Section:  .. / 0406-advisories  /

Page 4 of 6
<< 1 2 3 4 5 6 >> Files 75 - 100 of 129
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: sa11799.txt
Description:
Microsoft has issued Service Pack 2 for ISA Server 2000. This includes patches for all previously reported vulnerabilities as well as older hot fixes, where some address potential security issues.
File Size:2735
Last Modified:Jun 14 11:11:43 2004
MD5 Checksum:5762fda1c8060fb7502ee4ba0b7903b2

 ///  File Name: sa11824.txt
Description:
A vulnerability has been discovered in ignitionServer versions 0.1.2 through 0.3.1, which can be exploited by malicious people to bypass certain security restrictions. The vulnerability is caused due to missing password verification when linking servers.
Author:Keith Gable
Homepage:http://www.ignition-project.com/ignition/server/download/
File Size:1872
Last Modified:Jun 14 10:59:28 2004
MD5 Checksum:3ed7bf846be98922567d8958ae3a1273

 ///  File Name: sa11807.txt
Description:
A vulnerability has been discovered in MoinMoin that can be exploited by malicious users to gain escalated privileges. The problem is that a user can gain the same privileges as an administrative group by creating a user with the same name. The vulnerability has been reported in versions 1.1, 1.2, and 1.2.1.
Author:Michael Castleman
File Size:1796
Last Modified:Jun 14 10:55:57 2004
MD5 Checksum:977b231f1ac6323f67c2ab8e56305c8c

 ///  File Name: sa11846.txt
Description:
VP-ASP Shopping Cart 5.x has a vulnerability which can potentially be exploited by malicious people to conduct cross-site scripting attacks.
File Size:1632
Last Modified:Jun 14 10:53:13 2004
MD5 Checksum:bb54e5157b2f5ac2b4579878bb357495

 ///  File Name: swapctlNetBSD.txt
Description:
An integer handling error within the swapctl() system call of NetBSD 1.x can allow a local user the ability to cause a denial of service attack.
Author:Evgeny Demidov
File Size:813
Last Modified:Jun 14 10:51:14 2004
MD5 Checksum:ca2eeda9cebd911cf463836200b6d2cd

 ///  File Name: billionFW.txt
Description:
A vulnerability in the Billion BIPAC-640 AE Broadband Firewall Gateway can be exploited by malicious people to bypass user authentication on the administrative web interface.
Author:Tommy A. Olsen
File Size:2189
Last Modified:Jun 14 10:15:18 2004
MD5 Checksum:706bf78e6fbf6d6a1b310ca5f9d3e0a5

 ///  File Name: modproxy1.html
Description:
The version of mod_proxy shipped with Apache 1.3.31 and possibly earlier versions are susceptible to a buffer overflow via the Content-Length: header. This can lead to a denial of service and possible compromise of a vulnerable system.
Author:Georgi Guninski
Homepage:http://www.guninski.com/modproxy1.html
File Size:8508
Last Modified:Jun 14 10:10:52 2004
MD5 Checksum:e7d78d7a935f0a2ce17af90ae82bf0ba

 ///  File Name: TA04-163A.txt
Description:
Technical Cyber Security Alert TA04-163A - There is a cross-domain vulnerability in the way Microsoft Internet Explorer determines the security zone of a browser frame that is opened in one domain then redirected by a web server to a different domain.
Homepage:http://www.us-cert.gov/cas/techalerts/TA04-163A.html
File Size:5311
Related CVE(s):CAN-2004-0549
Last Modified:Jun 14 10:06:00 2004
MD5 Checksum:863aa8ed338738125c76110936385e7e

 ///  File Name: CAN-2004-0413-advisory.txt
Description:
Subversion versions up to and including 1.0.4 have a potential Denial of Service and Heap Overflow issue related to the parsing of strings in the 'svn://' family of access protocols. This affects only sites running svnserve.
File Size:1962
Related CVE(s):CAN-2004-0413
Last Modified:Jun 14 10:02:05 2004
MD5 Checksum:6c57e45271df0257835bf6f75027de6f

 ///  File Name: realra.txt
Description:
NGSSoftware Insight Security Research Advisory #NISR11062004 - By crafting a malformed .RA, .RM, .RV or .RMJ file it possible to cause heap corruption that can lead to execution of arbitrary code. By forcing a browser or enticing a user to a website containing such a file, arbitrary attacker supplied code could be executed on the target machine. This code will run in the security context of the logged on user. Another attacker vector is via an e-mail attachment. NGSResearchers have created reliable exploits to take advantage of these issues. Versions affected are: RealOne Player (English), RealOne Player v2 (all languages), RealPlayer 10 (English, German and Japanese), RealPlayer 8 (all languages), RealPlayer Enterprise (all versions, standalone and as-configured by the RealPlayer Enterprise Manager).
Author:John Heasman
Homepage:http://www.nextgenss.com/advisories/realra.tx
File Size:2216
Last Modified:Jun 14 09:51:09 2004
MD5 Checksum:9b39749f4276503fbe10da621c33ba0b

 ///  File Name: snsadv074.txt
Description:
Webmin version 1.140, a web-based system administration tool for Unix, has a vulnerability that allow users to gain read access to the configuration of a module without authentication.
Author:Keigo Yamazaki
File Size:1658
Last Modified:Jun 14 09:47:39 2004
MD5 Checksum:60b527ea62095c03c90abf72d9dadb76

 ///  File Name: eEye.realHeap.txt
Description:
eEye Security Advisory - eEye Digital Security has discovered a critical vulnerability in RealPlayer. The vulnerability allows a remote attacker to reliably overwrite heap memory with arbitrary data and execute arbitrary code in the context of the user who executed the player or application hosting the RealMedia plug-in. This specific flaw exists within the embd3260.dll file used by RealPlayer. By specially crafting a malformed movie file along with an HTML file, a direct heap overwrite is triggered, and reliable code execution is then possible. Systems Affected: RealOne Player, RealOne Player v2, RealPlayer 10, RealPlayer 8, RealPlayer Enterprise.
Author:Karl Lynn
Homepage:http://www.eeye.com
File Size:3090
Last Modified:Jun 14 09:40:50 2004
MD5 Checksum:1ab3251d59de9827bc933f9e0042e061

 ///  File Name: SSRT3456.txt
Description:
A potential security vulnerability has been identified with HP-UX running ftp where the vulnerability could be exploited remotely to allow unauthorized access. Impacted versions: HP-UX B.11.00, B.11.11, B.11.22.
Homepage:http://www.hp.com/
File Size:7352
Last Modified:Jun 14 09:01:58 2004
MD5 Checksum:8a4b86d932e2a37b0f7cabc398cdd68f

 ///  File Name: 0xbadc0ded-04.txt
Description:
A remotely exploitable format string vulnerability exists in smtp.proxy up to and including version 1.1.3. The bug is present and exploitable regardless of any compile time and runtime configuration options and can be exploited by sending a message with an embedded format string in either the client hostname or the message-id.
Author:Joel Eriksson
File Size:7763
Last Modified:Jun 14 08:52:54 2004
MD5 Checksum:8ff006e1ae1e98fc101e810e7fd5cffd

 ///  File Name: sa11805.txt
Description:
A vulnerability has been discovered in Horde IMP, which can be exploited by malicious people to conduct script insertion attacks.
Homepage:http://www.horde.org/imp/3.2/
File Size:1565
Last Modified:Jun 10 10:02:07 2004
MD5 Checksum:ff401bcdcafe5e9ca79120237b594ff9

 ///  File Name: sa11791.txt
Description:
A security issue has been discovered in jCIFS, which allows a malicious person to authenticate with an invalid username. The problem is that it is possible to authenticate with any username if the guest account is enabled on a CIFS server.
File Size:1640
Last Modified:Jun 10 09:59:20 2004
MD5 Checksum:027c723f0398c03b0735a3eab81a30d9

 ///  File Name: 06.08.04.txt
Description:
iDEFENSE Security Advisory 06.08.04: A remote attacker can compromise a target system if Squid Proxy is configured to use the NTLM authentication helper. The attacker can send an overly long password to overflow the buffer and execute arbitrary code.
Homepage:http://www.idefense.com/
File Size:3277
Related CVE(s):CAN-2004-0541
Last Modified:Jun 10 09:56:40 2004
MD5 Checksum:060874905d54e3bb9b334b152ab56049

 ///  File Name: cisco-sa-20040609-catos.txt
Description:
Cisco CatOS is susceptible to a TCP-ACK Denial of Service (DoS) attack on the Telnet, HTTP and SSH service. If exploited, the vulnerability causes the Cisco CatOS running device to stop functioning and reload. Releases affected: 8.xGLX earlier than 8.3(2)GLX, 8.x earlier than 8.2(2), 7.x earlier than 7.6(6), 6.x earlier than 6.4(9). and 5.x earlier than 5.5(20).
Homepage:http://www.cisco.com/warp/public/707/cisco-sa-20040609-catos.shtml
File Size:14113
Last Modified:Jun 10 09:39:19 2004
MD5 Checksum:f670fb26d4079fcf300acbdaa289c627

 ///  File Name: aspdotnet33.txt
Description:
AspDotNetStorefront version 3.3 has a flaw that allows a remote attacker the ability to delete images off of a server due to a lack of input validation.
Author:Thomas Ryan
File Size:1719
Last Modified:Jun 10 09:35:12 2004
MD5 Checksum:863f2ba45c46649a203599321b33b7d0

 ///  File Name: aspXSS.txt
Description:
AspDotNetStorefront 3.3 is susceptible to cross site scripting attacks.
Author:Tom
File Size:2185
Last Modified:Jun 10 09:31:29 2004
MD5 Checksum:e9d4f52aa7ecf0cf6b4fa20dc5b41e17

 ///  File Name: 092004.txt
Description:
A team audit of the CVS codebase has revealed more security related problems. The vulnerabilities discovered include exploitable, potentially exploitable and simple crash bugs. Vulnerable versions are CVS feature releases up to 1.12.8 and stable release up to 1.11.16.
Author:Stefan Esser
Homepage:http://security.e-matters.de/advisories/092004.html
File Size:6672
Related CVE(s):CAN-2004-0414, CAN-2004-0416, CAN-2004-0417, CAN-2004-0418
Last Modified:Jun 10 09:28:47 2004
MD5 Checksum:15d5f057bf9e9a5cec1e69c9dad30bbc

 ///  File Name: trendOfficeScan55.txt
Description:
Trend OfficeScan version 5.5 has a flaw that allows a malicious user to escalate a program's privileges to that of the virus scanner.
Author:Donald Reid
File Size:1819
Last Modified:Jun 10 09:12:45 2004
MD5 Checksum:bc8d3150c3d1faa2fe9aec6822a56db4

 ///  File Name: symantecWireless.txt
Description:
The Symantec Gateway Security 360R fails to prohibit non-VPNed wireless connections when the directive to enforce tunnels is set.
Author:Dev Null
File Size:1220
Last Modified:Jun 10 09:04:27 2004
MD5 Checksum:7937a622ffde30aa6901ba4b643ae941

 ///  File Name: aspellOverflow.txt
Description:
Aspell is susceptible to a stack overflow when it makes use of a wordlist file that has an entry exceeding 256 bytes.
Author:shaun2k2 aka Shaun Colley
Homepage:http://www.nettwerked.co.uk
File Size:5568
Last Modified:Jun 10 08:58:31 2004
MD5 Checksum:9c966404c0f3b3642724ecafe8e07326

 ///  File Name: isakmpdAgain.txt
Description:
Unauthorized deletion of IPsec SAs is still possible using a delete payload piggybacked on an initiation of main mode with the latest version of isakmpd.
Author:Thomas Walpuski
File Size:2386
Last Modified:Jun 10 08:50:37 2004
MD5 Checksum:4d35d10802dfc221a5d6be5493aaa368