Section:  .. / 0403-advisories  /

Page 2 of 4
<< 1 2 3 4 >> Files 25 - 50 of 90
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: modsurvey0321.txt
Description:
The mod_survey module versions 3.0.16-pre1 and below for Apache are susceptible to a script injection attack.
Author:Niklas Deutschman
File Size:4706
Last Modified:Mar 22 21:34:00 2004
MD5 Checksum:f206233ec99f76b47d3854937d0b91c2

 ///  File Name: moddiskcache.txt
Description:
mod_disk_cache, for versions of Apache 2.0.49 and below, stores all client authentication credentials for cached objects on disk. This means proxy authentication credentials and possibly in certain RFC2616 defined cases, standard authentication credentials.
Author:Andreas Steinmetz
File Size:4541
Last Modified:Mar 20 17:44:00 2004
MD5 Checksum:35f35aab82f5ee3c24bcf057d2067fee

 ///  File Name: eEye.iss.txt
Description:
eEye Security Advisory - A critical vulnerability has been discovered in the PAM component used in all current ISS host, server, and network device solutions. A routine within the Protocol Analysis Module (PAM) that monitors ICQ server responses contains a series of stack based buffer overflow vulnerabilities. If the source port of an incoming UDP packet is 4000, it is assumed to be an ICQ v5 server response. Any incoming packet matching this criterion will be forwarded to the vulnerable routine.
Author:delivering a carefully crafted response packet to the broadcast address of a network operating RealSecure/BlackICE agents an attacker can achieve anonymous, remote SYSTEM access across all vulnerable nodes. Homepage: http://www.eEye.com.
File Size:4537
Last Modified:Mar 19 18:12:00 2004
MD5 Checksum:89bb0e2f36e4df086c28ec3597fcec82

 ///  File Name: gm005-mc.txt
Description:
GreyMagic Security Advisory GM#005-MC - Both Yahoo and Hotmail are susceptible to cross site scripting attacks.
Homepage:http://security.greymagic.com/adv/gm005-mc/
File Size:4527
Last Modified:Mar 23 20:49:00 2004
MD5 Checksum:d92616a623403f44dcc8abe3ff567f06

 ///  File Name: anubisAdv.txt
Description:
GNU Anubis is vulnerable to multiple buffer overflow attacks and format string bugs. Vulnerable versions: 3.6.2, 3.9.93, 3.9.92, 3.6.0, 3.6.1, possibly others
Author:Ulf H?rnhammar
Related Exploit:anubis-crasher.pl
File Size:4393
Last Modified:Mar 5 06:06:21 2004
MD5 Checksum:5355353168b13a65a59967379206eae6

 ///  File Name: RHSA-2004:134-01.txt
Description:
Red Hat Security Advisory RHSA-2004:134-01 - A bug was found in the processing of %-encoded characters in a URL in versions of Squid 2.5.STABLE4 and earlier. If a Squid configuration uses Access Control Lists (ACLs), a remote attacker could create URLs that would not be correctly tested against Squid's ACLs, potentially allowing clients to access prohibited URLs.
Homepage:http://www.redhat.com/
File Size:4393
Related CVE(s):CAN-2004-0189
Last Modified:Mar 29 02:11:00 2004
MD5 Checksum:4c18ad62669586588d02b6bf5eb9695d

 ///  File Name: ieXSS.txt
Description:
Internet Explorer version 6.0 with SP1 is susceptible to Cross Zone and Site scripting vulnerabilities.
Author:Cheng Peng Su
File Size:4218
Last Modified:Mar 3 23:33:00 2004
MD5 Checksum:d23e8a84ad6f0fb34fc5c9af59a5d226

 ///  File Name: FreeBSD-SA-04:06.ipv6.txt
Description:
FreeBSD Security Advisory FreeBSD-SA-04:06.ipv6 - Applications may manipulate the behavior of an IPv6 socket using the setsockopt(2) system call. This may allow a local attacker to read portions of kernel memory.
Author:Katsuhisa ABE, Colin Percival
Homepage:http://www.freebsd.org/security/
File Size:4053
Related CVE(s):CAN-2004-0370
Last Modified:Mar 29 17:46:00 2004
MD5 Checksum:b5aebf5d0593c20a8019ec6f67e94cbd

 ///  File Name: RHSA-2004:093-01.txt
Description:
Red Hat Security Advisory RHSA-2004:093-01 - Alan Cox discovered a vulnerability in the systat package where the post and trigger scripts insecurely created temporary filenames, allowing for a symlink attack using /tmp.
Homepage:https://www.redhat.com/solutions/security/news/contact.html
File Size:3953
Related CVE(s):CAN-2004-0107
Last Modified:Mar 11 17:44:38 2004
MD5 Checksum:43d951b7e20b40788c778ebd4604593e

 ///  File Name: OpenPKG-SA-2004.006.txt
Description:
OpenPKG Security Advisory - UUDeview versions 0.5.19 and below suffer from buffer overflows and insecure temporary file handling.
Author:The OpenPKG Project
Homepage:http://www.openpkg.org/security.html
File Size:3777
Last Modified:Mar 13 08:31:33 2004
MD5 Checksum:84e1c8fa1dfdb48cec0b64b5098d5c62

 ///  File Name: unrealEngine.txt
Description:
The Unreal game engine for Windows, MacOS, and Linux has a format string bug that allows an attacker to remotely crash or execute malicious code on the server. Games affected: America's Army, DeusEx, Devastation, Magic Battlegrounds, Mobile Forces, Nerf Arena Blast, Postal 2, Rainbow Six: Raven Shield, Rune, Sephiroth: 3rd episode the Crusade, Star Trek: Klingon Honor Guard, Tactical Ops, TNN Pro Hunter, Unreal 1, Unreal II XMP, Unreal Tournament, Unreal Tournament 2003, Wheel of Time, X-com Enforcer, and XIII.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related Exploit:unrfs-poc.zip
File Size:3426
Last Modified:Mar 11 02:42:34 2004
MD5 Checksum:ba1bf0b1ec64c16152ef766ad9850acc

 ///  File Name: 03.19.04.txt
Description:
iDEFENSE Security Advisory 03.19.04: Exploitation of default file permissions in Borland Interbase can allow local attackers to gain database administrative privileges. The vulnerability specifically exists due to insecure permissions on the admin.ib user database file. Local attackers can add or modify existing accounts to gain administrative privileges.
Author:Larry Cashdollar
Homepage:http://www.idefense.com/
File Size:3324
Last Modified:Mar 19 20:42:00 2004
MD5 Checksum:08bc0ef21f02718f607d01cd1cc3ffc9

 ///  File Name: secadv_20040317.txt
Description:
OpenSSL Security Advisory - A Null-pointer assignment during an SSL handshake can result in a denial of service. Versions 0.9.6c to 0.9.6k and 0.9.7a to 0.9.7c are affected by this issue. Versions 0.9.7a, 0.9.7b, and 0.9.7c are affected by another vulnerability in the handling of Kerberos ciphersuites that can cause OpenSSL to crash. Patches are attached to the advisory.
Homepage:http://www.openssl.org/news/secadv_20040317.txt
File Size:3155
Related CVE(s):CAN-2004-0079, CAN-2004-0112
Last Modified:Mar 17 15:36:13 2004
MD5 Checksum:8296433d89da39966b6d020c7aa78ebb

 ///  File Name: waraxe-2004-SA008.txt
Description:
PHP-Nuke versions 6.x through 7.1.0 allow for link inclusions that can force an administrator to unknowingly add a superuser.
Author:Janek Vind aka waraxe
File Size:3004
Last Modified:Mar 23 01:57:00 2004
MD5 Checksum:16ed4cb0b4664693cee520faf21ab541

 ///  File Name: netscreenXSS.txt
Description:
Netscreen-SA 5000 services VPNs are susceptible to cross site scripting attacks.
Author:Mark Lachniet
File Size:2964
Last Modified:Mar 2 21:31:00 2004
MD5 Checksum:41c6f05cfa3d60c2f48908869e627ae5

 ///  File Name: Adv-20040303.txt
Description:
S-Quadra Advisory #2004-03-03 - Spider Sales shopping cart suffers from incorrect use of cryptography and SQL injection attacks.
Author:Nick Gudov
Homepage:http://www.s-quadra.com/advisories/Adv-20040303.txt
File Size:2931
Last Modified:Mar 3 21:43:00 2004
MD5 Checksum:77f816c1755f41e56fa5927b03607d3f

 ///  File Name: webctCE41.txt
Description:
WebCT Campus Edition 4.1 suffers from cross site scripting vulnerabilities.
Author:Simon Boulet
File Size:2869
Last Modified:Mar 28 19:01:00 2004
MD5 Checksum:c59ceaf9802b6872126c55b2c8604a88

 ///  File Name: sonicwall.txt
Description:
SonicWall Firewall/VPN appliances with a firmware revision of 6.5.0.4 or below are vulnerable to denial of service attacks, arp flooding, and network mapping.
Author:xeno
File Size:2856
Last Modified:Mar 2 04:33:00 2004
MD5 Checksum:d9ef37f6713b61522d04c580212080bc

 ///  File Name: hotmailfun.txt
Description:
Some amusing flaws in Hotmail.com allows for credential theft.
Author:http-equiv@excite.com
Homepage:http://www.malware.com
File Size:2649
Last Modified:Mar 19 17:00:00 2004
MD5 Checksum:fe20ef3354aa143ca18df7704983ee22

 ///  File Name: outlook032004.txt
Description:
Microsoft Outlook contains a vulnerability which allows execution of arbitrary code when a victim user views a web page or an e-mail message created by an attacker. According to Microsoft the affected supported versions are Microsoft Office XP SP2 and Microsoft Outlook 2002 SP 2. Some earlier versions are vulnerable too, but not supported by the vendor.
Author:Jouko Pynn�nen
Homepage:http://iki.fi/jouko/
File Size:2618
Last Modified:Mar 11 02:35:27 2004
MD5 Checksum:a786f33a68425d0d583bd412ca29aeb1

 ///  File Name: realHelix9.txt
Description:
Pentest Limited Security Advisory - The RealNetworks Helix 9 Server allows for an authenticated attacker to submit malformed HTTP POST requests against the Administration server to trigger a buffer overflow and execute arbitrary code. Affected versions: Helix Universal Mobile Server and Gateway 10, version 10.1.1.120 and prior; Helix Universal Server and Gateway 9, version 9.0.2.881 and prior.
Homepage:http://www.pentest.co.uk/
File Size:2607
Related CVE(s):CAN-2004-0049
Last Modified:Mar 18 18:25:29 2004
MD5 Checksum:66d23f86209a9b83426d2f5cba1e4e4b

 ///  File Name: nisrce.txt
Description:
NGSSoftware Insight Security Research Advisory #NISR19042004b - Symantec's Norton Internet Security 2004 Professional makes use of an ActiveX component that is marked safe for scripting, particularly WrapUM.dll. Using the LaunchURL method an attacker has the ability to force the browser to run arbitrary executables on the target.
Author:Mark Litchfield
Homepage:http://www.ngssoftware.com/advisories/nisrce.txt
File Size:2559
Last Modified:Mar 19 19:23:00 2004
MD5 Checksum:463931f265ad4a0daff86e14957d6f76

 ///  File Name: CPANEL-2004:01-01.txt
Description:
cPanel Security Advisory - CPANEL-2004:01-01 - When trying to change a user password in cPanel 8.x.x, it is possible to execute commands as root. cPanel suggests that administrators disable this feature until a fixed version is released.
Author:J. Nick Koston
Homepage:http://support.cpanel.net/
File Size:2530
Last Modified:Mar 12 02:54:41 2004
MD5 Checksum:81d1cba8405419c675e67a7882076a22

 ///  File Name: repredhat.txt
Description:
A local buffer overflow vulnerability exists in REP version 0.15.1 on RedHat Linux 7.3. Proof of concept exploitation included.
Homepage:http://www.blackangels.it
File Size:2517
Last Modified:May 1 18:09:19 2004
MD5 Checksum:39225a84cba3e870a2ffcdc5452210b4

 ///  File Name: wsftp402eval.txt
Description:
Ipswitch WS_FTP server version 4.0.2.EVAL allows for a remote user with write access to a directory the ability to execute arbitrary code due to a buffer overflow in WS_FTP Server's STAT command when downloading a file the user created.
Author:Hugh Mann
Related Exploit:xp_ws_ftp_server.zip
File Size:2499
Last Modified:Mar 23 16:22:00 2004
MD5 Checksum:584b2040c538e3d89da88f206f59d717