit Mutations.

HiddenBit.org Security Advisory.

Date: October 14, 2004

Author: Andrey Bayora

BACKGROUND

While performing research paper for SANS GCIH practice I have found
this issue and it seems to me enough critical to warn readers
about this.

[ more ]  [ reply ]
Re: EEYE: Windows Shell ZIP File Decompression DUNZIP32.DLL Buffer Overflow Vulnerability 2004-10-14
Bipin Gautam (visitbipin hotmail com)
In-Reply-To: <19F34051C5BB60429ACD1BF01338C5987EC511 (at) av-mail01.corp.int-eeye (dot) com [email concealed]>

>---Description---

>Win xp default zip manager can't handle long file names properly...

>

>---Bug Demonstration---

>Create a new file with very long file name... in your c: [ say:

>1.111111111111111111111111111

[ more ]  [ reply ]
Writing Trojans that bypass Windows XP Service Pack 2 Firewall 2004-10-12
americanidiot hushmail com
Writing Trojans that bypass Windows XP Service Pack 2 Firewall

Windows XP Service Pack 2 incorporates many enhancements to try to better
protect systems from malware and other forms of attacks. One of those
layers of protection is the Windows XP SP2 Firewall. One of the features
of this firewall is

[ more ]  [ reply ]
[OpenPKG-SA-2004.044] OpenPKG Security Advisory (modssl) 2004-10-15
OpenPKG (openpkg openpkg org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________

OpenPKG Security Advisory The OpenPKG Project
http://www.openpkg.org/security.html http://www.openpkg.org
openpkg-security (at) openpkg (dot) org [email concealed]

[ more ]  [ reply ]
TSLSA-2004-0054 - multi 2004-10-15
Trustix Security Advisor (tsl trustix org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
--
Trustix Secure Linux Security Advisory #2004-0054

Package name: libtiff, mysql, squid, cyrus-sasl
Summary: Multiple security vulnerabilities
Date:

[ more ]  [ reply ]
a path disclosure and a posibility file inclusion and vulneability in thepeak file upload v1.3 2004-10-15
keitel andres ortega (justint rdmail net)


Justin_T

#NT - Undernet

justint (at) orangemail.com (dot) do [email concealed]

hi,

there is a posiblity path disclosure and run commands on a server usint thepeak File Upload v1.3

searching for /fileupload/index.php an attacker can upload a malicious jpg of gif and can execute commands or make a file inclusion,

but it

[ more ]  [ reply ]
Re: Format String Vulnerability in Valve's CS-Source 2004-10-14
Luigi Auriemma (aluigi autistici org)
> if u type '%n' (without ') to in-game-console, your game crashes
> instantly.
>
> So far, i was not able, to do this remotely with rcon %n e.g., but this
> does not mean, it is not possible.

If this is the same bug I reported over one year ago
http://aluigi.altervista.org/adv/hlclientfs-adv.txt

[ more ]  [ reply ]
[FLSA-2004:2102] Updated samba packages fix security vulnerability [updated] 2004-10-14
Dominic Hargreaves (dom earth li)
-----------------------------------------------------------------------
Fedora Legacy Update Advisory

Synopsis: Updated samba resolves security vulnerabilities
Advisory ID: FLSA:2102
Issue date: 2004-10-14
Product: Red Hat Linux
Keywords: Secu

[ more ]  [ reply ]
[ GLSA 200410-13 ] BNC: Input validation flaw 2004-10-15
Thierry Carrez (koon gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200410-13
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -

[ more ]  [ reply ]
Re: Adobe acrobat / Adobe Reader 6 can read local files 2004-10-14
Nick Leoncavallo (nleoncavallo yahoo com)
In-Reply-To: <0I5H001195EBYO (at) smtp13.wxs (dot) nl [email concealed]>

This can be defeated by disallowing multimedia operations in the "Trust Manager" settings.

I'm not sure I want to the other setting labeled "Allow documents to open other files and launch other applications" either, but it doesn't have an affect on J

[ more ]  [ reply ]
UPDATE: Format String Vulnerability in Valve's CS-Source 2004-10-14
Some One (mc iglo ddclan de)
In-Reply-To: <20041013154826.13068.qmail (at) www.securityfocus (dot) com [email concealed]>

Hi,

i just found out, that u can also use it remotely against the server without any knowledge of the rcon-password!

just do the following:

type 'name "%n"' (without ') to console and wait until you get killed.

The server will be

[ more ]  [ reply ]
ACROS Security: Session Fixation in JRun Management Console 2004-10-14
ACROS Security (lists acros si)
=====[BEGIN-ACROS-REPORT]=====

PUBLIC

========================================================================
=
ACROS Security Problem Report #2004-10-14-2
------------------------------------------------------------------------
-
ASPR #2004-10-14-2: Session Fixation in JRun Management Console
===

[ more ]  [ reply ]
ACROS Security: HTML Injection in JRun Management Console 2004-10-14
ACROS Security (lists acros si)
=====[BEGIN-ACROS-REPORT]=====

PUBLIC

========================================================================
=
ACROS Security Problem Report #2004-10-14-1
------------------------------------------------------------------------
-
ASPR #2004-10-14-1: HTML Injection in JRun Management Console
======

[ more ]  [ reply ]
[ GLSA 200410-10 ] gettext: Insecure temporary file handling 2004-10-10
Luke Macken (lewk gentoo org)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200410-10
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -

[ more ]  [ reply ]
ACROS Security: Unsanitized Session ID Cookie Allows Modifying Server Response 2004-10-14
ACROS Security (lists acros si)
=====[BEGIN-ACROS-REPORT]=====

PUBLIC

========================================================================
=
ACROS Security Problem Report #2004-10-14-3
------------------------------------------------------------------------
-
ASPR #2004-10-14-3: Unsanitized Session ID Cookie Allows Modifying S

[ more ]  [ reply ]
New Remote Microsoft JPEG DoS Vulnerability + Other Potential Security Vulnerabilitys in asycpict.dll 1.0 Advisory 2004-10-14
John Bissell (monkey321_1 hotmail com)


+---------------------------------------------------------------------+

| |

| ================================================================= |

| Microsoft asycpict.dll 1.0 Remote JPEG DoS Attack Vulnerability |

|

[ more ]  [ reply ]
3COM Wireless router (3CRADSL72) information disclosure 2004-10-13
Karb0nOxyde - (karb0noxyde gmail com)
The router gives you a web page with user name, password, primary and
secondary DNS, default gateway, etc, if you access
http://[routerIP]/app_sta.stm without athentification of any kind.

Router details:
Runtime Code Version 1.05 (Jan 27 2004 14:58:25)
Boot Code Version V1.3d
Hardware Vers

[ more ]  [ reply ]
(Page 1437 of 1748)  < Prev  1432 1433 1434 1435 1436 1437 1438 1439 1440 1441 1442  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus