Section:  .. / 0410-advisories  /

Page 4 of 11
<< 1 2 3 4 5 6 7 8 9 10 11 >> Files 75 - 100 of 254
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: sa12896.txt
Description:
Secunia Security Advisory - HP has acknowledged a vulnerability in the Java Runtime Environment software for HP-UX, which can be exploited by untrusted applets to gain escalated privileges on a vulnerable system.
Homepage:http://secunia.com/advisories/12896/
File Size:1676
Last Modified:Oct 27 04:28:29 2004
MD5 Checksum:7e2cc6c9a869f035594eb833ca2fde5f

 ///  File Name: sa12895.txt
Description:
Secunia Security Advisory - HP has acknowledged a vulnerability in HP CIFS Server, which can be exploited by malicious users to access arbitrary files and directories.
Homepage:http://secunia.com/advisories/12895/
File Size:1656
Last Modified:Oct 27 04:27:56 2004
MD5 Checksum:3cefaf56e7b916d0df1cd6c37ee9da03

 ///  File Name: sa12887.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in Gaim, which potentially can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error within the handling of MSN SLP messages. This can be exploited to cause a buffer overflow by supplying a specially crafted sequence of MSN SLP messages.
Homepage:http://secunia.com/advisories/12887/
File Size:2097
Last Modified:Oct 27 04:25:24 2004
MD5 Checksum:c9ff511efbf2de9dc8baecbb8e43d8e7

 ///  File Name: saMultiple.txt
Description:
Secunia Research Advisory - Multiple browsers suffer from multiple vulnerabilities. It is possible for a inactive tab to spawn dialog boxes e.g. the JavaScript Prompt box or the Download dialog box, even if the user is browsing/viewing a completely different web site in another tab. It is also possible for an inactive tab to always gain focus on a form field in the inactive tab, even if the user is browsing/viewing a completely different web site in another tab.
Author:Jakob Balle
Homepage:http://secunia.com/
File Size:7032
Last Modified:Oct 27 04:23:13 2004
MD5 Checksum:5d9bcf2b56ac00a434ce9b989b602923

 ///  File Name: malware10192004.txt
Description:
Technical exercise demonstrating the enormously elaborate methods required to defeat the current security mechanisms in place in both Microsoft Windows XP SP2 and Internet Explorer 6.00 SP2 fully patched.
Author:http-equiv
Homepage:http://www.malware.com
File Size:4652
Last Modified:Oct 27 04:20:35 2004
MD5 Checksum:51b24b1f7ff67c137b10c010626f02a9

 ///  File Name: netscapewebmail_advisory.txt
Description:
Netscape.net Webmail is susceptible to a cross site scripting attack.
Author:Steven
Homepage:http://www.lovebug.org/
File Size:2644
Last Modified:Oct 27 04:18:51 2004
MD5 Checksum:80b7f34b2c05e4eb63aae8f232b64c25

 ///  File Name: aolwebmail_advisory.txt
Description:
AOL Webmail suffers from cross site scripting flaws.
Author:Steven
Homepage:http://www.lovebug.org/
File Size:2667
Last Modified:Oct 27 04:17:48 2004
MD5 Checksum:9f0bdcc9129d7889bdfad4e7dbb5d11b

 ///  File Name: vypresstone.txt
Description:
Due to a mishandling of malformed streams, Vypress Tonecast versions 1.3 and below suffer from a denial of service vulnerability.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related Exploit:toneboom.zip"
File Size:1471
Last Modified:Oct 27 04:11:40 2004
MD5 Checksum:e137800e571641ae693da865c06b78c9

 ///  File Name: googlePhish.txt
Description:
Google's custom websearch does not prevent javascript from being inserted into the url of the image, allowing malicious users to modify the content of the google page allowing in phishing attacks, or silently steal search terms/results/clicks or modify actual searches to always contain controlled results.
Author:Jim Ley
Homepage:http://jibbering.com/
File Size:1866
Last Modified:Oct 27 04:09:39 2004
MD5 Checksum:8198e08d8b7af0509965ff6ae8fd406e

 ///  File Name: lotusInject.txt
Description:
An attacker can bypass native Lotus Notes HTML encoding in a computed value by adding square brackets to the beginning and end of a field of the following types computed, computed for display, computed when composed or a computed text element, Injecting HTML and JavaScript as desired.
Author:Juan C Calderon
File Size:732
Last Modified:Oct 27 04:06:11 2004
MD5 Checksum:a530f3dbe467042b6de009436004101a

 ///  File Name: 85mod_include.adv.txt
Description:
The mod_include module in Apache 1.3.31 is susceptible to a buffer overflow that allows for arbitrary code execution.
Author:Crazy Einstein
Related Exploit:85mod_include.c"
File Size:3983
Last Modified:Oct 26 05:57:48 2004
MD5 Checksum:bf0ae517364c6d03a26888664b2407a6

 ///  File Name: sa12861.txt
Description:
Secunia Security Advisory - Zero X has discovered a vulnerability in Anaconda Foundation Directory, which can be exploited by malicious people to disclose sensitive information.
Homepage:http://secunia.com/advisories/12861/
File Size:2021
Last Modified:Oct 26 05:53:24 2004
MD5 Checksum:042675ddc178f05ab2f36fefd4cc4aa9

 ///  File Name: sa12882.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in cabextract, which potentially can be exploited to overwrite arbitrary files on a vulnerable system.
Homepage:http://secunia.com/advisories/12882/
File Size:1605
Last Modified:Oct 26 05:52:51 2004
MD5 Checksum:47364042e9ee2d7e4873a34f1ff4a8ea

 ///  File Name: sa12880.txt
Description:
Secunia Security Advisory - Some vulnerabilities with an unknown impact have been reported in PBLang 4.x.
Homepage:http://secunia.com/advisories/12880/
File Size:1502
Last Modified:Oct 26 05:51:58 2004
MD5 Checksum:fb3cb40dde306e4c4dc0bb31e923353c

 ///  File Name: sa12793.txt
Description:
Secunia Security Advisory - A weakness has been reported in Windows XP, which can be exploited to bypass certain rules in the Internet Connection Firewall (ICF). The problem is caused due to the firewall by default accepting incoming connections to ports listened on by the "sessmgr.exe" process.
Homepage:http://secunia.com/advisories/12793/
File Size:2525
Last Modified:Oct 26 05:51:03 2004
MD5 Checksum:9f689300b46c200ccc976fc4b44c5ead

 ///  File Name: 57657.html
Description:
Sun Security Advisory - A vulnerability has been reported in Sun Solaris, which can be exploited by malicious, local users to escalate their privileges. The vulnerability is caused by an unspecified problem when LDAP and RBAC (Role Based Access Control) is used together. This can be exploited to execute certain commands with root privileges.
Homepage:http://sunsolve.sun.com/search/document.do?assetkey=1-26-57657-1
File Size:7030
Last Modified:Oct 26 05:48:03 2004
MD5 Checksum:07cb81112061f53059c84f7f2032bab9

 ///  File Name: glsa-200410-16.txt
Description:
Gentoo Linux Security Advisory GLSA 200410-16 - The make_oidjoins_check script, part of the PostgreSQL package, is vulnerable to symlink attacks, potentially allowing a local user to overwrite arbitrary files with the rights of the user running the utility.
Homepage:http://security.gentoo.org/
File Size:3093
Last Modified:Oct 26 05:44:22 2004
MD5 Checksum:7851b07d4101292b0404879189f101b3

 ///  File Name: glsa-200410-15.txt
Description:
Gentoo Linux Security Advisory GLSA 200410-14 - Squid contains a vulnerability in the SNMP module which may lead to a denial of service.
Homepage:http://security.gentoo.org/
File Size:3107
Last Modified:Oct 26 05:38:40 2004
MD5 Checksum:9dbb71ffb3ce1be4e100d4fa1dba2072

 ///  File Name: 10.18.04.txt
Description:
iDEFENSE Security Advisory 10.18.04: Multiple Vendor Anti-Virus Software Detection Evasion Vulnerability. Multiple anti-virus vendors including McAfee, Computer Associates, Kaspersky, Sophos, Eset and RAV are affected. The problem specifically exists in the parsing of .zip archive headers. It is possible to modify the uncompressed size of archived files in both the local and global header without affecting functionality. An attacker can compress a malicious payload and evade detection by some anti-virus software by modifying the uncompressed size within the local and global headers to zero.
Homepage:http://www.idefense.com/application/poi/display?id=153
File Size:9344
Related CVE(s):CAN-2004-0934
Last Modified:Oct 26 05:28:25 2004
MD5 Checksum:5ea91b2e4983eda20599d2b692fa14ad

 ///  File Name: sa12855.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in Gnofract 4D, which potentially can be exploited by malicious people to compromise a user's system.
Homepage:http://secunia.com/advisories/12855/
File Size:1773
Last Modified:Oct 26 05:22:09 2004
MD5 Checksum:5faa2638e47a49cb03ae6913a3336bbe

 ///  File Name: sa12862.txt
Description:
Secunia Security Advisory - A security issue has been reported in ClientExec, which can be exploited by malicious people to gain knowledge of various system information.
Homepage:http://secunia.com/advisories/12862/
File Size:1570
Last Modified:Oct 26 05:21:36 2004
MD5 Checksum:91743f7388545654aad8bde8611eff31

 ///  File Name: sa12857.txt
Description:
Secunia Security Advisory - Doubles has discovered a vulnerability in Unzoo, which potentially can be exploited by malicious people to compromise a user's system.
Homepage:http://secunia.com/advisories/12857/
File Size:1743
Last Modified:Oct 26 05:20:54 2004
MD5 Checksum:e7ae8b34e35cd0ccc6725b1713eb6131

 ///  File Name: Ad20041009.txt
Description:
Exploitation of design vulnerabilities in various AntiVirus products could allow malicious code to evade detection.
Author:Sowhat
Homepage:http://secway.org/Advisory/Ad20041009.txt
File Size:1571
Last Modified:Oct 26 05:18:47 2004
MD5 Checksum:5e0c822a0a20c9355dff21c1a2247c8c

 ///  File Name: 3com3crwe754g72-a2.txt
Description:
The 3COM 3crwe754g72-a has a flaw with handling DHCP requests that allows an attacker to inject code into the administration interface.
Author:Cyrille Barthelemy
File Size:2306
Last Modified:Oct 26 05:17:50 2004
MD5 Checksum:a209fba5838b726d7dd665f09ae2d571

 ///  File Name: 3com3crwe754g72-a.txt
Description:
The 3COM 3crwe754g72-a products suffers from information disclosure, clear text information text storage, and bad authentication design.
Author:Cyrille Barthelemy
File Size:2752
Last Modified:Oct 26 05:15:40 2004
MD5 Checksum:965807fae934ba693c72a223294ab2a7