Section:  .. / 0411-advisories  /

Page 7 of 7
<< 1 2 3 4 5 6 7 >> Files 150 - 167 of 167
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: sa13065.txt
Description:
Secunia Security Advisory - Lyndon Dubeau has reported a security issue in NetGear FWAG114 ProSafe Dual Band Wireless VPN Firewall, which can be exploited by malicious people to read or manipulate configuration information. The problem is that it is not possible to disable the SNMP service nor change the default SNMP community strings. The problem has been reported in firmware release 1.0.26RC4. Other versions may also be affected.
Homepage:http://secunia.com/advisories/13065/
File Size:2180
Last Modified:Nov 5 04:50:45 2004
MD5 Checksum:ad00d6dbd8ed9d711edd223e8328d5f8

 ///  File Name: glsa-200411-04.txt
Description:
Gentoo Linux Security Advisory GLSA 200411-04 - A vulnerability in the Speedtouch USB driver can be exploited to allow local users to execute arbitrary code with escalated privileges.
Homepage:http://security.gentoo.org/
File Size:2750
Last Modified:Nov 5 04:49:31 2004
MD5 Checksum:db185bdb2d0ddf244592227b0e19d1ca

 ///  File Name: sa13062.txt
Description:
Secunia Security Advisory - A vulnerability with an unknown impact has been reported in MailEnable Professional.
Homepage:http://secunia.com/advisories/13062/
File Size:1493
Last Modified:Nov 5 04:46:26 2004
MD5 Checksum:9552e8514d85b0d94cdc1bec29e00e83

 ///  File Name: 000077.txt
Description:
Hat Squad Advisory - Helm Web Hosting Control Panel is susceptible to cross site scripting and SQL injection vulnerabilities. Versions 3.1.19 and below are affected.
Author:Behrang Fouladi
Homepage:http://www.hat-squad.com/
File Size:2208
Last Modified:Nov 5 04:39:12 2004
MD5 Checksum:78f326a40bba8360a83c0d4572bfe5d3

 ///  File Name: sa13041.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in HTML::Merge, which can be exploited by malicious people to perform a directory traversal attack.
Homepage:http://secunia.com/advisories/13041/
File Size:1784
Last Modified:Nov 5 04:33:48 2004
MD5 Checksum:76d3d744e79d3412dedf92dae4c37e79

 ///  File Name: safari_url_spoof.txt
Description:
It is possible to spoof URLs in Safari 1.2.3 using the same method that MSIE is susceptible via.
Author:Gilbert Verdian
Homepage:http://neoresearch.org/
Related File:msieLink.txt
File Size:1143
Last Modified:Nov 5 04:32:09 2004
MD5 Checksum:62d90103c39f1d208fc4b1c2c7c3960e

 ///  File Name: IEHTMLHelp.txt
Description:
The HTML Help Control vulnerability in Internet Explorer that allows for bypass of local zone security restrictions can be further misused to cause cross-domain and cross-zone scripting attacks.
Author:Roozbeh Afrasiabi
File Size:2710
Last Modified:Nov 5 04:30:27 2004
MD5 Checksum:45f406a3d02af0d10ea11ebc54f60182

 ///  File Name: sa13031.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in haserl, which can be exploited by malicious people to manipulate critical environment variables. haserl executes shell scripts embedded in HTML documents using a cgi wrapper and sets all input parameters as environment variables. This could be exploited to cause certain programs and utilities to behave unexpectedly and potentially be exploited to execute arbitrary system commands. The vulnerability has been reported in version 0.5.1. Other versions may also be affected.
Homepage:http://secunia.com/advisories/13031/
File Size:1859
Last Modified:Nov 2 04:44:53 2004
MD5 Checksum:0be1dae9ae5d72fef17858127fcd8f88

 ///  File Name: sa13047.txt
Description:
Secunia Security Advisory - A weakness has been discovered in Safari, which can be exploited by malicious people to trick users into visiting a malicious website by obfuscating URLs.
Homepage:http://secunia.com/advisories/13047/
File Size:1829
Last Modified:Nov 2 04:43:48 2004
MD5 Checksum:17c46a957820e94694856b045496034b

 ///  File Name: 57606.html
Description:
Sun Security Advisory - Buffer overflow vulnerabilities in the Sun Java System Web Proxy Server may allow a remote unprivileged user to crash either the Web Proxy Server or the Admin Server (of the Web Proxy Server) or execute arbitrary code with the privileges of the respective server processes.
Homepage:http://sunsolve.sun.com/search/document.do?assetkey=1-26-57606-1
File Size:5961
Last Modified:Nov 2 02:58:56 2004
MD5 Checksum:ff7518d2275c5f059050b1b4fdcd8d79

 ///  File Name: sa13040.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in Caudium 1.x, which can be exploited by malicious people to cause a DoS (Denial of Service).
Homepage:http://secunia.com/advisories/13040/
File Size:1792
Last Modified:Nov 2 02:33:49 2004
MD5 Checksum:632fba5d62b0c0ebbdbf50c1446b79d5

 ///  File Name: qwik-smtpd.txt
Description:
Unl0ck Team Security Advisory - qwik-smtpd is susceptible to a format string vulnerability.
Author:Dark Eagle
Homepage:http://unl0ck.info/
File Size:1872
Last Modified:Nov 2 02:32:25 2004
MD5 Checksum:72d63649943c30e53555c1dd3cd54599

 ///  File Name: dsa-580.txt
Description:
Debian Security Advisory 580-1 - Faheem Mitha noticed that the iptables command, an administration tool for IPv4 packet filtering and NAT, did not always load the required modules on it own as it was supposed to. This could lead to firewall rules not being loaded on system startup. This caused a failure in connection with rules provided by lokkit at least.
Homepage:http://www.debian.org/security/
File Size:6910
Related CVE(s):CAN-2004-0986
Last Modified:Nov 2 02:25:41 2004
MD5 Checksum:2d59abf3d3425f529d4e19d677f3367f

 ///  File Name: dsa-579.txt
Description:
Debian Security Advisory 579-1 - A buffer overflow vulnerability has been discovered in the wv library, used for converting and previewing word documents. On exploitation an attacker could execute arbitrary code with the privileges of the user running the vulnerable application.
Homepage:http://www.debian.org/security/
File Size:13207
Related CVE(s):CAN-2004-0645
Last Modified:Nov 2 02:24:30 2004
MD5 Checksum:d8d591e39dcf7b418c34190c4192d025

 ///  File Name: glsa-200411-02.txt
Description:
Gentoo Linux Security Advisory GLSA 200411-02 - Cherokee contains a format string vulnerability that could lead to denial of service or the execution of arbitary code.
Homepage:http://security.gentoo.org/
File Size:2460
Last Modified:Nov 2 02:22:03 2004
MD5 Checksum:b604ac377a1fa4bf3a377e22ecc74039

 ///  File Name: Ad20041026EN.txt
Description:
XDICT 2002 through 2005 all suffer from a buffer overrun vulnerability when attempting to examine a word for translation.
Author:Sowhat
Homepage:http://secway.org
File Size:2135
Last Modified:Nov 2 02:06:47 2004
MD5 Checksum:600a5a01f14eff1f7e10eb42afaf44d0

 ///  File Name: bogofilter-SA-2004-01.txt
Description:
A vulnerability in bogofilter/bogolexer causes a segmentation fault due to malformed input.
Author:Antti-Juhani Kaijanaho, Clint Adams, David Relson
File Size:3786
Last Modified:Nov 1 04:11:50 2004
MD5 Checksum:de3d71a71544b27c4427eac5daf74186