Section:  .. / 0407-advisories  /

Page 3 of 5
<< 1 2 3 4 5 >> Files 50 - 75 of 114
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: lexmarkDoS.txt
Description:
Several Lexmark printers have HTTP servers embedded that are susceptible to a denial of service attacks via an overly long Host argument.
Author:Peter Kruse
Homepage:http://www.csis.dk
File Size:1082
Last Modified:Jul 21 23:45:29 2004
MD5 Checksum:34ed0c9b60f28797846665ff792ae732

 ///  File Name: linux.ia64.psr.mfh.txt
Description:
Arun Sharma has discovered a vulnerability that affects Linux ia64 kernels. When the psr.mfh bit is checked without checking the identity of the FPH owner, another process may be able to see the first process's registers.
Author:Arun Sharma
Homepage:https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=124734
File Size:553
Related CVE(s):CAN-2004-0565
Last Modified:Jul 12 19:36:00 2004
MD5 Checksum:d2971eacdc2d281edebc8c5270c3bffd

 ///  File Name: lionmax.txt
Description:
LionMax Software WWW File Share Pro version 2.60 is susceptible to a denial of service attack.
Author:nekd0
File Size:683
Last Modified:Jul 21 23:48:27 2004
MD5 Checksum:98ee79a936abaee7ba101235880d8418

 ///  File Name: memcorruptIE.txt
Description:
An 11 byte attack against Microsoft Internet Explorer allows for an attacker to denial of service the application due to a memory corruption vulnerability. Versions affected: 5.x, 6.1 SP1.
Author:Phuong Nguyen
File Size:2137
Last Modified:Jul 3 13:57:00 2004
MD5 Checksum:cb16ac1e7998cbf382f0139889778d75

 ///  File Name: memHalfLife.txt
Description:
A malformed packet to a Half-Life engine will cause a denial of service when a write to a read-only memory zone occurs. Both Windows and Linux releases are affected.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related Exploit:hlboom.zip"
File Size:2739
Last Modified:Jul 12 18:54:00 2004
MD5 Checksum:082dc86864b336de5ae00880586b6b07

 ///  File Name: methodCache.txt
Description:
Microsoft Internet Explorer gives too much trust to the location variant when it comes to method cache.
Author:Paul
Homepage:http://www.greyhats.cjb.net
File Size:974
Last Modified:Jul 17 03:06:00 2004
MD5 Checksum:469715a18eec5605c5fa0574ec75369d

 ///  File Name: mod_authz_svn-copy-advisory.txt
Description:
Subversion versions up to and including 1.0.5 have a bug in mod_authz_svn that allows users with write access to read portions of the repository that they do not have read access to.
Homepage:http://subversion.tigris.org/
File Size:1353
Last Modified:Jul 26 18:00:23 2004
MD5 Checksum:2520a76f3d17802a2d29d13ad9b66794

 ///  File Name: modsslFormat.txt
Description:
mod_ssl 2.8.18 for Apache 1.3.31 suffers from a format string vulnerability.
Author:virulent
Homepage:http://virulent.siyahsapka.org
File Size:968
Last Modified:Jul 16 18:48:23 2004
MD5 Checksum:d955211dcaee7e16eab94959262a8004

 ///  File Name: mohBufferOverflow.txt
Description:
Medal of Honor games, such as Allied Assault version 1.11v9 and below, Breakthrough version 2.40b and below, and Spearhead version 2.15 and below, all suffer from buffer overflows server-side.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related Exploit:mohaabof.zip"
File Size:3584
Last Modified:Jul 17 23:36:00 2004
MD5 Checksum:df75413feb3caadc6ed78409be9e1ed4

 ///  File Name: moodlexss.txt
Description:
Moodle 1.3.2 and Moodle 1.4 dev is susceptible to a cross site scripting flaw.
Author:Thomas Waldegger
File Size:1028
Last Modified:Jul 14 16:52:00 2004
MD5 Checksum:d1dba3807db1d272421a6b822449d32c

 ///  File Name: moz070704.txt
Description:
Mozilla Security Advisory - Windows versions of Mozilla products pass URIs using the shell: scheme to the OS for handling. The effects depend on the version of windows, but on Windows XP it is possible to launch executables in known locations or the default handlers for file extensions. It could be possible to combine this effect with a known buffer overrun in one of these programs to create a remote execution exploit, although at this time we have confirmed only denial-of-service type attacks. Versions affected: Mozilla (Suite), Mozilla Firefox, Mozilla Thunderbird.
Author:Dan Veditz
Homepage:http://www.mozilla.org/security/shell.html
File Size:1063
Last Modified:Jul 8 18:14:00 2004
MD5 Checksum:089aed4b2ef682ce1d33814503d610e0

 ///  File Name: mozShell.txt
Description:
Mozilla has a flaw that allows for a remote attacker to trick a user into launching an executable via the SHELL: directive.
Author:Liu Die Yu
File Size:2452
Last Modified:Jul 9 20:15:00 2004
MD5 Checksum:f053b8c961ebfbed779d64b34647bfb6

 ///  File Name: msoeJavascript.txt
Description:
Microsoft Outlook Express is susceptible to a vulnerability which will allow javascript to be execute in the message window. Tested against Microsoft Outlook Express version 6.0.2800.1123 on Microsoft Windows XP SP2.
Author:Paul
Homepage:http://www.greyhats.cjb.net
File Size:1054
Last Modified:Jul 11 11:48:00 2004
MD5 Checksum:87124c0d6ea2dbfd512293c0b3b23bbe

 ///  File Name: msSMSClient.txt
Description:
A denial of service condition exists in the Microsoft SMS Client where a data packet that gets analyzed will cause the server to throw an exception while attempting to read or write an invalid memory address. Tested against: Microsoft Systems Management Server version 2.50.2726.0.
Author:Hexview
File Size:2919
Last Modified:Jul 14 18:47:00 2004
MD5 Checksum:bbf3da2645436728b6cafef56500c1fa

 ///  File Name: mstask.txt
Description:
A remote code execution vulnerability exists in the Task Scheduler (mstask.dll) because of an unchecked buffer. Affected Software: Microsoft Windows 2000 Service Pack 4, Microsoft Windows XP, Microsoft Windows XP Service Pack 1.
Author:Brett Moore
Homepage:http://www.security-assessment.com/
Related File:TA04-196A.txt
File Size:3864
Related CVE(s):CAN-2004-0212
Last Modified:Jul 14 18:35:00 2004
MD5 Checksum:03d352af4dfa72396c4e7934987da494

 ///  File Name: mstaskjob.txt
Description:
Microsoft Windows Task Scheduler is vulnerable to a stack-based buffer overflow. The flaw can be exploited by creating a specially-crafted .job file. This will most frequently be a local exploit, but it is possible to imagine some cases where this could be remotely exploited as well.
Author:Peter Winter-Smith
Homepage:http://www.ngssoftware.com/advisories/mstaskjob.txt
File Size:3966
Last Modified:Jul 14 18:30:00 2004
MD5 Checksum:cfafc6e92727b06c8186984f6f610665

 ///  File Name: msWinUtilMan.txt
Description:
A local elevation of privileges exists in the Windows Utility Manager which allows any user to take complete control over the operating system. This vulnerability affects the Windows 2000 operating system family.
Author:Cesar Cerrudo
Related File:TA04-196A.txt
File Size:4482
Related CVE(s):CAN-2004-0213
Last Modified:Jul 14 17:12:00 2004
MD5 Checksum:2b4514b7f08e2e518c0e9d06663ed71d

 ///  File Name: mswordEmail.txt
Description:
Outlook 2000 and 2003 allow execution of remote web pages specified within the data property of OBJECT tags when there is no closing /OBJECT tag, while forwarding an HTML email message using Word 2000 or 2003 as the email editor. This behavior happens regardless of Security Zone settings.
Author:James C. Slora
File Size:4595
Last Modified:Jul 8 18:06:00 2004
MD5 Checksum:4a0f91f6f1d08335b62e06ca5937a45a

 ///  File Name: netegrityXSS.txt
Description:
A cross site scripting vulnerability exists in Netegrity IdentityMinder Web Edition 5.6 SP2 for Windows and Netegrity Policy Server version 5.5.
Author:hexview
File Size:2399
Last Modified:Jul 1 13:59:00 2004
MD5 Checksum:2b214c050da725dba066adffb8ca0d4f

 ///  File Name: noranvDoS.txt
Description:
Symantec Norton AntiVirus 2003 Professional Edition and Symantec Norton AntiVirus 2002 suffer from a denial of service condition when scanning files deeply embedded in directories.
Author:Bipin Gautam
Homepage:http://www.geocities.com/visitbipin/
File Size:1795
Last Modified:Jul 9 20:10:00 2004
MD5 Checksum:a3dc0a9842107bbe0f94e585cd96c558

 ///  File Name: novellVPN.txt
Description:
Novell Bordermanager 3.x suffers from a flaw that allows for a denial of service attack due to an unspecified error within the VPN service IKE.NLM.
Homepage:http://support.novell.com/cgi-bin/search/searchtid.cgi?/10093576.htm
File Size:1491
Last Modified:Jul 15 03:44:00 2004
MD5 Checksum:aa781b8516490d82b07f814aa693a955

 ///  File Name: nucpuncms.txt
Description:
Secunia Security Advisory - PunBB 1.x, Nucleus 3.x, and BLOG:CMS 3.x all suffer from a flaw where system access can be gained due to a lack of input validation.
Homepage:http://secunia.com/advisories/12097/
File Size:2041
Last Modified:Jul 20 13:13:00 2004
MD5 Checksum:8e1f2f0111426634ee5901415deab633

 ///  File Name: ollyDbg110.txt
Description:
A format string bug exists in the code that handle the Debugger Messages for OllyDbg version 1.10.
Author:ned
Homepage:http://felinemenace.org/~nd
File Size:3164
Last Modified:Jul 17 04:26:00 2004
MD5 Checksum:2f60c3059cc9045d85a1d66295fc1266

 ///  File Name: php_memory_limit_remote.txt
Description:
PHP memory_limit remote vulnerability allows for remote code execution on PHP servers with activated memory_limit.
Author:Stefan Esser
Homepage:http://security.e-matters.de/advisories/112004.html
File Size:6660
Related CVE(s):CAN-2004-0594
Last Modified:Jul 14 18:10:00 2004
MD5 Checksum:4cbf9d53c4b6392a1826cd5673b6db43

 ///  File Name: php_strip_tags_css.txt
Description:
PHP strip_tags() bypass vulnerability may allow for Cross-site scripting attacks launched via websites that run PHP and depend on strip_tags() for security. The attack requires a vulnerable browser such as IE, Safari, or Mozilla in order to work.
Author:Stefan Esser
Homepage:http://security.e-matters.de/advisories/122004.html
File Size:3681
Related CVE(s):CAN-2004-0595
Last Modified:Jul 14 18:05:00 2004
MD5 Checksum:863e7ba7525c9271c3acb7416575f74b