Section:  .. / 0410-advisories  /

Page 8 of 11
<< 1 2 3 4 5 6 7 8 9 10 11 >> Files 175 - 200 of 254
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: sa12662.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in PHP-Fusion that can be exploited by malicious users to conduct script insertion attacks.
Homepage:http://secunia.com/advisories/12662/
File Size:1813
Last Modified:Oct 1 16:46:21 2004
MD5 Checksum:278532df40737715641291e55515f131

 ///  File Name: USN-8-1.txt
Description:
A buffer overflow and two remote crashes were recently discovered in gaim's MSN protocol handler. An attacker could potentially execute arbitrary code with the user's privileges by crafting and sending a particular MSN message.
File Size:1802
Related CVE(s):CAN-2004-0891
Last Modified:Oct 28 03:33:20 2004
MD5 Checksum:ce6dab8cfae21bb1a8a69d8432dcb67f

 ///  File Name: sa12995.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in ImageMagick, which potentially can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error within the EXIF parsing routine. This can be exploited to cause a buffer overflow via a malicious image file containing specially crafted EXIF information.
Homepage:http://secunia.com/advisories/12995/
File Size:1794
Last Modified:Oct 28 16:43:34 2004
MD5 Checksum:db6a7ca97913bc4817397b1dc241f713

 ///  File Name: sa12649.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in Baal Smart Forms 3.x, which can be exploited by malicious people to bypass certain security restrictions.
Homepage:http://secunia.com/advisories/12649/
File Size:1791
Last Modified:Oct 1 16:29:13 2004
MD5 Checksum:86577de8a1084f1e8a8c90dcb2b8cca4

 ///  File Name: cubecart201.txt
Description:
CubeCart 2.0.1 is susceptible to full path disclosure and SQL injection attacks.
Author:cybercide
File Size:1776
Last Modified:Oct 13 07:39:14 2004
MD5 Checksum:dcbf15b005fb06c0b879af267e238d9b

 ///  File Name: sa12855.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in Gnofract 4D, which potentially can be exploited by malicious people to compromise a user's system.
Homepage:http://secunia.com/advisories/12855/
File Size:1773
Last Modified:Oct 26 05:22:09 2004
MD5 Checksum:5faa2638e47a49cb03ae6913a3336bbe

 ///  File Name: sa12729.txt
Description:
Secunia Security Advisory - Some vulnerabilities have been reported in My Blog, which can be exploited by malicious people to conduct cross-site scripting attacks.
Homepage:http://secunia.com/advisories/12729/
File Size:1773
Last Modified:Oct 13 05:41:45 2004
MD5 Checksum:6f81fbf3015d1f6ed0bc90dd6b188699

 ///  File Name: wordpress12split.txt
Description:
WordPress 1.2 is susceptible to HTTP Response splitting flaws.
Author:Chaotic Evil
File Size:1767
Last Modified:Oct 13 07:54:05 2004
MD5 Checksum:4bdddc7a077f00a5d3ffa96c634f94d3

 ///  File Name: sa12839.txt
Description:
Secunia Security Advisory - Positive Technologies has reported a vulnerability in Express-Web Content Management System, which can be exploited by malicious people to conduct cross-site scripting attacks.
Homepage:http://secunia.com/advisories/12839/
File Size:1763
Last Modified:Oct 26 04:19:06 2004
MD5 Checksum:009a5f3d05b3baee8ba12a5517b4f949

 ///  File Name: sa12857.txt
Description:
Secunia Security Advisory - Doubles has discovered a vulnerability in Unzoo, which potentially can be exploited by malicious people to compromise a user's system.
Homepage:http://secunia.com/advisories/12857/
File Size:1743
Last Modified:Oct 26 05:20:54 2004
MD5 Checksum:e7ae8b34e35cd0ccc6725b1713eb6131

 ///  File Name: sa12498.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions. The vulnerability is caused due to an unspecified error within the ide-cd SG_IO functionality. This allows a user with read-only access to bypass these permissions and perform write and erase operations on media in a drive.
Homepage:http://secunia.com/advisories/12498/
File Size:1740
Last Modified:Oct 7 04:50:52 2004
MD5 Checksum:d426f4ec3713f4861f1fd241f2ce2e17

 ///  File Name: sa12732.txt
Description:
Secunia Security Advisory - BliZZard has reported a vulnerability in AWS MySQLguest, which can be exploited by malicious people to conduct script insertion attacks.
Homepage:http://secunia.com/advisories/12732/
File Size:1738
Last Modified:Oct 13 05:50:49 2004
MD5 Checksum:3f5762dbf69e95e933c510f375e0d541

 ///  File Name: sa12661.txt
Description:
Secunia Security Advisory - A weakness has been reported in Intellipeer Email Server, which can be exploited by malicious people to determine valid usernames.
Author:Ziv Kamir
Homepage:http://secunia.com/advisories/12661/
File Size:1728
Last Modified:Oct 1 16:34:07 2004
MD5 Checksum:74cc04e19e3fd9cbf54606063188e358

 ///  File Name: win2k3DACL.txt
Description:
In regard to Windows 2003 Servers, both the Distributed Link tracking Server Service and Internet Connection Firewall Service have the Default DACL of Everyone:Full Control, which basically lets anyone connect to the SCM and start and stop these services at will, which in the case of the Internet Connection Firewall Service could cause many headaches for your service based systems.
Author:Edward Ziots
File Size:1696
Last Modified:Oct 13 10:07:56 2004
MD5 Checksum:2fed6aad41ba46b945c2d14ef97bbb3e

 ///  File Name: alphaBlack104.txt
Description:
Alpha Black Zero: Intrepid Protocol versions 1.04 and below suffer from a denial of service flaw where the server does not limit how many clients can attempt to connect.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related Exploit:abzboom.zip"
File Size:1693
Last Modified:Oct 7 05:36:46 2004
MD5 Checksum:3a598fb42177b889a94174a93878cc20

 ///  File Name: sa12692.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in MediaWiki, which can be exploited by malicious people to conduct cross-site scripting attacks.
Homepage:http://secunia.com/advisories/12692/
File Size:1692
Last Modified:Oct 13 04:51:30 2004
MD5 Checksum:37b6a8efbcd0b473be5d9bc248eb74fe

 ///  File Name: windowsWhoops.txt
Description:
A fluke in NTFS permission handling allows files to be locked even from an administrator, disallowing virus scanners to access it, etc.
Author:Bipin Gautam
Homepage:http://www.geocities.com/visitbipin
File Size:1686
Last Modified:Oct 13 05:01:56 2004
MD5 Checksum:b15f05dd8e4488ce4f99f44a44cb28d2

 ///  File Name: sa12831.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in WeHelpBUS, which can be exploited by malicious people to compromise a user's system.
Homepage:http://secunia.com/advisories/12831/
File Size:1685
Last Modified:Oct 26 04:15:20 2004
MD5 Checksum:48bbcf43f734288da73efb1354fcac48

 ///  File Name: sa12963.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in LinuxStat, which can be exploited by malicious people to disclose sensitive information.
Homepage:http://secunia.com/advisories/12963/
File Size:1682
Last Modified:Oct 27 06:33:44 2004
MD5 Checksum:c6ceb25a8e5f06d686ae35457140640b

 ///  File Name: sa12728.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in Online-Bookmarks, which can be exploited by malicious people to bypass certain security restrictions.
Homepage:http://secunia.com/advisories/12728/
File Size:1679
Last Modified:Oct 13 05:45:02 2004
MD5 Checksum:f17af5ff0b172fdb088f504e7e017a1e

 ///  File Name: sa12834.txt
Description:
Secunia Security Advisory - Positive Technologies has reported a vulnerability in NatterChat, which can be exploited by malicious people to conduct SQL injection attacks. Certain unspecified input is not properly sanitized before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. The vulnerability has been reported in version 1.12 Final. Other versions may also be affected.
Homepage:http://secunia.com/advisories/12834/
File Size:1678
Last Modified:Oct 26 03:46:37 2004
MD5 Checksum:8b6abe89f2477cce400c2eb9bcb286b1

 ///  File Name: sa12896.txt
Description:
Secunia Security Advisory - HP has acknowledged a vulnerability in the Java Runtime Environment software for HP-UX, which can be exploited by untrusted applets to gain escalated privileges on a vulnerable system.
Homepage:http://secunia.com/advisories/12896/
File Size:1676
Last Modified:Oct 27 04:28:29 2004
MD5 Checksum:7e2cc6c9a869f035594eb833ca2fde5f

 ///  File Name: sa13021.txt
Description:
Secunia Security Advisory - Colin Phipps has reported a vulnerability in catdoc, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges.
Homepage:http://secunia.com/advisories/13021/
File Size:1671
Last Modified:Oct 30 00:37:24 2004
MD5 Checksum:c02cb5d057e2f7972c76403e3000b251

 ///  File Name: sa12711.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in distcc, which potentially can be exploited by malicious people to bypass certain security restrictions.
Homepage:http://secunia.com/advisories/12711/
File Size:1660
Last Modified:Oct 13 05:28:46 2004
MD5 Checksum:5d5bdf3a635958aa5404c44c6eb67ba6

 ///  File Name: sa12895.txt
Description:
Secunia Security Advisory - HP has acknowledged a vulnerability in HP CIFS Server, which can be exploited by malicious users to access arbitrary files and directories.
Homepage:http://secunia.com/advisories/12895/
File Size:1656
Last Modified:Oct 27 04:27:56 2004
MD5 Checksum:3cefaf56e7b916d0df1cd6c37ee9da03