Section:  .. / 0406-advisories  /

Page 2 of 6
<< 1 2 3 4 5 6 >> Files 25 - 50 of 129
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: sa11941.txt
Description:
Secunia Security Advisory - Alan Fitton has discovered a vulnerability in giFT-FastTrack, allowing malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to an unspecified error, which can be exploited to crash the giFT daemon via a specially crafted signal. Version 0.8.6 and prior are reportedly affected.
Homepage:http://secunia.com/product/3616/
File Size:1691
Last Modified:Jun 25 14:55:00 2004
MD5 Checksum:e8f02f477651c78c7e3266cbe640d6d0

 ///  File Name: 57587.html
Description:
A flaw in Kerberos password handling under Sun Solaris 9 allows for passwords to be logged in clear text on clients with services using pam_krb5 as an auth module.
Homepage:http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57587
File Size:10283
Last Modified:Jun 25 14:52:00 2004
MD5 Checksum:9cbfc28498aa0afd113d15af3bf8dcd4

 ///  File Name: zone-h-gnats.txt
Description:
A format string bug has been discovered in the Gnats package version 4.0 which could possibly be exploited to execute arbitrary commands.
Author:Khan Shirani
Homepage:http://www.zone-h.org/
File Size:1730
Last Modified:Jun 25 14:39:00 2004
MD5 Checksum:ed3a0943d7ef171187f6ce526e6e72e6

 ///  File Name: 57581.html
Description:
An unspecified vulnerability has been discovered in Sun StorEdge Enterprise Storage Manager, which can be exploited by malicious, local users to gain root privileges.
Homepage:http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57581
File Size:8878
Last Modified:Jun 25 14:38:00 2004
MD5 Checksum:0ff9d68c60768a5ca72ab9a624ab50ea

 ///  File Name: rlprd204.txt
Description:
Vulnerabilities in rlpr version 2.x include a format string error and boundary error in the msg() function that can lead to remote arbitrary code execution.
Author:jaguar
Homepage:http://www.felinemenace.org/
Related Exploit:rlprd.py.exploit"
File Size:1705
Last Modified:Jun 25 14:16:00 2004
MD5 Checksum:622552d78530d2f6da6a7bca0118a674

 ///  File Name: sa11928.txt
Description:
Secunia Security Advisory - VeNoMouS has reported a vulnerability in php-exec-dir, which can be exploited by malicious users to bypass certain security restrictions.
Homepage:http://secunia.com/product/3612/
File Size:1817
Last Modified:Jun 25 13:38:00 2004
MD5 Checksum:6ad1a23b9f59682c89fb027ed2bfbaba

 ///  File Name: zone-h-drcat.txt
Description:
Zone-h Security Advisory - Drcatd is susceptible to multiple local and remote buffer overflows.
Author:Khan Shirani
Homepage:http://www.zone-h.org
File Size:1891
Last Modified:Jun 25 13:33:00 2004
MD5 Checksum:8fb7ead33f30e6c160a15a3dfbe98254

 ///  File Name: SSRT4741.txt
Description:
DCE for HP Tru64 UNIX is susceptible to a potential RPC buffer overrun attack that can result in a denial of service. Affected releases: All versions of DCE/DFS for Tru64 UNIX are vulnerable v4.1.4 (ifspec), v4.1.5, v4.2 and v4.3.
Homepage:http://www.hp.com/
File Size:6226
Last Modified:Jun 25 13:12:00 2004
MD5 Checksum:5105524b134383c9389d9305c83b7d38

 ///  File Name: vbulletin301.txt
Description:
A cross site scripting vulnerability exists in VBulletin.
Author:Cheng Peng Su
File Size:1701
Last Modified:Jun 25 12:44:00 2004
MD5 Checksum:9fe2bb2648a2053012169ec0f0b35823

 ///  File Name: 06.23.04.txt
Description:
iDEFENSE Security Advisory 06.23.04: Remote exploitation of a parameter filtering vulnerability in IBM Corp.'s Lotus Notes application allows remote attackers to execute arbitrary code.
Homepage:http://www.idefense.com/
File Size:4443
Last Modified:Jun 25 12:29:00 2004
MD5 Checksum:a9fa891c5283563f433af1bf1b033ebf

 ///  File Name: lotus.xss.txt
Description:
IBM Lotus recognized the potential for a cross-site scripting vulnerability to exist under certain circumstances.
Homepage:http://www-1.ibm.com/support/docview.wss?rs=463&uid=swg21171253
File Size:612
Last Modified:Jun 25 12:26:00 2004
MD5 Checksum:3303bb3c7522a144a036dc684c7f5447

 ///  File Name: 57497.html
Description:
An error within the Basic Security Module (BSM) under Sun Solaris versions 7, 8, and 9 allows a malicious local attacker to cause a denial of service against the system.
Homepage:http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57497
File Size:9058
Last Modified:Jun 25 12:18:00 2004
MD5 Checksum:fd0d63ac0874ed48781baafa86521355

 ///  File Name: linux.5820.txt
Description:
There exists an integer overflow in the Broadcom 5820 Cryptonet driver. A user supplied value is used to size a dynamic buffer, and this buffer is subsequently filled with user supplied data. This allows for a local denial of service attack with possible code execution.
Author:sean
File Size:4043
Last Modified:Jun 25 12:03:00 2004
MD5 Checksum:6cbe3f856adde2daa4badebe27af44af

 ///  File Name: sns76.txt
Description:
Internet Explorer allows local users to cause a denial of service against the system when attempting to print a certain HTML page.
Author:Nobuo Miwa
Homepage:http://www.lac.co.jp/security/csl/intelligence/SNSadvisory_e/76_e.html
File Size:2820
Last Modified:Jun 25 11:53:00 2004
MD5 Checksum:6ea6a8000f952d6e811871803c2e170a

 ///  File Name: arbitroWeb.txt
Description:
ArbitroWeb suffers from a java injection flaw.
Author:Josh Gilmour
File Size:977
Last Modified:Jun 25 11:48:00 2004
MD5 Checksum:cdf204ceb995128f4061d52fd1d62652

 ///  File Name: arhontWireless.txt
Description:
A clear text account password is obtainable using SNMP on the BT Voyager 2000 Wireless ADSL router.
Author:Konstantin V. Gavrilenko
Homepage:http://www.arhont.com
File Size:2607
Last Modified:Jun 25 11:38:00 2004
MD5 Checksum:f5cddd8c6c87e246584a2c4e90391329

 ///  File Name: 11924.txt
Description:
Secunia Security Advisory 11924 - Martin Michlmayr has reported a vulnerability in cplay allowing malicious, local users to perform certain actions with escalated privileges. A temporary file is created insecurely in a predictable location, which can be exploited via symlink attacks to corrupt the content of arbitrary files with the privileges of a user invoking cplay. The vulnerability has been reported in version 1.49. Prior versions may also be affected.
Homepage:http://secunia.com/product/3603/
File Size:1723
Last Modified:Jun 25 11:18:00 2004
MD5 Checksum:d475393e7f0b2a0911812a9aa03ceaad

 ///  File Name: nCipher-10.txt
Description:
nCipher Security Advisory No. 10 - Pass phrases entered by means of the nCipher netHSM front panel, either using the built in thumbwheel or using a directly attached keyboard, are exposed in the netHSM system log. Under certain circumstances this information is also available to the remote filesystem machine.
Homepage:http://www.ncipher.com/support/advisories/
File Size:9112
Last Modified:Jun 23 02:00:46 2004
MD5 Checksum:993957a98dd6b1d0f2b779e9a29802b5

 ///  File Name: linux1394.txt
Description:
The Linux kernel IEEE 1394 aka Firewire driver suffers from integer overflows that can result in a local denial of service and possible code execution. Both the 2.4 and 2.6 series are affected.
Author:sean
File Size:3026
Last Modified:Jun 23 01:53:24 2004
MD5 Checksum:515e51b617c25cd5a08e6eacfe98b7f4

 ///  File Name: TA04-174A.txt
Description:
Technical Cyber Security Alert TA04-174A - Two vulnerabilities in the ISC DHCP allow a remote attacker to cause a denial of the DHCP service on a vulnerable system. It may be possible to exploit these vulnerabilities to execute arbitrary code on the system. Systems affected are ISC DHCP versions 3.0.1rc12 and 3.0.1rc13.
Homepage:http://www.us-cert.gov/cas/techalerts/TA04-174A.html
File Size:5627
Last Modified:Jun 23 01:37:13 2004
MD5 Checksum:38468dc7a5f7532d69739b603f55df3f

 ///  File Name: unrealCodeExec.txt
Description:
The Unreal game engine has a flaw where a simple UDP packet with a long value can overwrite important memory zones and possibly allow for remote code execution. Vulnerable games include: DeusEx versions below and equal to 1.112fm, Devastation versions below and equal to 390, Mobile Forces versions below and equal to 20000, Nerf Arena Blast versions below and equal to 1.2, Postal 2 versions below and equal to 1337, Rune versions below and equal to 107, Tactical Ops versions below and equal to 3.4.0, TNN Pro Hunter, Unreal 1 versions below and equal to 226f, Unreal II XMP versions below and equal to 7710, Unreal Tournament versions below and equal to 451b, Unreal Tournament 2003 versions below and equal to 2225, Unreal Tournament 2004 versions below 3236, Wheel of Time versions below and equal to 333b, X-com Enforcer.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related Exploit:unsecure.zip"
File Size:3709
Last Modified:Jun 23 01:31:53 2004
MD5 Checksum:51dd71f79c8e10c31480c4545396b33b

 ///  File Name: rsshFlaw.txt
Description:
rssh, the small shell whose purpose is to restrict users to using scp or sftp, has a bug that allows a user to gather information outside of a chrooted jail unintentionally. Affected versions are 2.0 through 2.1.x.
Author:Derek Martin
Homepage:http://www.pizzashack.org/
File Size:2971
Last Modified:Jun 23 01:18:55 2004
MD5 Checksum:897d2cb5dbfd8548e2d3419a56df3d1c

 ///  File Name: osticket.txt
Description:
A flaw in osTicket will allow a malicious attacker the ability to view files that are supposed to be protected.
Author:Guy Pearce
File Size:2471
Last Modified:Jun 23 01:16:53 2004
MD5 Checksum:d815c3f9325b66f8f1de32be46fa35b5

 ///  File Name: sqwebmailXSS.txt
Description:
Sqwebmail 4.0.4.20040524 is susceptible to a cross site scripting vulnerability.
Author:Luca Legato
File Size:2078
Last Modified:Jun 23 00:56:04 2004
MD5 Checksum:bed2413cb1cadb0226c9ca0b40f9fedf

 ///  File Name: ie6xss.txt
Description:
Information regarding proper exploitation of a cross site scripting flaw affecting Internet Explorer 6 SP1 running on Windows XP.
Author:liu die yu
File Size:1758
Last Modified:Jun 23 00:54:31 2004
MD5 Checksum:86a570a697441562d1433091fc6e6107