Section:  .. / 0409-advisories  /

Page 2 of 6
<< 1 2 3 4 5 6 >> Files 25 - 50 of 142
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: sa12570.txt
Description:
Secunia Security Advisory - Multiple unspecified vulnerabilities have been reported in FreeRADIUS, which can be exploited by malicious people to cause a DoS (Denial of Service).
Homepage:http://secunia.com/advisories/12570/
File Size:1561
Last Modified:Sep 21 10:34:50 2004
MD5 Checksum:3354715813179cc34931f1362c31f3ca

 ///  File Name: debian.telnetd.txt
Description:
The Netkit telnetd implementation shipped with Debian Linux appears to be lacking the AYT vulnerability patch. This exposes the platform to a remote root problem discovered by scut of TESO back in 2001.
Author:Michal Zalewski
File Size:2517
Related CVE(s):CVE-2001-0554
Last Modified:Sep 21 10:00:52 2004
MD5 Checksum:ccc9f50ed1c607fb9fe4e62e63e30ca0

 ///  File Name: MySQLguest.txt
Description:
MySQLguest from AllWebscripts is vulnerable to an HTML injection flaw that is exposed via the entry submitting form due to a lack of proper sanitization.
Author:BliZZard
File Size:933
Last Modified:Sep 21 09:51:51 2004
MD5 Checksum:3853a6b6493f34ff1de4a1cca83258ba

 ///  File Name: dns4me.txt
Description:
GulfTech Security Research - DNS4Me version 3.0.0.4 is susceptible to cross site scripting and denial of service vulnerabilities.
Homepage:http://www.gulftech.org/
File Size:2697
Last Modified:Sep 21 09:49:24 2004
MD5 Checksum:abbd3d6f5c7ff2a62c6bd6b5686f8ff3

 ///  File Name: airscanner.txt
Description:
Airscanner Mobile Security Advisory - Airscanner Corp. has been able to reverse engineer and post a fix for the CE.Dust virus.
Homepage:http://airscanner.com/
File Size:2473
Last Modified:Sep 21 09:41:28 2004
MD5 Checksum:bbfc491dd0e07f2c486464acd811b781

 ///  File Name: sudo168.txt
Description:
sudo version 1.6.8p1 has been released to address a security flaw in sudoedit that could give a malicious user read access to file that would normally be unreadable.
File Size:4931
Last Modified:Sep 21 06:03:18 2004
MD5 Checksum:bc14fbcb3df1464bd4114345306db2d3

 ///  File Name: TA04-261A.txt
Description:
Technical Cyber Security Alert TA04-261A - Several vulnerabilities exist in the Mozilla web browser and derived products, the most serious of which could allow a remote attacker to execute arbitrary code on an affected system.
Homepage:http://www.cert.org
File Size:5738
Last Modified:Sep 21 05:56:32 2004
MD5 Checksum:4a7629142708cf8d9b7489e720ee81b9

 ///  File Name: inkraError.txt
Description:
The Inkra 1504GX router suffers from a denial of service vulnerability.
Author:Felix Zhou
File Size:1527
Last Modified:Sep 21 05:55:14 2004
MD5 Checksum:b376d8d08e78acca4fef89a9553b72f9

 ///  File Name: boFreeBSDroot.txt
Description:
A buffer overflow has been discovered in the trap.c syscall() function of the FreeBSD source tree. However, you need to be root to exploit this.
Author:rookie
File Size:2383
Last Modified:Sep 21 05:16:42 2004
MD5 Checksum:3b5b7af45f45cac6e50e620b4e08f447

 ///  File Name: 09.16.04.txt
Description:
iDEFENSE Security Advisory 09.16.04 - Remote exploitation of a denial of service vulnerability in Ipswitch Inc.'s WhatsUp Gold versions 8.03 and below allows attackers to cause the application to crash.
Homepage:http://www.idefense.com/
File Size:2901
Related CVE(s):CAN-2004-0799
Last Modified:Sep 21 02:24:23 2004
MD5 Checksum:c8974ee6cf54a2c6438b2eb6a83d6c22

 ///  File Name: pigeon302.txt
Description:
A login field longer than 8180 characters sent to the port 3103 causes the immediate freeze of the Pigeon server versions 3.02.0143 and below.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related Exploit:pigeonx.zip"
File Size:1558
Last Modified:Sep 21 02:20:40 2004
MD5 Checksum:340e7c40f70dda0e97195936b258bd7c

 ///  File Name: snitz.txt
Description:
Snitz Forums 2000 v3.4.04 suffers from an HTTP response splitting vulnerability.
Author:Maestro
File Size:1010
Last Modified:Sep 21 02:18:50 2004
MD5 Checksum:543cf7d98fe29180cfd17d1102e92821

 ///  File Name: glsa-200409-19.txt
Description:
Gentoo Linux Security Advisory GLSA 200409-19 Several bugs exist in the Heimdal ftp daemon which could allow a remote attacker to gain root privileges. Versions below 0.6.3 are affected.
Homepage:http://security.gentoo.org/
File Size:2791
Last Modified:Sep 21 02:15:56 2004
MD5 Checksum:fd1c8450c3bbf5db99685ff6ebda4755

 ///  File Name: wp-04-0001.txt
Description:
Westpoint Security Advisory wp-04-0001 - Multiple browsers are susceptible to multiple cookie injection vulnerabilities. Tested: Internet Explorer 6.0 for Windows 2000 with all patches, Konqueror 3.1.4 for SuSE 9.0, Mozilla Firefox 0.9.2 for Windows 2000, Opera 7.51 for Windows 2000.
Author:Paul Johnston
Homepage:http://www.westpoint.ltd.uk
File Size:8038
Related CVE(s):CAN-2004-0746, CAN-2004-0866, CAN-2004-0867, CAN-2004-0869, CAN-2004-0870, CAN-2004-0871, CAN-2004-0872
Last Modified:Sep 21 02:12:17 2004
MD5 Checksum:481ea8dba3b55f3df0e1c1d645d91543

 ///  File Name: TA04-260A.txt
Description:
Technical Cyber Security Alert TA04-260A - Microsoft's Graphic Device Interface Plus (GDI+) contains a vulnerability in the processing of JPEG images. This vulnerability may allow attackers to remotely execute arbitrary code on the affected system. Exploitation may occur as the result of viewing a malicious web site, reading an HTML-rendered email message, or opening a crafted JPEG image in any vulnerable application. The privileges gained by a remote attacker depend on the software component being attacked.
Homepage:http://www.cert.org
File Size:8728
Related CVE(s):CAN-2004-0200
Last Modified:Sep 17 09:37:52 2004
MD5 Checksum:48fc2f0a102082a846aaac33df78ce20

 ///  File Name: sa12535.txt
Description:
Secunia Security Advisory - Multiple vulnerabilities have been reported in Netscape, which can be exploited by malicious people to conduct cross-site scripting attacks, access and modify sensitive information, and compromise a user's system.
Homepage:http://secunia.com/advisories/12535/
File Size:1849
Last Modified:Sep 17 09:34:30 2004
MD5 Checksum:8bbc61259ac43eacdddb6807b933cfc1

 ///  File Name: dsa-548.txt
Description:
Debian Security Advisory DSA 548-1 - A heap overflow error in imlib could be abused by an attacker to execute arbitrary code on the vicim's machine.
Author:Marcus Meissner
Homepage:http://www.debian.org/security/
File Size:11890
Related CVE(s):CAN-2004-0817
Last Modified:Sep 17 08:57:35 2004
MD5 Checksum:81695d972d74981c7b1ded330a177ed0

 ///  File Name: dsa-547.txt
Description:
Debian Security Advisory DSA 547-1 - SUSE has discovered several buffer overflows in the ImageMagick graphics library. An attacker could create a malicious image or video file in AVI, BMP, or DIB format that could crash the reading process. It might be possible that carefully crafted images could also allow to execute arbitrary code with the capabilities of the invoking process.
Author:Marcus Meissner
Homepage:http://www.debian.org/security/
File Size:14336
Related CVE(s):CAN-2004-0827
Last Modified:Sep 17 08:52:09 2004
MD5 Checksum:a91fa4ea1964c77a604058d074714c80

 ///  File Name: proboardsXSS.txt
Description:
ProBoards, based off of the YaBB Forums, is susceptible to a cross site scripting flaw.
Author:LJ Lemke
File Size:670
Last Modified:Sep 17 08:42:43 2004
MD5 Checksum:7c0cb377aa677b9975df0a281ac78b2e

 ///  File Name: 09.15.04.txt
Description:
iDEFENSE Security Advisory 09.15.04 - Remote exploitation of an input validation error in version 1.2 of GNU radiusd could allow a denial of service. The vulnerability specifically exists within the asn_decode_string() function defined in snmplib/asn1.c. When a very large unsigned number is supplied, it is possible that an integer overflow will occur in the bounds-checking code. The daemon will then attempt to reference unallocated memory, resulting in an access violation that causes the process to terminate.
Homepage:http://www.idefense.com/
File Size:3174
Related CVE(s):CAN-2004-0849
Last Modified:Sep 17 08:36:08 2004
MD5 Checksum:c955131260496f45cbcfeda92c30acfc

 ///  File Name: CESA-2004-005.txt
Description:
gtk+ version 2.4.4 has heap and stack-based overflows that can allow for the compromise of an account used to browse a malicious XPM file.
Author:Chris Evans
File Size:2048
Related CVE(s):CAN-2004-0782, CAN-2004-0783
Last Modified:Sep 17 08:01:55 2004
MD5 Checksum:85691971eba050ddab22aac301a8a167

 ///  File Name: CESA-2004-003.txt
Description:
libXpm versions below 6.8.1 suffer from multiple stack and integer overflows.
Author:Chris Evans
File Size:2737
Related CVE(s):CAN-2004-0782, CAN-2004-0783
Last Modified:Sep 17 07:58:49 2004
MD5 Checksum:aab6715e16b3b1a7e49bc762fd4978de

 ///  File Name: phpvulns501.txt
Description:
PHP versions above 4.1.2 and below or equal to 5.0.1 suffer from an exposure of arbitrary memory due to bad array parsing in php_variables.c.
Author:Stefano Di Paola
File Size:2273
Last Modified:Sep 17 07:52:58 2004
MD5 Checksum:cbe8b992f622c696f3423793c80d3622

 ///  File Name: SUSE-SA:2004:031.txt
Description:
SUSE Security Announcement - Alvaro Martinez Echevarria has found a remote Denial of Service condition within CUPS which allows remote users to make the cups server unresponsive. Additionally the SUSE Security Team has discovered a flaw in the foomatic-rip print filter which is commonly installed along with cups. It allows remote attackers, which are listed in the printing ACLs, to execute arbitrary commands as the printing user 'lp'.
Author:Alvaro Martinez, SUSE
Homepage:http://www.suse.com/
File Size:20937
Related CVE(s):CAN-2004-0801, CAN-2004-0558
Last Modified:Sep 17 07:48:09 2004
MD5 Checksum:bcdd3c34b76481d7c6e5dfb74adfe134

 ///  File Name: SA04-002.txt
Description:
SITIC Vulnerability Advisory - Apache 2.0.x suffers from a buffer overflow when expanding environment variables in configuration files such as .htaccess and httpd.conf. In a setup typical of ISPs, for instance, users are allowed to configure their own public_html directories with .htaccess files, leading to possible privilege escalation.
Homepage:http://www.sitic.se/
File Size:2980
Related CVE(s):CAN-2004-0747
Last Modified:Sep 17 07:44:54 2004
MD5 Checksum:71ef694e4ec5ffe97343a8f3e650e977