Section:  .. / 0404-advisories  /

Page 4 of 4
<< 1 2 3 4 >> Files 75 - 90 of 90
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: fastream.txt
Description:
Fastream NETFile FTP / HTTP server version 6.5.1.980 is susceptible to a denial of service attack due to an inability to handle nonexistent user names.
Author:Donato Ferrante
Homepage:http://www.autistici.org/fdonato
File Size:1886
Last Modified:Apr 19 15:55:00 2004
MD5 Checksum:7f21738e0c24a152b2f4a0e018a1b3f9

 ///  File Name: keriofw4.txt
Description:
Kerio Personal Firewall version 4.0.13 is susceptible to a remote crash when using the web filter functionality.
Author:E. Kellinis
Homepage:http://www.cipher.org.uk
File Size:1851
Last Modified:Apr 7 12:03:00 2004
MD5 Checksum:d684f21bc194c228f962df2ff5834200

 ///  File Name: waraxe-2004-SA014.txt
Description:
AzDGDatingLite version 2.1.1 is susceptible to cross site scripting attacks.
Author:Janek Vind
Homepage:http://www.waraxe.us/index.php?modname=sa&id=14
File Size:1813
Last Modified:Apr 8 09:01:00 2004
MD5 Checksum:bd97228c20b33ab049b77211500e8e10

 ///  File Name: digiwww.txt
Description:
DiGi WWW Server version Compieuw.1 suffers from a DoS vulnerability due to a malformed URL.
Author:Donato Ferrante
Homepage:http://www.autistici.org/fdonato
File Size:1781
Last Modified:Apr 28 06:07:38 2004
MD5 Checksum:10aed3b00ae6eea78f8f8d5e157fb1ab

 ///  File Name: 1stClass.txt
Description:
1st Class mail server 4.01 suffers from a directory traversal and cross site scripting vulnerabilities.
Author:Dr. Insane
Homepage:http://members.lycos.co.uk/r34ct/
File Size:1713
Last Modified:Apr 14 16:12:00 2004
MD5 Checksum:5028924fba9a2451ea6c3d82cb6d2d12

 ///  File Name: sa11396.txt
Description:
Secunia Security Advisory SA11396 - The SCT Campus Pipeline attachment script has a vulnerability that allows for a cross site scripting attack.
Homepage:http://secunia.com/advisories/11396/
File Size:1702
Last Modified:Apr 17 14:03:00 2004
MD5 Checksum:6af0e279f7fb3a1dd84dc8764f4173dd

 ///  File Name: crackalaka.txt
Description:
Crackalaka version 1.0.8 is susceptible to a denial of service attack when it attempts to manage an unallocated sector of memory.
Author:Donato Ferrante
Homepage:http://www.autistici.org/fdonato
File Size:1648
Last Modified:Apr 9 12:59:00 2004
MD5 Checksum:0c433f7ca6760e11f7859c73b5f33e7a

 ///  File Name: sa11394.txt
Description:
Secunia Security Advisory SA11394 - A vulnerability in WIKINDX allows remote attackers the ability to read the configuration file.
Homepage:http://secunia.com/advisories/11394/
File Size:1616
Last Modified:Apr 17 14:23:00 2004
MD5 Checksum:69caf9761d966d42127fbec7af6710a0

 ///  File Name: sa11431.txt
Description:
Secunia Security Advisory SA11431 - Journalness versions below 3.0.8 suffer from a vulnerability that can be exploited by invalid users to create and edit posts.
Homepage:http://secunia.com/advisories/11431/
File Size:1534
Last Modified:Apr 21 10:01:00 2004
MD5 Checksum:0a47d70f911fb6cc463c31f2530b266e

 ///  File Name: sa11367.txt
Description:
Secunia Security Advisory SA11367 - Subversion versions 0.x to 1.x are reportedly affected by some vulnerabilities, which potentially can be exploited by malicious people to compromise a vulnerable system.
Homepage:http://secunia.com/advisories/11367/
File Size:1527
Last Modified:Apr 17 14:21:00 2004
MD5 Checksum:99948cab7ad33a83991d10dc6c485f5a

 ///  File Name: fusion.txt
Description:
fusion news version 3.6.1 suffers from a cross site scripting vulnerability.
Author:DarkBicho
Homepage:http://www.darkbicho.tk
File Size:1246
Last Modified:Apr 24 03:05:00 2004
MD5 Checksum:0d465d8cfbb48effc4006aecde0d7944

 ///  File Name: suse-yast.txt
Description:
Possible symlink attack in SuSe's Yast Online Update tool.
Author:l0om
Homepage:http://www.excluded.org
File Size:1195
Last Modified:Apr 5 09:02:00 2004
MD5 Checksum:92e05ab461557575452e09a08e2058fd

 ///  File Name: ie6crash.txt
Description:
Internet Explorer 6 crashes when locally loading a page with a question mark in a SRC directive for an IFRAME.
Author:E.Kellinis
File Size:687
Last Modified:Apr 8 22:39:33 2004
MD5 Checksum:b567cbdbb80339aa2d0d43b7ce8c1adf

 ///  File Name: chpasswd.txt
Description:
The chpasswd binary plugin version 3.x that comes with SquirrelMail is susceptible to a buffer overflow.
Author:Matias Neiff
File Size:500
Last Modified:Apr 17 04:20:00 2004
MD5 Checksum:925dc53e7334dfe39f26d2606f0a1b52

 ///  File Name: advguest.txt
Description:
Advanced Guestbook web application version 2.2 is susceptible to a SQL injection attack.
Author:JQ
File Size:296
Last Modified:Apr 22 10:14:00 2004
MD5 Checksum:601545f561f0a1de4ae46a1bbc7a06af