exploit the possibilities
Showing 1 - 25 of 26 RSS Feed

Files from SCO

Email addresssecurity at sco.com
First Active2005-10-26
Last Active2008-03-13
SCOSA-2008.2.txt
Posted Mar 13, 2008
Authored by SCO | Site sco.com

SCO Security Advisory SCOSA-2008.2 - sshd in OpenSSH versions before 4.4, when using the version 1 SSH protocol, could allow a remote attacker to cause a denial of service. It certainly is nice to have SCO bring this to light for their consumers two years after the fact.

tags | advisory, remote, denial of service, protocol
advisories | CVE-2006-4924
MD5 | 4dc7715fb3a411b0fca873e248936b25
SCOSA-2006.26.txt
Posted Jul 13, 2006
Authored by SCO | Site sco.com

SCO Security Advisory SCOSA-2006.26 - The Mozilla 1.7.13 browser contains fixes for several security issues resolved by Mozilla.org developers since the release of Mozilla 1.7.12.

tags | advisory
MD5 | 2ff655bb40295d62287b108ce0349359
SCOSA-2006.24.txt
Posted May 24, 2006
Authored by SCO | Site sco.com

SCO Security Advisory SCOSA-2006.24 - Sendmail could allow a remote attacker to execute arbitrary code as root, caused by a signal race vulnerability.

tags | advisory, remote, arbitrary, root
advisories | CVE-2006-0058
MD5 | 5182e7e6c52f6ce1f2f87747534565ce
SCOSA-2006.23.txt
Posted May 17, 2006
Authored by SCO | Site sco.com

SCO Security Advisory SCOSA-2006.23 - UnixWare 7.1.4 : GhostScript Insecure Temporary File Creation Vulnerability.

tags | advisory
systems | unixware
MD5 | 720486293a9b502302601810813d82d1
SCOSA-2006.22.txt
Posted Apr 26, 2006
Authored by SCO | Site sco.com

SCO Security Advisory SCOSA-2006.22: Multiple X Window System server applications share code that may contain a flaw in the memory allocation for large pixmaps. The affected products include X server applications.

tags | advisory
MD5 | 6fff273af3bc100d8f531b85e84f1da8
SCOSA-2006.21.txt
Posted Apr 26, 2006
Authored by SCO | Site sco.com

SCO Security Advisory SCOSA-2006.21 - Some vulnerabilities have been reported in CUPS, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
MD5 | 0547be55607e139aaeb60758e09512f0
SCOSA-2006.20.txt
Posted Apr 26, 2006
Authored by SCO | Site sco.com

SCO Security Advisory SCOSA-2006.20 - Some vulnerabilities have been reported in CUPS, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
MD5 | 23a819acdbc1f4a535d05bf5d2abeed3
SCOSA-2006.19.txt
Posted Apr 26, 2006
Authored by SCO | Site sco.com

SCO Security Advisory SCOSA-2006.19: Ghostscript is affected by an insecure temporary file creation vulnerability. This issue is likely due to a design error that causes the application to fail to verify the existence of a file before writing to it.

tags | advisory
MD5 | 51e67e1b6cb56afae51faaa9757c1922
SCOSA-2006.18.txt
Posted Apr 12, 2006
Authored by SCO | Site sco.com

SCO Security Advisory SCOSA-2006.18: UnixWare 7.1.4 : MySQL User-Defined Function Buffer Overflow Vulnerability

tags | advisory, overflow
systems | unixware
MD5 | 91efe21c1a77c3d4b12808963a2ae678
SCOSA-2006.15.txt
Posted Apr 1, 2006
Authored by SCO | Site sco.com

SCO Security Advisory - OpenServer 5.0.7 OpenServer 6.0.0 : Xpdf Multiple Buffer Overflow Vulnerabilities

tags | advisory, overflow, vulnerability
MD5 | fcb869b43455f8ab02b84ff19d4aa14a
SCOSA-2006.14.txt
Posted Mar 21, 2006
Authored by SCO | Site sco.com

SCO Security Advisory - SCOSA-2006.14 - Multiple X Window System server applications share code that may contain a flaw in the memory allocation for large pixmaps. The affected products include the X.Org X server applications.

tags | advisory
MD5 | 47938db420a00f40d2a98b550db1a608
SCOSA-2006.13.txt
Posted Mar 21, 2006
Authored by SCO | Site sco.com

SCO Security Advisory - SCOSA-2006.13 - Vim is susceptible to an arbitrary command execution vulnerability with ModeLines. This issue is due to insufficient sanitization of user-supplied input.

tags | advisory, arbitrary
MD5 | 1296210fb79a5512ef492ca9eb9d3fc7
SCOSA-2006.11.txt
Posted Mar 15, 2006
Authored by SCO | Site sco.com

SCO Security Advisory - OpenServer 5.0.6 OpenServer 5.0.7 : OpenSSH Multiple Vulnerabilities: A vulnerability has been reported in the OpenSSH scp utilities. This issue may permit a malicious scp server to corrupt files on a client system when files are copied.

tags | advisory, vulnerability
MD5 | a76853adb7e1876553a84b4c1ccb7e87
SCOSA-2006.12.txt
Posted Mar 15, 2006
Authored by SCO | Site sco.com

SCO Security Advisory - OpenServer 6.0.0 : OpenSSH Multiple Vulnerabilities: Two security issues have been reported in OpenSSH, which can be exploited by malicious users to gain escalated privileges or bypass certain security restrictions.

tags | advisory, vulnerability
MD5 | 6fe496733bf80234fc9fbfa2cd6da557
SCOSA-2006.10.txt
Posted Mar 14, 2006
Authored by SCO | Site sco.com

SCO Security Advisory - OpenServer 5.0.6 OpenServer 5.0.7 OpenServer 6.0.0 : Multiple System Libraries Vulnerabilities.

tags | advisory, vulnerability
MD5 | 44f172ac56316935297e1c7385be5c9b
SCOSA-2006.5.txt
Posted Jan 5, 2006
Authored by SCO | Site sco.com

SCO Security Advisory - OpenServer 5.0.6 OpenServer 5.0.7 OpenServer 6.0.0 : LibXpm Integer Overflow Vulnerability

tags | advisory, overflow
MD5 | 5570b198187dd998a34a2c7942a0ff6e
SCOSA-2006.4.txt
Posted Jan 5, 2006
Authored by SCO | Site sco.com

SCO Security Advisory - OpenServer 5.0.6 and OpenServer 5.0.7 : TCP Remote ICMP Denial Of Service Vulnerabilities

tags | advisory, remote, denial of service, tcp, vulnerability
MD5 | 89abe114258bc3cd1fb8f921db4ba9f5
SCOSA-2005.48.txt
Posted Nov 20, 2005
Authored by SCO | Site sco.com

SCO Security Advisory - A vulnerability has been found in OpenSSL which potentially affects applications that use the SSL/TLS server implementation provided by OpenSSL.

tags | advisory
advisories | CVE-2005-2969
MD5 | dfe0317c437e122cfe12f971e0e7475a
SCOSA-2005.47.txt
Posted Nov 9, 2005
Authored by SCO | Site sco.com

SCO Security Advisory - Ulf Harnhammar has reported a vulnerability in Lynx, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error in the HTrjis() function in the handling of article headers sent from NNTP (Network News Transfer Protocol) servers. This can be exploited to cause a stack-based buffer overflow by e.g. tricking a user into visiting a malicious web site which redirects to a malicious NNTP server via the nntp: URI handler. Successful exploitation allows execution of arbitrary code.

tags | advisory, web, overflow, arbitrary, protocol
advisories | CVE-2005-3120
MD5 | 752c9d5d8cbf2303c0ff077301a0326c
SCOSA-2005.46.txt
Posted Nov 3, 2005
Authored by SCO | Site sco.com

SCO Security Advisory - Cross-site scripting vulnerability in docview (htdig) under OpenServer 5.0.7 and OpenServer 6.0.0 allows remote attackers to execute arbitrary web script or HTML via the config parameter, which is not properly sanitized before it is displayed in an error message.

tags | advisory, remote, web, arbitrary, xss
advisories | CVE-2005-0085
MD5 | 9212a33ccabfb3eeaa527133fb092386
SCOSA-2005.45.txt
Posted Nov 3, 2005
Authored by SCO | Site sco.com

SCO Security Advisory - Cross-site scripting vulnerability in docview (htdig) under UnixWare 7.1.3 and UnixWare 7.1.4 allows remote attackers to execute arbitrary web script or HTML via the config parameter, which is not properly sanitized before it is displayed in an error message.

tags | advisory, remote, web, arbitrary, xss
systems | unixware
advisories | CVE-2005-0085
MD5 | 830d6a475dfaf83134d280b5481e4aca
SCOSA-2005.44.txt
Posted Nov 3, 2005
Authored by SCO | Site sco.com

SCO Security Advisory - store.c in Squid 2.5.STABLE10 and earlier allows remote attackers to cause a denial of service (crash) via certain aborted requests that trigger an assert error related to STORE_PENDING. The sslConnectTimeout function in ssl.c for Squid 2.5.STABLE10 and earlier allows remote attackers to cause a denial of service (segmentation fault) via certain crafted requests. Squid versions 2.5.STABLE10 and below, while performing NTLM authentication, do not properly handle certain request sequences, which allows attackers to cause a denial of service (daemon restart).

tags | advisory, remote, denial of service
advisories | CVE-2005-2794, CVE-2005-2796, CVE-2005-2917, CVE-2005-3258
MD5 | 2280f9c51a67192a7ab8ab9b035ee495
SCOSA-2005.43.txt
Posted Oct 30, 2005
Authored by SCO | Site sco.com

SCO Security Advisory - When the RPC portmapper (rpcbind) receives an invalid portmap request from a remote (or local) host, it falls into a denial of service state and cannot respond. As a result, the RPC services will not operate normally.

tags | advisory, remote, denial of service, local
advisories | CVE-2005-2132
MD5 | a5e921749d8c7cf467e6365c7f3511e4
SCOSA-2005.40.txt
Posted Oct 26, 2005
Authored by SCO | Site sco.com

SCO Security Advisory - iDEFENSE has identified a Buffer Overflow vulnerability in SCO Openserver backupsh. The backupsh utility is a standard binary distributed with Openserver 5.0.7 and earlier.

tags | advisory, overflow
MD5 | d6db8e642200e16bde64b751bf00a586
SCOSA-2005.41.txt
Posted Oct 26, 2005
Authored by SCO | Site sco.com

SCO Security Advisory - iDEFENSE has identified a Buffer Overflow vulnerability in SCO Unixware ppp prompt. Local exploitation of a buffer overflow vulnerability in the ppp binary, allows attackers to gain root privileges.

tags | advisory, overflow, local, root
systems | unixware
MD5 | a2077939709397d682ff4c438339458e
Page 1 of 2
Back12Next

File Archive:

September 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    20 Files
  • 2
    Sep 2nd
    15 Files
  • 3
    Sep 3rd
    15 Files
  • 4
    Sep 4th
    4 Files
  • 5
    Sep 5th
    1 Files
  • 6
    Sep 6th
    1 Files
  • 7
    Sep 7th
    15 Files
  • 8
    Sep 8th
    27 Files
  • 9
    Sep 9th
    7 Files
  • 10
    Sep 10th
    16 Files
  • 11
    Sep 11th
    9 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    25 Files
  • 15
    Sep 15th
    15 Files
  • 16
    Sep 16th
    15 Files
  • 17
    Sep 17th
    15 Files
  • 18
    Sep 18th
    12 Files
  • 19
    Sep 19th
    1 Files
  • 20
    Sep 20th
    1 Files
  • 21
    Sep 21st
    15 Files
  • 22
    Sep 22nd
    21 Files
  • 23
    Sep 23rd
    8 Files
  • 24
    Sep 24th
    15 Files
  • 25
    Sep 25th
    4 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close