Section:  .. / 0411-advisories  /

Page 2 of 7
<< 1 2 3 4 5 6 7 >> Files 25 - 50 of 167
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: ieloop.txt
Description:
Another MSIE flaw that allows for a nest sort loop to cause an exception.
Author:Skylined
Homepage:http://www.edup.tudelft.nl/~bjwever
File Size:1017
Last Modified:Dec 11 21:01:00 2004
MD5 Checksum:ae052c32d2f1da0062351cedb471afd7

 ///  File Name: insiteprod.txt
Description:
Various insite products suffer from cross site scripting attacks.
Author:Carlos Ulver
File Size:951
Last Modified:Dec 11 20:58:26 2004
MD5 Checksum:dff8e7068041165dcb97077fba9fc73d

 ///  File Name: cmailserver52.txt
Description:
Multiple vulnerabilities were found in CMailServer's Web Mail service including buffer overflow, SQL Injection and Cross-Site Scripting (XSS) flaws. CMailServer version 5.2 on English Win2K IIS 5.0 was tested.
Author:Tan Chew Keong
File Size:2156
Last Modified:Dec 11 20:57:29 2004
MD5 Checksum:18e7da6d843920c1103aac787da4ca16

 ///  File Name: swbfp.txt
Description:
Star Wars Battlefront versions 1.11 and below suffer from buffer overflow and arbitrary memory access flaws.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related Exploit:swbfp.zip"
File Size:3647
Last Modified:Dec 11 20:50:46 2004
MD5 Checksum:c3912ae0b050b34f155ae1147426f5ae

 ///  File Name: msScreen.txt
Description:
Anything with the capabilities of changing a screen saver under Windows XP theoretically can execute with anything with SYSTEM privileges.
Author:Matthew Walker
File Size:975
Last Modified:Dec 11 20:41:05 2004
MD5 Checksum:5190686d7e3ee70ccb15b0f7981212d0

 ///  File Name: sa13301.txt
Description:
Secunia Security Advisory - Cassiopeia has reported a security issue in RediCart and S-Mart Shopping Cart Script, allowing malicious people to view the configuration file.
Homepage:http://secunia.com/advisories/13301/
File Size:1788
Last Modified:Dec 11 20:26:28 2004
MD5 Checksum:69ca0c3787d7f634e2194a18ee92742b

 ///  File Name: opendchub0714.txt
Description:
A buffer overflow exists in the Open Dc Hub program that allows for arbitrary code execution. Version 0.7.14 is affected.
Author:Donato Ferrante
Homepage:http://www.autistici.org/fdonato
Related Exploit:OpenDcHub-poc.zip"
File Size:2088
Last Modified:Dec 11 20:24:01 2004
MD5 Checksum:f83cf3e535f608591f57480c20e2f368

 ///  File Name: sa13259.txt
Description:
Secunia Security Advisory - Joey Hess has reported a vulnerability in wmFrog, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges.
Homepage:http://secunia.com/advisories/13259/
File Size:1862
Last Modified:Dec 11 20:21:12 2004
MD5 Checksum:002bfa3008e3348878d274117302e326

 ///  File Name: sa13300.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in PHPNews, which can be exploited by malicious people to conduct SQL injection attacks.
Homepage:http://secunia.com/advisories/13300/
File Size:1732
Last Modified:Dec 11 20:15:19 2004
MD5 Checksum:739d2c6d42640cfbdfa30dfbf0473839

 ///  File Name: glsa-200411-33.txt
Description:
Gentoo Linux Security Advisory GLSA 200411-33 - A bug in the TWiki search function allows an attacker to execute arbitrary commands with the permissions of the user running TWiki.
Homepage:http://security.gentoo.org/
File Size:2778
Last Modified:Dec 11 20:13:52 2004
MD5 Checksum:ccbda51539f215d9fc5b58a69eecc7f1

 ///  File Name: glsa-200411-32.txt
Description:
Gentoo Linux Security Advisory GLSA 200411-32 - phpBB contains a vulnerability which allows a remote attacker to execute arbitrary commands with the rights of the web server user.
Homepage:http://security.gentoo.org/
File Size:3497
Last Modified:Dec 11 20:13:08 2004
MD5 Checksum:9fc2a7d7d045d34c68e8b3c25e14c2ef

 ///  File Name: ADLAB-04002.txt
Description:
There is a remote buffer overflow in the C2S module of Jabberd 2.x which allows attackers to crash the Jabberd sever and possibly execute arbitrary code.
Author:icbm
File Size:16861
Related CVE(s):CAN-2004-0953
Last Modified:Dec 11 20:10:39 2004
MD5 Checksum:327661b7a2bda25c6b5153ae00300914

 ///  File Name: SSA-20041122-09.txt
Description:
STG Security Advisory: cscope is vulnerable to symlink attacks, potentially allowing a local user to overwrite arbitrary files with the right of the user running them, which could be root.
Author:Jeremy Bae
Homepage:http://stgsecurity.com/
File Size:2233
Last Modified:Dec 11 20:04:04 2004
MD5 Checksum:bf49f8764a822bfd3c05ed3e40c2795e

 ///  File Name: sof2boom.txt
Description:
Soldier of Fortune II versions 1.0.3 gold and below suffers from a typical sprintf() overflow that allows for remote code execution.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related Exploit:sof2boom.zip"
File Size:2312
Last Modified:Dec 11 19:54:20 2004
MD5 Checksum:63a37cbc9afde3c58117db8f263faed7

 ///  File Name: glsa-200411-31.txt
Description:
Gentoo Linux Security Advisory GLSA 200411-31 - ProZilla contains several buffer overflow vulnerabilities that can be exploited by a malicious server to execute arbitrary code with the rights of the user running ProZilla.
Homepage:http://security.gentoo.org/
File Size:2996
Last Modified:Dec 11 19:50:28 2004
MD5 Checksum:85f24611e07ca211e1fd687a36047e1d

 ///  File Name: sa13263.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in various F-Secure products, which can be exploited by malware to bypass certain scanning functionality.
Homepage:http://secunia.com/advisories/13263/
File Size:3871
Last Modified:Dec 11 19:49:21 2004
MD5 Checksum:19bee47fa2d4c055536e479f1212491e

 ///  File Name: sa13261.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in SecretSanta, which can be exploited by malicious users to bypass some security restrictions. The problem is that a new group can be created with the same name as a previously created group, which causes the administrative user of the new group to be incorrectly assigned to the previous group.
Homepage:http://secunia.com/advisories/13261/
File Size:1799
Last Modified:Dec 11 19:45:20 2004
MD5 Checksum:93b1a44272beb1fa01a4231885beeb59

 ///  File Name: sa13277.txt
Description:
Secunia Security Advisory - Aaron has reported a vulnerability in iCal, which potentially can be exploited by malicious people to compromise a user's system.
Homepage:http://secunia.com/advisories/13277/
File Size:1585
Last Modified:Dec 11 19:44:32 2004
MD5 Checksum:f36d7527f56fe70944b38faef3e2ebe3

 ///  File Name: glsa-200411-30.txt
Description:
Gentoo Linux Security Advisory GLSA 200411-30 - pdftohtml includes vulnerable Xpdf code to handle PDF files, making it vulnerable to execution of arbitrary code upon converting a malicious PDF file.
Homepage:http://security.gentoo.org/
File Size:2674
Last Modified:Dec 11 19:42:07 2004
MD5 Checksum:14287e579c93c5182ea4ab69d33858b0

 ///  File Name: sunjava.txt
Description:
A vulnerability in Java Plugin allows an attacker to create an Applet which can disable Java's security restrictions and break out of the Java sandbox. The attack can be launched when a victim views a web page created by the attacker. Further user interaction is not required as Java Applets are normally loaded and started automatically. Versions affected are below 1.4.2_06.
Author:Jouko Pynnonen
Homepage:http://iki.fi/jouko/
File Size:3055
Last Modified:Dec 11 19:41:10 2004
MD5 Checksum:cfc32dc03acc5ffbde59bf5570ae0aca

 ///  File Name: winamp505.txt
Description:
Detailed analysis and overview of the Winamp 5.05 vulnerability recently patched.
Author:Brett Moore
Homepage:http://security-assessment.com/
File Size:3892
Last Modified:Dec 11 19:39:30 2004
MD5 Checksum:24b1db34abd1449688876f4b51823628

 ///  File Name: secureCRTrce.txt
Description:
SecureCRT versions 4.1 and 4.0 suffer from flaws that allow for remote compromise due to links automatically launching the application.
Author:Brett Moore
Homepage:http://security-assessment.com/
File Size:4401
Last Modified:Dec 11 19:37:36 2004
MD5 Checksum:8210ae378698fdfe344c519600742518

 ///  File Name: 152004.txt
Description:
Cyrus IMAP server versions 2.2.8 and below suffer from several vulnerabilities that allow for remote code execution.
Author:Stefan Esser
Homepage:http://security.e-matters.de/
File Size:6248
Related CVE(s):CAN-2004-1011, CAN-2004-1012, CAN-2004-1013
Last Modified:Dec 11 19:33:04 2004
MD5 Checksum:376d387fe5ca3758423f2541a97b5b72

 ///  File Name: halocboom.txt
Description:
Halo: Combat Evolved versions 1.05 and below suffer from a remote denial of service vulnerability.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related Exploit:halocboom.zip"
File Size:2004
Last Modified:Dec 11 19:28:57 2004
MD5 Checksum:eec6db6ecee16cef1ba273f45a2a9095

 ///  File Name: prevxhome.txt
Description:
Prevx Home's registry and buffer overflow protection features are implemented by hooking several native APIs in kernel-space by modifying entries within the SDT ServiceTable. This means that a malicious program with Administrator privilege can disable these features by restoring the running kernel's SDT ServiceTable with direct writes to \device\physicalmemory. Verified against Prevx Home Version 1.0 Build 2.1.0.0 on WinXP SP0, SP2.
Author:Tan Chew Keong
Homepage:http://www.security.org.sg/vuln/prevxhome.html
File Size:2726
Last Modified:Dec 11 19:16:26 2004
MD5 Checksum:986c79fd4f992cf251df0feb34f55926