Section:  .. / 0411-advisories  /

Page 5 of 7
<< 1 2 3 4 5 6 7 >> Files 100 - 125 of 167
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: sa13130.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in Samhain, which can be exploited by malicious, local users to gain escalated privileges. The vulnerability is caused due to a boundary error in the database update code. This can be exploited to cause a buffer overflow when a malicious directory is checked with Samhain. The vulnerability has been reported in versions 1.8.9 through 2.0.1.
Homepage:http://secunia.com/advisories/13130/
File Size:2283
Last Modified:Nov 10 08:34:00 2004
MD5 Checksum:7f879296efa6e2a310304673c46b41fe

 ///  File Name: sa13160.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in MIMEsweeper for SMTP, which potentially can be exploited by malware to bypass the scanning functionality.
Homepage:http://secunia.com/advisories/13160/
File Size:2269
Last Modified:Nov 12 21:35:19 2004
MD5 Checksum:a984a574a2189bc9d38899655187bddb

 ///  File Name: sa13086.txt
Description:
Secunia Security Advisory - plonk has discovered a weakness in Mozilla and Thunderbird, which can be exploited by malicious people to enumerate valid email addresses.
Homepage:http://secunia.com/advisories/13086/
File Size:2259
Last Modified:Nov 5 05:14:16 2004
MD5 Checksum:2df221e5e4772fe05b8868596a49a010

 ///  File Name: sa13071.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in Gallery, which can be exploited by malicious people to conduct script insertion attacks. Some unspecified input is not properly sanitised before being used. This can be exploited to inject arbitrary HTML and script code, which is executed in a user's browser session in context of an affected site when the malicious user data is viewed.
Homepage:http://secunia.com/advisories/13071/
File Size:2258
Last Modified:Nov 5 05:12:13 2004
MD5 Checksum:defbf0eb432caa1a5702da3935d28957

 ///  File Name: SSA-20041122-09.txt
Description:
STG Security Advisory: cscope is vulnerable to symlink attacks, potentially allowing a local user to overwrite arbitrary files with the right of the user running them, which could be root.
Author:Jeremy Bae
Homepage:http://stgsecurity.com/
File Size:2233
Last Modified:Dec 11 20:04:04 2004
MD5 Checksum:bf49f8764a822bfd3c05ed3e40c2795e

 ///  File Name: 000077.txt
Description:
Hat Squad Advisory - Helm Web Hosting Control Panel is susceptible to cross site scripting and SQL injection vulnerabilities. Versions 3.1.19 and below are affected.
Author:Behrang Fouladi
Homepage:http://www.hat-squad.com/
File Size:2208
Last Modified:Nov 5 04:39:12 2004
MD5 Checksum:78f326a40bba8360a83c0d4572bfe5d3

 ///  File Name: artikel53297.txt
Description:
Flaws in SP2 security features, part II - With Service Pack 2, Microsoft introduced a couple of new security features. However, some of them suffer from implementation flaws.
Author:Juergen Schmidt
Homepage:http://www.heise.de/
File Size:2195
Last Modified:Nov 20 22:36:35 2004
MD5 Checksum:3993ab9c51af04af4297e45da508af4f

 ///  File Name: sa13065.txt
Description:
Secunia Security Advisory - Lyndon Dubeau has reported a security issue in NetGear FWAG114 ProSafe Dual Band Wireless VPN Firewall, which can be exploited by malicious people to read or manipulate configuration information. The problem is that it is not possible to disable the SNMP service nor change the default SNMP community strings. The problem has been reported in firmware release 1.0.26RC4. Other versions may also be affected.
Homepage:http://secunia.com/advisories/13065/
File Size:2180
Last Modified:Nov 5 04:50:45 2004
MD5 Checksum:ad00d6dbd8ed9d711edd223e8328d5f8

 ///  File Name: cmailserver52.txt
Description:
Multiple vulnerabilities were found in CMailServer's Web Mail service including buffer overflow, SQL Injection and Cross-Site Scripting (XSS) flaws. CMailServer version 5.2 on English Win2K IIS 5.0 was tested.
Author:Tan Chew Keong
File Size:2156
Last Modified:Dec 11 20:57:29 2004
MD5 Checksum:18e7da6d843920c1103aac787da4ca16

 ///  File Name: sa13201.txt
Description:
Secunia Security Advisory - Digital-X has reported two vulnerabilities in Private Message System module for PunBB, which can be exploited by malicious people to conduct cross-site scripting attacks and disclose sensitive information.
Homepage:http://secunia.com/advisories/13201/
File Size:2136
Last Modified:Nov 20 22:04:09 2004
MD5 Checksum:a9fb59587b0afd3d421f5d668f85199e

 ///  File Name: sa13103.txt
Description:
Secunia Security Advisory - A vulnerability with an unknown impact has been reported in Sophos MailMonitor.
Homepage:http://secunia.com/advisories/13103/
File Size:2135
Last Modified:Nov 10 07:05:18 2004
MD5 Checksum:8e6abcac0e089a2f23c1fddef23f06d1

 ///  File Name: Ad20041026EN.txt
Description:
XDICT 2002 through 2005 all suffer from a buffer overrun vulnerability when attempting to examine a word for translation.
Author:Sowhat
Homepage:http://secway.org
File Size:2135
Last Modified:Nov 2 02:06:47 2004
MD5 Checksum:600a5a01f14eff1f7e10eb42afaf44d0

 ///  File Name: sa13085.txt
Description:
Secunia Security Advisory - Isno has reported a vulnerability in CCProxy, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to a boundary error within the handling of HTTP requests. This can be exploited to cause a buffer overflow by sending an overly long HTTP GET request. Successful exploitation may allow execution of arbitrary code. The vulnerability has been reported in version 6.0. Other versions may also be affected.
Homepage:http://secunia.com/advisories/13085/
File Size:2119
Last Modified:Nov 12 05:18:45 2004
MD5 Checksum:f8e9e21468038e4d502605da4bf8a84c

 ///  File Name: sa13104.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in JAF CMS, which can be exploited by malicious people to disclose sensitive information.
Homepage:http://secunia.com/advisories/13104/
File Size:2092
Last Modified:Nov 10 08:06:47 2004
MD5 Checksum:7d5b85212d50b3e130c1de3a00e485a1

 ///  File Name: opendchub0714.txt
Description:
A buffer overflow exists in the Open Dc Hub program that allows for arbitrary code execution. Version 0.7.14 is affected.
Author:Donato Ferrante
Homepage:http://www.autistici.org/fdonato
Related Exploit:OpenDcHub-poc.zip"
File Size:2088
Last Modified:Dec 11 20:24:01 2004
MD5 Checksum:f83cf3e535f608591f57480c20e2f368

 ///  File Name: sa13331.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in FreeImage, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system.
Homepage:http://secunia.com/advisories/13331/
File Size:2082
Last Modified:Dec 12 00:30:52 2004
MD5 Checksum:f23b4b8b9bc68e1143acc35f37c380aa

 ///  File Name: sa13073.txt
Description:
Secunia Security Advisory - Some vulnerabilities have been reported in Gbook MX, which can be exploited by malicious people to conduct SQL injection attacks. Gbook MX fails to verify input passed to various scripts properly before it is used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
Homepage:http://secunia.com/advisories/13073/
File Size:2080
Last Modified:Nov 5 05:09:59 2004
MD5 Checksum:7b5d24ef6e01f64d2d33ba9acb8cc978

 ///  File Name: sa13135.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in SQLgrey Postfix greylisting service, which can be exploited by malicious people to conduct SQL injection attacks.
Homepage:http://secunia.com/advisories/13135/
File Size:2060
Last Modified:Nov 10 08:35:33 2004
MD5 Checksum:9f6c9f8097901c09f79bec2c36439e3b

 ///  File Name: wsftp503.txt
Description:
Multiple buffer overflows exist in WS_FTP Server Version 5.03, 2004.10.14. There are four vulnerable commands that can be used to cause these buffer overflows. Three of the vulnerable commands can be used to stop the WS_FTP Server service resulting in a denial of service. The vulnerable commands are SITE, XMKD, MKD, and RNFR.
Author:Reed Arvin
Related Exploit:IPSWSFTP-exploit.c"
File Size:2019
Last Modified:Dec 12 00:12:07 2004
MD5 Checksum:8965bc3c144815e73d70ee13c356263a

 ///  File Name: halocboom.txt
Description:
Halo: Combat Evolved versions 1.05 and below suffer from a remote denial of service vulnerability.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related Exploit:halocboom.zip"
File Size:2004
Last Modified:Dec 11 19:28:57 2004
MD5 Checksum:eec6db6ecee16cef1ba273f45a2a9095

 ///  File Name: sa13198.txt
Description:
Secunia Security Advisory - Frank Mileto has discovered a vulnerability in Spy Sweeper Enterprise, which can be exploited by malicious, local users to disclose sensitive information.
Homepage:http://secunia.com/advisories/13198/
File Size:1974
Last Modified:Nov 20 22:01:11 2004
MD5 Checksum:884ac589353de1d56c4374a334fb30da

 ///  File Name: urlSpoofMSIE.txt
Description:
There is a security bug in Microsoft Internet Explorer, which allows to show any faked target-address in the status bar of the window. Tested in Microsoft Internet Explorer 6 SP1 (6.0.2800.1106) with all patches installed on Windows 98.
Author:Benjamin Tobias Franz
File Size:1942
Last Modified:Nov 5 05:03:50 2004
MD5 Checksum:b82e2cc260d1b64d199dc6847af1468a

 ///  File Name: squirrelXSS.txt
Description:
SquirrelMail versions 1.4.3a and below suffer from a cross site scripting issue in the decoding of encoded text in certain headers. It correctly decodes the specially crafted header, but does not sanitize the decoded strings.
Author:Joost Pol
Homepage:http://www.squirrelmail.org
File Size:1939
Last Modified:Nov 12 04:41:47 2004
MD5 Checksum:e2157d9b8a998aad296e8c1f503db370

 ///  File Name: msboftools.txt
Description:
Microsoft tools ipconfig.exe, forcedos.exe, and mrinfo.exe suffer from buffer overflow and format string vulnerabilities.
Author:Martin Eiszner
File Size:1919
Last Modified:Nov 20 22:40:07 2004
MD5 Checksum:919154fd2dfec8c6135a1a5529455bf7

 ///  File Name: ipcop141.txt
Description:
IPCop suffers from a cross site scripting vulnerability in proxylog.dat. Version 1.4.1 is affected. Older versions have not been tested.
Author:Paul Kurczaba
File Size:1908
Last Modified:Dec 12 00:46:22 2004
MD5 Checksum:d238e5bafa11188833b7f516a3580804