Section:  .. / 0409-advisories  /

Page 5 of 6
<< 1 2 3 4 5 6 >> Files 100 - 125 of 142
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: postnukePath.txt
Description:
Postnuke 0.750 Phoenix is susceptible to multiple full path disclosure flaws.
Homepage:http://www.mantralab.org/
File Size:1847
Last Modified:Sep 21 21:18:39 2004
MD5 Checksum:81f4fede96a1e21bb6f737f71ce33b99

 ///  File Name: sa12486.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in Emdros, which can be exploited by malicious users to cause a DoS (Denial of Service). The vulnerability is caused due to a memory leak in the CFeatureDeclaration::TypeTypeCompatibility() function. This can be exploited to consume available system resources by issuing a large amount of malformed CREATE OBJECT TYPE or UPDATE OBJECT TYPE statements. Versions below 1.1.20 are affected.
Homepage:http://secunia.com/advisories/12486/
File Size:1831
Last Modified:Sep 10 07:20:02 2004
MD5 Checksum:6f04cd1583e007b086f330a5d3aa6398

 ///  File Name: jabberdDoS.txt
Description:
jabberd up to and including version 1.4.3 and jadc2s up to and including version 0.9.0 are vulnerable against a DoS attack.
Author:Jose Antonio Calvo
File Size:1815
Last Modified:Sep 29 05:45:23 2004
MD5 Checksum:05c6eb51a5a893bf9b9b8ca25b049d93

 ///  File Name: sa12546.txt
Description:
Secunia Security Advisory - Red Hat has issued an update for openoffice.org. This fixes a vulnerability, which can be exploited by malicious, local users to gain knowledge of sensitive information.
Author:Carsten Eiram
Homepage:http://secunia.com/advisories/12546/
File Size:1805
Related CVE(s):CAN-2004-0752
Last Modified:Sep 15 23:54:56 2004
MD5 Checksum:182644ea109993cae9dbb3de57a46d6c

 ///  File Name: halo14.txt
Description:
Halo: Combat Evolved versions 1.4 and below suffer from an off-by-one vulnerability that can result in a denial of service.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related Exploit:haloboom.zip"
File Size:1804
Last Modified:Sep 10 21:07:36 2004
MD5 Checksum:e9b809f4bc45956b5f8c99c07360e105

 ///  File Name: codelabs-05.txt
Description:
PHP-Nuke 7.4 has a cross site scripting flaw that allows an attacker the ability to post messages in a system newsletter.
Author:Pierquinto Manco
Homepage:http://www.mantralab.org
File Size:1791
Last Modified:Sep 9 09:47:22 2004
MD5 Checksum:0084a0a5ca504e3a7974ddbeec463248

 ///  File Name: sa12493.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in MailEnable Professional and Standard 1.x, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to an error when processing DNS responses. This can be exploited to crash the SMTP service by returning a DNS response containing over 100 MX records.
Homepage:http://secunia.com/advisories/12493/
File Size:1790
Last Modified:Sep 10 07:33:33 2004
MD5 Checksum:dbbb09e5a784e60ee121b0893e1ec42e

 ///  File Name: sus202.txt
Description:
SUS versions 2.0.2 has a format string vulnerability in the log() function that allows any local user to gain root privileges.
Author:Leon Juranic
File Size:1774
Last Modified:Sep 15 02:32:03 2004
MD5 Checksum:f9705ac372ec96a759f2ba28b7a961d9

 ///  File Name: popMessenger.txt
Description:
PopMessenger versions 1.60 and below are susceptible to a denial of service attack when attempting to create a dialog with illegal characters.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org/
Related Exploit:popmsgboom.zip"
File Size:1771
Last Modified:Sep 29 05:55:56 2004
MD5 Checksum:f4f19b665c3359ff14cc0710056e0fb9

 ///  File Name: sa12611.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in VP-ASP, which can be exploited by malicious users to cause a DoS (Denial of Service).
Homepage:http://secunia.com/advisories/12611/
File Size:1766
Last Modified:Sep 29 06:09:15 2004
MD5 Checksum:f67c086e31516814224e945c94111fae

 ///  File Name: sa12422.txt
Description:
Secunia Security Advisory - A vulnerability in Cerbere Proxy Server 1.x can be exploited to cause a denial of service.
Author:Ziv Kamir
Homepage:http://secunia.com/advisories/12422/
File Size:1763
Last Modified:Sep 9 05:58:46 2004
MD5 Checksum:d84c212b00f94fe4bc3df85cf9c59d39

 ///  File Name: caEnumeration.txt
Description:
The CA UniCenter Management Portal versions 2.0 and 3.1 allow for username validation via using the forgotten password feature.
Author:Thomas Adams
File Size:1736
Last Modified:Sep 22 00:56:19 2004
MD5 Checksum:64aafa3137e8233bcbc0dd1a5b94e372

 ///  File Name: sa12527.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in Apache, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to an error in the mod_dav module. A malicious client can exploit this to crash an httpd child process by sending a particular sequence of LOCK requests. Successful exploitation requires that the malicious client is allowed to use the LOCK method and the threaded process model is used. The vulnerability has been fixed in version 2.0.51-dev.
Homepage:http://secunia.com/advisories/12527/
File Size:1734
Last Modified:Sep 15 06:56:26 2004
MD5 Checksum:32f96a4ec30106e04108eaa8aa410a1f

 ///  File Name: sa12456.txt
Description:
Secunia Security Advisory - A vulnerability in the Altnet Download Manager included in Grokster can be exploited by malicious people to compromise a user's system. The vulnerability has been confirmed in Altnet Download Manager 4.0.0.2 included in Grokster 2.6. Other versions may also be affected.
Author:CelebrityHacker
Homepage:http://secunia.com/advisories/12456/
File Size:1716
Last Modified:Sep 9 08:50:12 2004
MD5 Checksum:647ef678c697f83fc03ecaeb0892f82e

 ///  File Name: sa12455.txt
Description:
Secunia Security Advisory - A vulnerability in the Altnet Download Manager included in Kazaa 2.x can be exploited by malicious people to compromise a user's system. The vulnerability has been confirmed in Altnet Download Manager 4.0.0.4 included in Kazaa 2.7.1. Other versions may also be affected.
Author:CelebrityHacker
Homepage:http://secunia.com/advisories/12455/
File Size:1702
Last Modified:Sep 9 08:53:40 2004
MD5 Checksum:5e7aabcc9a8045e400455c8c163080fa

 ///  File Name: sa12531.txt
Description:
Secunia Security Advisory - A vulnerability in vBulletin 3.x can be exploited by malicious people to conduct SQL injection attacks.
Author:al3ndaleeb
Homepage:http://secunia.com/advisories/12531/
File Size:1701
Last Modified:Sep 15 23:40:29 2004
MD5 Checksum:ec677ffa92562755de639bcc2203b9d4

 ///  File Name: lotr3boom-adv.txt
Description:
Lords of the Realm III versions 1.01 and below suffer from a denial of service attack when an overly long string is supplied as the user's nickname.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org/
Related Exploit:lotr3boom.zip"
File Size:1669
Last Modified:Sep 21 21:23:59 2004
MD5 Checksum:e5e64ff5837f15d4a1bab8df35cdf383

 ///  File Name: codelabs-03.txt
Description:
PHP-Nuke 7.4 has a cross site scripting flaw that allows an attacker the ability to view admin account information. It is an old bug that has a patch that can be bypassed if the data is sent via a POST instead of a GET.
Author:Pierquinto Manco
Homepage:http://www.mantralab.org
File Size:1619
Last Modified:Sep 9 09:15:58 2004
MD5 Checksum:9c2f036328deeb1846117e3a23905e5b

 ///  File Name: codelabs-02.txt
Description:
PHP-Nuke 7.4 has a cross site scripting flaw that allows an attacker the ability to delete any admin account. It is an old bug that has a patch that can be bypassed if the data is sent via a POST instead of a GET.
Author:Pierquinto Manco
Homepage:http://www.mantralab.org
File Size:1612
Last Modified:Sep 9 09:14:07 2004
MD5 Checksum:cb911209f829b0ce7191b3cd64a8fec3

 ///  File Name: sa12467.txt
Description:
Secunia Security Advisory - Various unspecified vulnerabilities with an unknown impact have been reported in Tutti Nova. Successful exploitation reportedly requires that register_globals is enabled.
Homepage:http://secunia.com/advisories/12467/
File Size:1604
Last Modified:Sep 10 05:40:50 2004
MD5 Checksum:34b02b4bd4804c4b5253cb9c2b287a5b

 ///  File Name: sa12466.txt
Description:
Secunia Security Advisory - An unspecified vulnerability has been reported in phpGroupWare, which can be exploited by malicious people to conduct cross-site scripting attacks.
Homepage:http://secunia.com/advisories/12466/
File Size:1577
Last Modified:Sep 10 05:39:14 2004
MD5 Checksum:1846f561d8437187af7da73f3a47e837

 ///  File Name: qnx-crttrap-race-condition.txt
Description:
A possible race condition exists in QNX RTP 6.1 due to a program being called without a complete path.
Author:Julio Cesar Fort
Homepage:http://www.rfdslabs.com.br
File Size:1574
Last Modified:Sep 14 01:49:25 2004
MD5 Checksum:ff76e02598bc5e1e36ce8cb6c389da72

 ///  File Name: sa12570.txt
Description:
Secunia Security Advisory - Multiple unspecified vulnerabilities have been reported in FreeRADIUS, which can be exploited by malicious people to cause a DoS (Denial of Service).
Homepage:http://secunia.com/advisories/12570/
File Size:1561
Last Modified:Sep 21 10:34:50 2004
MD5 Checksum:3354715813179cc34931f1362c31f3ca

 ///  File Name: pigeon302.txt
Description:
A login field longer than 8180 characters sent to the port 3103 causes the immediate freeze of the Pigeon server versions 3.02.0143 and below.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related Exploit:pigeonx.zip"
File Size:1558
Last Modified:Sep 21 02:20:40 2004
MD5 Checksum:340e7c40f70dda0e97195936b258bd7c

 ///  File Name: codelabs-01.txt
Description:
PHP-Nuke 7.4 has a cross site scripting flaw that allows an attacker administrative access.
Author:Pierquinto Manco
Homepage:http://www.mantralab.org
File Size:1556
Last Modified:Sep 9 08:43:20 2004
MD5 Checksum:4e3d47ef98e4dc2faf1b2b5b8daef2c7