Section:  .. / 0408-advisories  /

Page 4 of 6
<< 1 2 3 4 5 6 >> Files 75 - 100 of 147
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: painkiller131.txt
Description:
Painkiller versions 1.3.1 and below have a memory corruption flaw with limited code execution possibilities.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related Exploit:painkex.zip"
File Size:2815
Last Modified:Aug 26 21:24:20 2004
MD5 Checksum:a76cebe5fbd44a2d121210f1cf27db83

 ///  File Name: sa12269.txt
Description:
Secunia Security Advisory - Multiple unspecified vulnerabilities have been reported in IceWarp 1.x through 5.x Web Mail, which can potentially be exploited by malicious people to conduct cross-site scripting and SQL injection attacks, access sensitive information, and manipulate the file system.
Homepage:http://secunia.com/advisories/12269/
File Size:2794
Last Modified:Aug 12 09:22:11 2004
MD5 Checksum:7c144959b5c1ba033aa319ccb58a3f81

 ///  File Name: 00044-08232004.txt
Description:
GulfTech Security Advisory - Multiple Liveworld products suffer from cross site scripting flaws.
Author:James Bercegay
Homepage:http://www.gulftech.org/
File Size:2785
Last Modified:Aug 26 21:17:05 2004
MD5 Checksum:fd60e55e1e12b2b8e39359c2d9b691b0

 ///  File Name: gm009-op.txt
Description:
GreyMagic Security Advisory GM#009-OP - Opera versions 7.53 and below on Windows, Linux and Macintosh have a flaw that allows an attacker the ability to figure out whether or not a file or directory exists.
Homepage:http://www.greymagic.com/security/advisories/gm009-op/
File Size:2761
Last Modified:Aug 19 07:42:29 2004
MD5 Checksum:5c4f31b02a2a510a1b74358ce14fd548

 ///  File Name: advisory-20040823-1.txt
Description:
KDE Security Advisory - Konqueror suffers from a Cross-Domain Cookie Injection vulnerability.
Homepage:http://www.kde.org/info/security/advisory-20040823-1.txt
File Size:2735
Related CVE(s):CAN-2004-0746
Last Modified:Aug 24 09:45:25 2004
MD5 Checksum:20dd8cfea48eed3ff3a2e76f30cc6985

 ///  File Name: NGSEC-2004-6.txt
Description:
Next Generation Advisory NGSEC-2004-6 - The IPD, or Integrity Protection Driver, from Pedestal Software suffers from an unvalidated pointer referencing in some of its kernel hooks. Any local and unauthorized user can crash the system with some simple coding skills. Versions up to 1.4 are affected.
Author:Ferm�n J. Serna
Homepage:http://www.ngsec.com/
Related Exploit:ipd-dos.c"
File Size:2667
Last Modified:Aug 18 02:36:57 2004
MD5 Checksum:0c147bf2fcf8f63236393de9fcf0d409

 ///  File Name: VSA0402.txt
Description:
A format string vulnerability exists in OpenFTPD versions up to 0.30.2.
Author:Thomas Wana, Andi
Homepage:http://void.at/
File Size:2574
Last Modified:Aug 5 05:31:06 2004
MD5 Checksum:c8cfa23176f37c10e27efa230bf3a93f

 ///  File Name: NGSEC-2004-7.txt
Description:
Next Generation Advisory NGSEC-2004-7 - NtRegmon, the Registry monitoring utility for Windows, suffers from an unvalidated pointer referencing. While any privileged user is using NtRegmon, any local and unauthorized user can crash the system. Versions below 6.12 are susceptible.
Author:Ferm�n J. Sern/a>
Homepage:http://www.ngsec.com/
File Size:2540
Last Modified:Aug 26 22:12:53 2004
MD5 Checksum:0fe7c24bff3aa28d43b7413f8a80d29e

 ///  File Name: sa12366.txt
Description:
Secunia Security Advisory - Multiple vulnerabilities have been reported in iChain, which can be exploited by malicious people to bypass security restrictions and conduct cross-site scripting and DoS (Denial of Service) attacks.
Homepage:http://secunia.com/advisories/12366/
File Size:2483
Last Modified:Aug 31 04:25:07 2004
MD5 Checksum:a5351bd9bbf71b235213d1cf6f9d34a7

 ///  File Name: advisory-20040811-3.txt
Description:
KDE Security Advisory - The Konqueror webbrowser allows websites to load webpages into a frame of any other frame-based webpage that the user may have open. A malicious website could abuse Konqueror to insert its own frames into the page of an otherwise trusted website. As a result the user may unknowingly send confidential information intended for the trusted website to the malicious website.
Homepage:http://www.kde.org/info/security/advisory-20040811-3.txt
File Size:2474
Related CVE(s):CAN-2004-0721
Last Modified:Aug 12 10:03:44 2004
MD5 Checksum:ebdde55dbc6bfb05aac19e72f83bee1c

 ///  File Name: sa12272.txt
Description:
Secunia Security Advisory - Ziv Kamir has reported some vulnerabilities in Keene Digital Media Server, which can be exploited by malicious people to retrieve sensitive information and perform administrative tasks. The vulnerabilities have been reported in version 1.0.2. Other versions may also be affected.
Homepage:http://secunia.com/advisories/12272/
File Size:2395
Last Modified:Aug 13 09:03:20 2004
MD5 Checksum:a14547b8c601f5061063e040720941a7

 ///  File Name: SympaXSS.txt
Description:
Sympa versions 4.1.x and below are susceptible to cross site scripting attacks.
Author:Joxean Koret
File Size:2394
Last Modified:Aug 24 08:59:49 2004
MD5 Checksum:4e7f812dfd61ab9ba22e538bf6e644df

 ///  File Name: moodle13.2.txt
Description:
Moodle versions 1.3 and below suffer from multiple cross site scripting flaws.
Author:Javier Ubilla Brenni
File Size:2321
Last Modified:Aug 10 02:01:25 2004
MD5 Checksum:3c4960d6144091dcdfcab8a80aa9dd76

 ///  File Name: QuiXplorer23.txt
Description:
QuiXplorer versions below 2.3 allow for full file disclosure and web server user read access due to a directory traversal vulnerability.
Author:Cyrille Barthelemy
File Size:2284
Last Modified:Aug 17 01:57:57 2004
MD5 Checksum:4345e035e35fde25e0739e457216a979

 ///  File Name: groundControl1007.txt
Description:
Ground Control II: Operation Exodus versions 1.0.0.7 and below is susceptible to a denial of service attack when a packet larger than the maximum size supported is received.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related Exploit:gc2boom.zip"
File Size:2246
Last Modified:Aug 31 02:54:13 2004
MD5 Checksum:279e738eb258ca3d2460e9855d873859

 ///  File Name: sa12254.txt
Description:
Secunia Security Advisory - Multiple vulnerabilities have been reported in Symantec Clientless VPN Gateway 4400 Series, where some have an unknown impact and others can be exploited to conduct cross-site scripting attacks or manipulate users' signon information.
Homepage:http://secunia.com/advisories/12254/
File Size:2223
Last Modified:Aug 11 02:30:13 2004
MD5 Checksum:4a9b8fb475f433345bee811648c1e855

 ///  File Name: nihuoXSS.txt
Description:
Nihuo Web Log Analyzer version 1.6 is susceptible to a cross site scripting attack.
Author:Audun Larsen
File Size:2177
Last Modified:Aug 24 08:44:20 2004
MD5 Checksum:c32a1e68f45854e1c94352646f397e13

 ///  File Name: mantisPHP.txt
Description:
Mantis suffers from a remote PHP code execution vulnerability when the REGISTER_GLOBAL variable is set.
Author:Joxean Koret
File Size:2151
Last Modified:Aug 24 08:58:44 2004
MD5 Checksum:42cc3d041e12b5bd891a088fe3d2331b

 ///  File Name: IEdetect.txt
Description:
Much like in the recent advisory about detection of directories in Opera, a similar method of detection has been discovered in Internet Explorer versions 6 and 5.
Author:Martin Aberastegue
Homepage:http://www.rzw.com.ar
Related File:gm009-op.txt
File Size:2095
Last Modified:Aug 26 20:39:56 2004
MD5 Checksum:fac2f3f45bed49b99f76b4e49dc789e4

 ///  File Name: comersus5098.txt
Description:
Comersus Cart versions 5.098 and below suffer from cross site scripting flaws.
Author:Abdul Azis
File Size:2073
Last Modified:Aug 5 06:44:54 2004
MD5 Checksum:c80bbcd6d12f0c85bf8dfa47251b4baa

 ///  File Name: sa12374.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in ignitionServer, which can be exploited by malicious people to cause a DoS (Denial of Service) on vulnerable systems. The vulnerability is caused due to insufficient restrictions on the SERVER command. The command is designed for server to server communication, but can be exploited by clients to introduce non-existing servers to the network. This can further be exploited to cause a DoS by introducing multiple servers, which can potentially flood the network. The vulnerability reportedly affect versions 0.1.2 through 0.3.1.
Homepage:http://secunia.com/advisories/12374/
File Size:2068
Last Modified:Aug 26 23:26:22 2004
MD5 Checksum:0a17fff5f0bfcfc42a7c6b42118e67a3

 ///  File Name: fusionPHP361.txt
Description:
Fusion News versions 3.6.1 and below suffer from a flaw that allows for unauthorized account additions.
Author:r3d5pik3
File Size:2065
Last Modified:Aug 5 06:21:49 2004
MD5 Checksum:724bd786fd9e306f7c7dfaa6bb4d1e86

 ///  File Name: sa12261.txt
Description:
Secunia Security Advisory - Microsoft has released an update for Exchange Server 5.5 SP4. This fixes a vulnerability, allowing malicious people to conduct script insertion attacks. The vulnerability is caused due to an input validation error in a HTML redirection query. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected website when a malicious entry is viewed. This vulnerability affects Microsoft Exchange 5.5 with Service Pack 4.
Homepage:http://secunia.com/advisories/12261/
File Size:2054
Last Modified:Aug 11 02:49:46 2004
MD5 Checksum:07b9deeae3068944868026d1ae63a15b

 ///  File Name: sa12375.txt
Description:
Secunia Security Advisory - A vulnerability exists in GNU a2ps 4.x that allows local users to escalate privileges due to insufficient validation of shell escape characters in filenames.
Author:Rudolf Polzer
Homepage:http://secunia.com/advisories/12375/
File Size:2045
Last Modified:Aug 31 02:31:49 2004
MD5 Checksum:390af2b49f5c43f1c0aa7f618c5738c1

 ///  File Name: advisory-20040811-2.txt
Description:
KDE Security Advisory - The Debian project was alerted that KDE's DCOPServer creates temporary files in an insecure manner. Since the temporary files are used for authentication related purposes this can potentially allow a local attacker to compromise the account of any user which runs a KDE application. Affected are version KDE 3.2.x up to KDE 3.2.3 inclusive.
Homepage:http://www.kde.org/info/security/advisory-20040811-2.txt
File Size:2040
Related CVE(s):CAN-2004-0690
Last Modified:Aug 12 10:00:52 2004
MD5 Checksum:586cb120613346465749ca546dd7eed2