Section:  .. / 0412-advisories  /

Page 7 of 11
<< 1 2 3 4 5 6 7 8 9 10 11 >> Files 150 - 175 of 253
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: sa13635.txt
Description:
Secunia Security Advisory - Two vulnerabilities have been reported in Rpm Finder, which can be exploited by malicious people to compromise a user's system and by malicious, local users to perform certain actions with escalated privileges.
Homepage:http://secunia.com/advisories/13635/
File Size:2039
Last Modified:Dec 31 22:55:49 2004
MD5 Checksum:1697b6efedeca34e4236ed6e1b44decb

 ///  File Name: abc2mtex.txt
Description:
abc2mtex version 1.6.1 has a boundary error condition in the process_abc() function that allows for arbitrary code execution.
Author:Limin Wang
Homepage:http://tigger.uic.edu/~jlongs2/holes/abc2mtex.txt
File Size:2039
Last Modified:Dec 30 10:42:26 2004
MD5 Checksum:e12f113d24d952fbfdf7bf71b1622856

 ///  File Name: jpegtoavi.txt
Description:
jpegtoavi version 1.5 is susceptible to a buffer overflow in the get_file_list_stdin() function.
Author:James Longstreet
File Size:2022
Last Modified:Dec 30 21:11:57 2004
MD5 Checksum:203a91df9553efd35a52a0d8b05c4a84

 ///  File Name: mpg123.txt
Description:
A boundary error condition in mpg123 version 0.59r allows for remote compromise.
Author:Bartlomiej Sieka
Homepage:http://tigger.uic.edu/~jlongs2/holes/mpg123.txt
File Size:2011
Last Modified:Dec 30 10:23:47 2004
MD5 Checksum:15ba7341715ed64b72f881b11018077d

 ///  File Name: PsychoStats.txt
Description:
PsychoStats versions 2.2.4 Beta and earlier are susceptible to a cross site scripting attack.
Author:James Bercegay
Homepage:http://www.gulftech.org/
File Size:2001
Last Modified:Dec 31 21:48:57 2004
MD5 Checksum:b859263831c45224a2b1a45ec7128718

 ///  File Name: jcabc2ps.txt
Description:
A buffer overflow in jcabc2ps version 20040902 may allow for system compromise.
Author:Tom Palarz, Limin Wang
Homepage:http://tigger.uic.edu/~jlongs2/holes/jcabc2ps.txt
File Size:2000
Last Modified:Dec 30 11:03:40 2004
MD5 Checksum:403b8a98d7ff5cb585b0f1c3f1365f67

 ///  File Name: jackformail.txt
Description:
Jacks FormMail.php script can be manipulated into sending arbitrary files from the server. Version 5.0 is affected.
Author:Hack Hawk
File Size:1989
Last Modified:Jan 2 21:46:02 2005
MD5 Checksum:22270187b18f9066be356c1b18f11108

 ///  File Name: winamp507crash.txt
Description:
Winamp 5.07 is susceptible to denial of service attacks due to file mishandling.
Author:Alan M aka b0f
File Size:1985
Last Modified:Dec 30 07:44:04 2004
MD5 Checksum:e8be87e3716e6df0f867bc1428c620d9

 ///  File Name: xlreader.txt
Description:
xlreader version 0.9.0 is susceptible to a buffer overflow condition in the book_format_sql() function.
Author:Tom Palarz, Kris Kubicki
File Size:1973
Last Modified:Dec 30 22:03:33 2004
MD5 Checksum:3d12a416c48f0834d6c769963b04f3f0

 ///  File Name: msieDHTML.txt
Description:
The MSIE DHTML Edit Control code is susceptible to a cross site scripting vulnerability.
Author:Paul
File Size:1964
Last Modified:Dec 30 09:00:05 2004
MD5 Checksum:9c3baf704ca21a29a37a183efed45be2

 ///  File Name: gg-dos.txt
Description:
It is possible to remotely conduct a denial of service attack on a Gadu-Gadu client by sending special crafted messages several times. All versions up to 6.1 build 156 are affected.
Author:Maciej Soltysiak
Homepage:http://www.soltysiak.com/gg-dos.txt
File Size:1961
Last Modified:Dec 31 10:23:38 2004
MD5 Checksum:cc5a640ddefec0d352ed82a14b815912

 ///  File Name: SSA-20041215-18.txt
Description:
STG Security Advisory: phpBB Attachment Mod is file upload module for phpBB. However, an input validation flaw can cause malicious attackers to run arbitrary commands with the privilege of the HTTPD process, which is typically run as the nobody user. Attachment module 2.3.10 and below is susceptible.
Author:Jeremy Bae
Homepage:http://stgsecurity.com/
File Size:1955
Last Modified:Dec 30 09:38:31 2004
MD5 Checksum:3abc59c49deb724310ded2e6b6779685

 ///  File Name: sa13234.txt
Description:
Secunia Security Advisory - A security issue has been reported in IBM WebSphere Commerce, which potentially may disclose customer information. The problem reportedly exists if store views update the database or directly invoke commands that perform the database update, which may result in customer information being stored under the default user. The security issue has been reported in versions 5.1, 5.4, 5.5, and 5.6.
Homepage:http://secunia.com/advisories/13234/
File Size:1954
Last Modified:Dec 12 08:35:43 2004
MD5 Checksum:69360318120b29e6b961128d35dfe063

 ///  File Name: nasm.txt
Description:
A boundary error condition in NASM version 0.98.38 allows for local system compromise.
Author:Jonathan Rockway
Homepage:http://tigger.uic.edu/~jlongs2/holes/nasm.txt
File Size:1949
Last Modified:Dec 30 10:38:04 2004
MD5 Checksum:43a8545b814a79e23cdb1e28d400355f

 ///  File Name: advisory-20041220-1.txt
Description:
KDE Security Advisory: Two flaws in the Konqueror webbrowser make it possible to by pass the sandbox environment which is used to run Java-applets. One flaw allows access to restricted Java classes via JavaScript, making it possible to escalate the privileges of the Java-applet. The other problem is that Konqueror fails to correctly restrict access to certain Java classes from the Java-applet itself. All versions of KDE up to KDE 3.3.1 inclusive. KDE 3.3.2 is not affected.
Homepage:http://www.kde.org/info/security/advisory-20041220-1.txt
File Size:1948
Related CVE(s):CAN-2004-1145
Last Modified:Dec 30 22:57:23 2004
MD5 Checksum:06097183c8b1a9e1d053061955ca4e44

 ///  File Name: sa13492.txt
Description:
Secunia Security Advisory - A security issue has been reported in Windows XP SP2, which erroneously causes the firewall to allow connections from the Internet. The problem is caused by the way certain dialers configure the routing table and how local subnets are interpreted when the 'My network (subnet) only' option is used in the Microsoft Windows Firewall. This issue only affects Windows XP with Service Pack 2 in combination with a dial-up network connection.
Homepage:http://secunia.com/advisories/13492/
File Size:1946
Last Modified:Dec 30 10:40:12 2004
MD5 Checksum:f5a3acbe598e4e33576f61305734742b

 ///  File Name: csv2xml.txt
Description:
A buffer overflow in csv2xml version 0.5.1 may allow for system compromise.
Author:Limin Wang
Homepage:http://tigger.uic.edu/~jlongs2/holes/csv2xml.txt
File Size:1920
Last Modified:Dec 30 11:04:32 2004
MD5 Checksum:537dbad4eea1e69b3ba11fe95b56a199

 ///  File Name: pgn2web.txt
Description:
A buffer overflow vulnerability in pgn2web version 0.3 may allow for system compromise.
Author:Tom Palarz, Kris Kubicki
Homepage:http://tigger.uic.edu/~jlongs2/holes/pgn2web.txt
File Size:1918
Last Modified:Dec 30 11:02:20 2004
MD5 Checksum:7bb496cbf59dcc5351d022810d272169

 ///  File Name: unrtf.txt
Description:
A buffer overflow in UnRTF version 0.19.3 may allow for system compromise.
Author:Yosef Klein, Limin Wang
File Size:1917
Last Modified:Dec 30 22:09:25 2004
MD5 Checksum:295256bfc6f864de8855ac59a2384636

 ///  File Name: sa13409.txt
Description:
Secunia Security Advisory - Alexander Fichman has reported a weakness in Microsoft Office SharePoint Portal Server 2003, which may disclose sensitive information to malicious, local users on the system.
Homepage:http://secunia.com/advisories/13409/
File Size:1901
Last Modified:Dec 12 20:41:27 2004
MD5 Checksum:54ff19f4dfe854673046de6b73b0587c

 ///  File Name: abcpp.txt
Description:
A vulnerability in abcpp 1.3.0 allows for system compromise.
Author:Yosef Klein
Homepage:http://tigger.uic.edu/~jlongs2/holes/abcpp.txt
File Size:1896
Last Modified:Dec 30 10:59:33 2004
MD5 Checksum:f13c23ffd3c56cba99cf073fd03f13fb

 ///  File Name: oracle23122004E.txt
Description:
NGSSoftware Insight Security Research Advisory #NISR2122004E - The 10g Oracle Application Server installs ISQL*Plus. Once logged in, an attacker can use load.uix to read files on the server. Systems Affected: Oracle 10g AS on all operating systems.
Author:David Litchfield
Homepage:http://www.ngssoftware.com/advisories/oracle23122004E.txt
File Size:1895
Last Modified:Dec 31 22:43:37 2004
MD5 Checksum:adfe20bd74a120aa085285fa65b8aa91

 ///  File Name: sa13408.txt
Description:
Secunia Security Advisory - Artur Szostak has reported a vulnerability in Squid, which can be exploited by malicious people to gain knowledge of potentially sensitive information.
Homepage:http://secunia.com/advisories/13408/
File Size:1890
Last Modified:Dec 12 20:17:09 2004
MD5 Checksum:c2592ba3f31ce5a5a1a528afeeb77898

 ///  File Name: sa13443.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in OpenBSD, which can be exploited by malicious, local users to cause a DoS (Denial of Service). The vulnerability is caused due to an unspecified error in isakmpd and can be exploited by setting ipsec credentials on a socket. Successful exploitation corrupts kernel memory and causes a system panic.
Homepage:http://secunia.com/advisories/13443/
File Size:1886
Last Modified:Dec 30 09:01:31 2004
MD5 Checksum:266469dfe298c5f6ff1eb95f8564bfa7

 ///  File Name: sa13660.txt
Description:
Secunia Security Advisory - cYon has reported a vulnerability in PHProjekt, which can be exploited by malicious people to compromise a vulnerable system. Input passed to the path_pre parameter in authform.inc.php is not properly verified, before it is used to include files. This can be exploited to include arbitrary files from external and local resources.
Homepage:http://secunia.com/advisories/13660/
File Size:1869
Last Modified:Jan 2 20:57:41 2005
MD5 Checksum:bbc0574d1e1eae53944a5d3f31e787fc