Section:  .. / 0412-advisories  /

Page 4 of 11
<< 1 2 3 4 5 6 7 8 9 10 11 >> Files 75 - 100 of 253
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: 12.20.04.txt
Description:
iDEFENSE Security Advisory 12.20.2004 - Local exploitation of an untrusted path vulnerability in the chcod command included by default in multiple versions of IBM Corp. AIX could allow for arbitrary code execution as the root user. Verified in version 5.2.
Homepage:http://www.idefense.com/
File Size:3830
Related CVE(s):CAN-2004-1028
Last Modified:Dec 31 10:31:06 2004
MD5 Checksum:fd13ffaaffddef8241c722f8dee67e2e

 ///  File Name: sa13576.txt
Description:
Secunia Security Advisory - Some vulnerabilities have been reported in PHPFormMail, which can be exploited by malicious people to conduct cross-site scripting attacks.
Homepage:http://secunia.com/advisories/13576/
File Size:1868
Last Modified:Dec 31 10:27:19 2004
MD5 Checksum:3522011c483948903568133734ac6b8e

 ///  File Name: faronics.txt
Description:
Faronics FreezeX version 1.00.100.0666 is susceptible to a denial of service attack.
Author:Xenzeo
File Size:1054
Last Modified:Dec 31 10:26:25 2004
MD5 Checksum:fff88b432668ebd6198206ac77eadf80

 ///  File Name: gg-dos.txt
Description:
It is possible to remotely conduct a denial of service attack on a Gadu-Gadu client by sending special crafted messages several times. All versions up to 6.1 build 156 are affected.
Author:Maciej Soltysiak
Homepage:http://www.soltysiak.com/gg-dos.txt
File Size:1961
Last Modified:Dec 31 10:23:38 2004
MD5 Checksum:cc5a640ddefec0d352ed82a14b815912

 ///  File Name: workboard.txt
Description:
A cross site scripting flaw exists in the Workboard 1.x module for PHP-Nuke.
Author:Lostmon
File Size:1434
Last Modified:Dec 31 10:21:31 2004
MD5 Checksum:342565c74d5aa6fff43d4d22935e03bf

 ///  File Name: sa13571.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in ArGoSoft Mail Server, which can be exploited by malicious people to conduct script insertion attacks.
Homepage:http://secunia.com/advisories/13571/
File Size:1725
Last Modified:Dec 31 10:18:38 2004
MD5 Checksum:87224581743819bf55962edc49693f7c

 ///  File Name: glsa-200412-21.txt
Description:
Gentoo Linux Security Advisory GLSA 200412-21 - Multiple overflow vulnerabilities have been found in MPlayer, potentially resulting in remote executing of arbitrary code.
Homepage:http://security.gentoo.org/
File Size:3047
Last Modified:Dec 31 10:16:45 2004
MD5 Checksum:bb53a2a583faa6b0bf1d4d967318f03f

 ///  File Name: deaap-sa1.txt
Description:
Various vulnerabilities exist in rftpd2 and rpf 1.2.2.
Author:Slotto Corleone
File Size:21881
Last Modified:Dec 31 10:15:37 2004
MD5 Checksum:af4fc9e21a0ce4a428bb4bc6dbaf0938

 ///  File Name: advisory-20041220-1.txt
Description:
KDE Security Advisory: Two flaws in the Konqueror webbrowser make it possible to by pass the sandbox environment which is used to run Java-applets. One flaw allows access to restricted Java classes via JavaScript, making it possible to escalate the privileges of the Java-applet. The other problem is that Konqueror fails to correctly restrict access to certain Java classes from the Java-applet itself. All versions of KDE up to KDE 3.3.1 inclusive. KDE 3.3.2 is not affected.
Homepage:http://www.kde.org/info/security/advisory-20041220-1.txt
File Size:1948
Related CVE(s):CAN-2004-1145
Last Modified:Dec 30 22:57:23 2004
MD5 Checksum:06097183c8b1a9e1d053061955ca4e44

 ///  File Name: tlen.txt
Description:
Tlen.pl versions 5.23.4.1 and below suffer from a remote script execution vulnerability.
Author:Blazej Miga, Jaroslaw Sajko
File Size:1011
Last Modified:Dec 30 22:55:23 2004
MD5 Checksum:d57733ca64397c04bd3e402f18efe4ca

 ///  File Name: dsa-612.txt
Description:
Debian Security Advisory 612-1 - Rudolf Polzer discovered a vulnerability in a2ps, a converter and pretty-printer for many formats to PostScript. The program did not escape shell meta characters properly which could lead to the execution of arbitrary commands as a privileged user if a2ps is installed as a printer filter.
Homepage:http://www.debian.org/security/
File Size:4764
Related CVE(s):CAN-2004-1170
Last Modified:Dec 30 22:29:28 2004
MD5 Checksum:dd4bd0d28639200edc8ee19f8362ae7a

 ///  File Name: SSRT4687.txt
Description:
HP Security Bulletin - A potential vulnerability has been identified with the HP-UX newgrp(1) command that may allow authorized users to elevate privileges. Affected versions are HP-UX B.11.00, B.11.04, B.11.11.
Homepage:http://www.hp.com/
File Size:6252
Last Modified:Dec 30 22:22:20 2004
MD5 Checksum:034da78b0a883d952e92b38d095fce9e

 ///  File Name: dsa-611.txt
Description:
Debian Security Advisory 611-1 - infamous41md discovered a buffer overflow in htget, a file grabber that will get files from HTTP servers. It is possible to overflow a buffer and execute arbitrary code by accessing a malicious URL.
Homepage:http://www.debian.org/security/
File Size:4494
Related CVE(s):CAN-2004-0852
Last Modified:Dec 30 22:10:39 2004
MD5 Checksum:e67a52f0504004d7c1cc74d20a38c389

 ///  File Name: unrtf.txt
Description:
A buffer overflow in UnRTF version 0.19.3 may allow for system compromise.
Author:Yosef Klein, Limin Wang
File Size:1917
Last Modified:Dec 30 22:09:25 2004
MD5 Checksum:295256bfc6f864de8855ac59a2384636

 ///  File Name: yamt.txt
Description:
A buffer overflow vulnerability in the YAMT 0.5 id3tag_sort() function can lead to a system compromise.
Author:Manigandan Radhakrishnan
File Size:1343
Last Modified:Dec 30 22:07:04 2004
MD5 Checksum:4ebdbb7190804ed5347c9a9b69c01081

 ///  File Name: vilistextum.txt
Description:
Vilistextum version 2.6.6 is susceptible to a buffer overflow in the get_attr() function.
Author:Ariel Berkman
File Size:1792
Last Modified:Dec 30 22:04:55 2004
MD5 Checksum:bf08708a98b0a42384791a1dce9df5fd

 ///  File Name: xlreader.txt
Description:
xlreader version 0.9.0 is susceptible to a buffer overflow condition in the book_format_sql() function.
Author:Tom Palarz, Kris Kubicki
File Size:1973
Last Modified:Dec 30 22:03:33 2004
MD5 Checksum:3d12a416c48f0834d6c769963b04f3f0

 ///  File Name: vb2c.txt
Description:
A buffer overflow in the vb2c 0.02 parse() function allows for system compromise.
Author:Qiao Zhang
File Size:1571
Last Modified:Dec 30 21:59:48 2004
MD5 Checksum:e86c43e351f45c3ad96d9181336c899a

 ///  File Name: uml-utilites.txt
Description:
uml-utilities version 20030903 is susceptible to a denial of service vulnerability via the uml-net utility running setuid root and being able to take down the system's ethernet connection.
Author:Danny Lungstrom
File Size:996
Last Modified:Dec 30 21:58:34 2004
MD5 Checksum:db4d432b0f456497f398b6080fdc7125

 ///  File Name: pcal.txt
Description:
Buffer overflow vulnerabilities in the getline() and get_holiday() functions of Pcal version 4.7.1 may allow for system compromise.
Author:Danny Lungstrom
File Size:2085
Last Modified:Dec 30 21:55:22 2004
MD5 Checksum:cb6b2d027816ca5bd3dd0f51705f9c80

 ///  File Name: meshviewer.txt
Description:
MeshViewer 0.2.2 is susceptible to a buffer overflow vulnerability in the Mesh::type() function.
Author:Mohammed Khan, Danny Lungstrom
File Size:1759
Last Modified:Dec 30 21:51:22 2004
MD5 Checksum:41b28ab911efe4335b17fc5f62641333

 ///  File Name: napshare.txt
Description:
NapShare version 1.2 is susceptible to a buffer overflow in the auto_filter_extern() function.
Author:Bartlomiej Sieka
File Size:1516
Last Modified:Dec 30 21:49:57 2004
MD5 Checksum:8d807ed6b769988f8dbf85ee70b49017

 ///  File Name: ringtonetools.txt
Description:
Ringtone Tools version 2.22 is susceptible to a buffer overflow in the parse_emelody() function.
Author:Qiao Zhang
File Size:1831
Last Modified:Dec 30 21:48:54 2004
MD5 Checksum:49c072a2956cb35e4660bdb38e148aa6

 ///  File Name: linpopup.txt
Description:
LinPopUp version 1.2.0 has a buffer overflow in the strexpand() function.
Author:Stephen Dranger
File Size:1661
Last Modified:Dec 30 21:14:34 2004
MD5 Checksum:e41c0dc897f18f92d9fe845bfa2390dd

 ///  File Name: o3read.txt
Description:
o3read version 0.0.3 suffers from a buffer overflow condition in the parse_html() function used when parsing HTML content.
Author:Wiktor Kopec
File Size:1731
Last Modified:Dec 30 21:13:19 2004
MD5 Checksum:f97b5e158bf526756b06630df1c83f47