Section:  .. / 0403-advisories  /

Page 4 of 4
<< 1 2 3 4 >> Files 75 - 90 of 90
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: solaris_kernel_vfs.sxw.pdf
Description:
Immunity Security Advisory - A vulnerability lies in Solaris 2.6 through 10 that allows a local user to load kernel modules without being root due to a directory traversal problem in vfs_getvfssw().
Author:Sinan Eren.
Homepage:http://www.immunitysec.com
File Size:22557
Last Modified:Mar 24 07:12:00 2004
MD5 Checksum:e384712d8c329650378a979c1a34b004

 ///  File Name: sonicwall.txt
Description:
SonicWall Firewall/VPN appliances with a firmware revision of 6.5.0.4 or below are vulnerable to denial of service attacks, arp flooding, and network mapping.
Author:xeno
File Size:2856
Last Modified:Mar 2 04:33:00 2004
MD5 Checksum:d9ef37f6713b61522d04c580212080bc

 ///  File Name: terminator3.txt
Description:
Terminator 3: War of the Machines version 1.0 for Windows has a broadcast client buffer overflow that results in a game network denial of service.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related Exploit:t3cbof.zip
File Size:2486
Last Modified:Mar 24 06:40:00 2004
MD5 Checksum:1d8feacdcbdfff8ab28a2bd66d86d166

 ///  File Name: therage101.txt
Description:
The Rage game versions 1.01 and below are vulnerable to a remote denial of service. The packet used by the client to join the match hosted on the server contains a sockaddr_in structure inside the data that is composed by the AF_INET family, the source port and the IP address of the client. This structure is used by the server to send the next packets to the client. If an attacker fills it with a port and an IP equal to zero the server will enter in an infinite loop.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related Exploit:ragefreeze.zip
File Size:1820
Last Modified:Mar 24 03:48:00 2004
MD5 Checksum:ed247d4aa5cacdbb878c9181d22ecc49

 ///  File Name: unrealEngine.txt
Description:
The Unreal game engine for Windows, MacOS, and Linux has a format string bug that allows an attacker to remotely crash or execute malicious code on the server. Games affected: America's Army, DeusEx, Devastation, Magic Battlegrounds, Mobile Forces, Nerf Arena Blast, Postal 2, Rainbow Six: Raven Shield, Rune, Sephiroth: 3rd episode the Crusade, Star Trek: Klingon Honor Guard, Tactical Ops, TNN Pro Hunter, Unreal 1, Unreal II XMP, Unreal Tournament, Unreal Tournament 2003, Wheel of Time, X-com Enforcer, and XIII.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related Exploit:unrfs-poc.zip
File Size:3426
Last Modified:Mar 11 02:42:34 2004
MD5 Checksum:ba1bf0b1ec64c16152ef766ad9850acc

 ///  File Name: vz012004-esignal7.txt
Description:
VizibleSoft Security Advisory #2004/01 - eSignal versions 7.6 and 7.5 have a stack based buffer overflow in the WinSig.exe binary, allowing for remote code execution.
Author:insect
Homepage:http://viziblesoft.com/insect/advisories/vz012004-esignal7.txt
Related Exploit:vz-eSignal76.pl
File Size:4717
Last Modified:Mar 26 02:48:33 2004
MD5 Checksum:baf95f8e34ade62800fd0d0ef24b06fe

 ///  File Name: waraxe-2004-SA008.txt
Description:
PHP-Nuke versions 6.x through 7.1.0 allow for link inclusions that can force an administrator to unknowingly add a superuser.
Author:Janek Vind aka waraxe
File Size:3004
Last Modified:Mar 23 01:57:00 2004
MD5 Checksum:16ed4cb0b4664693cee520faf21ab541

 ///  File Name: waraxe-2004-SA011.txt
Description:
MS Analysis module version 2.0 for PHP-Nuke has full path disclosure, cross site scripting, and SQL injection vulnerabilities.
Author:Janek Vind aka waraxe
File Size:6600
Last Modified:Mar 23 01:54:00 2004
MD5 Checksum:7bd49123ef6d14a8d1036985619167ff

 ///  File Name: webctCE41.txt
Description:
WebCT Campus Edition 4.1 suffers from cross site scripting vulnerabilities.
Author:Simon Boulet
File Size:2869
Last Modified:Mar 28 19:01:00 2004
MD5 Checksum:c59ceaf9802b6872126c55b2c8604a88

 ///  File Name: wMCam21348.txt
Description:
wMCam server version 2.1.348 is susceptible to a denial of service attack when in excess of 300 connections are made to it each supplying a small amount of non-standard data.
Author:Donato Ferrante
Homepage:http://www.autistici.org/fdonato
File Size:1415
Last Modified:Mar 11 02:37:36 2004
MD5 Checksum:537a49857360384941b39572aee42000

 ///  File Name: wsftp402eval.txt
Description:
Ipswitch WS_FTP server version 4.0.2.EVAL allows for a remote user with write access to a directory the ability to execute arbitrary code due to a buffer overflow in WS_FTP Server's STAT command when downloading a file the user created.
Author:Hugh Mann
Related Exploit:xp_ws_ftp_server.zip
File Size:2499
Last Modified:Mar 23 16:22:00 2004
MD5 Checksum:584b2040c538e3d89da88f206f59d717

 ///  File Name: wsftp402eval2.txt
Description:
Ipswitch WS_FTP server version 4.0.2.EVAL allows a remote attacker to fill up the hard disk of the server via the REST command, resulting in a denial of service.
Author:Hugh Mann
File Size:1951
Last Modified:Mar 23 16:41:00 2004
MD5 Checksum:dfa540d6de41d78f9d74ef23367a7390

 ///  File Name: wsftp402eval4.txt
Description:
Ipswitch WS_FTP server version 4.0.2.EVAL has a flaw that allows a remote attacker that ability to read any memory address. With the right address, the user can cause a buffer overflow and execute arbitrary code as SYSTEM.
Author:Hugh Mann
Related Exploit:xp_ws_ftp_server2.zip
File Size:1320
Last Modified:Mar 23 17:08:00 2004
MD5 Checksum:4a498c09d40073c1dd726cfac06a70fa

 ///  File Name: wsftp802.txt
Description:
WS_FTP Pro versions 8.02 and below suffer from a buffer overrun when ASCII mode directory data is passed to the client from the server. If the data exceeds 260 bytes without a terminating CR/LF, the application will crash. Arbitrary code execution is possible.
Author:John Layman
File Size:1087
Last Modified:Mar 16 04:43:25 2004
MD5 Checksum:87428c4b5102ab4a9264c9a1b34b1789

 ///  File Name: yabbSESQL.txt
Description:
YaBB SE versions 1.5.4 to 1.5.5b are all susceptible to various remote SQL injection attacks.
Author:backspace
File Size:8299
Last Modified:Mar 1 18:20:00 2004
MD5 Checksum:b0be7a2e966b524d21e37516553cb6e6