Section:  .. / 0402-advisories  /

Page 2 of 5
<< 1 2 3 4 5 >> Files 25 - 50 of 107
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: TYPSoftFTP.txt
Description:
TYPSoft FTP Server version 1.10 is susceptible to denial of service attacks via most standard FTP commands.
Author:intuit
Homepage:http://rootshells.tk/
File Size:2382
Last Modified:Feb 24 03:47:00 2004
MD5 Checksum:88e4a5ad8548ea1cf52387515f2704d0

 ///  File Name: Lam3rZ-032004.txt
Description:
Lam3rZ Security Advisory #3/2004 - Confirm versions 0.62 and below allow for forged email headers to execute arbitrary code as the uid the script runs under for procmail.
Author:Mariusz Woloszyn
File Size:1121
Last Modified:Feb 24 03:45:00 2004
MD5 Checksum:af6a46460589f4b374f74859982daf70

 ///  File Name: teamfactor.txt
Description:
Team Factor versions 1.25 and below are susceptible to a remote server crash. Both the Windows and Linux platforms are affected.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
File Size:2628
Last Modified:Feb 24 03:08:00 2004
MD5 Checksum:0b545354858f0f101198b7019e71e592

 ///  File Name: nCipher-09.txt
Description:
nCipher Security Advisory No. 9 - On certain models and firmware combinations, an attacker who is able to issue commands to an HSM may be able to access secret data stored in the module, including critical application keys.
Homepage:http://www.ncipher.com/support/advisories/
File Size:11635
Last Modified:Feb 23 23:33:00 2004
MD5 Checksum:31dac511eb4d01d3206db5729fcf4f51

 ///  File Name: ezboardXSS.txt
Description:
ezBoard versions 7.3u and below are vulnerable to a cross site scripting attack.
Author:Cheng Peng Su
File Size:1206
Last Modified:Feb 23 23:01:00 2004
MD5 Checksum:763a44b4e5b0218d30ded5e7097fe284

 ///  File Name: Lam3rZ-022004.txt
Description:
Lam3rZ Security Advisory #2/2004 - Load Sharing Facility, or LSF, versions 4.x through 6.x, has a remotely accessible vulnerability. The eauth binary can be exploited to send commands to LSF on behalf of a different user. In this way a user could submit and control jobs on behalf of other users.
Author:Tomasz Grabowski
File Size:3924
Last Modified:Feb 23 22:39:00 2004
MD5 Checksum:397d31ea3101cee97e37668955aaa325

 ///  File Name: Lam3rZ-012004.txt
Description:
Lam3rZ Security Advisory #1/2004 - Load Sharing Facility, or LSF, versions 4.x through 6.x, has a remotely accessible vulnerability. Specific input data strings can be constructed and can cause failure of the eauth binary, leading to the code execution under root privileges.
Author:Tomasz Grabowski
File Size:2569
Last Modified:Feb 23 22:38:00 2004
MD5 Checksum:b06f31ba8f0744c1eb238dbf50b9d56b

 ///  File Name: AvirtSoho43.txt
Description:
Avirt SOHO version 4.3 is susceptible to a remote buffer overflow via a large GET request passed on ports 1080 and 8080.
Author:Donato Ferrante
Homepage:http://www.autistici.org/fdonato
File Size:1715
Last Modified:Feb 23 18:56:00 2004
MD5 Checksum:57c79df112f55a7c439429392806c4fb

 ///  File Name: Avirt40.txt
Description:
Avirt Voice version 4.0 is susceptible to a remote buffer overflow via a large GET request passed on port 1080.
Author:Donato Ferrante
Homepage:http://www.autistici.org/fdonato
File Size:1600
Last Modified:Feb 23 18:08:00 2004
MD5 Checksum:77ac5e1c8c67c549d691a0def05b6633

 ///  File Name: XPimage.txt
Description:
The image preview code that explorer uses in Microsoft Windows XP allows a malformed .emf file to cause an exploitable heap overflow in shimgvw.dll.
Author:Jellytop
File Size:1877
Last Modified:Feb 21 22:23:00 2004
MD5 Checksum:4b985f074f5b2f320f249c8430ee15a9

 ///  File Name: ASNflashsky.txt
Description:
Detailed analysis on how the MS ASN library has stack overflows as well as integer overflows.
Author:flashsky
Homepage:http://www.xfocus.org
File Size:2486
Last Modified:Feb 21 22:08:00 2004
MD5 Checksum:d3b400ee379dfed18b1bc8f812e5899c

 ///  File Name: PSOProxy091.txt
Description:
The PSOProxy server version 0.91 has a buffer overflow vulnerability when handling large GET requests.
Author:Donato Ferrante
Homepage:http://www.autistici.org/fdonato
Related Exploit:PSOProxy.c
File Size:1524
Last Modified:Feb 20 19:06:00 2004
MD5 Checksum:ac59f17fd7642c57beb983616882e383

 ///  File Name: livejournalXSS.txt
Description:
LiveJournal is vulnerable to a cross site scripting vulnerability.
Author:Joshua Miller
File Size:1276
Last Modified:Feb 19 23:32:00 2004
MD5 Checksum:e9d41f06621b8ba3970b959288ecda53

 ///  File Name: eEye.Zonelabs.txt
Description:
eEye Security Advisory - Zonelabs Pro/Plus/Integrity versions 4.0 and above are susceptible to a stack based buffer overflow within vsmon.exe that can be exploited to execute code with the context of the SYSTEM account. The vulnerability exists within the component responsible for processing the RCPT TO command argument.
Author:eEye Digital Security
Homepage:http://www.eEye.com
File Size:2910
Last Modified:Feb 19 22:50:00 2004
MD5 Checksum:2cb205821b026ed7fc8c0f56c3bd9e22

 ///  File Name: cisco-sa-20040219-ONS.txt
Description:
Cisco Security Advisory 20040219 - Multiple vulnerabilities exist in the Cisco ONS 15327 Edge Optical Transport Platform, the Cisco ONS 15454 Optical Transport Platform, the Cisco ONS 15454 SDH Multiplexer Platform, and the Cisco ONS 15600 Multiservice Switching Platform. With one vulnerability, the TFTP service on UDP port 69 is enabled by default to allow both GET and PUT commands to be executed without any authentication. Another allows for an ACK Denial of Service (DoS) attack on TCP port 1080. Another involves telnet, where access to the underlying VxWorks operating system, by default, is restricted to Superusers only. Due to this vulnerability, a superuser whose account is locked out, disabled, or suspended is still able to login into the VxWorks shell, using their previously configured password.
Homepage:http://www.cisco.com/go/psirt
File Size:18282
Last Modified:Feb 19 22:08:00 2004
MD5 Checksum:96bc846820392450c6ac3399ed0d1c81

 ///  File Name: aimRCE.txt
Description:
AOL Instant Messenger (AIM) being used in conjunction with Internet Explorer on Windows XP allows for remote command execution.
Author:Michael Evanchik
Homepage:http://www.MichaelEvanchik.com
File Size:4026
Last Modified:Feb 19 14:06:00 2004
MD5 Checksum:87f6922fd93bacdb6ceed887d39960ce

 ///  File Name: ZL04-008.txt
Description:
A security vulnerability exists in specific versions of ZoneAlarm,ZoneAlarm Pro, ZoneAlarm Plus and the Zone Labs Integrity client. This vulnerability is caused by an unchecked buffer in Simple Mail Transfer Protocol (SMTP) processing which could lead to a buffer overflow. In order to exploit the vulnerability without user assistance, the target system must be operating as an SMTP server.
Homepage:http://www.zonelabs.com/
File Size:5286
Last Modified:Feb 19 13:02:00 2004
MD5 Checksum:6e6220ddbbede622b30b4fe3b08f0178

 ///  File Name: sa2988.txt
Description:
APC's hardware-based network management cards could be compromised by non-privileged users via Telnet or the local serial port using a static factory password.
Related File:apc_9606_backdoor.txt
File Size:9979
Last Modified:Feb 19 09:16:00 2004
MD5 Checksum:f3197af68f915a5efbc861d44f7c5cf9

 ///  File Name: XPkern.txt
Description:
There exist several vulnerabilities in one of Windows XP kernel's native API functions which allow any user with the SeDebugPrivilege privilege to execute arbitrary code in kernel mode, and read from and write to any memory address, including kernel memory. Tested against Windows XP Pro SP1.
Author:randnut
Related Exploit:xploit_dbg.cpp.txt
File Size:4345
Last Modified:Feb 19 05:52:00 2004
MD5 Checksum:cb7c6e9dd8b091e6c4a18421639501a9

 ///  File Name: metamailBUGS.txt
Description:
Two format string bugs and two buffer overflows exist in Metamail versions 2.2 through 2.7. Patch and test scripts to test for these vulnerabilities are available here.
Author:Ulf H�rnhammar
File Size:4373
Related CVE(s):CAN-2004-0104, CAN-2004-0105
Last Modified:Feb 19 05:40:00 2004
MD5 Checksum:728aa78a892e32396f83d3f4bfad3d3c

 ///  File Name: isec-0014-mremap-unmap.txt
Description:
A critical security vulnerability has been found in the Linux kernel memory management code inside the mremap(2) system call due to missing function return value check. This bug is completely unrelated to the mremap bug disclosed on 05-01-2004 except concerning the same internal kernel function code. Versions affected: 2.2 up to 2.2.25, 2.4 up to 2.4.24, 2.6 up to 2.6.2.
Author:Paul Starzetz
Homepage:http://isec.pl/vulnerabilities/isec-0014-mremap-unmap.txt
File Size:6435
Related CVE(s):CAN-2004-0077
Last Modified:Feb 18 22:01:00 2004
MD5 Checksum:d2250a6f166b77301fc08235625db115

 ///  File Name: smallFTPd.txt
Description:
Smallftpd version 1.0.3 crashes when an attempted directory traversal occurs.
Author:intuit
Homepage:http://rootshells.tk/
File Size:4466
Last Modified:Feb 18 15:17:00 2004
MD5 Checksum:7c6bda452d125ca4a380cbe1d981d53c

 ///  File Name: cesarFTP099.txt
Description:
CesarFTP version 0.99e has a bug that can cause the system to employ 100 percent of its resources.
Author:intuit
Homepage:http://rootshells.tk/
File Size:1560
Last Modified:Feb 18 14:48:00 2004
MD5 Checksum:c78e1f637133520d69a04107b63c2ae7

 ///  File Name: linksysSNMP.txt
Description:
The Linksys WAP55AG does not properly secure SNMP community strings.
Author:NN Poster
File Size:384
Last Modified:Feb 18 08:08:00 2004
MD5 Checksum:bb29eb1215f03927a712e8902f59dab5

 ///  File Name: vizer191.txt
Description:
Vizer webserver version 1.9.1 is susceptible to a denial of service attack due to mismanaging input strings for HTTP requests.
Author:Donato Ferrante
Homepage:http://www.autistici.org/fdonato
File Size:1537
Last Modified:Feb 18 03:08:00 2004
MD5 Checksum:f9e8ea9de1a03f2ef23937c90bcc3f37