BugTraq Mode:
(Page 1481 of 1748)  < Prev  1476 1477 1478 1479 1480 1481 1482 1483 1484 1485 1486  Next >
Mozilla Security Advisory 2004-07-08 2004-07-08
dveditz cruzio com
Mozilla Security Advisory
July 7, 2004

Summary: Windows shell: scheme exposed in Mozilla
Products: Mozilla (Suite)
Mozilla Firefox
Mozilla Thunderbird
Fixed in: Mozilla (Suite) 1.7.1
Mozilla Firefox 0.9.2
Mozilla Thunderbird 0.7.2

Description

[ more ]  [ reply ]
[OpenPKG-SA-2004.031] OpenPKG Security Advisory (dhcpd) 2004-07-08
OpenPKG (openpkg openpkg org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________

OpenPKG Security Advisory The OpenPKG Project
http://www.openpkg.org/security.html http://www.openpkg.org
openpkg-security (at) openpkg (dot) org [email concealed]

[ more ]  [ reply ]
Norton AntiVirus Denial Of Service Vulnerability [Part: !!!] 2004-07-09
Bipin Gautam (visitbipin hotmail com)


Norton AntiVirus Denial Of Service Vulnerability [Part: !!!]

*vulnerable [...only tested on!]

Symantec Norton AntiVirus 2003 Professional Edition

Symantec Norton AntiVirus 2002

*not vulnerable

Mcafee 7*

Mcafee 8*

Risk Impact: Medium

Remote: yes

Description:

While having a virus

[ more ]  [ reply ]
[GLSA 200407-06] libpng: Buffer overflow on row buffers 2004-07-08
Sune Kloppenborg Jeppesen (jaervosz gentoo org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200407-06
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

[ more ]  [ reply ]
[ GLSA 200407-07 ] Shorewall : Insecure temp file handling 2004-07-08
Thierry Carrez (koon gentoo org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200407-07
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

[ more ]  [ reply ]
RE: Suggestion: erase data posted to the Web 2004-07-08
Michael Wojcik (Michael Wojcik microfocus com) (1 replies)
> From: Andrew Daviel [mailto:advax (at) triumf (dot) ca [email concealed]]
> Sent: Wednesday, July 07, 2004 2:30 PM
>
> A recent New Scientist article referred to the fact that
> "sensitive data" may persist in computer memory, and be
> swapped to disk and persist after a power-down.
>
> I had observed a while ago that text

[ more ]  [ reply ]
Re: Suggestion: erase data posted to the Web 2004-07-09
devnull Rodents Montreal QC CA
Security contact wanted 2004-07-07
S G Masood (sgmasood yahoo com)

Hello,

Does anyone know the security contact for Rediff.com,
Indiatimes.com or Sify.com? Please let me know if you
do.

--
S.G.Masood

__________________________________
Do you Yahoo!?
New and Improved Yahoo! Mail - Send 10MB messages!
http://promotions.yahoo.com/new_mail

[ more ]  [ reply ]
Scob variant using IIS 6.0 or just upgrades ? 2004-07-07
Hubbard, Dan (dhubbard websense com)
Our mining processes have uncovered more than 100 additional sites that
are appear to have been breached and used as part of the "Scob" malcode.
Unlike the other sites discovered these sites are NOT running IIS 5.0
and appear as though they are not using the IIS "footer" vulnerability.
There are two

[ more ]  [ reply ]
Suggestion: erase data posted to the Web 2004-07-07
Andrew Daviel (advax triumf ca) (2 replies)

A recent New Scientist article referred to the fact that
"sensitive data" may persist in computer memory, and be swapped to disk
and persist after a power-down.

http://www.newscientist.com/news/news.jsp?id=ns99995064

I had observed a while ago that text such as credit card numbers entered
into a

[ more ]  [ reply ]
Re: Suggestion: erase data posted to the Web 2004-07-07
Luciano Miguel Ferreira Rocha (strange nsk no-ip org)
Re: Suggestion: erase data posted to the Web 2004-07-08
Nick Lamb (njl98r ecs soton ac uk)
RE: Can we prevent IE exploits a priori? 2004-07-07
Drew Copley (dcopley eEye com) (1 replies)
I have not seen evidence that either of these applications
prevents new exploits. If anyone is making this claim, they
should explain what technology they are using.

The required fix is simply setting a kill bit on the vulnerable
activex objects. Had this been done in September, none of these
attac

[ more ]  [ reply ]
Re: Can we prevent IE exploits a priori? 2004-07-09
Jason Coombs (jasonc science org)
Comersus Cart Improper Request Handling 2004-07-07
Thomas Ryan (tommy providesecurity com)
Comersus Cart Improper Request Handling

Release Date:
July 6, 2004

Severity:
Medium

Vendor:
Comersus Open Technologies

Software:
Tested on Comersus Cart 5.09
Previous versions may also be affected.

Remote:
Remotely executed from any web browser

Technical Details:
The unethical user is able to

[ more ]  [ reply ]
FW: [security bulletin] SSRT4718 rev.0 HP Tru64 UNIX NTP Integer Overflow 2004-07-07
Boren, Rich (SSRT) (rich boren hp com)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

HP SECURITY BULLETIN

HPSBTU01043 REVISION: 0

SSRT4718 rev.0 HP Tru64 UNIX NTP Integer Overflow

-----------------------------------------------------------------
NOTICE:
There are no restrictions for distribution of this Bulletin
provided that

[ more ]  [ reply ]
Can we prevent IE exploits a priori? 2004-07-07
security-bugtraq marketshark net (1 replies)


We all know that yet another critical IE vulnerability (download.ject [aka SCOB, finally patched by M$ after 10 months] caused some high profile groups (http://slate.msn.com/id/2103152/, http://www.theinquirer.net/?article=16922, slashdot.org/articles/04/07/02/1441242.shtml?tid=103&tid=113&tid=126

[ more ]  [ reply ]
RE: Can we prevent IE exploits a priori? 2004-07-07
James C Slora Jr (Jim Slora phra com)
Re: (IE/SCOB) Switching Software Because of Bugs: Some Facts About Software and Security bugs 2004-07-06
Thomas C. Greene (tcgreene verizon net)
Drew, you make some valid points. However, i believe your conclusion is off
the mark nonetheless. Admittedly, IE's vast installed user base and MS's
arrogance regarding security (and many other matters) have influenced the
number of bugs that come to light. No argument there. However, there *are*

[ more ]  [ reply ]
Npds BB HTML Injection 2004-07-07
Benjamin Tolman (rituel voila fr)


I release it very quickly ... So it can be improved :

Code to put in a reply or in a topic :

Your fake message</td></tr><tr><td valign="bottom"><hr noshade size="1" class="ONGL">  <a href="user.php?op=userinfo&uname=User" CLASS="NOIR" target=_blank><img src="images/forum/icons/profi

[ more ]  [ reply ]
Comersus Cart Cross-Site Scripting Vulnerability 2004-07-07
Thomas Ryan (tommy providesecurity com)
Comersus Cart Cross-Site Scripting Vulnerability

Release Date:
July 6, 2004

Severity:
High

Vendor:
Comersus Open Technologies

Software:
Tested on Comersus Cart 5.09
Previous versions may also be affected.

Remote:
Remotely executed from any web browser

Technical Details:
The malicious user is a

[ more ]  [ reply ]
Enterasys XSR Security Router Record Route Denial Of Service Vulnerability (More information) 2004-07-07
Frederico Queiroz (fqueiroz ish com br)
The Enterasys Networks Security Response Team published an incident note
about this thread. (ETS-i-2004-11036)

Check it out for updated information:

http://www.enterasys.com/support/security/incidents/2004/07/11036.html

Frederico Queiroz
Security Consultant/ISH Tecnologia
Phone: +55-27-3334-8900

[ more ]  [ reply ]
MDKSA-2004:066 - Updated kernel packages fix multiple vulnerabilities 2004-07-07
Mandrake Linux Security Team (security linux-mandrake com)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandrakelinux Security Update Advisory
_______________________________________________________________________

Package name: kernel
Advisory ID:

[ more ]  [ reply ]
Eudora 6.1.2 attachment spoof 2004-07-06
psz maths usyd edu au (Paul Szabo)
Eudora 6.1.2 for Windows was released on 21 June 2004. The release notes
http://www.eudora.com/download/eudora/windows/6.1.2/RelNotes.txt
say:

> SECURITY
> Fixed case where attachments could be spoofed via base64 encoded
> (plain-text, inline) MIME parts.

Not so. Harmless demo below.

Cheers,

Pau

[ more ]  [ reply ]
Re: Registry Fix For Variant of Scob 2004-07-06
http-equiv (at) excite (dot) com [email concealed] (1 malware com)


<!--

No reason to set the kill bit?

Take a look at
http://seclists.org/lists/fulldisclosure/2004/Jun/0318.html

And I am quoting you now

"You should be able to use this to compromise Windows XP SP2
through Internet Explorer despite the My Computer zone hardening
since the Trusted Sites Zone

[ more ]  [ reply ]
(Page 1481 of 1748)  < Prev  1476 1477 1478 1479 1480 1481 1482 1483 1484 1485 1486  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus