Section:  .. / 0412-advisories  /

Page 5 of 11
<< 1 2 3 4 5 6 7 8 9 10 11 >> Files 100 - 125 of 253
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: jpegtoavi.txt
Description:
jpegtoavi version 1.5 is susceptible to a buffer overflow in the get_file_list_stdin() function.
Author:James Longstreet
File Size:2022
Last Modified:Dec 30 21:11:57 2004
MD5 Checksum:203a91df9553efd35a52a0d8b05c4a84

 ///  File Name: elm-bolthole-filter.txt
Description:
Bolthole Filter 2.6.1 is susceptible to a buffer overflow in the save_embedded_address() function.
Author:Ariel Berkman
File Size:1629
Last Modified:Dec 30 21:10:15 2004
MD5 Checksum:2377c54dc55dee29004918a211eb4beb

 ///  File Name: junkie.txt
Description:
Multiple input validation errors exist in Junkie version 0.3.1 that allow for command execution and directory traversal attacks.
Author:Yosef Klein
File Size:2041
Last Modified:Dec 30 21:08:55 2004
MD5 Checksum:515671d678ea00a67f75ffee1d76995f

 ///  File Name: greed.txt
Description:
An input validation error that allows for arbitrary command execution and a buffer overflow exist in Greed 0.81p.
Author:Manigandan Radhakrishnan
File Size:2460
Last Modified:Dec 30 21:07:24 2004
MD5 Checksum:932b28c64ce93483e4d0ffb7d20e2b73

 ///  File Name: iglooftp2.txt
Description:
IglooFTP version 0.6.1 suffers from an input validation error that allows for arbitrary file overwrite.
Author:Yosef Klein
File Size:1407
Last Modified:Dec 30 21:05:45 2004
MD5 Checksum:c76e011e24f02b27f737bf2a5e08ad5d

 ///  File Name: iglooftp.txt
Description:
A weakness when uploading directories recursively can potentially be exploited by malicious, local users to substitute the uploaded files in IglooFTP version 0.6.1.
Author:Manigandan Radhakrishnan
File Size:1345
Last Modified:Dec 30 21:04:34 2004
MD5 Checksum:b192b57a18258e832ad9e898d7cb0787

 ///  File Name: dxfscope.txt
Description:
DXFscope version 0.2 is susceptible to a buffer overflow in the dxfin() function.
Author:Ariel Berkman
File Size:2088
Last Modified:Dec 30 21:02:37 2004
MD5 Checksum:82eb657d34bf358e211533dc74d15262

 ///  File Name: crystalftp.txt
Description:
Crystal FTP Pro does not perform bound checking on the results returned by LIST command.
Author:Luca Ercoli
File Size:1309
Last Modified:Dec 30 20:59:50 2004
MD5 Checksum:3e735b8731fc6f75973d1578b2057af8

 ///  File Name: glsa-200412-17.txt
Description:
Gentoo Linux Security Advisory GLSA 200412-17 - kfax contains several buffer overflows potentially leading to execution of arbitrary code.
Homepage:http://security.gentoo.org/
File Size:3401
Last Modified:Dec 30 11:19:38 2004
MD5 Checksum:1357c3db8a9338a2b1dd11b088f41a12

 ///  File Name: php-shmop.txt
Description:
PHP shmop shared memory module has a leak that can lead to Safe Mode bypass. PHP versions 5.0.2 and below and 4.3.9 and below are susceptible.
Author:Stefano Di Paola
File Size:1232
Last Modified:Dec 30 11:18:53 2004
MD5 Checksum:99a70050f72c34784b76a9665223213f

 ///  File Name: mwmp9.txt
Description:
Microsoft Windows Media Player 9 allows for writing to audio files from Internet Explorer, which may allow for code execution in a trusted zone. It also suffers from a file existence determination flaw.
Author:Arman Nayyeri
Homepage:http://www.4rman.com
File Size:4514
Last Modified:Dec 30 11:13:33 2004
MD5 Checksum:417ed1ab5f95ea5851bcda7df494d55e

 ///  File Name: chbg.txt
Description:
A buffer overflow in the simplify_path() function of chbg version 1.5 allows for system compromise.
Author:Danny Lungstrom
Homepage:http://tigger.uic.edu/~jlongs2/holes/chbg.txt
File Size:2094
Last Modified:Dec 30 11:10:12 2004
MD5 Checksum:dd6ee8190c3b3aa744db24acef213db0

 ///  File Name: changepassword.txt
Description:
changepassword version 0.8 fails to use a trusted path when calling make.
Author:Ariel Berkman
Homepage:http://tigger.uic.edu/~jlongs2/holes/changepassword.txt
File Size:1663
Last Modified:Dec 30 11:09:09 2004
MD5 Checksum:7698f5ec75c1e6ffdae6c520099b1a09

 ///  File Name: html2hdml.txt
Description:
A vulnerability has been reported in html2hdml version 1.0.3, allowing malicious people to compromise a vulnerable system.
Author:Wiktor Kopec, Matthew Dabrowski
Homepage:http://tigger.uic.edu/~jlongs2/holes/html2hdml.txt
File Size:1759
Last Modified:Dec 30 11:07:14 2004
MD5 Checksum:37d8c774c75eaa0d9fd8a7ecfec5bb5c

 ///  File Name: rtf2latex2e.txt
Description:
A buffer overflow in the ReadFontTbl() function of rtf2latex2e version 1.0fc2 allows for arbitrary code execution.
Author:Limin Wang
Homepage:http://tigger.uic.edu/~jlongs2/holes/rtf2latex2e.txt
File Size:1855
Last Modified:Dec 30 11:06:09 2004
MD5 Checksum:078d428f64800e2f85bab6f0a7c95ec9

 ///  File Name: csv2xml.txt
Description:
A buffer overflow in csv2xml version 0.5.1 may allow for system compromise.
Author:Limin Wang
Homepage:http://tigger.uic.edu/~jlongs2/holes/csv2xml.txt
File Size:1920
Last Modified:Dec 30 11:04:32 2004
MD5 Checksum:537dbad4eea1e69b3ba11fe95b56a199

 ///  File Name: jcabc2ps.txt
Description:
A buffer overflow in jcabc2ps version 20040902 may allow for system compromise.
Author:Tom Palarz, Limin Wang
Homepage:http://tigger.uic.edu/~jlongs2/holes/jcabc2ps.txt
File Size:2000
Last Modified:Dec 30 11:03:40 2004
MD5 Checksum:403b8a98d7ff5cb585b0f1c3f1365f67

 ///  File Name: pgn2web.txt
Description:
A buffer overflow vulnerability in pgn2web version 0.3 may allow for system compromise.
Author:Tom Palarz, Kris Kubicki
Homepage:http://tigger.uic.edu/~jlongs2/holes/pgn2web.txt
File Size:1918
Last Modified:Dec 30 11:02:20 2004
MD5 Checksum:7bb496cbf59dcc5351d022810d272169

 ///  File Name: bsb2ppm.txt
Description:
A buffer overflow vulnerability in libbsb version 0.0.6 allows for system compromise.
Author:James Longstreet, Tom Indelli
Homepage:http://tigger.uic.edu/~jlongs2/holes/bsb2ppm.txt
File Size:2106
Last Modified:Dec 30 11:01:01 2004
MD5 Checksum:428561c54110ead22c8fd9f495687c65

 ///  File Name: abcpp.txt
Description:
A vulnerability in abcpp 1.3.0 allows for system compromise.
Author:Yosef Klein
Homepage:http://tigger.uic.edu/~jlongs2/holes/abcpp.txt
File Size:1896
Last Modified:Dec 30 10:59:33 2004
MD5 Checksum:f13c23ffd3c56cba99cf073fd03f13fb

 ///  File Name: qwik-smtpd-djb.txt
Description:
A buffer overflow vulnerability in qwik-smtpd version 0.3 enables mail relay possibilities.
Author:Jonathan Rockway
Homepage:http://tigger.uic.edu/~jlongs2/holes/qwik-smtpd.txt
File Size:1231
Last Modified:Dec 30 10:58:00 2004
MD5 Checksum:03b0d06401bc46791b619075557bdc32

 ///  File Name: convex3d.txt
Description:
Convex 3D version 0.8pre1 is susceptible to a boundary error condition in the readObjectChunk() function that can result in arbitrary code execution.
Author:Ariel Berkman
Homepage:http://tigger.uic.edu/~jlongs2/holes/convex3d.txt
File Size:2102
Last Modified:Dec 30 10:55:23 2004
MD5 Checksum:f121a61b8ab0221cb66d4b8c80eb3527

 ///  File Name: abc2midi.txt
Description:
abc2midi suffers from two vulnerabilities that allow for system compromise.
Author:Limin Wang
Homepage:http://tigger.uic.edu/~jlongs2/holes/abc2midi.txt
File Size:2178
Last Modified:Dec 30 10:53:56 2004
MD5 Checksum:76e99f06e6a5ef24b8fe943881ff7086

 ///  File Name: asp2php.txt
Description:
Two vulnerabilities in asp2php version 0.76.23 allow for system compromise.
Author:Qiao Zhang
Homepage:http://tigger.uic.edu/~jlongs2/holes/asp2php.txt
File Size:2095
Last Modified:Dec 30 10:52:49 2004
MD5 Checksum:afd094baa3735c21b59625bbc6e4bfef

 ///  File Name: abctab2ps.txt
Description:
Two vulnerabilities in abctab2ps allow for local compromise of a system. Version 1.6.3 is affected.
Author:Limin Wang
Homepage:http://tigger.uic.edu/~jlongs2/holes/abctab2ps.txt
File Size:2251
Last Modified:Dec 30 10:51:27 2004
MD5 Checksum:773d4df2ce8d86eee4c048d358ac3ce4