Section:  .. / 0409-advisories  /

Page 4 of 6
<< 1 2 3 4 5 6 >> Files 75 - 100 of 142
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: ONCommandCCM.txt
Description:
Four default username/password pairs are present in the Sybase database backend used by ON Command CCM 5.x servers. One of the username/password pairs is publicly available in a knowledgebase article at ON Technology's web site. The database accounts can be used to read and modify all data in the CCM database.
Author:Jonas Olsson
File Size:2983
Last Modified:Sep 21 21:08:46 2004
MD5 Checksum:2a6a6d4d0287b4220327ede2bd75381e

 ///  File Name: phpScheduleIt.txt
Description:
phpScheduleIt 1.0.0 RC1 is susceptible to cross site scripting attacks.
Author:Joxean Koret
File Size:3481
Last Modified:Sep 9 00:13:26 2004
MD5 Checksum:d15d3c0eb58484b9abaec648541b1d59

 ///  File Name: phpvulns501.txt
Description:
PHP versions above 4.1.2 and below or equal to 5.0.1 suffer from an exposure of arbitrary memory due to bad array parsing in php_variables.c.
Author:Stefano Di Paola
File Size:2273
Last Modified:Sep 17 07:52:58 2004
MD5 Checksum:cbe8b992f622c696f3423793c80d3622

 ///  File Name: phpWebSite.txt
Description:
GulfTech Security Research - phpWebSite versions 0.9.3-4 and prior are susceptible to cross site scripting, SQL injection, script injection, and command execution vulnerabilities.
Author:James Bercegay
Homepage:http://www.gulftech.org/
File Size:5936
Last Modified:Sep 9 09:06:42 2004
MD5 Checksum:f95e3a0da2ae1ca16f755fe20a8b9f82

 ///  File Name: pigeon302.txt
Description:
A login field longer than 8180 characters sent to the port 3103 causes the immediate freeze of the Pigeon server versions 3.02.0143 and below.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related Exploit:pigeonx.zip"
File Size:1558
Last Modified:Sep 21 02:20:40 2004
MD5 Checksum:340e7c40f70dda0e97195936b258bd7c

 ///  File Name: pinnacleShow151.txt
Description:
Pinnacle ShowCenter 1.51 is susceptible to a denial of service attack when sent a GET request that points to a non-existent skin.
Author:Marc Ruef
Homepage:http://www.computec.ch/
File Size:3434
Last Modified:Sep 22 00:30:21 2004
MD5 Checksum:7301316e747bd1d838dc77d60e5e61e5

 ///  File Name: pLog.txt
Description:
pLog version 0.3.2 is susceptible to cross site scripting attacks in the register.php script.
Author:Jason Thistlethwaite
File Size:609
Last Modified:Sep 9 05:57:25 2004
MD5 Checksum:b6c1b508ccb1f9bc08c1d2de439cd55c

 ///  File Name: popMessenger.txt
Description:
PopMessenger versions 1.60 and below are susceptible to a denial of service attack when attempting to create a dialog with illegal characters.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org/
Related Exploit:popmsgboom.zip"
File Size:1771
Last Modified:Sep 29 05:55:56 2004
MD5 Checksum:f4f19b665c3359ff14cc0710056e0fb9

 ///  File Name: postnukePath.txt
Description:
Postnuke 0.750 Phoenix is susceptible to multiple full path disclosure flaws.
Homepage:http://www.mantralab.org/
File Size:1847
Last Modified:Sep 21 21:18:39 2004
MD5 Checksum:81f4fede96a1e21bb6f737f71ce33b99

 ///  File Name: proboardsXSS.txt
Description:
ProBoards, based off of the YaBB Forums, is susceptible to a cross site scripting flaw.
Author:LJ Lemke
File Size:670
Last Modified:Sep 17 08:42:43 2004
MD5 Checksum:7c0cb377aa677b9975df0a281ac78b2e

 ///  File Name: psnew11.txt
Description:
PsNews 1.1 is susceptible to a cross site scripting flaw.
Author:wacky
File Size:688
Last Modified:Sep 9 10:12:48 2004
MD5 Checksum:2349a02a8054003c92d582c6eaf59db7

 ///  File Name: qnx-crttrap-race-condition.txt
Description:
A possible race condition exists in QNX RTP 6.1 due to a program being called without a complete path.
Author:Julio Cesar Fort
Homepage:http://www.rfdslabs.com.br
File Size:1574
Last Modified:Sep 14 01:49:25 2004
MD5 Checksum:ff76e02598bc5e1e36ce8cb6c389da72

 ///  File Name: qnx-photon_multiple_overflows.txt
Description:
Various buffer overflow conditions exist in four binaries of QNX Photon.
Author:Julio Cesar Fort
Homepage:http://www.rfdslabs.com.br
File Size:2570
Last Modified:Sep 14 01:46:47 2004
MD5 Checksum:2b811969d1209337472170074200f623

 ///  File Name: qnx-rtp610_ftp.txt
Description:
The QNX FTP client is susceptible to a format string attack.
Author:Julio Cesar Fort
Homepage:http://www.rfdslabs.com.br
File Size:2078
Last Modified:Sep 14 01:47:52 2004
MD5 Checksum:d2d3f71eaa7e204a6dac608d8ac48677

 ///  File Name: RHSA-2004-349.txt
Description:
Red Hat Security Advisory RHSA-2004:349 - An input filter bug in mod_ssl was discovered in Apache httpd version 2.0.50 and earlier. A remote attacker could force an SSL connection to be aborted in a particular state and cause an Apache child process to enter an infinite loop, consuming CPU resources.
Homepage:http://rhn.redhat.com/errata/RHSA-2004-349.html
File Size:7867
Related CVE(s):CAN-2004-0748
Last Modified:Sep 9 06:21:00 2004
MD5 Checksum:6ab71665badee39a9f73f0903f97af88

 ///  File Name: RHSA-2004-434.txt
Description:
Red Hat Security Advisory RHSA-2004:434 - A security issue in redhat-config-nfs allows users access to more resources than should normally be allowed.
Author:John Buswell
Homepage:http://rhn.redhat.com/errata/RHSA-2004-434.html
File Size:3783
Last Modified:Sep 29 08:36:05 2004
MD5 Checksum:414e8a2018ecf8aad9ec13de483a13f8

 ///  File Name: RK-001-04.txt
Description:
Three high-risk vulnerabilities have been identified in the Symantec Enterprise Firewall products and two in the Gateway products. All are remotely exploitable and allow an attacker to perform a denial of service attack against the firewall, identify active services in the WAN interface and exploit one of these services to collect and alter the firewall or gateway's configuration.
Author:Mike Sues
Homepage:http://www.rigelksecurity.com
File Size:2743
Last Modified:Sep 29 07:32:50 2004
MD5 Checksum:50c5e3743abfc8f856b6c722d3a6e502

 ///  File Name: SA04-002.txt
Description:
SITIC Vulnerability Advisory - Apache 2.0.x suffers from a buffer overflow when expanding environment variables in configuration files such as .htaccess and httpd.conf. In a setup typical of ISPs, for instance, users are allowed to configure their own public_html directories with .htaccess files, leading to possible privilege escalation.
Homepage:http://www.sitic.se/
File Size:2980
Related CVE(s):CAN-2004-0747
Last Modified:Sep 17 07:44:54 2004
MD5 Checksum:71ef694e4ec5ffe97343a8f3e650e977

 ///  File Name: sa12302.txt
Description:
Secunia Security Advisory - Secunia has discovered a vulnerability in OpenOffice and StarOffice, which can be exploited by malicious, local users to gain knowledge of sensitive information.
Author:Carsten Eiram
Homepage:http://secunia.com/secunia_research/2004-5/
File Size:2591
Last Modified:Sep 14 00:34:42 2004
MD5 Checksum:db50ff214f3c0485e49d12faae42067b

 ///  File Name: sa12404.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in PvPGN, which can be exploited by malicious people to compromise a vulnerable system. The problem is caused due to boundary errors in the handling of the commands /watchall and /unwatchall. This can be exploited by supplying an overly long argument to cause a buffer overflow.
Homepage:http://secunia.com/advisories/12404/
File Size:2049
Last Modified:Sep 8 22:51:54 2004
MD5 Checksum:d9396afe902b65ca6db59156b87baadd

 ///  File Name: sa12422.txt
Description:
Secunia Security Advisory - A vulnerability in Cerbere Proxy Server 1.x can be exploited to cause a denial of service.
Author:Ziv Kamir
Homepage:http://secunia.com/advisories/12422/
File Size:1763
Last Modified:Sep 9 05:58:46 2004
MD5 Checksum:d84c212b00f94fe4bc3df85cf9c59d39

 ///  File Name: sa12445.txt
Description:
Secunia Security Advisory - Two vulnerabilities have been reported in gnubiff 1.x, which potentially can be exploited to cause a DoS (Denial of Service) or compromise a vulnerable system.
Homepage:http://secunia.com/advisories/12445/
File Size:1869
Last Modified:Sep 10 05:29:32 2004
MD5 Checksum:7b5abc524035321c6396a8ce27edd3b1

 ///  File Name: sa12453.txt
Description:
Secunia Security Advisory - Various vulnerabilities have been reported in IMail 8.x, which potentially can be exploited by malicious people to cause a DoS (Denial of Service).
Homepage:http://secunia.com/advisories/12453/
File Size:1956
Last Modified:Sep 9 08:47:23 2004
MD5 Checksum:a0fbbef59649020b21ae3b569ed82e9a

 ///  File Name: sa12455.txt
Description:
Secunia Security Advisory - A vulnerability in the Altnet Download Manager included in Kazaa 2.x can be exploited by malicious people to compromise a user's system. The vulnerability has been confirmed in Altnet Download Manager 4.0.0.4 included in Kazaa 2.7.1. Other versions may also be affected.
Author:CelebrityHacker
Homepage:http://secunia.com/advisories/12455/
File Size:1702
Last Modified:Sep 9 08:53:40 2004
MD5 Checksum:5e7aabcc9a8045e400455c8c163080fa

 ///  File Name: sa12456.txt
Description:
Secunia Security Advisory - A vulnerability in the Altnet Download Manager included in Grokster can be exploited by malicious people to compromise a user's system. The vulnerability has been confirmed in Altnet Download Manager 4.0.0.2 included in Grokster 2.6. Other versions may also be affected.
Author:CelebrityHacker
Homepage:http://secunia.com/advisories/12456/
File Size:1716
Last Modified:Sep 9 08:50:12 2004
MD5 Checksum:647ef678c697f83fc03ecaeb0892f82e