Section:  .. / 0406-advisories  /

Page 5 of 6
<< 1 2 3 4 5 6 >> Files 100 - 125 of 129
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: sa11928.txt
Description:
Secunia Security Advisory - VeNoMouS has reported a vulnerability in php-exec-dir, which can be exploited by malicious users to bypass certain security restrictions.
Homepage:http://secunia.com/product/3612/
File Size:1817
Last Modified:Jun 25 13:38:00 2004
MD5 Checksum:6ad1a23b9f59682c89fb027ed2bfbaba

 ///  File Name: sa11941.txt
Description:
Secunia Security Advisory - Alan Fitton has discovered a vulnerability in giFT-FastTrack, allowing malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to an unspecified error, which can be exploited to crash the giFT daemon via a specially crafted signal. Version 0.8.6 and prior are reportedly affected.
Homepage:http://secunia.com/product/3616/
File Size:1691
Last Modified:Jun 25 14:55:00 2004
MD5 Checksum:e8f02f477651c78c7e3266cbe640d6d0

 ///  File Name: sa11944.txt
Description:
Secunia Security Advisory - Valerie Holfield has discovered a vulnerability in phpmyfamily, which can be exploited by malicious people to gain edit privileges. It is possible to be automatically logged in as user nobody when clicking to download a document and then leaving the page. This grants the person ability to add people, change information, upload and delete documents and images.
Homepage:http://secunia.com/product/3619/
File Size:1999
Last Modified:Jun 29 12:37:00 2004
MD5 Checksum:7a48b2c53f4f7d2095df499a86c435b1

 ///  File Name: sa11950.txt
Description:
A vulnerability in JUNOS can be exploited by transmitting specially-crafted IPv6 packets.
Homepage:http://secunia.com/product/3418/
File Size:2059
Related CVE(s):CAN-2004-0468
Last Modified:Jun 29 13:59:00 2004
MD5 Checksum:fd4b86d888b70777512552f554032c2f

 ///  File Name: snitzxss.txt
Description:
Sec-Tec Advisory - A cross site scripting vulnerability has been discovered in Snitz Forums 2000. Version 3.4.04 is affected.
Author:Pete Foster
Homepage:http://www.sec-tec.co.uk/vulnerability/snitzxss.html
File Size:2542
Last Modified:Jun 18 02:45:19 2004
MD5 Checksum:7012e9ae03857f86bff396165533b03b

 ///  File Name: snmpfile.txt
Description:
If any ucd-snmp version, 4.2.6 and below, is installed setuid root, a local attacker can overwrite any file using the -P and -l parameters.
Author:priestmaster
Homepage:http://priestmaster.org/
File Size:807
Last Modified:Jun 3 23:24:46 2004
MD5 Checksum:ecac51c8f2f51cfe49cc336b840c05a9

 ///  File Name: sns76.txt
Description:
Internet Explorer allows local users to cause a denial of service against the system when attempting to print a certain HTML page.
Author:Nobuo Miwa
Homepage:http://www.lac.co.jp/security/csl/intelligence/SNSadvisory_e/76_e.html
File Size:2820
Last Modified:Jun 25 11:53:00 2004
MD5 Checksum:6ea6a8000f952d6e811871803c2e170a

 ///  File Name: snsadv074.txt
Description:
Webmin version 1.140, a web-based system administration tool for Unix, has a vulnerability that allow users to gain read access to the configuration of a module without authentication.
Author:Keigo Yamazaki
File Size:1658
Last Modified:Jun 14 09:47:39 2004
MD5 Checksum:60b527ea62095c03c90abf72d9dadb76

 ///  File Name: spfp.html
Description:
Sygate Personal Firewall Pro version 5.x is susceptible to a denial of service attack by being crashed via unprivileged applications sending specially crafted messages to the ListView control in the GUI.
Author:Tan Chew Keong
Homepage:http://www.security.org.sg/vuln/spfp.html
File Size:6843
Last Modified:Jun 18 08:54:07 2004
MD5 Checksum:6db7060b0f91673eabfcc809e036974f

 ///  File Name: sqwebmailXSS.txt
Description:
Sqwebmail 4.0.4.20040524 is susceptible to a cross site scripting vulnerability.
Author:Luca Legato
File Size:2078
Last Modified:Jun 23 00:56:04 2004
MD5 Checksum:bed2413cb1cadb0226c9ca0b40f9fedf

 ///  File Name: SSRT3456.txt
Description:
A potential security vulnerability has been identified with HP-UX running ftp where the vulnerability could be exploited remotely to allow unauthorized access. Impacted versions: HP-UX B.11.00, B.11.11, B.11.22.
Homepage:http://www.hp.com/
File Size:7352
Last Modified:Jun 14 09:01:58 2004
MD5 Checksum:8a4b86d932e2a37b0f7cabc398cdd68f

 ///  File Name: SSRT3552.txt
Description:
A potential vulnerability has been identified in the HP-UX ARPA Transport which could be exploited by a local user to create a Denial of Service. Impacted versions: HP-UX B.11.00, B.11.04, B.11.11.
Homepage:http://www.hp.com/
File Size:6452
Last Modified:Jun 29 14:17:00 2004
MD5 Checksum:2722dc60aa6e99f8549197d80b437536

 ///  File Name: SSRT4741.txt
Description:
DCE for HP Tru64 UNIX is susceptible to a potential RPC buffer overrun attack that can result in a denial of service. Affected releases: All versions of DCE/DFS for Tru64 UNIX are vulnerable v4.1.4 (ifspec), v4.1.5, v4.2 and v4.3.
Homepage:http://www.hp.com/
File Size:6226
Last Modified:Jun 25 13:12:00 2004
MD5 Checksum:5105524b134383c9389d9305c83b7d38

 ///  File Name: SSRT4758.txt
Description:
A potential vulnerability has been identified with HP-UX running ObAM 5.0 with the WebAdmin capability enabled. This vulnerability could be exploited remotely to allow unauthorized access. Impacted version: HP-UX B.11.11 running ObAM 5.0.
Homepage:http://www.hp.com/
File Size:6662
Last Modified:Jun 29 14:02:00 2004
MD5 Checksum:9ed87a78b6cbedd00fdf61b116af9b32

 ///  File Name: swapctlNetBSD.txt
Description:
An integer handling error within the swapctl() system call of NetBSD 1.x can allow a local user the ability to cause a denial of service attack.
Author:Evgeny Demidov
File Size:813
Last Modified:Jun 14 10:51:14 2004
MD5 Checksum:ca2eeda9cebd911cf463836200b6d2cd

 ///  File Name: symantecWireless.txt
Description:
The Symantec Gateway Security 360R fails to prohibit non-VPNed wireless connections when the directive to enforce tunnels is set.
Author:Dev Null
File Size:1220
Last Modified:Jun 10 09:04:27 2004
MD5 Checksum:7937a622ffde30aa6901ba4b643ae941

 ///  File Name: TA04-163A.txt
Description:
Technical Cyber Security Alert TA04-163A - There is a cross-domain vulnerability in the way Microsoft Internet Explorer determines the security zone of a browser frame that is opened in one domain then redirected by a web server to a different domain.
Homepage:http://www.us-cert.gov/cas/techalerts/TA04-163A.html
File Size:5311
Related CVE(s):CAN-2004-0549
Last Modified:Jun 14 10:06:00 2004
MD5 Checksum:863aa8ed338738125c76110936385e7e

 ///  File Name: TA04-174A.txt
Description:
Technical Cyber Security Alert TA04-174A - Two vulnerabilities in the ISC DHCP allow a remote attacker to cause a denial of the DHCP service on a vulnerable system. It may be possible to exploit these vulnerabilities to execute arbitrary code on the system. Systems affected are ISC DHCP versions 3.0.1rc12 and 3.0.1rc13.
Homepage:http://www.us-cert.gov/cas/techalerts/TA04-174A.html
File Size:5627
Last Modified:Jun 23 01:37:13 2004
MD5 Checksum:38468dc7a5f7532d69739b603f55df3f

 ///  File Name: tocaracedriver120.txt
Description:
Remote denial of service attacks are possible against the server and connected clients of Race Driver versions 1.20 and below when a server receives a message packet with a length identifier of 0.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related Exploit:rdboom.zip"
File Size:2579
Last Modified:Jun 9 08:12:26 2004
MD5 Checksum:5ed51807d5919737956f867e6ee6c0d4

 ///  File Name: trendOfficeScan55.txt
Description:
Trend OfficeScan version 5.5 has a flaw that allows a malicious user to escalate a program's privileges to that of the virus scanner.
Author:Donald Reid
File Size:1819
Last Modified:Jun 10 09:12:45 2004
MD5 Checksum:bc8d3150c3d1faa2fe9aec6822a56db4

 ///  File Name: trippedUp.txt
Description:
Tripwire commercial versions equal to and below 2.4 and Tripwire open source versions equal to and below 2.3.1 are susceptible to a format string vulnerability an email report is generated. This vulnerability allows an attacker to execute arbitrary code with the rights of the user running the file check, which is typically root.
Author:Paul Herman
File Size:3159
Last Modified:Jun 3 19:08:03 2004
MD5 Checksum:29c0b4d25bca6aa6b518267348ca8c84

 ///  File Name: TSSA-2004-012.txt
Description:
A remote exploit has been discovered in the Apache 2.0.49 HTTP server which allows an attacker to cause the server to allocate increasing amounts of memory until system memory is exhausted or until process limits are reached.
Homepage:http://http.tinysofa.org/
File Size:3551
Last Modified:Jun 29 12:14:00 2004
MD5 Checksum:8b9a4bac6716b2602875a36b7005774a

 ///  File Name: unrealCodeExec.txt
Description:
The Unreal game engine has a flaw where a simple UDP packet with a long value can overwrite important memory zones and possibly allow for remote code execution. Vulnerable games include: DeusEx versions below and equal to 1.112fm, Devastation versions below and equal to 390, Mobile Forces versions below and equal to 20000, Nerf Arena Blast versions below and equal to 1.2, Postal 2 versions below and equal to 1337, Rune versions below and equal to 107, Tactical Ops versions below and equal to 3.4.0, TNN Pro Hunter, Unreal 1 versions below and equal to 226f, Unreal II XMP versions below and equal to 7710, Unreal Tournament versions below and equal to 451b, Unreal Tournament 2003 versions below and equal to 2225, Unreal Tournament 2004 versions below 3236, Wheel of Time versions below and equal to 333b, X-com Enforcer.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related Exploit:unsecure.zip"
File Size:3709
Last Modified:Jun 23 01:31:53 2004
MD5 Checksum:51dd71f79c8e10c31480c4545396b33b

 ///  File Name: vbulletin301.txt
Description:
A cross site scripting vulnerability exists in VBulletin.
Author:Cheng Peng Su
File Size:1701
Last Modified:Jun 25 12:44:00 2004
MD5 Checksum:9fe2bb2648a2053012169ec0f0b35823

 ///  File Name: VSA-2004-1.txt
Description:
VICE Security Advisory VSA-2004-1 - VICE versions 1.6 through 1.14 on all platforms are vulnerable to a format string vulnerability in the handling of the monitor memory dump command.
Author:Spiro Trikaliotis
Homepage:http://www.viceteam.org/
File Size:3415
Related CVE(s):CAN-2004-0453
Last Modified:Jun 18 02:15:11 2004
MD5 Checksum:fd8e8cba31cf3059f09585e8512232b9