Section:  .. / 0412-advisories  /

Page 4 of 11
<< 1 2 3 4 5 6 7 8 9 10 11 >> Files 75 - 100 of 253
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: faronics.txt
Description:
Faronics FreezeX version 1.00.100.0666 is susceptible to a denial of service attack.
Author:Xenzeo
File Size:1054
Last Modified:Dec 31 10:26:25 2004
MD5 Checksum:fff88b432668ebd6198206ac77eadf80

 ///  File Name: FreeBSD-SA-04:17.procfs.txt
Description:
FreeBSD Security Advisory FreeBSD-SA-04:17.procfs - The implementation of the /proc/curproc/cmdline pseudofile in the procfs(5) file system on FreeBSD 4.x and 5.x, and of the /proc/self/cmdline pseudofile in the linprocfs(5) file system on FreeBSD 5.x reads a process' argument vector from the process address space. During this operation, a pointer was dereferenced directly without the necessary validation steps being performed.
Homepage:http://www.freebsd.org/security/
File Size:5923
Related CVE(s):CAN-2004-1066
Last Modified:Dec 12 01:07:55 2004
MD5 Checksum:4d1821253f3b6964d3307c7b0dcd122d

 ///  File Name: fsecureDisclose.txt
Description:
F-Secure Policy Manager has a path disclosure vulnerability when being fed a malformed URL.
Author:Oliver Karow
File Size:1241
Last Modified:Dec 12 20:21:13 2004
MD5 Checksum:ce5b0e8a5800752c7291b90b74082baa

 ///  File Name: gadugadu.txt
Description:
Gadu-Gadu is susceptible to script execution in the local zone and remote denial of service flaws.
Author:Blazej Miga, Jaroslaw Sajko
File Size:1731
Last Modified:Dec 30 10:20:55 2004
MD5 Checksum:328eed129e3efbbd707100fbfdfafb1d

 ///  File Name: gameport.txt
Description:
GamePort versions 3.0, 3.1, and 4.0 suffer from multiple vulnerabilities including reversal of the admin password.
Author:AmoXi and Dr. VaXin
File Size:3617
Last Modified:Dec 30 10:31:11 2004
MD5 Checksum:b7560aef6bf4b2b4549bdb18a6a44329

 ///  File Name: gdesktop-tr-dec04.pdf
Description:
Technical paper detailing the recent flaw discovered in the Google Desktop personal search engine that would allow a third party to read snippets of files.
Author:Seth Nielson, Seth J. Fogarty, Dan S. Wallach
Homepage:http://seclab.cs.rice.edu/
File Size:122713
Last Modified:Dec 31 19:48:31 2004
MD5 Checksum:05d876e668a698d439086eef7611b46d

 ///  File Name: gg-adv.txt
Description:
Several vulnerabilities were discovered ranging from heap, stack, and integer overflows and directory traversals in the Gadu-Gadu instant messenger tool.
Author:Blazej Miga, Jaroslaw Sajko
Homepage:http://www.man.poznan.pl/~security/gg-adv.txt
File Size:5504
Last Modified:Dec 30 07:33:52 2004
MD5 Checksum:02da5334c8f29eb0e1fab878a56517ad

 ///  File Name: gg-dos.txt
Description:
It is possible to remotely conduct a denial of service attack on a Gadu-Gadu client by sending special crafted messages several times. All versions up to 6.1 build 156 are affected.
Author:Maciej Soltysiak
Homepage:http://www.soltysiak.com/gg-dos.txt
File Size:1961
Last Modified:Dec 31 10:23:38 2004
MD5 Checksum:cc5a640ddefec0d352ed82a14b815912

 ///  File Name: glsa-200412-02.txt
Description:
Gentoo Linux Security Advisory GLSA 200412-02 - PDFlib is vulnerable to multiple overflows, which can potentially lead to the execution of arbitrary code.
Homepage:http://security.gentoo.org/
File Size:3062
Last Modified:Dec 12 08:41:38 2004
MD5 Checksum:99a75ce8795d3d924b358ecc83eded7d

 ///  File Name: glsa-200412-03.txt
Description:
Gentoo Linux Security Advisory GLSA 200412-03 - Multiple overflows have been found in the imlib library image decoding routines, potentially allowing execution of arbitrary code.
Homepage:http://security.gentoo.org/
File Size:2895
Last Modified:Dec 12 19:07:20 2004
MD5 Checksum:f5ff410a33e410a7fb43bfcbcff80cab

 ///  File Name: glsa-200412-04.txt
Description:
Gentoo Linux Security Advisory GLSA 200412-04 - Some Perl modules create temporary files in world-writable directories with predictable names. A local attacker could create symbolic links in the temporary files directory, pointing to a valid file somewhere on the filesystem. When a Perl script is executed, this would result in the file being overwritten with the rights of the user running the utility, which could be the root user.
Homepage:http://security.gentoo.org/
File Size:2905
Last Modified:Dec 12 19:28:02 2004
MD5 Checksum:fd675b49cf33c11f19265ba93234583d

 ///  File Name: glsa-200412-05.txt
Description:
Gentoo Linux Security Advisory GLSA 200412-05 - mirrorselect is vulnerable to symlink attacks, potentially allowing a local user to overwrite arbitrary files.
Homepage:http://security.gentoo.org/
File Size:2581
Last Modified:Dec 12 19:35:18 2004
MD5 Checksum:45104d9f128007d23b594638cf29aa6c

 ///  File Name: glsa-200412-06.txt
Description:
Gentoo Linux Security Advisory GLSA 200412-06 - PHProjekt contains a vulnerability in the setup procedure allowing remote users without admin rights to change the configuration.
Homepage:http://security.gentoo.org/
File Size:2638
Last Modified:Dec 12 20:44:16 2004
MD5 Checksum:05bcfb024fd293b46c915d3d9d0002e9

 ///  File Name: glsa-200412-07.txt
Description:
Gentoo Linux Security Advisory GLSA 200412-07 - The code for parsing ELF headers in file contains a flaw which may allow an attacker to execute arbitrary code.
Homepage:http://security.gentoo.org/
File Size:2814
Last Modified:Dec 30 07:49:49 2004
MD5 Checksum:93e13bc7b37065c6ca354d3173195165

 ///  File Name: glsa-200412-08.txt
Description:
Gentoo Linux Security Advisory GLSA 200412-08 - Multiple vulnerabilities have been discovered in nfs-utils that could lead to a Denial of Service, or the execution of arbitrary code.
Homepage:http://security.gentoo.org/
File Size:2810
Last Modified:Dec 30 07:54:07 2004
MD5 Checksum:cf1cc1e57fadfb2253dc758ee6a465e1

 ///  File Name: glsa-200412-09.txt
Description:
Gentoo Linux Security Advisory GLSA 200412-09 - ncpfs is vulnerable to a buffer overflow that could lead to local execution of arbitrary code with elevated privileges.
Homepage:http://security.gentoo.org/
File Size:2811
Last Modified:Dec 30 09:00:31 2004
MD5 Checksum:89659cc5b5b273adbe87d0bbcd3df49a

 ///  File Name: glsa-200412-10.txt
Description:
Gentoo Linux Security Advisory GLSA 200412-10 - Several vulnerabilities related to the use of options in modelines have been found and fixed in Vim. They could potentially result in a local user escalating privileges.
Homepage:http://security.gentoo.org/
File Size:3362
Last Modified:Dec 30 09:12:28 2004
MD5 Checksum:c302c065ce3ced1c4c71f15c8aa2ff5e

 ///  File Name: glsa-200412-17.txt
Description:
Gentoo Linux Security Advisory GLSA 200412-17 - kfax contains several buffer overflows potentially leading to execution of arbitrary code.
Homepage:http://security.gentoo.org/
File Size:3401
Last Modified:Dec 30 11:19:38 2004
MD5 Checksum:1357c3db8a9338a2b1dd11b088f41a12

 ///  File Name: glsa-200412-21.txt
Description:
Gentoo Linux Security Advisory GLSA 200412-21 - Multiple overflow vulnerabilities have been found in MPlayer, potentially resulting in remote executing of arbitrary code.
Homepage:http://security.gentoo.org/
File Size:3047
Last Modified:Dec 31 10:16:45 2004
MD5 Checksum:bb53a2a583faa6b0bf1d4d967318f03f

 ///  File Name: glsa-200412-22.txt
Description:
Gentoo Linux Security Advisory GLSA 200412-22 - mpg123 is vulnerable to a buffer overflow that allows an attacker to execute arbitrary code through the use of a malicious playlist.
Homepage:http://security.gentoo.org/
File Size:3235
Last Modified:Dec 31 19:50:40 2004
MD5 Checksum:bd9cf87c49885b93b53d8d718c2b3f20

 ///  File Name: glsa-200412-24.txt
Description:
Gentoo Linux Security Advisory GLSA 200412-24 - New integer overflows were discovered in Xpdf, potentially resulting in the execution of arbitrary code. GPdf includes Xpdf code and therefore is vulnerable to the same issues.
Homepage:http://security.gentoo.org/
File Size:3164
Last Modified:Jan 2 21:26:39 2005
MD5 Checksum:1d3121a5369875b3b2f17b0844cdf0cb

 ///  File Name: glsa-200412-27.txt
Description:
Gentoo Linux Security Advisory GLSA 200412-27 - cYon discovered that the authform.inc.php script allows a remote user to define the global variable path_pre.
Homepage:http://security.gentoo.org/
File Size:3199
Last Modified:Jan 2 21:27:23 2005
MD5 Checksum:5c78c8821c527d78708884dba7ffab40

 ///  File Name: googleSegFault.txt
Description:
Amusing tidbit showing Google segfaulting.
Author:Przemyslaw Frasunek
File Size:458
Last Modified:Dec 31 20:34:27 2004
MD5 Checksum:a266eb1e1ba9d8b983438ccfe0843248

 ///  File Name: goregsbof.zip
Description:
Gore proof of concept exploit that makes use of a buffer overflow in the Gamespy cd-key validation SDK toolkit.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related File:la-gamespy.txt
File Size:15708
Last Modified:Dec 12 21:02:31 2004
MD5 Checksum:29998dc5ebf4dbf3d7f3672daafe3e2e

 ///  File Name: greed.txt
Description:
An input validation error that allows for arbitrary command execution and a buffer overflow exist in Greed 0.81p.
Author:Manigandan Radhakrishnan
File Size:2460
Last Modified:Dec 30 21:07:24 2004
MD5 Checksum:932b28c64ce93483e4d0ffb7d20e2b73