The version of mod_proxy shipped with Apache 1.3.31 and possibly earlier versions are susceptible to a buffer overflow via the Content-Length: header. tags | advisory, web SHA-256 | 8f7a686d9df9d69ea856244b34bb4a7ae567e7e1692f015c199a0b92a90df698 Download | Favorite | View modproxy1.html Posted Authored by Georgi Guninski | Site OlsenĪ vulnerability in the Billion BIPAC-640 AE Broadband Firewall Gateway can be exploited by malicious people to bypass user authentication on the administrative web interface. tags | advisory, denial of service, local systems | netbsd SHA-256 | 0b04f2d0bae3375ec84b5c4112c85c28ed5adf7a137c5cae027ebc0d6c7b7189 Download | Favorite | View billionFW.txt Posted Authored by Tommy A. tags | advisory, xss, asp SHA-256 | 39e70e14d5aaca15d049fefd2cf2605dd17105c01c09ccaa33fcafe0ff6552e5 Download | Favorite | View swapctlNetBSD.txt Posted Authored by Evgeny DemidovĪn integer handling error within the swapctl() system call of NetBSD 1.x can allow a local user the ability to cause a denial of service attack. VP-ASP Shopping Cart 5.x has a vulnerability which can potentially be exploited by malicious people to conduct cross-site scripting attacks. The vulnerability has been reported in versions 1.1, 1.2, and 1.2.1. The problem is that a user can gain the same privileges as an administrative group by creating a user with the same name. tags | advisory SHA-256 | a2424139487a4dea84b44192623c5978ce663be7e2f00ee01d02e198048e68cf Download | Favorite | View Secunia Security Advisory 11807 Posted Authored by Secunia, Michael CastlemanĪ vulnerability has been discovered in MoinMoin that can be exploited by malicious users to gain escalated privileges. The vulnerability is caused due to missing password verification when linking servers. tags | advisory, vulnerability SHA-256 | cde0a6316c61f476997a2b12d1eb5ba5efc7734e090b2a60a4e961c5b135579d Download | Favorite | View Secunia Security Advisory 11824 Posted Authored by Secunia, Keith Gable | Site Ī vulnerability has been discovered in ignitionServer versions 0.1.2 through 0.3.1, which can be exploited by malicious people to bypass certain security restrictions. This includes patches for all previously reported vulnerabilities as well as older hot fixes, where some address potential security issues. Microsoft has issued Service Pack 2 for ISA Server 2000. Secunia Security Advisory 11799 Posted Authored by Secunia
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |