Section:  .. / 0408-advisories  /

Page 2 of 6
<< 1 2 3 4 5 6 >> Files 25 - 50 of 147
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: SpecificMAIL.theft.txt
Description:
SpecificMAIL, a freeware spam filter for Outlook and Outlook Express, happens to be extremely intrusive and acts more as spyware than a useful utility to users. Buyer beware.
Author:N. DeBaggis
File Size:5190
Last Modified:Aug 17 01:52:42 2004
MD5 Checksum:b2a57feb9c389957fc49a35fab203589

 ///  File Name: security-advisory-001.html
Description:
Xephyrus Libraries Security Advisory JST-001 - JST versions 3.0 and below are susceptible to a directory traversal vulnerability in the Xephyrus Java Simple Template Engine.
Homepage:http://www.xephyrus.com/
File Size:5147
Last Modified:Aug 17 05:53:46 2004
MD5 Checksum:06c7deccf68d557e189b22e8d12ea941

 ///  File Name: putty-advisory.txt
Description:
Putty client versions below 0.55 suffer from a flaw that allow for arbitrary code execution.
Author:Daniel De Luca, Laura Nunez, Carlos Sarraute
Homepage:http://www.coresecurity.com/common/showdoc.php?idx=417&idxseccion=10
File Size:5111
Last Modified:Aug 5 08:02:44 2004
MD5 Checksum:031610ab69b910612eebb07fdf17a6bf

 ///  File Name: mantis.txt
Description:
Mantis is susceptible to multiple cross site scripting vulnerabilities.
Author:Joxean Koret
File Size:5070
Last Modified:Aug 24 08:51:40 2004
MD5 Checksum:6896f72f2835a6235ef933293bc19c87

 ///  File Name: dsa-541.txt
Description:
Debian Security Advisory DSA 541-1 - In icecast-server, the UserAgent variable is not properly html_escaped allowing an an attacker the ability to cause the client to execute arbitrary Java script commands.
Author:Martin Schulze
Homepage:http://www.debian.org/security/
File Size:4795
Related CVE(s):CAN-2004-0781
Last Modified:Aug 26 20:19:42 2004
MD5 Checksum:4ac93631fadd1df088d9fd3136a56b1e

 ///  File Name: adv03-y3dips-2004.txt
Description:
JetboxOne CMS version 2.0.8 keeps system passwords in an unencrypted state and also has a remote code execution flaw.
Author:y3dips
Homepage:http://y3dips.echo.or.id/
File Size:4750
Last Modified:Aug 5 08:12:20 2004
MD5 Checksum:752a4e9ece4d9839fe95cfbf85265b8a

 ///  File Name: cacti085a.txt
Description:
CACTI version 0.8.5a suffers from full path disclosure and SQL injection vulnerabilities that allow for complete authentication bypass.
Author:Fernando Quintero aka nonroot
File Size:4656
Last Modified:Aug 18 02:45:57 2004
MD5 Checksum:0f12a17d5f1bc8d2a0cd51d11a14bd27

 ///  File Name: adv04-y3dips-2004.txt
Description:
PHP-Fusion version 4.00 has a full path disclosure vulnerability and a flaw that allows an attacker to download the database backup file that can be used to gain administrative access.
Author:y3dips
Homepage:http://echo.or.id/adv/adv04-y3dips-2004.txt
File Size:4581
Last Modified:Aug 19 10:48:40 2004
MD5 Checksum:d0374134c5331166a92e979e90f26c9b

 ///  File Name: 08.05.04.txt
Description:
iDEFENSE Security Advisory 08.05.04: Remote exploitation of a design error vulnerability in Thompson's SpeedTouch Home ADSL modem allows attackers to spoof TCP traffic on behalf of the device.
Homepage:http://www.idefense.com/application/poi/display?id=120
File Size:4479
Related CVE(s):CAN-2004-0641
Last Modified:Aug 6 20:58:41 2004
MD5 Checksum:a8b4d8e57a1d17dacac166231ba15b2b

 ///  File Name: 08112004-1.txt
Description:
BlackIce Server Protect versions 3.6cno and below from Internet Security Systems installs a firewall ruleset that can be removed or modified by any trusted or local unprivileged user.
Author:Thomas Ryan, Paul Craig
File Size:4412
Last Modified:Aug 12 10:15:21 2004
MD5 Checksum:0eef793b3c7c3fea0a7027ca07b5e177

 ///  File Name: jaw04.txt
Description:
A vulnerability exists in jaws 0.4 that allows anyone to get in the control panel with administrator rights without a password due to a SQL injection flaw.
Author:Fernando Quintero
File Size:4372
Last Modified:Aug 5 06:19:52 2004
MD5 Checksum:23a75393fe4c2cebd56b9b784d269fdc

 ///  File Name: ptl-2004-03.txt
Description:
An unauthenticated remote attacker can submit various malformed service requests via Bluetooth, triggering a buffer overflow and executing arbitrary code on vulnerable devices using WIDCOMM Bluetooth Connectivity Software. All releases prior to 3.0 are affected.
Author:Mark Rowe, Matt Moore
Homepage:http://www.pentest.co.uk/documents/ptl-2004-03.html
File Size:4337
Related CVE(s):CAN-2004-0775
Last Modified:Aug 12 09:41:46 2004
MD5 Checksum:bfed25095a7e4597170fa58ba13ae4a0

 ///  File Name: sredird.txt
Description:
sredird versions 2.2.1-1 and below suffer from a format string bug and a buffer overflow that may let remote users execute arbitrary code.
Author:Max Vozeler
File Size:4286
Last Modified:Aug 26 21:10:27 2004
MD5 Checksum:cad9ea9b796dc1cc4e5cbd09351fac2d

 ///  File Name: 08.25.04-2.txt
Description:
iDEFENSE Security Advisory 08.25.04-2 - Exploitation of a buffer overflow in the libDtHelp library included with CDE can allow local attackers to gain root privileges. The vulnerability specifically exists due to a lack of bounds checking on the LOGNAME environment variable. Local attackers can specify a long LOGNAME to trigger a buffer overflow in any application linked with libDtHelp. The overflow is activated once the help subsystem is accessed by selecting any option under the Help menu.
Homepage:http://www.idefense.com/
File Size:4214
Related CVE(s):CAN-2003-0834
Last Modified:Aug 26 23:53:32 2004
MD5 Checksum:78f592957d67bd46e19e9549026d4408

 ///  File Name: webchat.txt
Description:
Free Web Chat suffers from both denial of service and resource allocation bugs.
Author:Donato Ferrante
Homepage:http://www.autistici.org/fdonato
File Size:4195
Last Modified:Aug 5 09:00:53 2004
MD5 Checksum:324b4b3bdaaa4f1883beae438580b2b9

 ///  File Name: gm008-op.txt
Description:
GreyMagic Security Advisory GM#008-OP - Opera versions 7.53 and below on Windows, Linux and Macintosh fail to block write-access to the often-used location object, allowing an attacker to gain immediate script access to any webpage.
Homepage:http://www.greymagic.com/security/advisories/gm008-op/
File Size:4091
Last Modified:Aug 7 22:26:42 2004
MD5 Checksum:6cc54f7d3c3f95e52dbbea817fd6f10f

 ///  File Name: suphp-advisory.txt
Description:
MOD_SUPHP is an Apache module that allows php scripts to run as users rather than the www-data user. A condition exists that would allow an attacker to use this module to run arbitrary code.
Author:Steven Van Acker
File Size:3966
Related OSVDB(s):9156
Last Modified:Aug 26 04:02:01 2004
MD5 Checksum:45f90e4fc4ffcce292b38d4d8ee7cfd4

 ///  File Name: c031120-001.txt
Description:
Corsaire Security Advisory - Sygate Enforcer 4.0 and prior releases are susceptible to a denial of service attack via malformed discovery packets.
Author:Martin O'Neal
Homepage:http://www.corsaire.com/
File Size:3940
Related CVE(s):CAN-2003-0931
Last Modified:Aug 11 02:42:43 2004
MD5 Checksum:de1fb9fa753cec65d523201d6f548a38

 ///  File Name: glsa-200408-16.txt
Description:
Gentoo Linux Security Advisory GLSA 200408-16 - glibc contains an information leak vulnerability allowing the debugging of SUID binaries. Versions 2.3.2 and below are affected.
Author:Silvio Cesare
Homepage:http://security.gentoo.org/
File Size:3915
Last Modified:Aug 19 08:42:07 2004
MD5 Checksum:30efee828e4fe1b73bdad7234480c68d

 ///  File Name: c031120-002.txt
Description:
Corsaire Security Advisory - Sygate Secure Enterprise versions prior to 3.5MR3 are susceptible to a replay attack that allows for resource exhaustion.
Author:Martin O'Neal
Homepage:http://www.corsaire.com/
File Size:3882
Related CVE(s):CAN-2004-0163
Last Modified:Aug 11 02:45:12 2004
MD5 Checksum:de6daa25dc2e5829b7afc4c72f3c43c3

 ///  File Name: 08.16.04.txt
Description:
iDEFENSE Security Advisory 08.16.04: Remote exploitation of an information disclosure vulnerability in Concurrent Versions Systems (CVS) allows attackers to glean information. The vulnerability exists within an undocumented switch to the history command implemented in src/history.c. The -X command specifies the name of the history file allowing an attacker to determine whether arbitrary system files and directories exist and whether or not the CVS process has access to them. This issue was patched in the latest (June 9th) releases of CVS, specifically 1.11.17 and 1.12.9.
Homepage:http://www.idefense.com/
File Size:3869
Related CVE(s):CAN-2004-0778
Last Modified:Aug 18 02:17:21 2004
MD5 Checksum:2edc37463ad39dabd231753b349d0d18

 ///  File Name: 08.12.04.txt
Description:
iDEFENSE Security Advisory 08.12.04: Remote exploitation of an input validation error in the uudecoding feature of Adobe Acrobat Reader (Unix) 5.0 allows an attacker to execute arbitrary code. The Unix and Linux versions of Adobe Acrobat Reader 5.0 automatically attempt to convert uuencoded documents back into their original format. The vulnerability specifically exists in the failure of Acrobat Reader to check for the backtick shell metacharacter in the filename before executing a command with a shell. This allows a maliciously constructed filename to execute arbitrary programs.
Author:Greg MacManus
Homepage:http://www.idefense.com/
File Size:3843
Related CVE(s):CAN-2004-0630
Last Modified:Aug 13 16:32:37 2004
MD5 Checksum:b6cbe26848f77b783a6bee2a27019ee8

 ///  File Name: HS04-005_e.html
Description:
Hitachi Security Advisory - The JP1/File Transmission Server/FTP is susceptible to a denial of service attack. It would be seriously impressive if their advisories could be more vague.
Homepage:http://www.hitachi-support.com/security_e/vuls_e/HS04-005_e/index-e.html
File Size:3837
Last Modified:Aug 26 19:15:15 2004
MD5 Checksum:7cebbc56d7076439d5e39304f75270c3

 ///  File Name: 08.12.04-2.txt
Description:
iDEFENSE Security Advisory 08.12.04-2: Remote exploitation of a buffer overflow in the uudecoding feature of Adobe Acrobat Reader 5.0 for Unix allows an attacker to execute arbitrary code. The Unix and Linux versions of Adobe Acrobat Reader 5.0 automatically attempt to convert uuencoded docuements back into their original format. The vulnerability specifically exists in that Acrobat Reader fails to check the length of the filename before copying it into a fixed length buffer. This allows a maliciously constructed file to cause a buffer overflow resulting in the execution of arbitrary code.
Homepage:http://www.idefense.com/
File Size:3834
Related CVE(s):CAN-2004-0631
Last Modified:Aug 13 16:35:37 2004
MD5 Checksum:45369ed00a25fb0e94e908833a955e56

 ///  File Name: oracleEscalation.txt
Description:
Any oracle, ias, iasr2, or iasdb users with local access to an Oracle database can gain root privileges through the Oracle installation. Versions affected include, but are not limited to: Oracle 8i Linux Platform, Oracle 9i Linux Platform, Oracle 8i HP-UX Platform, Oracle 9i Solaris Platform, Oracle IAS 9.0.2.0.1 with patchset v9.0.2.3.
Author:Juan Manuel Pascual Escriba
File Size:3715
Last Modified:Aug 5 06:54:00 2004
MD5 Checksum:a6d3218940b0ca97752342306326a083