Section:  .. / 0408-advisories  /

Page 6 of 6
<< 1 2 3 4 5 6 >> Files 125 - 147 of 147
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: SpecificMAIL.theft.txt
Description:
SpecificMAIL, a freeware spam filter for Outlook and Outlook Express, happens to be extremely intrusive and acts more as spyware than a useful utility to users. Buyer beware.
Author:N. DeBaggis
File Size:5190
Last Modified:Aug 17 01:52:42 2004
MD5 Checksum:b2a57feb9c389957fc49a35fab203589

 ///  File Name: sredird.txt
Description:
sredird versions 2.2.1-1 and below suffer from a format string bug and a buffer overflow that may let remote users execute arbitrary code.
Author:Max Vozeler
File Size:4286
Last Modified:Aug 26 21:10:27 2004
MD5 Checksum:cad9ea9b796dc1cc4e5cbd09351fac2d

 ///  File Name: SSRT4785.txt
Description:
HP Security Bulletin - A potential security vulnerability has been identified with HP Process Resource Manager on all OS versions running PRM C.02.01[.01] and prior. HP PRM is also used in Workload Manager, so this also affects WLM version A.02.01 and prior as well. This vulnerability could potentially be exploited to corrupt data on a system running PRM.
Homepage:http://www.hp.com/
File Size:8625
Last Modified:Aug 11 01:43:30 2004
MD5 Checksum:9d093bf7ed58f415323fbe7c227ae637

 ///  File Name: suphp-advisory.txt
Description:
MOD_SUPHP is an Apache module that allows php scripts to run as users rather than the www-data user. A condition exists that would allow an attacker to use this module to run arbitrary code.
Author:Steven Van Acker
File Size:3966
Related OSVDB(s):9156
Last Modified:Aug 26 04:02:01 2004
MD5 Checksum:45f90e4fc4ffcce292b38d4d8ee7cfd4

 ///  File Name: SUSE-SA:2004:025.txt
Description:
SUSE Security Announcement - The SuSE Security Team has discovered various remotely exploitable buffer overflows in the MSN-protocol parsing functions during a code review of the MSN protocol handling code of gaim. Remote attackers can execute arbitrary code as the user running the gaim client.
Author:Sebastian Krahmer
Homepage:http://www.suse.com/
File Size:13788
Related OSVDB(s):8382
Related CVE(s):CAN-2004-0500
Last Modified:Aug 13 16:07:01 2004
MD5 Checksum:bbe94b5a9984bcb0a5b0bbe005022c95

 ///  File Name: SympaXSS.txt
Description:
Sympa versions 4.1.x and below are susceptible to cross site scripting attacks.
Author:Joxean Koret
File Size:2394
Last Modified:Aug 24 08:59:49 2004
MD5 Checksum:4e7f812dfd61ab9ba22e538bf6e644df

 ///  File Name: TA04-212A.txt
Description:
Technical Cyber Security Alert TA04-212A - Microsoft Internet Explorer contains three vulnerabilities that may allow arbitrary code to be executed. The privileges gained by a remote attacker depend on the software component being attacked. For example, a user browsing to an unsafe web page using Internet Explorer could have code executed with the same privilege as the user. These vulnerabilities have been reported to be relatively straightforward to exploit; even vigilant users visiting a malicious website, viewing a malformed image, or reading an HTML-rendered email message may be affected.
Homepage:http://www.cert.org/
File Size:7890
Last Modified:Aug 5 06:09:22 2004
MD5 Checksum:eca2b08fadf892d543653192b8d317d0

 ///  File Name: TA04-217A.txt
Description:
Technical Cyber Security Alert TA04-217A - All applications and systems that use the libpng library versions 1.2.5 and below are susceptible to several vulnerabilities, the most serious of which could allow a remote attacker to execute arbitrary code on an affected system.
Homepage:http://www.cert.org/
File Size:6502
Last Modified:Aug 5 09:04:08 2004
MD5 Checksum:281f0fd6e4bbc6bda55f4c0e54efea1e

 ///  File Name: TID10094233.txt
Description:
An unspecified vulnerability with an unknown impact has been reported in Novell Web Manager on Novell NetWare 6.5.
File Size:1308
Last Modified:Aug 24 09:53:44 2004
MD5 Checksum:db119648199c75cb94429ffb399deff3

 ///  File Name: TSA-051.txt
Description:
Secure Science Corporation Advisory TSA-051 - T-mobile Wireless and Verizon Northwest are vulnerable to caller-ID authentication spoofing, enabling arbitrary compromise of customer voicemail/message center.
Author:Lance James, Samy Kamkar, Dachb0den Labs
Homepage:http://www.securescience.net
File Size:3239
Last Modified:Aug 12 10:09:08 2004
MD5 Checksum:ca8ed41a88fe1fceaa6ab6c3f3d637e7

 ///  File Name: typepadXSS.txt
Description:
Typepad weblogging service is susceptible to a cross site scripting flaw.
Author:Matt Oyer
Homepage:http://Spiffomatic64.com
File Size:1007
Last Modified:Aug 10 02:02:16 2004
MD5 Checksum:9f1f92faf4fb3c0e10f27f17bd961ac9

 ///  File Name: usrAPdos.txt
Description:
USRobotics Access Point version 1.21h embeds an HTTP server that is susceptible to a buffer overflow when an overly long GET request is supplied.
Author:Albert Puigsech Galicia
File Size:2981
Last Modified:Aug 5 06:41:49 2004
MD5 Checksum:88284e7e4826303e32549aa9cf7822a8

 ///  File Name: VSA0402.txt
Description:
A format string vulnerability exists in OpenFTPD versions up to 0.30.2.
Author:Thomas Wana, Andi
Homepage:http://void.at/
File Size:2574
Last Modified:Aug 5 05:31:06 2004
MD5 Checksum:c8cfa23176f37c10e27efa230bf3a93f

 ///  File Name: wackowikixss.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in WackoWiki, which can be exploited by malicious people to conduct cross-site scripting attacks.
Homepage:http://secunia.com/advisories/12209/
File Size:1636
Last Modified:Aug 5 07:54:42 2004
MD5 Checksum:1419d7517865ed3c9e004b9f36734403

 ///  File Name: webbsyte.txt
Description:
When over 40 connections are made to Webbsyte 0.9.0, the service crashes.
Author:Donato Ferrante
Homepage:http://www.autistici.org/fdonato
File Size:1534
Last Modified:Aug 5 08:08:21 2004
MD5 Checksum:9e0bb4f36d041ee36552eacb315d8b54

 ///  File Name: webchat.txt
Description:
Free Web Chat suffers from both denial of service and resource allocation bugs.
Author:Donato Ferrante
Homepage:http://www.autistici.org/fdonato
File Size:4195
Last Modified:Aug 5 09:00:53 2004
MD5 Checksum:324b4b3bdaaa4f1883beae438580b2b9

 ///  File Name: WHMAutoPilot.txt
Description:
A vulnerability in WHM Autopilot versions 2.4.5 and below allows malicious attackers the ability to access usernames and clear text passwords.
Author:MS Blows
File Size:5881
Last Modified:Aug 5 07:12:46 2004
MD5 Checksum:a1377c8babf5c6cad23638d2e86f45e8

 ///  File Name: windowWasher55.txt
Description:
Window Washer 5.5 fails to actually full wipe files as the product functionality claims. After deletion, files can still be recovered, and only their metadata is actually wiped.
Author:wbglinks
File Size:1830
Last Modified:Aug 26 20:13:42 2004
MD5 Checksum:e064b2496a011e9b20e2192b4fad9c7e

 ///  File Name: wsFTP-DoS.txt
Description:
A vulnerability has been found in WS_FTP Server version 5.0.2. The problem is in the module handling the file path parsing.
Author:lion
File Size:792
Last Modified:Aug 31 05:29:04 2004
MD5 Checksum:45f8ca017c4f17ceda928639cf45fc29

 ///  File Name: xoops2x.txt
Description:
XOOPS versions 2.x is susceptible to a cross site scripting flaw in the Dictionary module.
Homepage:http://cyruxnet.org
File Size:5942
Last Modified:Sep 2 08:45:40 2004
MD5 Checksum:f375214a1bc893f211d91e00f68cc006

 ///  File Name: yastControl.txt
Description:
By placing the preferences submenu in a K Menu, the SuSE YAST Control Center can be accessed with needing root authentication.
Author:Jordan Pilat
File Size:494
Last Modified:Aug 7 22:30:22 2004
MD5 Checksum:77583c4e279c33f08c2bbd06c105d870

 ///  File Name: zoneAlarmed.txt
Description:
It has been discovered that Zone Alarm stores its configuration files in a directory that is forcibly left accessible to EVERYONE under Windows.
Author:Bipin Gautam
Homepage:http://www.geocities.com/visitbipin/
File Size:1535
Last Modified:Aug 24 08:33:46 2004
MD5 Checksum:8fd02c5a822a684cd07cdfafef3c3534