Section:  .. / 0412-advisories  /

Page 9 of 11
<< 1 2 3 4 5 6 7 8 9 10 11 >> Files 200 - 225 of 253
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: meshviewer.txt
Description:
MeshViewer 0.2.2 is susceptible to a buffer overflow vulnerability in the Mesh::type() function.
Author:Mohammed Khan, Danny Lungstrom
File Size:1759
Last Modified:Dec 30 21:51:22 2004
MD5 Checksum:41b28ab911efe4335b17fc5f62641333

 ///  File Name: html2hdml.txt
Description:
A vulnerability has been reported in html2hdml version 1.0.3, allowing malicious people to compromise a vulnerable system.
Author:Wiktor Kopec, Matthew Dabrowski
Homepage:http://tigger.uic.edu/~jlongs2/holes/html2hdml.txt
File Size:1759
Last Modified:Dec 30 11:07:14 2004
MD5 Checksum:37d8c774c75eaa0d9fd8a7ecfec5bb5c

 ///  File Name: sa13370.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in AIX, which can be exploited by malicious, local users to inject arbitrary data into the ODM (Object Data Manager) or cause a vulnerable system to hang during boot. The vulnerability is caused due to an unspecified error within the system startup scripts. The vulnerability affects versions 5.1, 5.2, and 5.3.
Homepage:http://secunia.com/advisories/13370/
File Size:1753
Last Modified:Dec 12 02:49:52 2004
MD5 Checksum:1ce0d75c61d357650fa775b1f35b687e

 ///  File Name: sa13432.txt
Description:
Secunia Security Advisory - Michael Krax and Mark J. Cox have reported some vulnerabilities in mnoGoSearch, which can be exploited by malicious people to conduct cross-site scripting attacks.
Homepage:http://secunia.com/advisories/13432/
File Size:1751
Last Modified:Dec 30 07:24:23 2004
MD5 Checksum:962a4f5be5850367735e4e43e7ece07e

 ///  File Name: sa13642.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in Docbook-to-Man, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges.
Homepage:http://secunia.com/advisories/13642/
File Size:1745
Last Modified:Dec 31 22:11:24 2004
MD5 Checksum:841d567be031f7fd31ca960150e64a09

 ///  File Name: sa13419.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in MediaWiki, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to insufficient validation of files uploaded to the "images" directory located inside the web root. This can be exploited to upload and execute arbitrary malicious scripts. The vulnerability has been reported in version 1.3.8. Prior versions may also be affected.
Homepage:http://secunia.com/advisories/13419/
File Size:1740
Last Modified:Dec 30 07:21:19 2004
MD5 Checksum:26f47b168b90e2d069ab32adaf8616f1

 ///  File Name: sa13410.txt
Description:
Secunia Security Advisory - Jeremy Fitzhardinge has reported some potential vulnerabilities with an unknown impact in the Linux Kernel.
Homepage:http://secunia.com/advisories/13410/
File Size:1735
Last Modified:Dec 12 20:18:36 2004
MD5 Checksum:35d9a443aafb3e2622ccc8f612c64ad0

 ///  File Name: o3read.txt
Description:
o3read version 0.0.3 suffers from a buffer overflow condition in the parse_html() function used when parsing HTML content.
Author:Wiktor Kopec
File Size:1731
Last Modified:Dec 30 21:13:19 2004
MD5 Checksum:f97b5e158bf526756b06630df1c83f47

 ///  File Name: gadugadu.txt
Description:
Gadu-Gadu is susceptible to script execution in the local zone and remote denial of service flaws.
Author:Blazej Miga, Jaroslaw Sajko
File Size:1731
Last Modified:Dec 30 10:20:55 2004
MD5 Checksum:328eed129e3efbbd707100fbfdfafb1d

 ///  File Name: ieDetect.txt
Description:
A security vulnerability in Internet Explorer allows remote attackers to discover what software is installed on the remote computer by testing for the existence of certain files.
Author:Gregory R. Panakkal
File Size:1729
Last Modified:Dec 12 19:34:33 2004
MD5 Checksum:f81af66a71a50556002f2c51fd72b5c2

 ///  File Name: sa13618.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in Citrix Metaframe XP, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to an unspecified boundary error, which can be exploited to cause a buffer overflow. Successful exploitation may allow execution of arbitrary code.
Homepage:http://secunia.com/advisories/13618/
File Size:1728
Last Modified:Dec 31 21:10:14 2004
MD5 Checksum:f6b72450155b17e5609f420cfb8ddde5

 ///  File Name: sa13571.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in ArGoSoft Mail Server, which can be exploited by malicious people to conduct script insertion attacks.
Homepage:http://secunia.com/advisories/13571/
File Size:1725
Last Modified:Dec 31 10:18:38 2004
MD5 Checksum:87224581743819bf55962edc49693f7c

 ///  File Name: cups.txt
Description:
A boundary error in the ParseCommand() function of CUPS version 1.x allows for a buffer overflow attack.
Author:Ariel Berkman
Homepage:http://tigger.uic.edu/~jlongs2/holes/cups.txt
File Size:1710
Last Modified:Dec 30 10:35:01 2004
MD5 Checksum:dc39406cac000791b41cbd2c2f4e58ac

 ///  File Name: sa13670.txt
Description:
Secunia Security Advisory - Some vulnerabilities have been reported in Atari800, which can be exploited by malicious, local users to gain escalated privileges. The vulnerabilities are caused due to unspecified boundary errors and can be exploited to cause buffer overflows. Successful exploitation may allow execution of arbitrary code with escalated privileges, if the SVGAlib version is used in a setuid binary.
Homepage:http://secunia.com/advisories/13670/
File Size:1702
Last Modified:Jan 2 20:45:42 2005
MD5 Checksum:6c0022d8a0fd1daec785445e1fea355f

 ///  File Name: sa13431.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in SQLgrey Postfix greylisting service, which can be exploited by malicious people to conduct SQL injection attacks.
Homepage:http://secunia.com/advisories/13431/
File Size:1697
Last Modified:Dec 30 07:23:31 2004
MD5 Checksum:cb34aa907a2e617d31f4a80804aae349

 ///  File Name: sa13405.txt
Description:
Secunia Security Advisory - A security issue has been reported in rootsh, which can be exploited by malicious, local users to bypass the logging functionality.
Homepage:http://secunia.com/advisories/13405/
File Size:1675
Last Modified:Dec 12 20:16:05 2004
MD5 Checksum:748644b1736eba21054b5540ae135f3c

 ///  File Name: sa13634.txt
Description:
Secunia Security Advisory - Nicolae Mihalache has reported a security issue in avelsieve, which potentially can be exploited by malicious users to cause a DoS (Denial of Service).
Homepage:http://secunia.com/advisories/13634/
File Size:1671
Last Modified:Dec 31 23:26:17 2004
MD5 Checksum:80fc9a8d4680fdd69e2dcabc51896311

 ///  File Name: changepassword.txt
Description:
changepassword version 0.8 fails to use a trusted path when calling make.
Author:Ariel Berkman
Homepage:http://tigger.uic.edu/~jlongs2/holes/changepassword.txt
File Size:1663
Last Modified:Dec 30 11:09:09 2004
MD5 Checksum:7698f5ec75c1e6ffdae6c520099b1a09

 ///  File Name: realone2.txt
Description:
A vulnerability has been found in the Internet Explorer browser with system installed Realone 2.0 build 6.0.11.868 in the processing of the EMBED tag.
Author:Wei Li
File Size:1662
Last Modified:Dec 31 21:13:57 2004
MD5 Checksum:64fc26bb0fb97fb2d29bcf661b5b43ed

 ///  File Name: linpopup.txt
Description:
LinPopUp version 1.2.0 has a buffer overflow in the strexpand() function.
Author:Stephen Dranger
File Size:1661
Last Modified:Dec 30 21:14:34 2004
MD5 Checksum:e41c0dc897f18f92d9fe845bfa2390dd

 ///  File Name: elm-bolthole-filter.txt
Description:
Bolthole Filter 2.6.1 is susceptible to a buffer overflow in the save_embedded_address() function.
Author:Ariel Berkman
File Size:1629
Last Modified:Dec 30 21:10:15 2004
MD5 Checksum:2377c54dc55dee29004918a211eb4beb

 ///  File Name: cups2.txt
Description:
Various errors in lppasswd under CUPS 1.x allows for /usr/local/etc/cups/passwd file manipulation/truncation.
Author:Bartlomiej Sieka
Homepage:http://tigger.uic.edu/~jlongs2/holes/cups2.txt
File Size:1623
Last Modified:Dec 30 10:36:34 2004
MD5 Checksum:61ea133082d16f3b0424f6de8d6096d5

 ///  File Name: 2fax-djb.txt
Description:
A boundary error condition in ArBas 2fax allow for arbitrary code execution. Version 3.04 was found susceptible.
Author:Ariel Berkman
Homepage:http://tigger.uic.edu/~jlongs2/holes/2fax.txt
File Size:1613
Last Modified:Dec 30 10:26:58 2004
MD5 Checksum:1b879f49f13ed4a55da16edb0f3d5479

 ///  File Name: sa13654.txt
Description:
Secunia Security Advisory - Martin Schwidefsky has reported a vulnerability in the Linux Kernel, which can be exploited by malicious, local users to gain escalated privileges. The vulnerability is caused due to the SACF (Set Address Space Control Fast) control instruction being handled insecurely on the S/390 platform.
Homepage:http://secunia.com/advisories/13654/
File Size:1607
Last Modified:Jan 2 20:20:58 2005
MD5 Checksum:7d9c2635d6e0aee58d0144bdfa9ba8af

 ///  File Name: sa13358.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in Big Medium, which potentially can be exploited by malicious users to compromise a vulnerable system.
Homepage:http://secunia.com/advisories/13358/
File Size:1589
Last Modified:Dec 12 01:12:14 2004
MD5 Checksum:9efbe1625cbe9d5084d9ecfee27688b5