Vuln Dev Mode:
(Page 29 of 75)  < Prev  24 25 26 27 28 29 30 31 32 33 34  Next >
Retina Vuln Scanner Problems. 2004-11-04
Robinson, Sonja (SRobinson HIPUSA com)
Anyone having issues with Retina Vulnerability Scanner 5.0.20.1140 w/ 250 IP
pack? We are trying to troubleshoot a potential bug and are wondering if
anyone else is experiencing issues. We've never had any problems before with
previous versions.

It appears that it locked all of our user accounts e

[ more ]  [ reply ]
DIMVA 2005 - Call for Papers 2004-11-08
Marc Heuse (Marc Heuse nruns com)
------------------------------------------------------------------------
----

CALL FOR PAPERS

DIMVA 2005

Second GI SIG SIDAR Conference on
Detection of Intrusions & Malware, and Vulnerability Assessm

[ more ]  [ reply ]
RE: Microsoft ISA Server Authentication Bypassing 2004-11-03
Jim Harrison (ISA) (jmharr microsoft com)
Hi Debasis,

You're a bit vague on the ISA configuration details (read: missing
entirely).
If you're in doubt about how to express this, use
(ISA 2000) http://isatools.org.isainfo.vbe
(ISA 2004) http://isatools.org/isainfo/isainfo.zip

I'll address each case inline (pardon the <snip> in case 2; it

[ more ]  [ reply ]
Microsoft ISA Server Authentication Bypassing 2004-11-02
Debasis Mohanty (mail hackingspirits com)
Vulnerability
Microsoft ISA Server Authentication Bypassing

Description
This weakness is tested in a network environment where Microsoft ISA
server is configured as an Internet proxy server and the users are
required to provide appropriate user name and the password to access the
internet.

In HTT

[ more ]  [ reply ]
Windows 2000 SP4 + IE (fully patched) - restrictions bypass 2004-11-02
Bartosz Kwitkowski (bartosz wb pl)


Windows 2000 SP4 + IE (fully patched) - restrictions bypass

Restrictions for example:

- disabled protocols (ftp://,file://,news://,...);

- you can't view computers in your network, and you can't explore their resources

Bypass it :-)...

open your browser (IE) and type:

javascript:windo

[ more ]  [ reply ]
Solaris/SPARC heap overflow examples 2004-10-29
Inode (inode wayreth eu org)
Hi all,
for who is interested I just done some examples of heap overflow under
solaris/SPARC. All examples can be found at: http://wayreth.eu.org

Some usefull routines as been developed to find needed address
automaticaly. Expecialy in:
http://wayreth.eu.org/heap_exploit_jmptable_auto.c

Best regar

[ more ]  [ reply ]
CanSecWest/core05 Call for Papers - May 4-6 2005 - Deadline December 6 2004 2004-10-26
Dragos Ruiu (dr kyx net)
CALL FOR PAPERS

CanSecWest/core05

Network Security Training Conference

http://cansecwest.com
May 4-6 2005
Vancouver, B.C.
Canada

CanSecWest would like to announce the call for papers of the
spring, sixth annual, CanSecWest/core05 network security training
conference and the

[ more ]  [ reply ]
Windows XP multiple local buffer overflows and format string bugs 2004-10-23
Jérôme ATHIAS (jerome athias caramail com) (1 replies)
Hi guys, little come back after a moving.

I don't remember to have seen these details, sorry if i'm wrong.

AUTHOR
Komrade

DATE
08/10/2004

PRODUCT
Windows XP
Tested on Windows XP Service Pack 2, prior versions should have the same bugs.

DETAILS
Here is a list of some Windows XP utilities that ar

[ more ]  [ reply ]
Re: Windows XP multiple local buffer overflows and format string bugs 2004-10-25
Berend-Jan Wever (skylined edup tudelft nl)
Denial of service in LANDesk 8 2004-10-19
Ryan Rounkles (ryan rounkles gmail com) (1 replies)
When connected to a remote machine with LANDesk version 8, and someone
connects with, or even telnets to the port of, Remote Desktop (3389),
the machine bluescreens, dumps memory, and reboots immediately. I've
tested with:

Windows 2000 Server, Advanced server (SP4 and up)
Windows 2003 Server
Win

[ more ]  [ reply ]
Re: Denial of service in LANDesk 8 2004-10-24
Michel Arboi (michel arboi gmail com)
Need Security Contact Info 2004-10-15
tommy providesecurity com (2 replies)
Does anyone have a direct security contact to someone at Netegrity? I have
found a few issues with SiteMinder I need to discuss with them.

Thanks in advance,

Thomas Ryan

[ more ]  [ reply ]
Re: Need Security Contact Info 2004-10-18
joe star (alan6 melimail com) (1 replies)
RE: Need Security Contact Info 2004-10-21
Rob Shein (shoten starpower net)
Re: Need Security Contact Info 2004-10-15
SBS Technical Services (sbstech email arizona edu)
SetWindowLong Shatter Attacks 2004-10-13
Brett Moore (brett moore security-assessment com)
========================================================================

= SetWindowLong Shatter Attacks
=
= MS Bulletin posted:
= http://www.microsoft.com/technet/security/bulletin/ms04-032.mspx
=
= Affected Software:
= Microsoft Windows 98, 98SE, ME
= Microsoft Windows NT 4.0
= Microsoft Windows

[ more ]  [ reply ]
Buffer Overflow In Microsoft Excel 2004-10-13
Brett Moore (brett moore security-assessment com)
========================================================================

= Excel - Buffer Overflow In Microsoft Excel
=
= MS Bulletin posted:
= http://www.microsoft.com/technet/security/bulletin/MS04-033.mspx
=
= Affected Software:
= Microsoft Office 2000 Service Pack 3 Software:
= - Ex

[ more ]  [ reply ]
MonkeyShell: using XML-RPC for access to a remote shell 2004-10-11
Abe Usher (securitylist sharp-ideas net)
Security pundits have been warning about the dangers implicit with Web
services for years. A good starting point for understanding the security
issues related to Web services can be found at:
http://searchwebservices.techtarget.com/originalContent/0,289142,sid26_g
ci872720,00.html

Of course to reall

[ more ]  [ reply ]
Re: No body emails and Norton antivirus 2004-10-07
Peter Lem (peter lem acml com)
In-Reply-To: <20040925222930.GA2041 (at) commedia (dot) it [email concealed]>

Version of Norton Anti-Virus? patched?

Version of Outlook? patched?

Thank You.

>Received: (qmail 13508 invoked from network); 27 Sep 2004 16:45:53 -0000

>Received: from mail2.securityfocus.com (205.206.231.1)

> by mail.securityfocus.com wi

[ more ]  [ reply ]
Re: Kaspersky AntiVirus Window Caption GUI Bypass Vulnerability 2004-10-05
miguel dilaj pharma novartis com (1 replies)
Hi Tony,

I used a similar trick in the past to deactivate McAffee 4.x (needed to
use some xploits like Debploit and runasx in WinNT4, at that time the only
protection was the antivirus, now we migrated to XP).
The configuration GUI was password protected, and even when the passwords
were show as

[ more ]  [ reply ]
Re: Kaspersky AntiVirus Window Caption GUI Bypass Vulnerability 2004-10-05
Simon (simos74 gmx net) (1 replies)
Re[2]: Kaspersky AntiVirus Window Caption GUI Bypass Vulnerability 2004-10-06
3APA3A (3APA3A SECURITY NNOV RU)
nmapbot: using instant messaging as platform for running remote system commands 2004-10-05
Abe Usher (abe usher sharp-ideas net)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

I've created a small proof of concept named "nmapbot" that shows it is
possible to use instant messaging as a platform for remote command and
control of computer systems.

Purpose:
- --------
To create a semi-intelligent security bot that uses instant m

[ more ]  [ reply ]
Antivirus, Trojan, Spy ware scanner, Nested file manual scan bypass bugs. [Part IV] 2004-10-04
Bipin Gautam (visitbipin hotmail com)


Affected Product (Only tested on...):

Mcafee Virus Scan professional (8.0.0.12)

Norton Antivirus 2003

Kaspersky 4.5x

Ad-Aware (6.0.1.181)

The Cleaner

Risk Level: Medium

Description:

------------

A malicious code can reside in a computer (with users privilege) bypassing "manual s

[ more ]  [ reply ]
Re: Kaspersky AntiVirus Window Caption GUI Bypass Vulnerability 2004-10-01
Tony Montana (c4p0ne hush com)
In-Reply-To: <20040930161008.28872.qmail (at) www.securityfocus (dot) com [email concealed]>

Hello, this is a response by myself in an attempt to address a flurry of emails regarding some unanswered questions about this latest exploit in Kaspersky Anti-Virus Version 5.0x line. I will attempt to answer all the questions I have

[ more ]  [ reply ]
Kaspersky AntiVirus Window Caption GUI Bypass Vulnerability 2004-09-30
Tony Montana (c4p0ne hush com)


I have discovered that the GUI part of KAV v5.0x (kav.exe) has a vulnerability that would allow any user to completely BYPASS the "password protection" in order to change settings or completely disable/exit KAV. There are dosens of shareware/freeware applications available on the internet that a u

[ more ]  [ reply ]
RE: Help on hardware flaws 2004-09-28
Daniel Weidman (dweidman netsec net)
Sorry for the late response but, you may want to try this link.

http://www.securityfocus.com/bid

Enjoy ;)

-----Original Message-----
From: GuidoZ [mailto:uberguidoz (at) gmail (dot) com [email concealed]]
Sent: Saturday, September 25, 2004 8:52 PM
To: Suroop
Cc: vuln-dev (at) securityfocus (dot) com [email concealed]
Subject: Re: Help on hardware flaws

[ more ]  [ reply ]
Re: No body emails and Norton antivirus 2004-09-30
lwalcher sterling edu
In-Reply-To: <20040925222930.GA2041 (at) commedia (dot) it [email concealed]>

This is a Norton issue that goes way back:

http://www.c4.net/Index.cfm?Method=NewsStories.NewsStory&NewsStory_ID=22
9

http://support.microsoft.com/default.aspx?scid=kb;EN-US;813514

Hope this helps,

Luke Walcher

Systems Admin

Sterling Colle

[ more ]  [ reply ]
(Page 29 of 75)  < Prev  24 25 26 27 28 29 30 31 32 33 34  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus