Section:  .. / 0412-advisories  /

Page 9 of 11
<< 1 2 3 4 5 6 7 8 9 10 11 >> Files 200 - 225 of 253
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: sa13492.txt
Description:
Secunia Security Advisory - A security issue has been reported in Windows XP SP2, which erroneously causes the firewall to allow connections from the Internet. The problem is caused by the way certain dialers configure the routing table and how local subnets are interpreted when the 'My network (subnet) only' option is used in the Microsoft Windows Firewall. This issue only affects Windows XP with Service Pack 2 in combination with a dial-up network connection.
Homepage:http://secunia.com/advisories/13492/
File Size:1946
Last Modified:Dec 30 10:40:12 2004
MD5 Checksum:f5a3acbe598e4e33576f61305734742b

 ///  File Name: sa13566.txt
Description:
Secunia Security Advisory - Bennett R. Samowich has discovered a security issue in Crypt::ECB, which makes it easier for malicious people to brute force passwords. The security issue is caused due to an error, where plain texts containing the ASCII character 0 is incorrectly encoded. This results in a weaker encryption and encoding collisions and may e.g. make it easier to brute force passwords. The issue has been confirmed on version 1.1. Other versions may also be affected.
Homepage:http://secunia.com/advisories/13566/
File Size:1797
Last Modified:Dec 31 19:55:24 2004
MD5 Checksum:27599e3eb5db6bf62855c6c1bff2ec96

 ///  File Name: sa13571.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in ArGoSoft Mail Server, which can be exploited by malicious people to conduct script insertion attacks.
Homepage:http://secunia.com/advisories/13571/
File Size:1725
Last Modified:Dec 31 10:18:38 2004
MD5 Checksum:87224581743819bf55962edc49693f7c

 ///  File Name: sa13572.txt
Description:
Secunia Security Advisory - Multiple vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or gain knowledge of potentially sensitive information. Kernel versions 2.6.9 and below may be affected.
Author:Darrick J. Wong, Thomas Hellstrom, Rob Landley
Homepage:http://secunia.com/advisories/13572/
File Size:2317
Last Modified:Dec 31 20:36:20 2004
MD5 Checksum:3807cb12e4412dae47dad72c97efb439

 ///  File Name: sa13576.txt
Description:
Secunia Security Advisory - Some vulnerabilities have been reported in PHPFormMail, which can be exploited by malicious people to conduct cross-site scripting attacks.
Homepage:http://secunia.com/advisories/13576/
File Size:1868
Last Modified:Dec 31 10:27:19 2004
MD5 Checksum:3522011c483948903568133734ac6b8e

 ///  File Name: sa13593.txt
Description:
Secunia Security Advisory - A weakness has been reported in Symantec Brightmail AntiSpam, which can be exploited by malicious people to cause a DoS (Denial of Service).
Homepage:http://secunia.com/advisories/13593/
File Size:1805
Last Modified:Dec 31 19:49:24 2004
MD5 Checksum:f7d8154710f751777c8dfd4f450e4c4f

 ///  File Name: sa13600.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in Namazu, which can be exploited by malicious people to conduct cross-site scripting attacks.
Homepage:http://secunia.com/advisories/13600/
File Size:1798
Last Modified:Dec 31 19:41:31 2004
MD5 Checksum:c66462ab3c216bd5290c1ebbeb3eca87

 ///  File Name: sa13618.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in Citrix Metaframe XP, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to an unspecified boundary error, which can be exploited to cause a buffer overflow. Successful exploitation may allow execution of arbitrary code.
Homepage:http://secunia.com/advisories/13618/
File Size:1728
Last Modified:Dec 31 21:10:14 2004
MD5 Checksum:f6b72450155b17e5609f420cfb8ddde5

 ///  File Name: sa13630.txt
Description:
Secunia Security Advisory - First Last has reported a weakness in CleanCache, which can be exploited by malicious people to disclose securely deleted data on a disk.
Homepage:http://secunia.com/advisories/13630/
File Size:1775
Last Modified:Jan 2 20:29:40 2005
MD5 Checksum:c4d38c96b00eabde9c68c7519a045417

 ///  File Name: sa13634.txt
Description:
Secunia Security Advisory - Nicolae Mihalache has reported a security issue in avelsieve, which potentially can be exploited by malicious users to cause a DoS (Denial of Service).
Homepage:http://secunia.com/advisories/13634/
File Size:1671
Last Modified:Dec 31 23:26:17 2004
MD5 Checksum:80fc9a8d4680fdd69e2dcabc51896311

 ///  File Name: sa13635.txt
Description:
Secunia Security Advisory - Two vulnerabilities have been reported in Rpm Finder, which can be exploited by malicious people to compromise a user's system and by malicious, local users to perform certain actions with escalated privileges.
Homepage:http://secunia.com/advisories/13635/
File Size:2039
Last Modified:Dec 31 22:55:49 2004
MD5 Checksum:1697b6efedeca34e4236ed6e1b44decb

 ///  File Name: sa13640.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in LPRng, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges.
Homepage:http://secunia.com/advisories/13640/
File Size:1836
Last Modified:Dec 31 22:10:19 2004
MD5 Checksum:aaf8d5f6b9983a156884f386aee0329e

 ///  File Name: sa13642.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in Docbook-to-Man, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges.
Homepage:http://secunia.com/advisories/13642/
File Size:1745
Last Modified:Dec 31 22:11:24 2004
MD5 Checksum:841d567be031f7fd31ca960150e64a09

 ///  File Name: sa13644.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in Crystal Enterprise, which can be exploited by malicious people to conduct cross-site scripting attacks.
Homepage:http://secunia.com/advisories/13644/
File Size:2413
Last Modified:Jan 2 20:15:15 2005
MD5 Checksum:0555ed56d6680e76b8a4edfa50f1e309

 ///  File Name: sa13654.txt
Description:
Secunia Security Advisory - Martin Schwidefsky has reported a vulnerability in the Linux Kernel, which can be exploited by malicious, local users to gain escalated privileges. The vulnerability is caused due to the SACF (Set Address Space Control Fast) control instruction being handled insecurely on the S/390 platform.
Homepage:http://secunia.com/advisories/13654/
File Size:1607
Last Modified:Jan 2 20:20:58 2005
MD5 Checksum:7d9c2635d6e0aee58d0144bdfa9ba8af

 ///  File Name: sa13660.txt
Description:
Secunia Security Advisory - cYon has reported a vulnerability in PHProjekt, which can be exploited by malicious people to compromise a vulnerable system. Input passed to the path_pre parameter in authform.inc.php is not properly verified, before it is used to include files. This can be exploited to include arbitrary files from external and local resources.
Homepage:http://secunia.com/advisories/13660/
File Size:1869
Last Modified:Jan 2 20:57:41 2005
MD5 Checksum:bbc0574d1e1eae53944a5d3f31e787fc

 ///  File Name: sa13665.txt
Description:
Secunia Security Advisory - snilabs has reported a security issue in PHP-Blogger, which can be exploited by malicious people to disclose sensitive information. The problem is that database files (.db) by default are stored inside the web root and are not correctly protected against being accessed directly on some server configurations. This can e.g. be exploited to disclose the admin password.
Homepage:http://secunia.com/advisories/13665/
File Size:1812
Last Modified:Jan 1 03:33:38 2005
MD5 Checksum:7af97deecc344ef6c750029906b994df

 ///  File Name: sa13670.txt
Description:
Secunia Security Advisory - Some vulnerabilities have been reported in Atari800, which can be exploited by malicious, local users to gain escalated privileges. The vulnerabilities are caused due to unspecified boundary errors and can be exploited to cause buffer overflows. Successful exploitation may allow execution of arbitrary code with escalated privileges, if the SVGAlib version is used in a setuid binary.
Homepage:http://secunia.com/advisories/13670/
File Size:1702
Last Modified:Jan 2 20:45:42 2005
MD5 Checksum:6c0022d8a0fd1daec785445e1fea355f

 ///  File Name: sa13671.txt
Description:
Secunia Security Advisory - Symantec has acknowledged three vulnerabilities in the Nexland Firewall Appliances, which can be exploited by malicious people to cause a DoS (Denial of Service), identify active services, and manipulate the firewall configuration.
Homepage:http://secunia.com/advisories/13671/
File Size:2277
Last Modified:Jan 2 21:13:12 2005
MD5 Checksum:110f14a17c20e3cf0838dad233a1ff87

 ///  File Name: sa13677.txt
Description:
Secunia Security Advisory - sullo has reported multiple vulnerabilities in Eventum, which can be exploited by malicious people to conduct cross-site scripting and script insertion attacks and potentially bypass certain security restrictions.
Homepage:http://secunia.com/advisories/13677/
File Size:2724
Last Modified:Jan 2 21:18:44 2005
MD5 Checksum:dcd60e2bb73e26378e1ab958b111aadc

 ///  File Name: sa13679.txt
Description:
Secunia Security Advisory - A vulnerability in aStats can be exploited by malicious, local users to perform certain actions on a vulnerable system to gain escalated privileges.
Homepage:http://secunia.com/advisories/13679/
File Size:1855
Last Modified:Jan 2 21:05:53 2005
MD5 Checksum:5e99e06d49c8e5d32d24af52f548f05a

 ///  File Name: sa13696.txt
Description:
Secunia Security Advisory - The vendor has acknowledged a vulnerability in kio_ftp, which can be exploited by malicious people to conduct FTP command injection attacks.
Homepage:http://secunia.com/advisories/13696/
File Size:1575
Last Modified:Jan 2 21:19:18 2005
MD5 Checksum:06ad05dd7b12d5c2f9d555081a20d6b0

 ///  File Name: sambaRemote.txt
Description:
Remote exploitation of an integer overflow vulnerability in the smbd daemon included in Samba 2.0.x, Samba 2.2.x, and Samba 3.0.x prior to and including 3.0.9 could allow an attacker to cause controllable heap corruption, leading to execution of arbitrary commands with root privileges.
Homepage:http://www.samba.org/
File Size:2488
Related CVE(s):CAN-2004-1154
Last Modified:Dec 30 09:54:35 2004
MD5 Checksum:51b3d15b606105f2c8e98b5768a8bf0d

 ///  File Name: SantyB.php.txt
Description:
Santy.b phpBB worm that affects versions 2.0.10 and below and installs a bot. Uses AOL/Yahoo search.
File Size:3312
Last Modified:Jan 2 19:53:15 2005
MD5 Checksum:f4c02459ecd6bf099c06b116417f8a3e

 ///  File Name: sec-consultPHP.txt
Description:
PHP 4.3.9 is susceptible to data segment memory corruption and information disclosure via memory dumping.
Author:Martin Eiszner
File Size:2564
Last Modified:Dec 30 09:28:41 2004
MD5 Checksum:be97382fa925148fa6e34e1147d94d1f