Section:  .. / 0411-advisories  /

Page 6 of 7
<< 1 2 3 4 5 6 7 >> Files 125 - 150 of 167
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: phpCMS121.txt
Description:
phpCMS versions 1.2.1 and below suffer from information disclosure and cross site scripting flaws.
Author:Cyrille Barthelemy
Homepage:http://www.cyrille-barthelemy.com
File Size:1907
Last Modified:Dec 11 23:03:57 2004
MD5 Checksum:b97ca5a9092ccc5324912daad7467f92

 ///  File Name: ssfakep.txt
Description:
The Serious engine for games like Alpha Black Zero and Nitro family fails to limit the amount of new players joining a game, allowing for a denial of service. Only one UDP packet is needed to create a fake player.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related Exploit:ssfakep.zip"
File Size:1898
Last Modified:Dec 11 23:37:53 2004
MD5 Checksum:955520e43052f03cc7cba58f2fd9dc4f

 ///  File Name: janados.txt
Description:
Jana server 2 versions 2.4.4 and below are susceptible to denial of service attacks that result in 100% CPU utilization and endless loops.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related Exploit:janados.zip"
File Size:1885
Last Modified:Dec 12 00:33:08 2004
MD5 Checksum:2042e310f75df545078eb5a48d4a8427

 ///  File Name: sa13191.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in Skype, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error within the handling of command line arguments.
Homepage:http://secunia.com/advisories/13191/
File Size:1880
Last Modified:Nov 20 21:59:36 2004
MD5 Checksum:4a6c0742f777a2a125f4fd51c423c2a2

 ///  File Name: qwik-smtpd.txt
Description:
Unl0ck Team Security Advisory - qwik-smtpd is susceptible to a format string vulnerability.
Author:Dark Eagle
Homepage:http://unl0ck.info/
File Size:1872
Last Modified:Nov 2 02:32:25 2004
MD5 Checksum:72d63649943c30e53555c1dd3cd54599

 ///  File Name: sa13259.txt
Description:
Secunia Security Advisory - Joey Hess has reported a vulnerability in wmFrog, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges.
Homepage:http://secunia.com/advisories/13259/
File Size:1862
Last Modified:Dec 11 20:21:12 2004
MD5 Checksum:002bfa3008e3348878d274117302e326

 ///  File Name: sa13031.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in haserl, which can be exploited by malicious people to manipulate critical environment variables. haserl executes shell scripts embedded in HTML documents using a cgi wrapper and sets all input parameters as environment variables. This could be exploited to cause certain programs and utilities to behave unexpectedly and potentially be exploited to execute arbitrary system commands. The vulnerability has been reported in version 0.5.1. Other versions may also be affected.
Homepage:http://secunia.com/advisories/13031/
File Size:1859
Last Modified:Nov 2 04:44:53 2004
MD5 Checksum:0be1dae9ae5d72fef17858127fcd8f88

 ///  File Name: sa13047.txt
Description:
Secunia Security Advisory - A weakness has been discovered in Safari, which can be exploited by malicious people to trick users into visiting a malicious website by obfuscating URLs.
Homepage:http://secunia.com/advisories/13047/
File Size:1829
Last Modified:Nov 2 04:43:48 2004
MD5 Checksum:17c46a957820e94694856b045496034b

 ///  File Name: sa13261.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in SecretSanta, which can be exploited by malicious users to bypass some security restrictions. The problem is that a new group can be created with the same name as a previously created group, which causes the administrative user of the new group to be incorrectly assigned to the previous group.
Homepage:http://secunia.com/advisories/13261/
File Size:1799
Last Modified:Dec 11 19:45:20 2004
MD5 Checksum:93b1a44272beb1fa01a4231885beeb59

 ///  File Name: sa13040.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in Caudium 1.x, which can be exploited by malicious people to cause a DoS (Denial of Service).
Homepage:http://secunia.com/advisories/13040/
File Size:1792
Last Modified:Nov 2 02:33:49 2004
MD5 Checksum:632fba5d62b0c0ebbdbf50c1446b79d5

 ///  File Name: sa13301.txt
Description:
Secunia Security Advisory - Cassiopeia has reported a security issue in RediCart and S-Mart Shopping Cart Script, allowing malicious people to view the configuration file.
Homepage:http://secunia.com/advisories/13301/
File Size:1788
Last Modified:Dec 11 20:26:28 2004
MD5 Checksum:69ca0c3787d7f634e2194a18ee92742b

 ///  File Name: sa13041.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in HTML::Merge, which can be exploited by malicious people to perform a directory traversal attack.
Homepage:http://secunia.com/advisories/13041/
File Size:1784
Last Modified:Nov 5 04:33:48 2004
MD5 Checksum:76d3d744e79d3412dedf92dae4c37e79

 ///  File Name: sa13329.txt
Description:
Secunia Security Advisory - XioNoX has reported a vulnerability in Nuked-Klan, which can be exploited by malicious people to conduct script insertion attacks.
Homepage:http://secunia.com/advisories/13329/
File Size:1757
Last Modified:Dec 11 23:45:54 2004
MD5 Checksum:f33b4d86cd9e1bd6999c5b4c350c7456

 ///  File Name: doubleByte.txt
Description:
On Double Byte Character Set Locale systems, such as Chinese, Japanese, etc, there exists a spoofing vulnerability within Microsoft Internet Explorer that enables attackers to fake the Address field.
Author:Liu Die Yu
Homepage:http://umbrella.name/
File Size:1756
Last Modified:Dec 11 23:41:59 2004
MD5 Checksum:82f813d3991957ef2c7fcbda0f270619

 ///  File Name: sa13300.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in PHPNews, which can be exploited by malicious people to conduct SQL injection attacks.
Homepage:http://secunia.com/advisories/13300/
File Size:1732
Last Modified:Dec 11 20:15:19 2004
MD5 Checksum:739d2c6d42640cfbdfa30dfbf0473839

 ///  File Name: sa13202.txt
Description:
Secunia Security Advisory - benji lemien has reported two vulnerabilities in Aztek Forum, which can be exploited by malicious people to conduct cross-site scripting attacks.
Homepage:http://secunia.com/advisories/13202/
File Size:1724
Last Modified:Nov 20 22:04:43 2004
MD5 Checksum:7f3f590adea89908efd6ad6edcc0ff4a

 ///  File Name: sa13206.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in phpScheduleIt, which can be exploited by malicious users to bypass certain security restrictions.
Homepage:http://secunia.com/advisories/13206/
File Size:1714
Last Modified:Nov 20 22:35:06 2004
MD5 Checksum:91bcae20afb2523136e36d9182b45a69

 ///  File Name: sa13267.txt
Description:
Secunia Security Advisory - Cengiz Aykanat has reported a security issue in eTrust Antivirus, which can be exploited by malicious people to bypass certain security features.
Homepage:http://secunia.com/advisories/13267/
File Size:1698
Last Modified:Dec 11 21:37:14 2004
MD5 Checksum:6fe48ecfde519a63fa4a6ceaf9fa1c07

 ///  File Name: sa13319.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in YaBB, which can be exploited by malicious people to conduct script insertion attacks.
Homepage:http://secunia.com/advisories/13319/
File Size:1697
Last Modified:Dec 11 23:11:50 2004
MD5 Checksum:75aec0fe23ae0a75667aa145e816448c

 ///  File Name: nortelVPN.txt
Description:
The Nortel Networks Contivity VPN Client authentication error message provides more information than is necessary, thus allowing an attacker to discover existing users on the system.
Author:Network Intelligence (I) Pvt. Ltd.
File Size:1684
Last Modified:Nov 12 04:43:05 2004
MD5 Checksum:acb958b66167874f86ad74927acf1ebe

 ///  File Name: 758884.txt
Description:
Unofficial addition to the NISCC DNS vulnerability advisory giving an additional list of vulnerable implementations.
Related File:758884.html
File Size:1632
Last Modified:Nov 20 23:15:46 2004
MD5 Checksum:d1daaf185fbd2a5d88c982e101bec10d

 ///  File Name: sa13330.txt
Description:
Secunia Security Advisory - A security issue has been reported in IberAgents, which can be exploited by malicious, local users to gain knowledge of sensitive information.
Homepage:http://secunia.com/advisories/13330/
File Size:1631
Last Modified:Dec 11 23:55:29 2004
MD5 Checksum:a1beee20b0b46885930e4db3cb0639ca

 ///  File Name: armymen10.txt
Description:
Army Men RTS version 1.0 is susceptible to a format string bug that results in a denial of service.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
File Size:1616
Last Modified:Nov 20 20:08:24 2004
MD5 Checksum:180c0dafcada1937e5d38a6c8b107397

 ///  File Name: secure142.txt
Description:
Secure Network Messenger versions 1.4.2 and below suffer from a remote denial of service vulnerability.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
File Size:1594
Last Modified:Nov 13 03:44:18 2004
MD5 Checksum:aaae6bc7ffbcadb6620fe6f123d5606f

 ///  File Name: sa13277.txt
Description:
Secunia Security Advisory - Aaron has reported a vulnerability in iCal, which potentially can be exploited by malicious people to compromise a user's system.
Homepage:http://secunia.com/advisories/13277/
File Size:1585
Last Modified:Dec 11 19:44:32 2004
MD5 Checksum:f36d7527f56fe70944b38faef3e2ebe3