Section:  .. / 0409-advisories  /

Page 4 of 6
<< 1 2 3 4 5 6 >> Files 75 - 100 of 142
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: airscanner.txt
Description:
Airscanner Mobile Security Advisory - Airscanner Corp. has been able to reverse engineer and post a fix for the CE.Dust virus.
Homepage:http://airscanner.com/
File Size:2473
Last Modified:Sep 21 09:41:28 2004
MD5 Checksum:bbfc491dd0e07f2c486464acd811b781

 ///  File Name: mozbugs.txt
Description:
New Firefox, Thunderbird, and Mozilla releases between September 13 and 14 address 7 critical security issues. If you have not already, upgrade today.
Author:Gael Delalleau
File Size:2412
Last Modified:Sep 17 07:42:26 2004
MD5 Checksum:d23698cd2c7e6824d796a8cd5276d119

 ///  File Name: boFreeBSDroot.txt
Description:
A buffer overflow has been discovered in the trap.c syscall() function of the FreeBSD source tree. However, you need to be root to exploit this.
Author:rookie
File Size:2383
Last Modified:Sep 21 05:16:42 2004
MD5 Checksum:3b5b7af45f45cac6e50e620b4e08f447

 ///  File Name: sa12593.txt
Description:
Secunia Security Advisory - GulfTech Security has discovered two vulnerabilities in YaBB, which can be exploited by malicious people to conduct cross-site scripting attacks and bypass certain security restrictions.
Homepage:http://secunia.com/advisories/12593/
File Size:2368
Last Modified:Sep 21 21:21:03 2004
MD5 Checksum:601bfa5f8694cac9d18e30b952c24e8b

 ///  File Name: MSInfoBOF.txt
Description:
A buffer overflow exists in the MSinfo32.exe binary.
Author:Emmanouel Kellinis
Homepage:http://www.cipher.org.uk
File Size:2364
Last Modified:Sep 8 23:02:47 2004
MD5 Checksum:897fe95a30eaa34cfbe308ad8e75822d

 ///  File Name: getmailroot.txt
Description:
getmail versions 3.2.5 and version 4 releases prior to 4.2.0 suffer from a symbolic link vulnerability that allows for privilege escalation.
Author:David Watson
File Size:2342
Last Modified:Sep 21 21:30:34 2004
MD5 Checksum:e48e7bc6e8db6d267a0881e6e0c0abb9

 ///  File Name: sa12492.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in F-Secure Internet Gatekeeper 6.x and F-Secure Anti-Virus for Microsoft Exchange 6.x, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to an error within the exception handling in the F-Secure Content Scanner Server component. This can be exploited to crash a process in the component via specially crafted packets.
Homepage:http://secunia.com/advisories/12492/
File Size:2292
Last Modified:Sep 10 07:35:13 2004
MD5 Checksum:768c5dae11a645111e0ff60cc1dee12f

 ///  File Name: phpvulns501.txt
Description:
PHP versions above 4.1.2 and below or equal to 5.0.1 suffer from an exposure of arbitrary memory due to bad array parsing in php_variables.c.
Author:Stefano Di Paola
File Size:2273
Last Modified:Sep 17 07:52:58 2004
MD5 Checksum:cbe8b992f622c696f3423793c80d3622

 ///  File Name: tutos11.txt
Description:
TUTOS 1.1 is susceptible to SQL injection and cross site scripting attacks.
Author:Joxean Koret
File Size:2246
Last Modified:Sep 21 11:01:46 2004
MD5 Checksum:6c53ff77dda67e1656237552d14cb8a6

 ///  File Name: samba30x.txt
Description:
Samba 3.0.x is susceptible to multiple denial of services bugs that can remotely crash the daemons nmbd and smbd.
Homepage:http://www.idefense.com/
File Size:2215
Related CVE(s):CAN-2004-0807, CAN-2004-0808
Last Modified:Sep 14 00:39:42 2004
MD5 Checksum:3a2867406071785f82ebec0f354d676a

 ///  File Name: serverviewInsecure.txt
Description:
The Serverview server management product is susceptible to multiple denial of service and data corruption attacks due to insecure file permissions.
Author:l0om
Homepage:http://www.excluded.org/
File Size:2202
Last Modified:Sep 10 05:44:44 2004
MD5 Checksum:94374dfccc6e4738003184a6f18e8bc3

 ///  File Name: BrocadeDoS.txt
Description:
Brocase switches can be frozen with a few specially crafted TCP packets. The IP stack becomes unresponsive and remote administration becomes impossible. This attack does not require any authentication and there is no trace in any log file. Versions affected: All Brocade fiber channel switches running pre-3.2 code including Silkworm 3800, Silkworm 3200 and Silkworm 2800.
Author:Frank Denis
File Size:2136
Last Modified:Sep 9 09:33:37 2004
MD5 Checksum:d2681304485cb00bffdfd443a6ddf27a

 ///  File Name: qnx-rtp610_ftp.txt
Description:
The QNX FTP client is susceptible to a format string attack.
Author:Julio Cesar Fort
Homepage:http://www.rfdslabs.com.br
File Size:2078
Last Modified:Sep 14 01:47:52 2004
MD5 Checksum:d2d3f71eaa7e204a6dac608d8ac48677

 ///  File Name: codelabs-04.txt
Description:
PHP-Nuke 7.4 has a cross site scripting flaw that allows an attacker the ability to post global homepage messages.
Author:Pierquinto Manco
Homepage:http://www.mantralab.org
File Size:2058
Last Modified:Sep 9 09:45:42 2004
MD5 Checksum:c731dc2a9af9905a84dee8cf9ff041e5

 ///  File Name: sa12404.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in PvPGN, which can be exploited by malicious people to compromise a vulnerable system. The problem is caused due to boundary errors in the handling of the commands /watchall and /unwatchall. This can be exploited by supplying an overly long argument to cause a buffer overflow.
Homepage:http://secunia.com/advisories/12404/
File Size:2049
Last Modified:Sep 8 22:51:54 2004
MD5 Checksum:d9396afe902b65ca6db59156b87baadd

 ///  File Name: CESA-2004-005.txt
Description:
gtk+ version 2.4.4 has heap and stack-based overflows that can allow for the compromise of an account used to browse a malicious XPM file.
Author:Chris Evans
File Size:2048
Related CVE(s):CAN-2004-0782, CAN-2004-0783
Last Modified:Sep 17 08:01:55 2004
MD5 Checksum:85691971eba050ddab22aac301a8a167

 ///  File Name: sa12602.txt
Description:
Secunia Security Advisory - Multiple vulnerabilities have been reported in xine-lib, which can be exploited by malicious people to compromise a user's system.
Homepage:http://secunia.com/advisories/12602/
File Size:2036
Last Modified:Sep 21 21:13:54 2004
MD5 Checksum:cbb152968504e5b9dc2692c040288890

 ///  File Name: sa12463.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in Cosminexus Portal Framework, which potentially can be exploited by malicious users to gain knowledge of sensitive information.
Homepage:http://secunia.com/advisories/12463/
File Size:2027
Last Modified:Sep 10 06:19:19 2004
MD5 Checksum:6c94cd6bbc5c823a838b6301c72e4470

 ///  File Name: sns77.txt
Description:
SNS Advisory 77 - A vulnerability in Usermin's Web mail function could result in arbitrary command execution upon viewing a specially crafted HTML mail. Affected Versions: Usermin 1.070, 1.080.
Author:Keigo Yamazaki, Jamie Cameron
Homepage:http://www.lac.co.jp/security/csl/intelligence/SNSadvisory_e/77_e.html
File Size:2014
Last Modified:Sep 10 06:08:56 2004
MD5 Checksum:f6116c85cd6e402e3971b57dd2788d87

 ///  File Name: zyxelP681.txt
Description:
Zyxel P681 SDSL routers disclose random portions of memory in ARP requests.
Author:Przemyslaw Frasunek
File Size:1981
Last Modified:Sep 15 02:26:34 2004
MD5 Checksum:6048d02b855c73c8f0589db01f868203

 ///  File Name: sa12453.txt
Description:
Secunia Security Advisory - Various vulnerabilities have been reported in IMail 8.x, which potentially can be exploited by malicious people to cause a DoS (Denial of Service).
Homepage:http://secunia.com/advisories/12453/
File Size:1956
Last Modified:Sep 9 08:47:23 2004
MD5 Checksum:a0fbbef59649020b21ae3b569ed82e9a

 ///  File Name: adv05-y3dips-2004.txt
Description:
YABBSE 1.5.1 is susceptible to a full path disclosure flaw.
Author:y3dips
Homepage:http://echo.or.id/adv/adv05-y3dips-2004.txt
File Size:1905
Last Modified:Sep 9 09:17:28 2004
MD5 Checksum:5d6997b2aa8480c029449b18f139a995

 ///  File Name: sa12445.txt
Description:
Secunia Security Advisory - Two vulnerabilities have been reported in gnubiff 1.x, which potentially can be exploited to cause a DoS (Denial of Service) or compromise a vulnerable system.
Homepage:http://secunia.com/advisories/12445/
File Size:1869
Last Modified:Sep 10 05:29:32 2004
MD5 Checksum:7b5abc524035321c6396a8ce27edd3b1

 ///  File Name: sa12476.txt
Description:
Secunia Security Advisory - A vulnerability in net-acct can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. The write_list() and dump_curr_list() functions create temporary files insecurely. This can be exploited via symlink attacks to overwrite or create arbitrary files with the privileges of a user executing net-acct. The vulnerability affects version 0.71 and prior.
Author:Stefan Nordhausen
Homepage:http://secunia.com/advisories/12476/
File Size:1853
Last Modified:Sep 10 06:22:31 2004
MD5 Checksum:886a83d82b6914e96b17e662ee2d78ab

 ///  File Name: sa12535.txt
Description:
Secunia Security Advisory - Multiple vulnerabilities have been reported in Netscape, which can be exploited by malicious people to conduct cross-site scripting attacks, access and modify sensitive information, and compromise a user's system.
Homepage:http://secunia.com/advisories/12535/
File Size:1849
Last Modified:Sep 17 09:34:30 2004
MD5 Checksum:8bbc61259ac43eacdddb6807b933cfc1