Section:  .. / 0408-advisories  /

Page 5 of 6
<< 1 2 3 4 5 6 >> Files 100 - 125 of 147
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: sa12368.txt
Description:
Secunia Security Advisory - Sourvivor has reported a vulnerability in Plesk 7.x, which can be exploited by malicious people to conduct cross-site scripting attacks.
Homepage:http://secunia.com/advisories/12368/
File Size:2030
Last Modified:Aug 26 23:41:35 2004
MD5 Checksum:ed7544af4c14d68e5aea799d40b28585

 ///  File Name: sa12260.txt
Description:
Secunia Security Advisory - Debasis Mohanty has reported a vulnerability in CuteNews, which can be exploited by malicious people to conduct cross-site scripting attacks.
Homepage:http://secunia.com/advisories/12260/
File Size:2014
Last Modified:Aug 17 02:01:58 2004
MD5 Checksum:cf51d9daffa6dca8a72d5c26a2ff55cf

 ///  File Name: jshopXSS.txt
Description:
JShop has a flaw in page.php that allows for cross site scripting attacks.
Author:Dr Ponidi
File Size:2014
Last Modified:Aug 24 09:33:39 2004
MD5 Checksum:1d1963acc617292e0cf2a9e10b1271df

 ///  File Name: sa12305.txt
Description:
Secunia Security Advisory - Lukasz Wojtow has reported a vulnerability in MySQL, potentially allowing malicious people to compromise a vulnerable system. The problem is that the mysql_real_connect() function does not properly verify the length of IP addresses returned by a reverse DNS lookup of a hostname. This could potentially be exploited to cause a buffer overflow and execute arbitrary code.
Homepage:http://secunia.com/advisories/12305/
File Size:2007
Last Modified:Aug 24 08:36:48 2004
MD5 Checksum:9a6a588ffacf6a94a2633ecc4ff6db68

 ///  File Name: msowa55.txt
Description:
Microsoft Outlook Web Access (OWA) for Exchange 5.5 is vulnerable to an HTTP Response Splitting attack.
Author:Amit Klein
Homepage:http://www.sanctuminc.com/
File Size:1993
Last Modified:Aug 12 09:38:36 2004
MD5 Checksum:8bf66d3a4df3ada9dac211e1232790e8

 ///  File Name: infoOverflow.txt
Description:
The info utility version 4.7-2.1 has an overflow that is exploitable if for some odd reason the binary was set setuid, which it is not by default.
Author:Josh Martin
File Size:1990
Last Modified:Aug 7 22:27:52 2004
MD5 Checksum:c50817171e81d9c336d6465a02a1699e

 ///  File Name: sa12379.txt
Description:
Secunia Security Advisory - ISS X-Force has reported a vulnerability in the NSS library included with various Netscape products, which can be exploited by malicious people to compromise a vulnerable system. Affected systems: Netscape Enterprise Server, Netscape Personalization Engine, Netscape Directory Server, Netscape Certificate Management System. Editor's Note: This advisory was posted because ISS refuses to grant Packet Storm permission to add their advisories.
Homepage:http://secunia.com/advisories/12379/
File Size:1975
Last Modified:Aug 26 23:37:11 2004
MD5 Checksum:f8c0a0e86f4f097676ba8767cf8b149e

 ///  File Name: sa12393.txt
Description:
Secunia Security Advisory - A vulnerability in Network Everywhere Cable/DSL 4-Port Router NR041 allows malicious people to conduct script insertion attacks.
Author:Mathieu Lacroix
Homepage:http://secunia.com/advisories/12393/
File Size:1932
Last Modified:Aug 31 05:04:47 2004
MD5 Checksum:a16e7b695f21d5302d8f217bebf320d4

 ///  File Name: entrust-vr15-readme.txt
Description:
Symantec VelociRaptor 1.5 has released hotfixes that address the denial of service attack reported against isakmpd.
File Size:1866
Related CVE(s):CAN-2004-0369
Last Modified:Aug 26 22:07:58 2004
MD5 Checksum:092651efef30307d6382ccede260c3e1

 ///  File Name: entrust-sgs10-readme.txt
Description:
Symantec Gateway Security 1.0 has released hotfixes that address the denial of service attack issue reported against isakmpd.
File Size:1857
Related CVE(s):CAN-2004-0369
Last Modified:Aug 26 22:09:14 2004
MD5 Checksum:2c2095c708ae3a35170199ffe50d6303

 ///  File Name: sa12334.txt
Description:
Secunia Security Advisory - Dmitriy Baranov has reported a vulnerability in aGSM, which potentially can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error when receiving information from a game server. This can be exploited by a malicious server to cause a buffer overflow by returning a specially crafted, overly long Half-life server name (about 148 bytes). Successful exploitation may lead to execution of arbitrary code. The vulnerability has been reported in versions 2.35c and 2.51c. Other versions may also be affected.
Homepage:http://secunia.com/advisories/12334/
File Size:1848
Last Modified:Aug 26 02:20:45 2004
MD5 Checksum:2f5324a442e260eaf7c709e820f3e8e6

 ///  File Name: openbsdDoS.txt
Description:
OpenBSD 3.5 is susceptible to a remote denial of service attack via a single ICMP echo request when set up as a gateway. Patch from OpenBSD included.
Author:Vafa Izadinia
File Size:1840
Last Modified:Aug 31 01:58:08 2004
MD5 Checksum:daeff80712162785ed832644720c5da5

 ///  File Name: windowWasher55.txt
Description:
Window Washer 5.5 fails to actually full wipe files as the product functionality claims. After deletion, files can still be recovered, and only their metadata is actually wiped.
Author:wbglinks
File Size:1830
Last Modified:Aug 26 20:13:42 2004
MD5 Checksum:e064b2496a011e9b20e2192b4fad9c7e

 ///  File Name: sa12397.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in Samba 2.x, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to an error within the handling of client printer change notification requests. This can be exploited to crash smbd by sending a FindNextPrintChangeNotify() request without first sending a FindFirstPrintChangeNotify() request.
Homepage:http://secunia.com/advisories/12397/
File Size:1823
Last Modified:Aug 31 05:36:26 2004
MD5 Checksum:d5666c5e84b029db9b0ccfd7634259e9

 ///  File Name: sa12270.txt
Description:
Secunia Security Advisory - Ziv Kamir has reported a vulnerability in Shuttle FTP Suite 3.x, which can be exploited by malicious people to read or place files in arbitrary locations on a vulnerable system.
Homepage:http://secunia.com/advisories/12270/
File Size:1797
Last Modified:Aug 12 09:50:37 2004
MD5 Checksum:c82b1b92efa906dad24b68f93ad9905d

 ///  File Name: sa12299.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in rxvt-unicode, which potentially can be exploited by malicious, local users to manipulate or access sensitive information. The problem is that rxvt-unicode keeps open file handlers to other terminal windows when spawning children. This may potentially allow access to arbitrary terminal windows. This vulnerability affects versions prior to 3.6.
Homepage:http://secunia.com/advisories/12299/
File Size:1792
Related OSVDB(s):8710
Last Modified:Aug 17 06:17:02 2004
MD5 Checksum:fd3b74fbe375ec21a2b939fb17669d98

 ///  File Name: sa12317.txt
Description:
Secunia Security Advisory - Christoph Jeschke has reported a vulnerability in PForum, allowing malicious users to conduct script insertion attacks. Input passed to the IRC Server and AIM ID fields is not sanitised before being stored in the user profile. This can be exploited to execute arbitrary script code in a user's browser session in context of an affected website when a malicious profile is viewed. The vulnerability has been reported in versions prior to 1.26.
Homepage:http://secunia.com/advisories/12317/
File Size:1790
Last Modified:Aug 19 07:15:02 2004
MD5 Checksum:293cc1f647de56aca43fe8d537d2da88

 ///  File Name: pads.adv.txt
Description:
Pads version 1.1 is susceptible to a stack overflow. This tool is not setuid by default so the risk is minimal. Version 1.1.1 fixes this.
Author:ChrisR-
Homepage:http://www.cr-secure.net
Related File:pads-1.1.1.tar.gz
File Size:1752
Last Modified:Aug 19 05:10:43 2004
MD5 Checksum:ded66f6133f70e649550ddae4b1f4016

 ///  File Name: sa12337.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in Davenport WebDAV-CIFS Gateway, which can be exploited by malicious users to cause a DoS (Denial of Service). The vulnerability is caused due to insufficient validation of XML documents sent from clients. This can be exploited by using a specially crafted overly long XML document, which will require excessive resources on expansion. The vulnerability affects versions prior to 0.9.10.
Homepage:http://secunia.com/advisories/12337/
File Size:1750
Last Modified:Aug 26 19:40:57 2004
MD5 Checksum:f554e7058bbea86faea38a0ac5b26aca

 ///  File Name: sa12392.txt
Description:
Secunia Security Advisory - A vulnerability in Netscape can be exploited by malicious people to conduct phishing attacks. The problem is caused due to errors in the displaying of Java applets in a window when multiple tabs are used. This can be exploited to spoof the content of a HTML document from another HTML document being in a different tab. The vulnerability has been confirmed in Netscape 7.2 on Mac OS X 10.3.5.
Author:J. Courcoul
Homepage:http://secunia.com/advisories/12392/
File Size:1749
Last Modified:Aug 31 05:06:12 2004
MD5 Checksum:a3d5839b567a1ced126ff50a8cb12dfb

 ///  File Name: sa12286.txt
Description:
Secunia Security Advisory - Security issues have been reported in Sympa, which can be exploited by malicious people to bypass certain security restrictions. The problem is caused due to an error within Sympa's web interface that makes it possible to approve a pending list without having listmaster privileges. The security issue affects all 2.x, 3.x, and 4.x versions prior to 4.1.2.
Homepage:http://secunia.com/advisories/12286/
File Size:1748
Last Modified:Aug 14 19:09:57 2004
MD5 Checksum:29df3779dc7dc1a92baa71a09401f9b3

 ///  File Name: sa12401.txt
Description:
Secunia Security Advisory - A security issue has been reported in Smart Guest Book 2.x, which may allow malicious people to gain knowledge of sensitive information. The problem is that the database file SmartGuestBook.mdb by default is accessible by anyone. This may disclose various information including the administrative username and password by downloading the file from an affected web site.
Homepage:http://secunia.com/advisories/12401/
File Size:1734
Last Modified:Aug 31 05:30:15 2004
MD5 Checksum:4f23137671107931fc773cadb6479342

 ///  File Name: sa12277.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in MAILsweeper for SMTP, which can be exploited by malicious people to cause a DoS (Denial of Service) on a vulnerable system. The vulnerability is caused due to an error when processing malformed PowerPoint files, which may cause the service to enter an endless loop and exhaust all CPU resources. Versions below 4.3.15 are affected.
Homepage:http://secunia.com/advisories/12277/
File Size:1719
Last Modified:Aug 13 16:23:33 2004
MD5 Checksum:0bac21f59af1796ef621a30fd94d7b8a

 ///  File Name: sa12378.txt
Description:
Secunia Security Advisory - ISS X-Force has reported a vulnerability in the NSS library included with Sun Java System Web Server, which can be exploited by malicious people to compromise a vulnerable system. System affected: Sun Java System Web Server (Sun ONE/iPlanet) 6.x. Editor's Note: This advisory was posted because ISS refuses to grant Packet Storm permission to add their advisories.
Homepage:http://secunia.com/advisories/12378/
File Size:1656
Last Modified:Aug 26 23:33:24 2004
MD5 Checksum:33c979db0b342f7b89e56a7a66244550

 ///  File Name: sa12360.txt
Description:
Secunia Security Advisory - The vendor has reported a vulnerability in PvPGN, potentially allowing malicious people to see sensitive information. An unspecified problem with statsreq may expose sensitive information. This has been fixed in version 1.6.4.
Homepage:http://secunia.com/advisories/12360/
File Size:1644
Last Modified:Aug 26 21:36:53 2004
MD5 Checksum:31be559d1ae953be8389b98ba093f79b