Section:  .. / 0401-advisories  /

Page 3 of 3
<< 1 2 3 >> Files 50 - 63 of 63
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: SRT2004-01-17-0227.txt
Description:
Secure Network Operations Advisory SRT2004-01-17-0227 - The BlackICE PC Protection firewall/IDS versions 3.6.cbz and below allows local users to gain SYSTEM privileges.
Author:KF
Homepage:http://www.secnetops.com
File Size:13388
Last Modified:Jan 28 06:36:00 2004
MD5 Checksum:3022d657274181d378344e8cf2e4f6d8

 ///  File Name: SRT2004-01-17-0425.txt
Description:
Secure Network Operations Advisory SRT2004-01-17-0425 - Ultr@VNC, the client/server software that allows you to remotely control a computer over any TCP/IP connection, has a faulty ShellExecute() statement that allows a local attacker to gain SYSTEM access.
Author:KF
Homepage:http://www.secnetops.com
File Size:5167
Last Modified:Jan 21 08:41:00 2004
MD5 Checksum:b364ba749d45ee9d44afa9249bed99fa

 ///  File Name: SRT2004-01-17-0628.txt
Description:
Secure Network Operations Advisory SRT2004-01-17-0628 - Outpost Firewall versions 1.0 and 2.0 run with SYSTEM access, allowing a local user to escalate privileges.
Author:KF
Homepage:http://www.secnetops.com
File Size:6292
Last Modified:Jan 17 23:04:00 2004
MD5 Checksum:11506f22a93ba377d2c990ff8f4ff666

 ///  File Name: suse90symlinks.txt
Description:
Various init related script in SuSE 9.0 are susceptible to symlink attacks.
Author:l0om
File Size:1636
Last Modified:Jan 20 23:48:00 2004
MD5 Checksum:b0a771d87e4879f9b01efe708f43ed7e

 ///  File Name: switchoff.txt
Description:
Switch Off versions 2.3 and below suffer from a denial of service vulnerability and a stack-based buffer overflow in the message parameter of the application that may allow a remote attacker the ability to gain SYSTEM privileges.
Author:Peter Winter-Smith
Homepage:http://www.elitehaven.net/switchoff.txt
File Size:7284
Last Modified:Jan 5 21:38:43 2004
MD5 Checksum:b340ea10c36da09785dfc2bd04752ff9

 ///  File Name: tbeBanner.txt
Description:
Native Solutions TBE Banner Engine is vulnerable to allowing an attacker to embed code to be executed by the server when text for a banner is added.
Author:Ed J. Aivazian
File Size:1454
Last Modified:Jan 22 12:55:00 2004
MD5 Checksum:2c12e6d41c2a540e173e7a4ed23d105b

 ///  File Name: vBulletinBBS.txt
Description:
vBulletin Bulletin Board derivatives contain a security bug that may lead to disclosure of private information via cross site scripting attacks. This vulnerability may also enable an attacker to transmit sensitive information such as encrypted passwords, user identification numbers, or forum passwords to another server.
Author:Darkwell
Homepage:http://www.gcf.de
File Size:3224
Last Modified:Jan 21 02:42:00 2004
MD5 Checksum:3f197c1d220e6abf13c6b6c7f362b095

 ///  File Name: webcamwatchdog.txt
Description:
Webcam Watchdog version 3.63 and below is vulnerable to a remotely exploitable stack based buffer overflow which can be triggered via an overly long HTTP GET request. Full detailed analysis of the vulnerability is given.
Author:Peter Winter-Smith
Homepage:http://www.elitehaven.net/webcamwatchdog.txt
Related Exploit:wcwdpoc.pl
File Size:5289
Last Modified:Jan 5 21:45:55 2004
MD5 Checksum:ab8534a516cb7f8c6cac460451b4de8a

 ///  File Name: WebcamXP.txt
Description:
WebcamXP versions 1.06.945 is susceptible to a XSS attack.
Author:Rafel Ivgi aka The-Insider
Homepage:http://theinsider.deep-ice.com
File Size:2036
Last Modified:Jan 21 08:44:00 2004
MD5 Checksum:d6b3ff49bac4d12f3e6b465bd776087c

 ///  File Name: webtrends.txt
Description:
WebTrends Reporting Center is administrated via a web interface that has a flaw which would allow a remote attacker to disclose the physical path to the application.
Author:Oliver Karow
Homepage:http://www.oliverkarow.de
File Size:1015
Last Modified:Jan 21 08:30:00 2004
MD5 Checksum:937ac402be71aa04081516bcd6708c22

 ///  File Name: windows.ftp.server.txt
Description:
The Windows FTP Server is a small free third party ftp server which contains a format string vulnerability in v1.6.1 and below.
Author:Peter Winter-Smith
Homepage:http://www.elitehaven.net
File Size:4169
Last Modified:Jan 9 09:36:35 2004
MD5 Checksum:279f460bb70cb08f92a777935f164bc4

 ///  File Name: yahooIM.txt
Description:
Yahoo Instant Messenger versions 5.6.0.1351 and below are susceptible to a buffer overflow when an attacker sends a specially crafted long filename to a user and that user attempts to download the file.
Author:Tri Huynh from SentryUnion
File Size:3910
Last Modified:Jan 8 19:31:04 2004
MD5 Checksum:4d70a9c8b0985d1d304a04938f269f4e

 ///  File Name: zyxel.txt
Description:
ZyXEL10 OF ZyWALL Series Router is susceptible to a cross site scripting attack.
Author:Rafel Ivgi
Homepage:http://theinsider.deep-ice.com
File Size:1773
Last Modified:Jan 8 01:39:00 2004
MD5 Checksum:5c5ca227d8ddb70e868e2657d9a16ed3