Section:  .. / 0408-advisories  /

Page 6 of 6
<< 1 2 3 4 5 6 >> Files 125 - 147 of 147
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: putty-advisory.txt
Description:
Putty client versions below 0.55 suffer from a flaw that allow for arbitrary code execution.
Author:Daniel De Luca, Laura Nunez, Carlos Sarraute
Homepage:http://www.coresecurity.com/common/showdoc.php?idx=417&idxseccion=10
File Size:5111
Last Modified:Aug 5 08:02:44 2004
MD5 Checksum:031610ab69b910612eebb07fdf17a6bf

 ///  File Name: wackowikixss.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in WackoWiki, which can be exploited by malicious people to conduct cross-site scripting attacks.
Homepage:http://secunia.com/advisories/12209/
File Size:1636
Last Modified:Aug 5 07:54:42 2004
MD5 Checksum:1419d7517865ed3c9e004b9f36734403

 ///  File Name: screenos-sshv1-2.txt
Description:
Juniper Networks NetScreen Advisory 59147 - A malicious person who can connect to the SSHv1 service on a Juniper Networks Netscreen firewall can crash the device before having to authenticate. Upon execution of the attack, the firewall will reboot or hang, which will prevent traffic to flow through the device.
Author:Mark Ellzey Thomas
Homepage:http://www.juniper.net/support/security/
File Size:3495
Last Modified:Aug 5 07:53:43 2004
MD5 Checksum:c5ea2a451b58630a35310e30ce362a07

 ///  File Name: 57613.html
Description:
Sun Security Advisory - The XSLT processor included with the Java Runtime Environment (JRE) may allow an untrusted applet to read data from another applet that is processed using the XSLT processor and may allow the untrusted applet to escalate privileges. All variants of Sun Java JRE 1.4.x and Sun Java SDK 1.4.x are affected, except releases 1.4.2_05 and above.
Author:Marc Schoenefeld
Homepage:http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57613
File Size:5965
Last Modified:Aug 5 07:26:27 2004
MD5 Checksum:d87c0af157537d5cd6452d44facff79a

 ///  File Name: 08.02.04.txt
Description:
iDEFENSE Security Advisory 08.02.04: Netscape version 7.0, 7.1, and Mozilla 1.6 are susceptible to a SOAPParameter constructor integer overflow vulnerability that can allow for arbitrary code execution running in the context of the user running the browser.
Author:zen-parse
Homepage:http://www.idefense.com/application/poi/display?id=117
File Size:3412
Related CVE(s):CAN-2004-0722
Last Modified:Aug 5 07:17:45 2004
MD5 Checksum:3a271bc80b97cfa87b2e71e086f470a7

 ///  File Name: WHMAutoPilot.txt
Description:
A vulnerability in WHM Autopilot versions 2.4.5 and below allows malicious attackers the ability to access usernames and clear text passwords.
Author:MS Blows
File Size:5881
Last Modified:Aug 5 07:12:46 2004
MD5 Checksum:a1377c8babf5c6cad23638d2e86f45e8

 ///  File Name: ripMIME.txt
Description:
A security flaw in ripMIME version 1.x allows attackers to bypass filtering software.
Homepage:http://www.pldaniels.com/ripmime/CHANGELOG
File Size:665
Last Modified:Aug 5 07:06:56 2004
MD5 Checksum:096acc5cdc5f1361b2c6174229e47b36

 ///  File Name: oracleEscalation.txt
Description:
Any oracle, ias, iasr2, or iasdb users with local access to an Oracle database can gain root privileges through the Oracle installation. Versions affected include, but are not limited to: Oracle 8i Linux Platform, Oracle 9i Linux Platform, Oracle 8i HP-UX Platform, Oracle 9i Solaris Platform, Oracle IAS 9.0.2.0.1 with patchset v9.0.2.3.
Author:Juan Manuel Pascual Escriba
File Size:3715
Last Modified:Aug 5 06:54:00 2004
MD5 Checksum:a6d3218940b0ca97752342306326a083

 ///  File Name: SA-20040802.txt
Description:
A denial of service vulnerability exists in GnuTLS versions prior to 1.0.17. The flaw lies in a failure to handle overly long RSA keys.
Author:Patrik Hornik
Homepage:http://www.hornik.sk/SA/SA-20040802.txt
File Size:2986
Last Modified:Aug 5 06:48:42 2004
MD5 Checksum:05475259543d443fb7f1c2f23e08279c

 ///  File Name: comersus5098.txt
Description:
Comersus Cart versions 5.098 and below suffer from cross site scripting flaws.
Author:Abdul Azis
File Size:2073
Last Modified:Aug 5 06:44:54 2004
MD5 Checksum:c80bbcd6d12f0c85bf8dfa47251b4baa

 ///  File Name: usrAPdos.txt
Description:
USRobotics Access Point version 1.21h embeds an HTTP server that is susceptible to a buffer overflow when an overly long GET request is supplied.
Author:Albert Puigsech Galicia
File Size:2981
Last Modified:Aug 5 06:41:49 2004
MD5 Checksum:88284e7e4826303e32549aa9cf7822a8

 ///  File Name: SCOSA-2004.2.txt
Description:
SCO Security Advisory - A buffer overflow in ReadFontAlias from dirfile.c of Xsco may allow local users and remote attackers to execute arbitrary code via a font alias file with a long token. Another buffer overflow in the ReadFontAlias function in Xsco, when using the CopyISOLatin1Lowered function, may allow local or remote authenticated users to execute arbitrary code via a malformed entry in the font alias file.
Homepage:http://www.sco.com/support/forums/security.html
File Size:3315
Related CVE(s):CAN-2004-0083, CAN-2004-0084, CAN-2004-0106
Last Modified:Aug 5 06:33:13 2004
MD5 Checksum:67ac91bfcd330d241163afdfe847e8d3

 ///  File Name: fusionPHP361.txt
Description:
Fusion News versions 3.6.1 and below suffer from a flaw that allows for unauthorized account additions.
Author:r3d5pik3
File Size:2065
Last Modified:Aug 5 06:21:49 2004
MD5 Checksum:724bd786fd9e306f7c7dfaa6bb4d1e86

 ///  File Name: jaw04.txt
Description:
A vulnerability exists in jaws 0.4 that allows anyone to get in the control panel with administrator rights without a password due to a SQL injection flaw.
Author:Fernando Quintero
File Size:4372
Last Modified:Aug 5 06:19:52 2004
MD5 Checksum:23a75393fe4c2cebd56b9b784d269fdc

 ///  File Name: TA04-212A.txt
Description:
Technical Cyber Security Alert TA04-212A - Microsoft Internet Explorer contains three vulnerabilities that may allow arbitrary code to be executed. The privileges gained by a remote attacker depend on the software component being attacked. For example, a user browsing to an unsafe web page using Internet Explorer could have code executed with the same privilege as the user. These vulnerabilities have been reported to be relatively straightforward to exploit; even vigilant users visiting a malicious website, viewing a malformed image, or reading an HTML-rendered email message may be affected.
Homepage:http://www.cert.org/
File Size:7890
Last Modified:Aug 5 06:09:22 2004
MD5 Checksum:eca2b08fadf892d543653192b8d317d0

 ///  File Name: sa12192.txt
Description:
Secunia Security Advisory - Microsoft has issued an update for Internet Explorer. This fixes three vulnerabilities, allowing malicious websites to cause a DoS or compromise a system.
Homepage:http://secunia.com/advisories/12192/
File Size:3557
Related CVE(s):CAN-2004-0549, CAN-2004-0566, CAN-2003-1048
Last Modified:Aug 5 06:00:21 2004
MD5 Checksum:f3d8b890b958ba937adaa5d7a8752ce5

 ///  File Name: dansguardian.txt
Description:
DansGuardian versions 2.8 and below may allow malicious users to bypass the extension filter rules when processing URLs which contain a hex encoded filename.
Author:Ruben Molina
File Size:1496
Last Modified:Aug 5 05:38:42 2004
MD5 Checksum:75d1c482dc37dc06083928e92c873dab

 ///  File Name: linpha094.txt
Description:
LinPHA versions 0.9.4 suffers from SQL injection attacks due to an input validation error in the session.php script.
Author:Fernando Quintero
File Size:3498
Last Modified:Aug 5 05:33:56 2004
MD5 Checksum:bc923b52c211af7d22d58e85dafdf899

 ///  File Name: VSA0402.txt
Description:
A format string vulnerability exists in OpenFTPD versions up to 0.30.2.
Author:Thomas Wana, Andi
Homepage:http://void.at/
File Size:2574
Last Modified:Aug 5 05:31:06 2004
MD5 Checksum:c8cfa23176f37c10e27efa230bf3a93f

 ///  File Name: lostBook11.txt
Description:
A vulnerability in lostBook versions 1.1 and below allows script insertion attacks.
Author:r3d5pik3
File Size:1560
Last Modified:Aug 5 05:29:21 2004
MD5 Checksum:93bd8127b8e7e100d64c9c254a39fc7c

 ///  File Name: 08.03.04.txt
Description:
iDEFENSE Security Advisory 08.03.04: NGSEC StackDefender 1.10 vulnerable to remote/local Denial of Service which may crash the underlying system.
Homepage:http://www.idefense.com
File Size:3518
Related CVE(s):CAN-2004-0766
Last Modified:Aug 4 14:20:23 2004
MD5 Checksum:15c814b567f0ab46d764c09bd2293e74

 ///  File Name: 20040801_01_P.asc
Description:
Two specific flaws may allow for local root exploit of systems with CDE (Common Desktop Environment) less than 5.3.4.
Homepage:ftp://patches.sgi.com/support/free/security/advisories/20040801-01-P.asc
File Size:7532
Related CVE(s):CAN-2003-0834
Last Modified:Aug 4 14:09:48 2004
MD5 Checksum:91bc9abd5fc1b0b77c943346e7e8ffdf