Section:  .. / 0402-advisories  /

Page 1 of 5
<< 1 2 3 4 5 >> Files 1 - 25 of 107
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: redfaction120.txt
Description:
Red Faction versions 1.20 and below for Windows and MacOS is susceptible to a buffer overflow client-side.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
File Size:2145
Last Modified:Mar 1 20:49:00 2004
MD5 Checksum:142a5eeea2b52b07f705d67926670026

 ///  File Name: phpBBXSS.txt
Description:
phpBB's ViewTopic.php script is vulnerable to a cross site scripting attack.
Author:Cheng Peng Su
File Size:1570
Last Modified:Feb 29 22:11:00 2004
MD5 Checksum:cf7d999c135a18776b6c789e7da3f45c

 ///  File Name: wftpdBO.txt
Description:
WFTPD server versions 3.1 through 3.21 and Pro server versions 3.2x have a stack based buffer overflow vulnerability that a remote attacker can exploit to execute arbitrary code. The daemon runs with SYSTEM privileges under Pro server releases and it runs under the user ID that spawn the process under regular server releases.
Author:axl
File Size:2583
Last Modified:Feb 29 02:12:00 2004
MD5 Checksum:f4963b824c10d98644f5bf9c6890e366

 ///  File Name: wftpdDoS.txt
Description:
WFTPD Pro Server 3.21 Release 1 allows a remote attacker to allocate arbitrary amounts of memory and force the WFTPD server process to use 100% of the CPU. Another DoS vulnerability allows an attacker to send a special string to crash WFTPD.
Author:axl
File Size:3902
Last Modified:Feb 28 23:06:00 2004
MD5 Checksum:26a388a0b241c32f35cda21cd047a30d

 ///  File Name: lansuite.txt
Description:
Lan Suite Web Mail version 602Pro running server WEB602/1.04 has multiple vulnerabilities that include path disclosure, cross site scripting problems, and directory listings.
Author:Rafel Ivgi aka The-Insider
Homepage:http://theinsider.deep-ice.com
File Size:2599
Last Modified:Feb 28 20:23:00 2004
MD5 Checksum:f1485a401a2a427f6e16b82c0140d653

 ///  File Name: innomedia.txt
Description:
The InnoMedia VideoPhone version au75200xvi04010x on the Windows platform is susceptible to an authorization bypass when attempting to via a file as a folder. The underlying webserver is GoAhead-Webs.
Author:Rafel Ivgi aka The-Insider
Homepage:http://theinsider.deep-ice.com
File Size:2311
Last Modified:Feb 28 20:17:00 2004
MD5 Checksum:9bc0a3993865e43e93e00e3419d29c32

 ///  File Name: FreeBSD-SA-04:03.jail.txt
Description:
FreeBSD Security Advisory FreeBSD-SA-04:03.jail - A vulnerability has been found where jailed processes can attach to other jails. A programming error has been found in the jail_attach(2) system call which affects the way that system call verifies the privilege level of the calling process. Instead of failing immediately if the calling process was already jailed, the jail_attach(2) system call would fail only after changing the calling process's root directory.
Homepage:http://www.freebsd.org/security/
File Size:3735
Last Modified:Feb 27 23:37:00 2004
MD5 Checksum:d2dd9443b680de4094398f1affe91b88

 ///  File Name: MacOSXAFP.txt
Description:
Paper discussing how the the standard Apple Filing Protocol (AFP) does not use encryption to protect transfered data. Login credentials may be sent in cleartext or protected with one of several different hashed exchanges or Kerberos. There does not appear to have been any serious third-party security review of Apple's client or server implementations.
Author:Chris Adams
File Size:7290
Last Modified:Feb 27 23:33:00 2004
MD5 Checksum:8bdd1487d6b85c881f615d77e4101b7b

 ///  File Name: symantecGS20.txt
Description:
A cross site scripting vulnerability exists in Symantec Gateway Security's management service which could allow an attacker to hijack a management session to the device. Version affected is 2.0.
Author:Brian Soby
File Size:2912
Last Modified:Feb 27 22:20:00 2004
MD5 Checksum:0826658d6b7788362f852a9bb21b8433

 ///  File Name: 02.27.04b.txt
Description:
iDEFENSE Security Advisory 02.27.04b: Exploitation of an access validation error within Microsoft Internet Explorer web browsers allows remote attackers to bypass the restrictions imposed on cross frame scripting.
Homepage:http://www.idefense.com/
File Size:6270
Last Modified:Feb 27 21:44:00 2004
MD5 Checksum:4565b422c422c95fb8d8635bcb8843f7

 ///  File Name: 02.27.04a.txt
Description:
iDEFENSE Security Advisory 02.27.04a: Exploitation of a buffer overflow vulnerability within a parameter parsing routine of WinZip Computing Inc.'s WinZip Archive Utility for Windows allows remote attackers to execute arbitrary code. Versions below 9.0 affected.
Homepage:http://www.idefense.com/
File Size:3219
Last Modified:Feb 27 21:18:00 2004
MD5 Checksum:fc0beb52f438bd4dd8ec85fcf77ea1a1

 ///  File Name: calife284.txt
Description:
Calife versions 2.8.4c and 2.8.5 has a heap memory corruption vulnerability which can lead to local privilege escalation.
Author:Leon Juranic aka DownBload
File Size:2478
Last Modified:Feb 27 18:19:00 2004
MD5 Checksum:6030b170dd39d3b94fd5f3a5363a792d

 ///  File Name: eEye.realsecure.txt
Description:
eEye Security Advisory - eEye Digital Security has discovered a critical vulnerability in both RealSecure and BlackICE. The vulnerability allows a remote attacker to reliably overwrite heap memory with user-controlled data and execute arbitrary code within the SYSTEM context. This attack will succeed with BlackICE using its most paranoid settings.
Author:eEye Digital Security
Homepage:http://www.eEye.com
File Size:4152
Last Modified:Feb 27 03:34:00 2004
MD5 Checksum:cf58862e37b168562457080264c01a9d

 ///  File Name: servU.MDTM.txt
Description:
Serv-U MDTM versions 5.0.0.4 and below suffer from a command buffer overflow.
Author:bkbll
Homepage:http://www.cnhonker.com
File Size:1295
Last Modified:Feb 26 20:38:00 2004
MD5 Checksum:4daa465d2501788fda0d70d16a91407b

 ///  File Name: domadv.txt
Description:
Dell's OpenManage Web Server versions 3.7.0 and below vulnerable to pre-authentication heap-based buffer overflows. The vendor was notified but Dell's security contact was on vacation. Support was also contacted but believed the issue was related to the hard drive being full.
Author:wirepair
File Size:7984
Last Modified:Feb 26 20:34:00 2004
MD5 Checksum:866c13ef2b1fd0ccb493d27b84a5a0c2

 ///  File Name: freechat111a.txt
Description:
FreeChat version 1.1.1a has problems parsing certain strings resulting in a denial of service.
Author:Donato Ferrante
Homepage:http://www.autistici.org/fdonato
File Size:1432
Last Modified:Feb 25 21:01:00 2004
MD5 Checksum:c03ec67f5051430b8705f4b618675070

 ///  File Name: sandblad13.txt
Description:
Using the mozilla browser, while linking to a new page it is still possible to interact with the old page before the new page has been successfully loaded. Any javascript events fired will be invoked in the context of the new page, making cross site scripting possible if the pages belong to different domains.
Author:Andreas Sandblad
File Size:2345
Last Modified:Feb 25 19:37:00 2004
MD5 Checksum:0182fb09a637cc8e469d1eb51bc5fbd4

 ///  File Name: jgs010.txt
Description:
jgs version 0.1.0 on the win32 platform is vulnerable to a cross site scripting attack.
Author:Rafel Ivgi aka The-Insider
Homepage:http://theinsider.deep-ice.com
File Size:2448
Last Modified:Feb 25 18:18:00 2004
MD5 Checksum:da1b5872e4f4db6887707d7f2ed04ff8

 ///  File Name: GamespySDK.txt
Description:
The Gamespy SDK used for online cd-keys validation in third party code has various vulnerabilities. Game servers getting crashed and privacy problems persist. Gamespy themselves sent the author a cease and desist due to his research.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
File Size:16589
Last Modified:Feb 24 23:19:00 2004
MD5 Checksum:2329acac06ac4148eabd9dd778fd046c

 ///  File Name: ghostrecon.txt
Description:
The Ghost Recon engine versions 1.4 and below along with some other games developed by Redstorm are vulnerable to a remote crash.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
File Size:2267
Last Modified:Feb 24 23:17:00 2004
MD5 Checksum:22c10d2cb22a420e9ad7f8ef47678b3d

 ///  File Name: haegemonia.txt
Description:
Haegemonia versions 1.07 and below have a remote vulnerability where the reading of unallocated memory causes a crash.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
File Size:1649
Last Modified:Feb 24 22:23:00 2004
MD5 Checksum:0bb1907284719014c8060b11d83e4222

 ///  File Name: trillian.txt
Description:
Trillian versions 0.71 through 0.74 and Pro versions 1.0 through 2.01 have two vulnerabilities that allow for remote compromise.
Author:Stefan Esser
Homepage:http://security.e-matters.de/advisories/022004.html
File Size:5688
Last Modified:Feb 24 22:15:00 2004
MD5 Checksum:85754744a2d93a8e680aa1b45f9814bd

 ///  File Name: gigabytebb.txt
Description:
Gigabyte Broadband Router version Gn-B46B with firmware version 1.003.00 is vulnerable to a remote authorization bypass.
Author:Rafel Ivgi aka The-Insider
Homepage:http://theinsider.deep-ice.com
File Size:16451
Last Modified:Feb 24 21:36:00 2004
MD5 Checksum:898f3ace7d6904b65998fc22270a0e18

 ///  File Name: 02.23.04.txt
Description:
iDEFENSE Security Advisory 02.23.04: Exploitation of a flaw in Apple Computer Inc's Darwin Streaming Server allows unauthenticated remote attackers to prevent legitimate usage.
Homepage:http://www.idefense.com/
File Size:2039
Last Modified:Feb 24 18:30:00 2004
MD5 Checksum:eff45c2697024a5ec7a5cee6b6c6277b

 ///  File Name: a022304-1.txt
Description:
Atstake Security Advisory A022304-1 - The ppp daemon that comes installed by default in Mac OS X is vulnerable to a format string vulnerability. It is possible to read arbitrary data out of pppd's process. Under certain circumstances, it is also possible to 'steal' PAP/CHAP authentication credentials.
Author:Dave G.
Homepage:http://www.atstake.com/research/advisories/2004/a022304-1.txt
File Size:3139
Related CVE(s):CAN-2004-0165
Last Modified:Feb 24 03:56:00 2004
MD5 Checksum:d6b94cbbeede03a57a36522e07c9415f