Section:  .. / 0403-advisories  /

Page 3 of 4
<< 1 2 3 4 >> Files 50 - 75 of 90
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: terminator3.txt
Description:
Terminator 3: War of the Machines version 1.0 for Windows has a broadcast client buffer overflow that results in a game network denial of service.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related Exploit:t3cbof.zip
File Size:2486
Last Modified:Mar 24 06:40:00 2004
MD5 Checksum:1d8feacdcbdfff8ab28a2bd66d86d166

 ///  File Name: expcrashnp.txt
Description:
Internet Explorer and Explorer.exe can be crashed when a null pointer exception occurs during a shell: call with a double backslash for a filename.
Author:Rafel Ivgi aka The-Insider
Homepage:http://theinsider.deep-ice.com
File Size:2414
Last Modified:Mar 19 20:32:00 2004
MD5 Checksum:6d4bc179453917274d5cf3f9973eeeeb

 ///  File Name: Adv-20040312.txt
Description:
S-Quadra Advisory #2004-03-12 - The Dogpatch Software CFWebstore 5.0 shopping cart is vulnerable to both SQL injection and cross site scripting attacks in the index.cfm script.
Author:Nick Gudov
Homepage:http://www.s-quadra.com/advisories/Adv-20040312.txt
File Size:2392
Last Modified:Mar 13 08:22:31 2004
MD5 Checksum:92cadde32e23bca7556fa53d8e7bedbf

 ///  File Name: etherlords.txt
Description:
Etherlords I versions 1.07 and below and Etherlords II versions 1.03 and below suffer from a bug where reading of unallocated memory causes a crash.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related Exploit:ethboom.zip
File Size:2345
Last Modified:Mar 26 02:54:16 2004
MD5 Checksum:b981557285057dbc3946715d75f4e822

 ///  File Name: antispam.txt
Description:
NGSSoftware Insight Security Research Advisory #NISR19042004a - Installed with Symantec's Norton AntiSpam 2004 product is an ActiveX component that is marked safe for scripting, particularly symspam.dll. However, when the method LaunchCustomRuleWizard is called with an overly long parameter, an attacker can cause a stack based overflow allowing for arbitrary code execution.
Author:Mark Litchfield
Homepage:http://www.ngssoftware.com/advisories/antispam.txt
File Size:2345
Last Modified:Mar 19 19:13:00 2004
MD5 Checksum:a351a8120d24537eb9f59f6ae9e60f6c

 ///  File Name: phpBB206a.txt
Description:
phpBB versions 2.0.6 and below suffer from a SQL injection vulnerability in the search.php file. Workaround included.
Author:pokleyzz
Homepage:http://www.scan-associates.net
Related Exploit:gemuruh-v2.php.txt
File Size:2341
Last Modified:Mar 15 20:40:12 2004
MD5 Checksum:7eba141ea384a599e9677a3788face6c

 ///  File Name: chrome1200.txt
Description:
Chrome versions 1.2.0.0 and below allow for reading and writing into allocated memory resulting in a server crash.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related Exploit:chromeboom.zip
File Size:2335
Last Modified:Mar 19 17:44:00 2004
MD5 Checksum:956615d9d99be41fe1be79fe590c0a2c

 ///  File Name: RSTACK-20040325.txt
Description:
Rstack Team Security Advisory RSTACK-20040325 - Nstxd has been found vulnerable to a denial of service attack due to a null-pointer-dereference.
Author:Rstack Team
Homepage:http://www.rstack.org/
File Size:2289
Last Modified:Mar 27 04:14:14 2004
MD5 Checksum:5e32679021aad2cac7230454ff587b51

 ///  File Name: MG-2004-01.txt
Description:
Hard coded login sequence values for Oracle SSO allow for easy man in the middle attacks.
Author:Guido van Rooij, Arjan de Vet
Homepage:http://www.madison-gurkha.com/advisories/MG-2004-01.txt
File Size:2253
Last Modified:Mar 30 17:58:00 2004
MD5 Checksum:87135b2bb648920a8b367396787a1281

 ///  File Name: adobexfdf.txt
Description:
NGSSoftware Insight Security Research Advisory #NISR03022004 - Adobe Acrobat Reader version 5.1 is susceptible to a buffer overflow when an xfdf file is parsed and an unsafe call to sprintf is made.
Author:David Litchfield
Homepage:http://www.ngssoftware.com/advisories/adobexfdf.txt
File Size:2227
Last Modified:Mar 4 23:55:02 2004
MD5 Checksum:cf88517aeae796f8b73eaa462901dafc

 ///  File Name: db2rmtcmd.txt
Description:
NGSSoftware Insight Security Research Advisory #NISR09032004 - IBM's DB2 version 8.1 Enterprise Edition on Windows has a remote command server that runs as db2admin, but can have commands executed by a guest account, allowing for privilege escalation.
Author:David Litchfield
Homepage:http://www.ngssoftware.com/advisories/db2rmtcmd.txt
File Size:2204
Last Modified:Mar 11 02:31:20 2004
MD5 Checksum:1962d75fb94caac85d2385e494eaa814

 ///  File Name: slmailsrc.txt
Description:
NGSSoftware Insight Security Research Advisory #NISR05022004a - SLMail Pro Supervisor Report Center versions 2.0.9 and below are vulnerable to a buffer overflow attack when supplied with an overly long HTTP sub-version.
Author:David Litchfield
Homepage:http://www.ngssoftware.com/advisories/slmailsrc.txt
File Size:2147
Last Modified:Mar 5 22:23:58 2004
MD5 Checksum:381f8428881bb22dd2452beba88e8254

 ///  File Name: bloggerXSS.txt
Description:
Blogger from Google has a cross site scripting flaw.
Author:Ferruh Mavituna
Homepage:http://ferruh.mavituna.com
File Size:2130
Last Modified:Mar 27 04:10:59 2004
MD5 Checksum:bf830c8c8036501f47cd47bd338e4912

 ///  File Name: battlemages-adv.txt
Description:
Battle Mages versions 1.0 for Windows is vulnerable to a denial of service server freeze. It infinitely loops when trying to read an expected data block after being sent incomplete data.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related Exploit:battlemagy.zip
File Size:2091
Last Modified:Mar 12 02:42:30 2004
MD5 Checksum:7aab55efe1583b0607afaf2479cb442d

 ///  File Name: slmailwm.txt
Description:
NGSSoftware Insight Security Research Advisory #NISR05022004b - SLWebMail has multiple buffer overflow vulnerabilities that are related to ISAPI appliactions.
Author:David Litchfield
Homepage:http://www.ngssoftware.com/advisories/slmailwm.txt
File Size:2019
Last Modified:Mar 5 22:28:00 2004
MD5 Checksum:3b3c992ac61ac071ca7b1da1388f08c5

 ///  File Name: hushmail_09-03-04.txt
Description:
Various cross site scripting vulnerabilties exist in the hushmail.com site.
Author:Calum Power
File Size:1987
Last Modified:Mar 12 02:57:03 2004
MD5 Checksum:c8874effe33c599a0604170fe41131ae

 ///  File Name: wsftp402eval2.txt
Description:
Ipswitch WS_FTP server version 4.0.2.EVAL allows a remote attacker to fill up the hard disk of the server via the REST command, resulting in a denial of service.
Author:Hugh Mann
File Size:1951
Last Modified:Mar 23 16:41:00 2004
MD5 Checksum:dfa540d6de41d78f9d74ef23367a7390

 ///  File Name: therage101.txt
Description:
The Rage game versions 1.01 and below are vulnerable to a remote denial of service. The packet used by the client to join the match hosted on the server contains a sockaddr_in structure inside the data that is composed by the AF_INET family, the source port and the IP address of the client. This structure is used by the server to send the next packets to the client. If an attacker fills it with a port and an IP equal to zero the server will enter in an infinite loop.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related Exploit:ragefreeze.zip
File Size:1820
Last Modified:Mar 24 03:48:00 2004
MD5 Checksum:ed247d4aa5cacdbb878c9181d22ecc49

 ///  File Name: chatanywhere.txt
Description:
Chat Anywhere versions 2.72 and below allow a remote attacker to add %00 before their nickname which keeps an administrator from being able to ban or kick the user from a room.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
File Size:1806
Last Modified:Mar 11 02:28:19 2004
MD5 Checksum:3c376d39bf7b1a136620b9935f5bf543

 ///  File Name: badblue24.txt
Description:
BadBlue web server version 2.4 has a local path disclosure vulnerability in phptest.php.
Author:Rafel Ivgi aka The-Insider
Homepage:http://theinsider.deep-ice.com
File Size:1802
Last Modified:Feb 24 22:10:00 2004
MD5 Checksum:173a9fc04e9c121df9d06bf78439f9f3

 ///  File Name: soapy.txt
Description:
Multiple vendors suffer from a denial of service vulnerability in their SOAP servers. Products affected: Macromedia ColdFusion/MX 6.0 and 6.1, ColdFusion/MX 6.0 and 6.1 J2EE, all editions of Macromedia JRun 4.0, and Sun Java System Application Server 7 Update 2 Upgrade and prior releases.
Author:Amit Klein
Homepage:http://www.SanctumInc.com
File Size:1693
Last Modified:Mar 17 07:41:11 2004
MD5 Checksum:c51d9646055d66485691116fe1f72ee0

 ///  File Name: crafty-adv.txt
Description:
A vulnerability exists in the Crafty game versions 19.3 and below that allows a local user to escalate privileges via a buffer overflow.
Author:Steve Kemp
Homepage:http://www.rosiello.org/
File Size:1626
Last Modified:Mar 17 08:01:38 2004
MD5 Checksum:04de1ee02537eee1d62754fc7e2301f2

 ///  File Name: MyProxy20030629.txt
Description:
Due to a lack of proper input validation, cross site scripting flaws exist in MyProxy version 20030629.
Author:Donato Ferrante
Homepage:http://www.autistici.org/fdonato
File Size:1608
Last Modified:Mar 12 02:58:15 2004
MD5 Checksum:7aff814f81d05f258777d74a195b448a

 ///  File Name: freshmeatXSS.txt
Description:
Freshmeat.net is susceptible to a cross site scripting flaw.
Author:Steve Kemp
File Size:1554
Last Modified:Mar 27 03:58:45 2004
MD5 Checksum:8adc2e66da95b1f65b1d0cb562f21729

 ///  File Name: picophone163.txt
Description:
PicoPhone versions 1.63 and below have a buffer overflow in their logging function that allows an attacker to take over the server.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related Exploit:picobof.zip
File Size:1524
Last Modified:Mar 24 17:17:00 2004
MD5 Checksum:c58c41988177769677bdbda6666df03f