Section:  .. / 0404-advisories  /

Page 1 of 4
<< 1 2 3 4 >> Files 1 - 25 of 90
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: advisory-04.txt
Description:
paFileDB version 3.1 suffers from path disclosure and cross site scripting flaws.
Author:DarkBicho
Homepage:http://www.darkbicho.tk
File Size:2676
Last Modified:Apr 28 06:09:03 2004
MD5 Checksum:cae8846cd34224d112651b525dbbc79d

 ///  File Name: digiwww.txt
Description:
DiGi WWW Server version Compieuw.1 suffers from a DoS vulnerability due to a malformed URL.
Author:Donato Ferrante
Homepage:http://www.autistici.org/fdonato
File Size:1781
Last Modified:Apr 28 06:07:38 2004
MD5 Checksum:10aed3b00ae6eea78f8f8d5e157fb1ab

 ///  File Name: HP_Web_Jetadmin_advisory.txt
Description:
Phenoelit Advisory #0815 - Multiple vulnerabilities exist in the HP Web JetAdmin product. Version 6.5 is fully affect. Versions 7.0 and 6.2 and below are partially affected. A vulnerability summary list: Source disclosure of HTS and INC files, real path disclosure of critical files, critical files accessible through web server, user and administrator password disclosure and decryption, user and administrator password replay, and many, many others.
Author:FX
Homepage:http://www.phenoelit.de
Related Exploit:JetRoot_pl.txt"
File Size:9333
Last Modified:Apr 28 05:56:54 2004
MD5 Checksum:e3e5f8476c574e691368a1f5161fc720

 ///  File Name: waraxe-2004-SA024.txt
Description:
Network Query Tool version 1.6 suffers from a cross site scripting and full path disclosure vulnerability.
Author:Janek Vind aka waraxe
Homepage:http://www.waraxe.us/
File Size:2388
Last Modified:Apr 28 05:18:43 2004
MD5 Checksum:d1445060688487a6f6a63d4c18dc813c

 ///  File Name: openbb106.txt
Description:
Open Bulletin Board versions 1.0.6 and below suffer from cross site scripting, SQL injection, and arbitrary command execution flaws.
Author:JeiAr
Homepage:http://www.gulftech.org
File Size:6473
Last Modified:Apr 25 17:43:00 2004
MD5 Checksum:d312d326fb6de5ac0f588ae4da200302

 ///  File Name: explorer-vuln.txt
Description:
Windows fails to handle long share names when accessing a remote file servers such as samba, allowing a malicious server to crash the clients explorer and the ability to execute arbitrary code in the machine as the current user (usually with Administrator rights on Windows machines). Verified to still work on IE 5.0.3700.1000 on Win2k SP4. The author originally notified Microsoft in early 2002.
Author:Rodrigo Gutierrez
File Size:2498
Last Modified:Apr 25 17:38:00 2004
MD5 Checksum:893d27ad9ddf3bac6cbd8baf44e2d5b7

 ///  File Name: eEye.symantec.txt
Description:
eEye Security Advisory - eEye Digital Security has discovered a severe denial of service vulnerability in the Symantec Client Firewall products for Windows. The vulnerability allows a remote attacker to reliably render a system inoperative with one single packet. Physical access is required in order to bring an affected system out of this "frozen" state. This specific flaw exists within the component that performs low level processing of TCP packets.
Author:Karl Lynn
Homepage:http://www.eeye.com/
File Size:3854
Related CVE(s):CAN-2004-0375
Last Modified:Apr 24 08:34:00 2004
MD5 Checksum:1a8e0db404df2e472bc8537292e8ae07

 ///  File Name: a042204-1.txt
Description:
Atstake Security Advisory A042204-1 - The SiteMinder Affiliate Agent plugin version 4.x is susceptible to a remotely exploitable heap overflow when the SMPROFILE cookie is passed a large value. This affect the Solaris, Windows, and HP-UX platforms.
Author:Jeremy Jethro
Homepage:http://www.atstake.com/research/advisories/2004/a042204-1.txt
File Size:3338
Related CVE(s):CAN-2004-0425
Last Modified:Apr 24 05:44:00 2004
MD5 Checksum:3e5b35e4323fe96cea4d9218a69b73c3

 ///  File Name: fusion.txt
Description:
fusion news version 3.6.1 suffers from a cross site scripting vulnerability.
Author:DarkBicho
Homepage:http://www.darkbicho.tk
File Size:1246
Last Modified:Apr 24 03:05:00 2004
MD5 Checksum:0d465d8cfbb48effc4006aecde0d7944

 ///  File Name: sa11464.txt
Description:
Secunia Security Advisory SA11464 - Brad Spengler has reported a vulnerability in the Linux kernel, which can be exploited by malicious, local users to gain knowledge of sensitive information. The vulnerability is caused due to a signedness error within the cpufreq proc handler, which allows arbitrary kernel memory regions to be read.
Homepage:http://secunia.com/advisories/11464/
File Size:1903
Last Modified:Apr 23 07:23:00 2004
MD5 Checksum:2a4aed641bfb4ac94c89c1c2ff46037f

 ///  File Name: unrealEngine2.txt
Description:
The Unreal engine developed by EpicGames has a flaw with UMOD where it handles information from files without properly filtering for dangerous characters. Using a standard directory traversal attack, an attacker is able to go outside of the game's directory to overwrite any file in the partition on which the game is installed.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related Exploit:umodpoc.zip"
File Size:3059
Last Modified:Apr 22 18:02:00 2004
MD5 Checksum:c092f526fd969a6b6506cbf489792308

 ///  File Name: eEye.yahoo.txt
Description:
eEye Security Advisory - eEye Digital Security has discovered a security hole in Yahoo! Mail which allows a remote attacker to take over an account remotely by sending a specially crafted email.
Author:Drew Copley
Homepage:http://www.eeye.com/
File Size:3195
Last Modified:Apr 22 11:36:00 2004
MD5 Checksum:1f6c099136596df156de1d37e887fc3b

 ///  File Name: advguest.txt
Description:
Advanced Guestbook web application version 2.2 is susceptible to a SQL injection attack.
Author:JQ
File Size:296
Last Modified:Apr 22 10:14:00 2004
MD5 Checksum:601545f561f0a1de4ae46a1bbc7a06af

 ///  File Name: cisco-sa-20040420-tcp-ios.txt
Description:
Cisco Security Advisory: Multiple IOS based Cisco products are susceptible to the TCP vulnerability that allows an attacker easier exploitation of reseting an established connection. All Cisco products which contain a TCP stack are susceptible to this vulnerability. Huge list included.
Homepage:http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-ios.shtml
Related File:246929.html
File Size:60677
Related CVE(s):CAN-2004-0230
Last Modified:Apr 22 09:16:00 2004
MD5 Checksum:663728941831d9d63a38198a2d659230

 ///  File Name: cisco-sa-20040420-tcp-nonios.txt
Description:
Cisco Security Advisory: Multiple non-IOS based Cisco products are susceptible to the TCP vulnerability that allows an attacker easier exploitation of reseting an established connection. All Cisco products which contain a TCP stack are susceptible to this vulnerability. Huge list included.
Homepage:http://www.cisco.com/warp/public/707/cisco-sa-20040420-tcp-nonios.shtml
Related File:246929.html
File Size:21737
Related CVE(s):CAN-2004-0230
Last Modified:Apr 22 09:14:00 2004
MD5 Checksum:ab5fb916f6cb82da579a4d6ff70daf27

 ///  File Name: ncFTP317.txt
Description:
ncftp versions 3.1.6/120 and 3.1.7/120 do not hash passwords under certain conditions allowing for their leakage via simple utilities like ps.
Author:Konstantin V. Gavrilenko
Homepage:http://www.arhont.com
File Size:2315
Last Modified:Apr 22 08:12:00 2004
MD5 Checksum:a9d97a6c6a7af07892e74439d07e8ea5

 ///  File Name: 246929.html
Description:
NISCC Vulnerability Advisory 236929 - Vulnerability Issues in TCP. The vulnerability described in this advisory affects implementations of the Transmission Control Protocol (TCP) that comply with the Internet Engineering Task Force'sā(IETF's) Requests For Comments (RFCs) for TCP, including RFC 793, the original specification, and RFC 1323, TCP Extensions for High Performance. If exploited, the vulnerability could allow an attacker to create a Denial of Service condition against existing TCP connections, resulting in premature session termination. The Border Gateway Protocol (BGP) is judged to be potentially most affected by this vulnerability.
Homepage:http://www.uniras.gov.uk/vuls/2004/236929/index.htm
Related Exploit:reset.zip"
File Size:41862
Related CVE(s):CAN-2004-0230
Last Modified:Apr 22 04:04:00 2004
MD5 Checksum:cff2aaba6bb7c03aa105c4ed0ce9e768

 ///  File Name: XSA-2004-1and2.html
Description:
When opening a malicious MRL in any xine-lib or xine-ui based media player, an attacker can write arbitrary content to an arbitrary file, only restricted by the permissions of the user running the application.
Homepage:http://www.xinehq.de/
File Size:6429
Last Modified:Apr 21 15:01:00 2004
MD5 Checksum:35b1987cd627eb2eda88919e59e11d08

 ///  File Name: sa11431.txt
Description:
Secunia Security Advisory SA11431 - Journalness versions below 3.0.8 suffer from a vulnerability that can be exploited by invalid users to create and edit posts.
Homepage:http://secunia.com/advisories/11431/
File Size:1534
Last Modified:Apr 21 10:01:00 2004
MD5 Checksum:0a47d70f911fb6cc463c31f2530b266e

 ///  File Name: TA04-111B.txt
Description:
Technical Cyber Security Alert TA04-111B - There is a vulnerability in Cisco's Internetwork Operating System (IOS) SNMP service. When vulnerable Cisco routers or switches process specific SNMP requests, the system may reboot. If repeatedly exploited, this vulnerability could result in a sustained denial of service (DoS).
Homepage:http://www.cert.org/
File Size:5582
Last Modified:Apr 20 22:03:00 2004
MD5 Checksum:df16f791ed8703fbc22092e035e8b3a5

 ///  File Name: TA04-111A.txt
Description:
Technical Cyber Security Alert TA04-111A - Most implementations of the Border Gateway Protocol (BGP) rely on the Transmission Control Protocol (TCP) to maintain persistent unauthenticated network sessions. There is a vulnerability in TCP which allows remote attackers to terminate network sessions. Sustained exploitation of this vulnerability could lead to a denial of service condition; in the case of BGP systems, portions of the Internet community may be affected. Routing operations would recover quickly after such attacks ended.
Homepage:http://www.cert.org
File Size:11431
Related CVE(s):CAN-2004-0230
Last Modified:Apr 20 15:32:00 2004
MD5 Checksum:e962a745188ee0ebe20c6eccbac1bdc1

 ///  File Name: isec-0015-msfilter.txt
Description:
Linux kernel versions 2.4.22 through 2.4.25 and 2.6.1 through 2.6.3 have an integer overflow in setsockopt MCAST_MSFILTER. Proper exploitation of this vulnerability can lead to privilege escalation.
Author:Paul Starzetz, Wojciech Purczynski
Homepage:http://isec.pl/
File Size:3106
Last Modified:Apr 20 12:13:00 2004
MD5 Checksum:fe315a954750890589fd4ce37cdce068

 ///  File Name: MDKSA-2004:031.txt
Description:
Mandrakelinux Security Update Advisory - Problems lie in the utempter program versions 10.0, 9.2, 9.1, Corporate Server 2.1, and Multi Network Firewall 8.2 that allow for arbitrary file overwrites and denial of service attacks.
Author:Steve Grubb
Homepage:http://www.mandrakesecure.net/
File Size:5847
Related CVE(s):CAN-2004-0233
Last Modified:Apr 19 16:44:00 2004
MD5 Checksum:5cccf5c233164f75ee1005a187215e83

 ///  File Name: 113579-03.txt
Description:
Patch 113579-03 that was released for Solaris 9 in mid-February introduces a security bug that affects anyone running a NIS server.
Author:Chris Thompson
File Size:2157
Last Modified:Apr 19 15:57:00 2004
MD5 Checksum:22a70ceff00e1f742c2b2ecb5a0c863f

 ///  File Name: fastream.txt
Description:
Fastream NETFile FTP / HTTP server version 6.5.1.980 is susceptible to a denial of service attack due to an inability to handle nonexistent user names.
Author:Donato Ferrante
Homepage:http://www.autistici.org/fdonato
File Size:1886
Last Modified:Apr 19 15:55:00 2004
MD5 Checksum:7f21738e0c24a152b2f4a0e018a1b3f9