Section:  .. / 0403-advisories  /

Page 1 of 4
<< 1 2 3 4 >> Files 1 - 25 of 90
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: repredhat.txt
Description:
A local buffer overflow vulnerability exists in REP version 0.15.1 on RedHat Linux 7.3. Proof of concept exploitation included.
Homepage:http://www.blackangels.it
File Size:2517
Last Modified:May 1 18:09:19 2004
MD5 Checksum:39225a84cba3e870a2ffcdc5452210b4

 ///  File Name: msSharePointXSS.txt
Description:
Microsoft SharePoint Portal Server 2001 suffer from cross site scripting vulnerabilities.
Author:Ory Segal
Homepage:http://www.SanctumInc.com
File Size:1331
Related CVE(s):CAN-2004-0379
Last Modified:Apr 5 13:12:00 2004
MD5 Checksum:a45b4a69b109f9c83050e3b018d90d77

 ///  File Name: rogerwilco2.txt
Description:
RogerWilco versions 1.4.1.6 and below and RogerWilco Base Station versions 0.30a suffer from multiple bugs. From being crashed with a malformed UDP packet to spoofing 'voice' traffic when not even being connected to a channel, quite a few amusing problems are listed.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related Exploit:wilco.zip
File Size:10816
Last Modified:Mar 31 20:11:00 2004
MD5 Checksum:c415dccfdd1b912ce202b7e7b276f867

 ///  File Name: phpkit.txt
Description:
PHPKIT version 1.6.03 suffers from a cross site scripting vulnerability.
Author:Yanosz
File Size:792
Last Modified:Mar 30 20:40:00 2004
MD5 Checksum:ea9213f4c4ba3a9d332cc7099f954461

 ///  File Name: R7-0017.txt
Description:
Rapid7 Security Advisory - tcpdump versions 3.8.1 and below contain multiple flaws in the packet display functions for the ISAKMP protocol. Upon receiving specially crafted ISAKMP packets, tcpdump will try to read beyond the end of the packet capture buffer and crash.
Author:Rapid7 Security Advisories
Homepage:http://www.rapid7.com/advisories/R7-0017.html
File Size:4839
Related CVE(s):CAN-2004-0183, CAN-2004-0184
Last Modified:Mar 30 19:48:00 2004
MD5 Checksum:67e1c0e97a7b6127733398b41d86e52e

 ///  File Name: linbit.txt
Description:
SEC-CONSULT Security Advisory - Linbit Linbox is vulnerable to authentication circumvention on its administration portal, password disclosure for all existing users, and using the obtained passwords, any account can be logged into via SSH.
Author:Daniel FABIAN
Homepage:http://www.sec-consult.com
File Size:4982
Last Modified:Mar 30 18:06:00 2004
MD5 Checksum:7492df126274009cc647dd21fc84d3ed

 ///  File Name: MG-2004-01.txt
Description:
Hard coded login sequence values for Oracle SSO allow for easy man in the middle attacks.
Author:Guido van Rooij, Arjan de Vet
Homepage:http://www.madison-gurkha.com/advisories/MG-2004-01.txt
File Size:2253
Last Modified:Mar 30 17:58:00 2004
MD5 Checksum:87135b2bb648920a8b367396787a1281

 ///  File Name: mplayer02.txt
Description:
MPlayer Security Advisory #002 - A remotely exploitable buffer overflow vulnerability was found in MPlayer. A malicious host can craft a harmful HTTP header (Location:), and trick MPlayer into executing arbitrary code upon parsing that header. Versions affected: MPlayer 0.90pre series, MPlayer 0.90rc series, MPlayer 0.90, MPlayer 0.91, MPlayer 1.0pre1, MPlayer 1.0pre2, MPlayer 1.0pre3.
Author:Gabucino
File Size:1380
Last Modified:Mar 30 17:54:00 2004
MD5 Checksum:f77fd385a682cb32d1a7acbf64c10f22

 ///  File Name: clamVE.txt
Description:
Security comments regarding the way clamav sets up VirusEvent information and how it could be improved. Due to a lack of input sanitizing, the variable taken in on the command line could be used for malicious purposes when put to a system().
Author:l0om
Homepage:http://www.excluded.org
File Size:4908
Last Modified:Mar 30 12:34:00 2004
MD5 Checksum:34af715b4ea6dc16cfe3e385f041aeb2

 ///  File Name: FreeBSD-SA-04:06.ipv6.txt
Description:
FreeBSD Security Advisory FreeBSD-SA-04:06.ipv6 - Applications may manipulate the behavior of an IPv6 socket using the setsockopt(2) system call. This may allow a local attacker to read portions of kernel memory.
Author:Katsuhisa ABE, Colin Percival
Homepage:http://www.freebsd.org/security/
File Size:4053
Related CVE(s):CAN-2004-0370
Last Modified:Mar 29 17:46:00 2004
MD5 Checksum:b5aebf5d0593c20a8019ec6f67e94cbd

 ///  File Name: dsa-469.txt
Description:
Debian Security Advisory DSA 469-1 - Primoz Bratanic discovered a bug in libpam-psgl, a PAM module to authenticate using a PostgreSQL database. The library does not escape all user-supplied data that are sent to the database. An attacker could exploit this bug to insert SQL statements.
Author:Martin Schulze
Homepage:http://www.debian.org/security/
File Size:4860
Related CVE(s):CAN-2004-0366
Last Modified:Mar 29 15:44:00 2004
MD5 Checksum:e90b8688ebc10816a8e89622a4d44c52

 ///  File Name: RHSA-2004:134-01.txt
Description:
Red Hat Security Advisory RHSA-2004:134-01 - A bug was found in the processing of %-encoded characters in a URL in versions of Squid 2.5.STABLE4 and earlier. If a Squid configuration uses Access Control Lists (ACLs), a remote attacker could create URLs that would not be correctly tested against Squid's ACLs, potentially allowing clients to access prohibited URLs.
Homepage:http://www.redhat.com/
File Size:4393
Related CVE(s):CAN-2004-0189
Last Modified:Mar 29 02:11:00 2004
MD5 Checksum:4c18ad62669586588d02b6bf5eb9695d

 ///  File Name: webctCE41.txt
Description:
WebCT Campus Edition 4.1 suffers from cross site scripting vulnerabilities.
Author:Simon Boulet
File Size:2869
Last Modified:Mar 28 19:01:00 2004
MD5 Checksum:c59ceaf9802b6872126c55b2c8604a88

 ///  File Name: RSTACK-20040325.txt
Description:
Rstack Team Security Advisory RSTACK-20040325 - Nstxd has been found vulnerable to a denial of service attack due to a null-pointer-dereference.
Author:Rstack Team
Homepage:http://www.rstack.org/
File Size:2289
Last Modified:Mar 27 04:14:14 2004
MD5 Checksum:5e32679021aad2cac7230454ff587b51

 ///  File Name: bloggerXSS.txt
Description:
Blogger from Google has a cross site scripting flaw.
Author:Ferruh Mavituna
Homepage:http://ferruh.mavituna.com
File Size:2130
Last Modified:Mar 27 04:10:59 2004
MD5 Checksum:bf830c8c8036501f47cd47bd338e4912

 ///  File Name: bblog.txt
Description:
Bblog has a cross site scripting flaw.
Author:penfold
File Size:674
Last Modified:Mar 27 04:09:19 2004
MD5 Checksum:e46c65d1a3ad89719dbd988200b6efc7

 ///  File Name: freshmeatXSS.txt
Description:
Freshmeat.net is susceptible to a cross site scripting flaw.
Author:Steve Kemp
File Size:1554
Last Modified:Mar 27 03:58:45 2004
MD5 Checksum:8adc2e66da95b1f65b1d0cb562f21729

 ///  File Name: etherlords.txt
Description:
Etherlords I versions 1.07 and below and Etherlords II versions 1.03 and below suffer from a bug where reading of unallocated memory causes a crash.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related Exploit:ethboom.zip
File Size:2345
Last Modified:Mar 26 02:54:16 2004
MD5 Checksum:b981557285057dbc3946715d75f4e822

 ///  File Name: vz012004-esignal7.txt
Description:
VizibleSoft Security Advisory #2004/01 - eSignal versions 7.6 and 7.5 have a stack based buffer overflow in the WinSig.exe binary, allowing for remote code execution.
Author:insect
Homepage:http://viziblesoft.com/insect/advisories/vz012004-esignal7.txt
Related Exploit:vz-eSignal76.pl
File Size:4717
Last Modified:Mar 26 02:48:33 2004
MD5 Checksum:baf95f8e34ade62800fd0d0ef24b06fe

 ///  File Name: camelot.txt
Description:
Dark Age of Camelot from Mythic Entertainment has flaws in the login client that allow an attacker to read customer information via a man in the middle attack. All versions below 1.68 are affected.
Author:Todd Chapman
File Size:9535
Last Modified:Mar 25 01:30:00 2004
MD5 Checksum:59a7528b4f94f1ef9e183ec72a6d6804

 ///  File Name: picophone163.txt
Description:
PicoPhone versions 1.63 and below have a buffer overflow in their logging function that allows an attacker to take over the server.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related Exploit:picobof.zip
File Size:1524
Last Modified:Mar 24 17:17:00 2004
MD5 Checksum:c58c41988177769677bdbda6666df03f

 ///  File Name: R7-0018.isakmpd.txt
Description:
Rapid7 Security Advisory - OpenBSD isakmpd payload handling is subject to multiple denial of service vulnerabilities. Known vulnerable: OpenBSD 3.4 and earlier, OpenBSD-current as of March 17, 2004.
Author:Rapid7 Security Advisories
Homepage:http://www.rapid7.com/
File Size:5061
Related CVE(s):CAN-2004-0218, CAN-2004-0219, CAN-2004-0220, CAN-2004-0221, CAN-2004-0222
Last Modified:Mar 24 07:15:00 2004
MD5 Checksum:ff6add0baf9cf2fe0508ba814bc1c676

 ///  File Name: solaris_kernel_vfs.sxw.pdf
Description:
Immunity Security Advisory - A vulnerability lies in Solaris 2.6 through 10 that allows a local user to load kernel modules without being root due to a directory traversal problem in vfs_getvfssw().
Author:Sinan Eren.
Homepage:http://www.immunitysec.com
File Size:22557
Last Modified:Mar 24 07:12:00 2004
MD5 Checksum:e384712d8c329650378a979c1a34b004

 ///  File Name: terminator3.txt
Description:
Terminator 3: War of the Machines version 1.0 for Windows has a broadcast client buffer overflow that results in a game network denial of service.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related Exploit:t3cbof.zip
File Size:2486
Last Modified:Mar 24 06:40:00 2004
MD5 Checksum:1d8feacdcbdfff8ab28a2bd66d86d166

 ///  File Name: dtlogin.sxw.pdf
Description:
Immunity Security Advisory - A double-free weakness in the XDMCP parser of dtlogin (CDE) results in remote code execution against popular server operating systems, such as Solaris. This attack is performed over UDP port 177.
Author:Dave Aitel
Homepage:http://www.immunitysec.com
File Size:24986
Last Modified:Mar 24 05:24:00 2004
MD5 Checksum:01c14a6a98f0a677463029b74cc20f5c