what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 393 RSS Feed

Files

FreeBSD-SA-05-19.ipsec.txt
Posted Jul 28, 2005
Authored by Yukiyo Akisada | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-05:19.ipsec - IPsec is a security protocol for the Internet Protocol networking layer. It provides a combination of encryption and authentication of system, using several possible cryptography algorithms. A programming error in the implementation of the AES-XCBC-MAC algorithm for authentication resulted in a constant key being used instead of the key specified by the system administrator.

tags | advisory, protocol
systems | freebsd
advisories | CVE-2005-2359
SHA-256 | 9d75e7d220ed1f61f09ae93e44a8e0ba4c60a6a4d11ff8f03cc972a6df79b6ea
FreeBSD-SA-05-18.zlib.txt
Posted Jul 28, 2005
Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-05:18.zlib - A carefully constructed compressed data stream can result in zlib overwriting some data structures. This may cause applications to halt, resulting in a denial of service; or it may result in an attacker gaining elevated privileges.

tags | advisory, denial of service
systems | freebsd
advisories | CVE-2005-1849
SHA-256 | b2d40ae5f59903bd6c1b0e96942c8b40d5b7c0070b211d4957535d4b74ee339c
Gentoo Linux Security Advisory 200507-26
Posted Jul 28, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200507-26 - GNU Gadu, CenterICQ, Kadu, EKG and libgadu are vulnerable to an integer overflow. Versions less than 2.2.6-r1 are affected.

tags | advisory, overflow
systems | linux, gentoo
advisories | CVE-2005-1852
SHA-256 | 8c3aaaaccf0fac192625a06806e0153319ef322a65cd4a6f3a2eae163005d614
Debian Linux Security Advisory 766-1
Posted Jul 28, 2005
Authored by Debian | Site security.debian.org

Debian Security Advisory DSA 766-1 - A vulnerability has been discovered in webcalendar, a PHP based multi-user calendar, that can lead to the disclosure of sensitive information to unauthorised parties.

tags | advisory, php
systems | linux, debian
advisories | CVE-2005-2320
SHA-256 | a27b79d26374c35fbcc5b2e450f99e4b707fffe22b122a16083190fc49a2eef2
Debian Linux Security Advisory 765-1
Posted Jul 28, 2005
Authored by Debian | Site security.debian.org

Debian Security Advisory DSA 765-1 - A buffer overflow was discovered in the handling of the LINEMODE suboptions in telnet clients. Heimdal, a free implementation of Kerberos 5, also contains such a client. This can lead to the execution of arbitrary code when connected to a malicious server.

tags | advisory, overflow, arbitrary
systems | linux, debian
advisories | CVE-2005-0469
SHA-256 | b7baf9fd1de6d686f58aaba35950d80f6e018eae34e768acc7cda018e5fabe46
novellBO653.txt
Posted Jul 28, 2005
Authored by Francisco Amato | Site infobyte.com.ar

The Novell GroupWise 6.5.3 client suffers from a remote buffer overflow vulnerability.

tags | advisory, remote, overflow
SHA-256 | 416b19430a2eb949354f800a7e077717fb0241942ea239754df3b2782f4eea1e
NILESA-20050701.txt
Posted Jul 28, 2005
Authored by Yun Jonglim | Site nilesoft.co.kr

When the UnixWare 7.x version of the RPC portmapper (rpcbind) receives an invalid portmap request, it falls into a denial of service state and cannot respond.

tags | advisory, denial of service
systems | unixware
advisories | CVE-2005-2132
SHA-256 | 8807b2907f72caa93595e16a3af544c8a1a1d674b4ca5df6487e048bed5f118b
Gentoo Linux Security Advisory 200507-25
Posted Jul 28, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200507-25 - Neel Mehta and Alex Wheeler discovered that Clam AntiVirus is vulnerable to integer overflows when handling the TNEF, CHM and FSG file formats. Versions less than 0.86.2 are affected.

tags | advisory, overflow
systems | linux, gentoo
SHA-256 | b3a7fcc88493feb480f9f4e78586c1d835b6e405e85b522567433aff52bda8b7
Gentoo Linux Security Advisory 200507-24
Posted Jul 28, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200507-24 - Several vulnerabilities in the Mozilla Suite allow attacks ranging from the execution of javascript code with elevated privileges to information leakage. Versions less than 1.7.10 are affected.

tags | advisory, javascript, vulnerability
systems | linux, gentoo
SHA-256 | e3bb5316095871b4e09851a2d7a878477943503d8b8037205c99f6a2bbc07840
lotus-disclose.txt
Posted Jul 28, 2005
Authored by Leandro Meiners | Site cybsec.com

Lotus Domino R5 WebMail versions R5, R6, and possibly R4 are susceptible to a default configuration information disclosure vulnerability.

tags | advisory, info disclosure
SHA-256 | 34234d1ec904e4f9c078ad43fec5b2b46d2b151e92f5f498cdf8453683179a04
fetchmail-SA-2005-01.txt
Posted Jul 28, 2005
Authored by Matthias Andree | Site fetchmail.berlios.de

Fetchmail version 1.02 suffers from a remote code injection vulnerability.

tags | advisory, remote
advisories | CVE-2005-2335
SHA-256 | fc3f1ce80d30fc5169baa1476c5710f9cd636aec98c35ccdc729e1c419f34d2c
IBMaccess.txt
Posted Jul 28, 2005
Authored by Sylvain ROGER | Site solucom.fr

The QCWLICON.exe and QCTRAY.exe binaries in IBM Access software allow anyone read access to the configuration of all connections.

tags | advisory
SHA-256 | ca1f1e403e44c575ce47a2a8135a8da6e1b491a26a2754749af7ace99003c1ad
SPIbad.txt
Posted Jul 28, 2005
Authored by 3APA3A

SPIDynamics WebInspect is susceptible to cross-application scripting attacks.

tags | advisory
SHA-256 | 1015978531e7b0bc37dd7eef03b9bb70913a12479637df33e68b9197fcf36a51
aresFileshare11.txt
Posted Jul 28, 2005
Authored by ATmaCA, Kozan | Site spyinstructors.com

Remote exploitation of a buffer overflow vulnerability in Ares FileShare 1.1 could allow execution of arbitrary code.

tags | advisory, remote, overflow, arbitrary
SHA-256 | 69900714ad4b60f7881d9946c2804a1e724d0a2b64a5262a37935655d22d926d
Gentoo Linux Security Advisory 200507-23
Posted Jul 28, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200507-23 - Kopete contains an internal copy of libgadu and is therefore subject to several input validation vulnerabilities in libgadu. Versions less than 3.4.1-r1 are affected.

tags | advisory, vulnerability
systems | linux, gentoo
advisories | CVE-2005-1852
SHA-256 | 8495487de7b3b61aac52bcedb9567407792fc59429d76c1586ee27556500b41c
Gentoo Linux Security Advisory 200507-22
Posted Jul 28, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200507-22 - The Gentoo Linux Security Audit Team discovered that the sandbox utility was vulnerable to multiple TOCTOU (Time of Check, Time of Use) file creation race conditions. Versions less than 1.2.11 are affected.

tags | advisory
systems | linux, gentoo
SHA-256 | 8a44b3fd3621a574a9efbe950cc71ea1299e0cb5ab061553b8fa3a8862eb6987
Gentoo Linux Security Advisory 200507-21
Posted Jul 28, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200507-21 - fetchmail does not properly validate UIDs coming from a POP3 mail server. The UID is placed in a fixed length buffer on the stack, which can be overflown. Versions less than 6.2.5.2 are affected.

tags | advisory, overflow
systems | linux, gentoo
advisories | CVE-2005-2335
SHA-256 | e183ba8135f58ed6750b8c55799fddc77fe41b5730a1d87bec474be7a913c8cf
clamav.pdf
Posted Jul 28, 2005
Authored by Neel Mehta, Alex Wheeler

Clam AntiVirus (ClamAV) versions 0.86.1 and below suffer from remote heap overflows.

tags | advisory, remote, overflow
SHA-256 | d1fb6fbca8fea0d2ff3d187e619c601048b6ef729562695ccc5fe2f00936a6d1
bedatecRealchat.txt
Posted Jul 28, 2005
Authored by Andreas Beck | Site bedatec.de

Realchat version 3.5.1b fails to properly authenticate any logins allowing for user impersonation.

tags | advisory
SHA-256 | 61fe60cdea857d958be0ff0375028d63a0b13ea646380983320846d57c92049b
GoodTechRCPT.txt
Posted Jul 28, 2005
Authored by Raphael Rigo

GoodTech versions 5.15 and below (and 5.16 evaluation) suffer from stack overflow vulnerabilities in the handling of the RCPT TO input.

tags | advisory, overflow, vulnerability
SHA-256 | d99bea5bc3c5546872d764d9ede2617885299aec72497604fa2a2e029d3f283a
Secunia Security Advisory 16173
Posted Jul 28, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in MDaemon, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | efa3bbc85512e00d502b5676f79aaac1f19b4c2ff8ebc08d3483eed049d98f17
Secunia Security Advisory 16218
Posted Jul 28, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - newbug has reported a vulnerability in FtpLocate, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 7d7be3b6bd5ab87d3a8eebec3b485b88d441ab84927ad34049ec64487fbbf4a3
Secunia Security Advisory 16221
Posted Jul 28, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Neo and Park Gyu Tae have reported a vulnerability in LiveCall, which potentially can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | b2d0b26ca6374e69840d8ba15aa4e22004e75e7b612756bb304f19c6aae85f86
Secunia Security Advisory 16222
Posted Jul 28, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sylvain Roger has reported a weakness in IBM Access Connections, which can be exploited by malicious, local users to gain knowledge of certain information or manipulate it.

tags | advisory, local
SHA-256 | 14b3d3d76507ae3c06a0fe743ee7fc4305f1a421659a65d489f39d05531f0503
Secunia Security Advisory 16224
Posted Jul 28, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Lostmon has reported some vulnerabilities in BMForum Plus!, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | 460b26848ef5a8d94a098279d339cfea8a4abf4adcbe427ff992dcf00b0c3373
Page 2 of 16
Back12345Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close