Section:  .. / 0409-advisories  /

Page 5 of 6
<< 1 2 3 4 5 6 >> Files 100 - 125 of 142
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: sa12463.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in Cosminexus Portal Framework, which potentially can be exploited by malicious users to gain knowledge of sensitive information.
Homepage:http://secunia.com/advisories/12463/
File Size:2027
Last Modified:Sep 10 06:19:19 2004
MD5 Checksum:6c94cd6bbc5c823a838b6301c72e4470

 ///  File Name: sa12466.txt
Description:
Secunia Security Advisory - An unspecified vulnerability has been reported in phpGroupWare, which can be exploited by malicious people to conduct cross-site scripting attacks.
Homepage:http://secunia.com/advisories/12466/
File Size:1577
Last Modified:Sep 10 05:39:14 2004
MD5 Checksum:1846f561d8437187af7da73f3a47e837

 ///  File Name: sa12467.txt
Description:
Secunia Security Advisory - Various unspecified vulnerabilities with an unknown impact have been reported in Tutti Nova. Successful exploitation reportedly requires that register_globals is enabled.
Homepage:http://secunia.com/advisories/12467/
File Size:1604
Last Modified:Sep 10 05:40:50 2004
MD5 Checksum:34b02b4bd4804c4b5253cb9c2b287a5b

 ///  File Name: sa12476.txt
Description:
Secunia Security Advisory - A vulnerability in net-acct can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. The write_list() and dump_curr_list() functions create temporary files insecurely. This can be exploited via symlink attacks to overwrite or create arbitrary files with the privileges of a user executing net-acct. The vulnerability affects version 0.71 and prior.
Author:Stefan Nordhausen
Homepage:http://secunia.com/advisories/12476/
File Size:1853
Last Modified:Sep 10 06:22:31 2004
MD5 Checksum:886a83d82b6914e96b17e662ee2d78ab

 ///  File Name: sa12486.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in Emdros, which can be exploited by malicious users to cause a DoS (Denial of Service). The vulnerability is caused due to a memory leak in the CFeatureDeclaration::TypeTypeCompatibility() function. This can be exploited to consume available system resources by issuing a large amount of malformed CREATE OBJECT TYPE or UPDATE OBJECT TYPE statements. Versions below 1.1.20 are affected.
Homepage:http://secunia.com/advisories/12486/
File Size:1831
Last Modified:Sep 10 07:20:02 2004
MD5 Checksum:6f04cd1583e007b086f330a5d3aa6398

 ///  File Name: sa12492.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in F-Secure Internet Gatekeeper 6.x and F-Secure Anti-Virus for Microsoft Exchange 6.x, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to an error within the exception handling in the F-Secure Content Scanner Server component. This can be exploited to crash a process in the component via specially crafted packets.
Homepage:http://secunia.com/advisories/12492/
File Size:2292
Last Modified:Sep 10 07:35:13 2004
MD5 Checksum:768c5dae11a645111e0ff60cc1dee12f

 ///  File Name: sa12493.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in MailEnable Professional and Standard 1.x, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to an error when processing DNS responses. This can be exploited to crash the SMTP service by returning a DNS response containing over 100 MX records.
Homepage:http://secunia.com/advisories/12493/
File Size:1790
Last Modified:Sep 10 07:33:33 2004
MD5 Checksum:dbbb09e5a784e60ee121b0893e1ec42e

 ///  File Name: sa12524.txt
Description:
Secunia Security Advisory - This particular advisory sums up about a dozen BEA WebLogic advisories. Everything from security bypass, manipulation of data, exposure of system information, and denial of service vulnerabilities exist for BEA WebLogic Server 6.x, 7.x, 8.x and BEA WebLogic Express 6.x, 7.x, 8.x.
Homepage:http://secunia.com/advisories/12524/
File Size:7306
Last Modified:Sep 15 02:30:31 2004
MD5 Checksum:6d5e93dc94a26b573abaa00b97916c17

 ///  File Name: sa12526.txt
Description:
Secunia Security Advisory - Details have been released about several vulnerabilities in Mozilla, Mozilla Firefox, and Thunderbird. These can potentially be exploited by malicious people to conduct cross-site scripting attacks, access and modify sensitive information, and compromise a user's system. These vulnerabilities reportedly affect versions prior to the following: Mozilla 1.7.3, Firefox 1.0PR, Thunderbird 0.8.
Author:Georgi Guninski, Wladimir Palant, Gael Delalleau, Mats Palmgren, Jesse Ruderman
Homepage:http://secunia.com/advisories/12526/
File Size:4611
Last Modified:Sep 15 06:48:07 2004
MD5 Checksum:b4ee8abb87dae2aeeabe4dd13264557a

 ///  File Name: sa12527.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in Apache, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to an error in the mod_dav module. A malicious client can exploit this to crash an httpd child process by sending a particular sequence of LOCK requests. Successful exploitation requires that the malicious client is allowed to use the LOCK method and the threaded process model is used. The vulnerability has been fixed in version 2.0.51-dev.
Homepage:http://secunia.com/advisories/12527/
File Size:1734
Last Modified:Sep 15 06:56:26 2004
MD5 Checksum:32f96a4ec30106e04108eaa8aa410a1f

 ///  File Name: sa12529.txt
Description:
Secunia Security Advisory - A vulnerability exists in various Microsoft Office products, which can be exploited by malicious people to compromise a user's system. A boundary error within the WordPerfect Converter can be exploited to cause a buffer overflow if a user opens a malicious document. Successful exploitation may allow execution of arbitrary code with the user's privileges.
Author:Peter Winter-Smith
Homepage:http://secunia.com/advisories/12529/
File Size:3774
Last Modified:Sep 15 02:22:36 2004
MD5 Checksum:670e9a6719615b16494f3f23cce9d8be

 ///  File Name: sa12531.txt
Description:
Secunia Security Advisory - A vulnerability in vBulletin 3.x can be exploited by malicious people to conduct SQL injection attacks.
Author:al3ndaleeb
Homepage:http://secunia.com/advisories/12531/
File Size:1701
Last Modified:Sep 15 23:40:29 2004
MD5 Checksum:ec677ffa92562755de639bcc2203b9d4

 ///  File Name: sa12535.txt
Description:
Secunia Security Advisory - Multiple vulnerabilities have been reported in Netscape, which can be exploited by malicious people to conduct cross-site scripting attacks, access and modify sensitive information, and compromise a user's system.
Homepage:http://secunia.com/advisories/12535/
File Size:1849
Last Modified:Sep 17 09:34:30 2004
MD5 Checksum:8bbc61259ac43eacdddb6807b933cfc1

 ///  File Name: sa12546.txt
Description:
Secunia Security Advisory - Red Hat has issued an update for openoffice.org. This fixes a vulnerability, which can be exploited by malicious, local users to gain knowledge of sensitive information.
Author:Carsten Eiram
Homepage:http://secunia.com/advisories/12546/
File Size:1805
Related CVE(s):CAN-2004-0752
Last Modified:Sep 15 23:54:56 2004
MD5 Checksum:182644ea109993cae9dbb3de57a46d6c

 ///  File Name: sa12570.txt
Description:
Secunia Security Advisory - Multiple unspecified vulnerabilities have been reported in FreeRADIUS, which can be exploited by malicious people to cause a DoS (Denial of Service).
Homepage:http://secunia.com/advisories/12570/
File Size:1561
Last Modified:Sep 21 10:34:50 2004
MD5 Checksum:3354715813179cc34931f1362c31f3ca

 ///  File Name: sa12593.txt
Description:
Secunia Security Advisory - GulfTech Security has discovered two vulnerabilities in YaBB, which can be exploited by malicious people to conduct cross-site scripting attacks and bypass certain security restrictions.
Homepage:http://secunia.com/advisories/12593/
File Size:2368
Last Modified:Sep 21 21:21:03 2004
MD5 Checksum:601bfa5f8694cac9d18e30b952c24e8b

 ///  File Name: sa12602.txt
Description:
Secunia Security Advisory - Multiple vulnerabilities have been reported in xine-lib, which can be exploited by malicious people to compromise a user's system.
Homepage:http://secunia.com/advisories/12602/
File Size:2036
Last Modified:Sep 21 21:13:54 2004
MD5 Checksum:cbb152968504e5b9dc2692c040288890

 ///  File Name: sa12611.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in VP-ASP, which can be exploited by malicious users to cause a DoS (Denial of Service).
Homepage:http://secunia.com/advisories/12611/
File Size:1766
Last Modified:Sep 29 06:09:15 2004
MD5 Checksum:f67c086e31516814224e945c94111fae

 ///  File Name: sa12633.txt
Description:
Secunia Security Advisory - A security issue has been reported in Apache, which may allow malicious people to bypass configured access controls. The problem is reportedly caused due to an error within the merging of the Satisfy directive. The issue only affects version 2.0.51.
Homepage:http://secunia.com/advisories/12633/
File Size:1554
Last Modified:Sep 29 08:38:22 2004
MD5 Checksum:f00ab660fd1a342444fd45a66f48111a

 ///  File Name: samba30x.txt
Description:
Samba 3.0.x is susceptible to multiple denial of services bugs that can remotely crash the daemons nmbd and smbd.
Homepage:http://www.idefense.com/
File Size:2215
Related CVE(s):CAN-2004-0807, CAN-2004-0808
Last Modified:Sep 14 00:39:42 2004
MD5 Checksum:3a2867406071785f82ebec0f354d676a

 ///  File Name: serverviewInsecure.txt
Description:
The Serverview server management product is susceptible to multiple denial of service and data corruption attacks due to insecure file permissions.
Author:l0om
Homepage:http://www.excluded.org/
File Size:2202
Last Modified:Sep 10 05:44:44 2004
MD5 Checksum:94374dfccc6e4738003184a6f18e8bc3

 ///  File Name: servUftpd.txt
Description:
Multiple methods exist that allow for a crash of the Serv-U FTP server versions 4.x through 5.x.
Author:Patrick
File Size:596
Last Modified:Sep 13 23:00:11 2004
MD5 Checksum:e7c6040d577eededa06d3db446cfbe39

 ///  File Name: SMCspoof.txt
Description:
The SMC7004VWBR and SMC7008ABR wireless routers allow a spoofed visitor to have administrative access to the devices and to retrieve the real administrator password.
Author:Jimmy Scott
File Size:3097
Last Modified:Sep 17 07:40:04 2004
MD5 Checksum:39a2f0c90dd9cc7d20e8a06e28e65cce

 ///  File Name: snitz.txt
Description:
Snitz Forums 2000 v3.4.04 suffers from an HTTP response splitting vulnerability.
Author:Maestro
File Size:1010
Last Modified:Sep 21 02:18:50 2004
MD5 Checksum:543cf7d98fe29180cfd17d1102e92821

 ///  File Name: sns77.txt
Description:
SNS Advisory 77 - A vulnerability in Usermin's Web mail function could result in arbitrary command execution upon viewing a specially crafted HTML mail. Affected Versions: Usermin 1.070, 1.080.
Author:Keigo Yamazaki, Jamie Cameron
Homepage:http://www.lac.co.jp/security/csl/intelligence/SNSadvisory_e/77_e.html
File Size:2014
Last Modified:Sep 10 06:08:56 2004
MD5 Checksum:f6116c85cd6e402e3971b57dd2788d87