Section:  .. / 0407-advisories  /

Page 3 of 5
<< 1 2 3 4 5 >> Files 50 - 75 of 114
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: memHalfLife.txt
Description:
A malformed packet to a Half-Life engine will cause a denial of service when a write to a read-only memory zone occurs. Both Windows and Linux releases are affected.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related Exploit:hlboom.zip"
File Size:2739
Last Modified:Jul 12 18:54:00 2004
MD5 Checksum:082dc86864b336de5ae00880586b6b07

 ///  File Name: hotmailXSS.txt
Description:
Microsoft Hotmail is vulnerable to a cross site scripting attack.
Author:Paul
Homepage:http://greyhats.cjb.net
File Size:2734
Last Modified:Jul 15 04:02:00 2004
MD5 Checksum:80b6dd7c85dfd7eacfd338e20360387f

 ///  File Name: advisory-11.txt
Description:
CuteNews version 1.3.x suffers from an HTML injection flaw in the commentary section.
Author:DarkBicho
Homepage:http://www.darkbicho.tk
File Size:2717
Last Modified:Jul 18 03:16:00 2004
MD5 Checksum:b1428594ddb5ead2d5403b3260a6e64d

 ///  File Name: dlink624.txt
Description:
The DI-624+ SOHO DLINK router suffers a script injection vulnerability that uses DHCP as a vector of attack.
Author:Gregory Duchemin
File Size:2547
Last Modified:Jul 1 13:53:00 2004
MD5 Checksum:c941c048bae8662782f9d8aad28f39fe

 ///  File Name: sa12011.txt
Description:
Secunia Security Advisory - Multiple vulnerabilities have been discovered in Mbedthis AppWeb 1.x. Some currently have an unknown impact and others may be exploited by malicious people to gain knowledge of sensitive information or bypass certain security restrictions.
Homepage:http://secunia.com/advisories/12011/
File Size:2546
Last Modified:Jul 6 15:17:00 2004
MD5 Checksum:48f51a4ae39dd13cb4cb53cd1edc0ea8

 ///  File Name: sa12150.txt
Description:
Secunia Security Advisory - Multiple vulnerabilities have been discovered in Hitachi's Web Page Generator versions 1.x and 2.x and also Enterprise releases 3.x and 4.x. These include denial of service, cross site scripting, and content disclosure attacks.
Homepage:http://secunia.com/advisories/12150/
File Size:2466
Last Modified:Jul 28 20:47:53 2004
MD5 Checksum:24a7ed4970aa66d8ac623a72ea68942c

 ///  File Name: mozShell.txt
Description:
Mozilla has a flaw that allows for a remote attacker to trick a user into launching an executable via the SHELL: directive.
Author:Liu Die Yu
File Size:2452
Last Modified:Jul 9 20:15:00 2004
MD5 Checksum:f053b8c961ebfbed779d64b34647bfb6

 ///  File Name: comersusXSS.txt
Description:
Comersus Cart version 5.09 is susceptible to a cross site scripting flaw.
Author:Thomas Ryan
Homepage:http://www.providesecurity.com/research/advisories/07062004-01.asp
File Size:2428
Last Modified:Jul 7 02:33:00 2004
MD5 Checksum:3c8fd332bf4de39d0cb4a8aaad17b757

 ///  File Name: ZoomX3.txt
Description:
The Zoom X3 ADSL modem has a backdoor menu on TCP port 254 that uses the factory default password for access. However, even if the password is changed on the main menu, the backdoor system still allows access with it.
Author:Adam Laurie
File Size:2428
Last Modified:Jul 5 08:39:00 2004
MD5 Checksum:dc2c285338609813f1f60e4ce58f4566

 ///  File Name: netegrityXSS.txt
Description:
A cross site scripting vulnerability exists in Netegrity IdentityMinder Web Edition 5.6 SP2 for Windows and Netegrity Policy Server version 5.5.
Author:hexview
File Size:2399
Last Modified:Jul 1 13:59:00 2004
MD5 Checksum:2b214c050da725dba066adffb8ca0d4f

 ///  File Name: advisory-09.txt
Description:
Outblaze email suffers from a cross site scripting flaw.
Author:DarkBicho
File Size:2370
Last Modified:Jul 18 03:13:00 2004
MD5 Checksum:2b07825995c3f193e175c0dcf40dd09e

 ///  File Name: GLSA200407-19.txt
Description:
Gentoo Linux Security Advisory GLSA 200407-19 - Pavuk 0.x contains a bug that can allow an attacker to run arbitrary code via a buffer overflow in the Digest authentication code.
Homepage:http://www.gentoo.org/
File Size:2367
Last Modified:Jul 28 01:40:12 2004
MD5 Checksum:8348347f9d1c6ccc27992306edea485d

 ///  File Name: comersusCart.txt
Description:
Comersus Cart versions 5.09 and below suffer from a flaw where improper request handling allows a malicious user to modify pricing parameters prior to purchase.
Author:Thomas Ryan
Homepage:http://www.providesecurity.com/research/advisories/07062004-02.asp
File Size:2298
Last Modified:Jul 7 12:15:00 2004
MD5 Checksum:eeb2a197d80bf08f6d51f15667f990c9

 ///  File Name: cart32XSS.txt
Description:
Cart32 suffers from an input validation flaw that allows for cross site scripting attacks.
Author:Dr Ponidi
File Size:2259
Last Modified:Jul 2 19:06:00 2004
MD5 Checksum:ad647d12209bbfc70ec74866b28218cb

 ///  File Name: sa11999.txt
Description:
Secunia Security Advisory - Jesse Ruderman has reported a security issue in Mozilla and Mozilla Firefox, allowing malicious websites to trick users into accepting security dialog boxes. The problem is that it may be possible to trick users into typing or clicking on a XPInstall / Security dialog box, using various interactive events, without the user noticing the dialog box. Successful exploitation may allow a malicious website to perform tasks that require user interaction. This has been fixed in Mozilla 1.7 and Mozilla Firefox 0.9.
Homepage:http://secunia.com/advisories/11999/
File Size:2173
Last Modified:Jul 5 08:44:00 2004
MD5 Checksum:ca6c84624d5835f20d80a1fc455fff0b

 ///  File Name: easy12.txt
Description:
Easy Chat Server version 1.2 is susceptible to multiple denial of service vulnerabilities.
Author:Donato Ferrante
Homepage:http://www.autistici.org/fdonato
File Size:2164
Last Modified:Jul 2 06:54:00 2004
MD5 Checksum:b924b36113ed9cd033d8663f2c60cc3a

 ///  File Name: memcorruptIE.txt
Description:
An 11 byte attack against Microsoft Internet Explorer allows for an attacker to denial of service the application due to a memory corruption vulnerability. Versions affected: 5.x, 6.1 SP1.
Author:Phuong Nguyen
File Size:2137
Last Modified:Jul 3 13:57:00 2004
MD5 Checksum:cb16ac1e7998cbf382f0139889778d75

 ///  File Name: unreal.ircd.txt
Description:
Unreal ircd versions below 3.2 suffer from a faulty cloaking scheme to hide IP addresses which allows attackers to find the true IP address of people using the server.
Author:bartavelle
Homepage:http://www.bandecon.com/advisory/unreal.txt
File Size:2121
Last Modified:Jul 5 08:17:00 2004
MD5 Checksum:61355316be6103ac7b56fdc8ab490da3

 ///  File Name: sa12092.txt
Description:
Secunia Security Advisory - Cengiz Aykanat has reported two vulnerabilities in eTrust Common Services, allowing malicious people to cause a Denial of Service.
Homepage:http://secunia.com/advisories/12092/
File Size:2101
Last Modified:Jul 19 14:10:00 2004
MD5 Checksum:3bc9f9a88952edb7840c28eaa29fe276

 ///  File Name: sa11986.txt
Description:
Secunia Security Advisory - Two vulnerabilities have been reported in RSBAC, potentially allowing malicious, local users to escalate their privileges. One allows a malicious user the ability to switch the AUTH module off. This affects 1.0.8 through 1.2.2. The other allows users to create suid and sgid files. This affects 1.2.2.
Homepage:http://secunia.com/advisories/11986/
File Size:2085
Last Modified:Jul 2 07:02:00 2004
MD5 Checksum:f5ab3013ab4a68f86a7e1b67fd99ec91

 ///  File Name: Vpop3.txt
Description:
VPOP3 2.0.0k is susceptible to a denial of service attack due to a buffer overflow.
Author:dr_insane, papabfs
Homepage:http://members.lycos.co.uk/r34ct/
File Size:2060
Last Modified:Jul 24 02:33:25 2004
MD5 Checksum:3f5c8f4d2d7aafaf6a7c2c10e020a448

 ///  File Name: nucpuncms.txt
Description:
Secunia Security Advisory - PunBB 1.x, Nucleus 3.x, and BLOG:CMS 3.x all suffer from a flaw where system access can be gained due to a lack of input validation.
Homepage:http://secunia.com/advisories/12097/
File Size:2041
Last Modified:Jul 20 13:13:00 2004
MD5 Checksum:8e1f2f0111426634ee5901415deab633

 ///  File Name: sa12101.txt
Description:
Secunia Security Advisory - Lostmon has reported a weakness in I-Cafe client, allowing malicious users to by disable the software.
Homepage:http://secunia.com/advisories/12101/
File Size:1985
Last Modified:Jul 20 14:44:00 2004
MD5 Checksum:5b907abd136db2186c82eaf3c27505c8

 ///  File Name: crossZone.txt
Description:
IEXPLORE.EXE file version 6.0.2800.1106 and MSHTML.DLL file version 6.00.2800.1400 are both susceptible to cross site/zone scripting flaws.
Author:paul
Homepage:http://www.greyhats.cjb.net
File Size:1969
Last Modified:Jul 20 06:05:45 2004
MD5 Checksum:62af020bb2b5a7828cbf938a1d3c540f

 ///  File Name: sa12103.txt
Description:
Secunia Security Advisory - PlaySMS SMS Gateway 0.x is susceptible to SQL and Command Injection vulnerabilities due to a lack of input validation.
Homepage:http://secunia.com/advisories/12103/
File Size:1935
Last Modified:Jul 19 21:50:00 2004
MD5 Checksum:d11e97dfe897e00a66c4157e7176c2e8