Section:  .. / 0410-advisories  /

Page 7 of 11
<< 1 2 3 4 5 6 7 8 9 10 11 >> Files 150 - 175 of 254
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: realplayer105.txt
Description:
Realplayer 10.5 permits execution of arbitrary code via a malformed skin.
Author:John Heasman
File Size:904
Last Modified:Oct 28 16:24:27 2004
MD5 Checksum:74f922327a4f7f3c19e3b46ae38d0143

 ///  File Name: realupdate.html
Description:
RealNetworks Inc. has recently been made aware of security vulnerabilities that could potentially allow an attacker to run arbitrary or malicious code on a user's machine. While they have not received reports of anyone actually being attacked with this exploit, all security vulnerabilities are taken very seriously by RealNetworks Inc. Real has found and fixed the problem.
Author:John Heasman, Marc Maiffret
Homepage:http://www.service.real.com/help/faq/security/040928_player/EN/
File Size:12108
Last Modified:Oct 7 05:26:13 2004
MD5 Checksum:1b41f2dd3ee671debebc629d42fd4190

 ///  File Name: remoteActivate.txt
Description:
Information on how to manipulate registry keys once a command shell is obtained to invoke the Remote Desktop functionality of XP.
Author:Fixer
File Size:2946
Last Modified:Oct 13 05:04:10 2004
MD5 Checksum:61b95dc3c5cbbb1b5a0934cdb0cf8e24

 ///  File Name: rsshFormat.txt
Description:
rssh versions below 2.2.2 suffer from a format string vulnerability that may allow for privilege escalation.
Author:Derek Martin
Homepage:http://www.pizzashack.org/
File Size:2475
Last Modified:Oct 27 05:42:07 2004
MD5 Checksum:66030e868f44a2848e1ae83843f52b6d

 ///  File Name: sa11711.txt
Description:
Secunia Security Advisory - Andrew Nakhla has discovered a vulnerability in Apple Remote Desktop, which can be exploited by malicious users to gain root access on a vulnerable system.
Homepage:http://secunia.com/advisories/11711/
File Size:2130
Last Modified:Oct 28 16:55:22 2004
MD5 Checksum:f40c517a2ac34a181a884183ee4ec256

 ///  File Name: sa12498.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions. The vulnerability is caused due to an unspecified error within the ide-cd SG_IO functionality. This allows a user with read-only access to bypass these permissions and perform write and erase operations on media in a drive.
Homepage:http://secunia.com/advisories/12498/
File Size:1740
Last Modified:Oct 7 04:50:52 2004
MD5 Checksum:d426f4ec3713f4861f1fd241f2ce2e17

 ///  File Name: sa12533.txt
Description:
Secunia Security Advisory - A format string vulnerability in QNX RTOS can be exploited by malicious, local users to gain escalated privileges.
Homepage:http://secunia.com/advisories/12533/
File Size:1940
Last Modified:Oct 7 04:52:05 2004
MD5 Checksum:25cb5e6da49d34284afeed6abe128881

 ///  File Name: sa12613.txt
Description:
Secunia Security Advisory - Secunia Research has discovered a vulnerability in Pinnacle ShowCenter, which can be exploited by malicious people to conduct cross-site scripting attacks.
Homepage:http://secunia.com/advisories/12613/
File Size:2159
Last Modified:Oct 26 03:30:03 2004
MD5 Checksum:4c9f464d37b0b5705697f4cf0d3dd059

 ///  File Name: sa12639.txt
Description:
Secunia Security Advisory - A security issue has been reported in Computer Associates Unicenter Common Services, which may disclose sensitive information to malicious, local users.
Homepage:http://secunia.com/advisories/12639/
File Size:1956
Last Modified:Oct 7 05:27:15 2004
MD5 Checksum:995113b649e55c96c05990710802d264

 ///  File Name: sa12648.txt
Description:
Secunia Security Advisory - A security issue with an unknown impact has been reported in fprobe 1.x.
Homepage:http://secunia.com/advisories/12648/
File Size:1591
Last Modified:Oct 1 16:24:21 2004
MD5 Checksum:ef913d0910aaa18f66ef07743f9becd4

 ///  File Name: sa12649.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in Baal Smart Forms 3.x, which can be exploited by malicious people to bypass certain security restrictions.
Homepage:http://secunia.com/advisories/12649/
File Size:1791
Last Modified:Oct 1 16:29:13 2004
MD5 Checksum:86577de8a1084f1e8a8c90dcb2b8cca4

 ///  File Name: sa12654.txt
Description:
Secunia Security Advisory - Two vulnerabilities have been reported in PHP-Fusion, which can be exploited by malicious people to conduct cross-site scripting attacks and potentially perform an identity spoof.
Author:Grindordie, Nolan West
Homepage:http://secunia.com/advisories/12654/
File Size:1978
Last Modified:Oct 1 16:28:00 2004
MD5 Checksum:2e6f9c8341419e2bb9e93e694bac0427

 ///  File Name: sa12655.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in HP StorageWorks Command View XP, which can be exploited by malicious, local users to bypass certain access restrictions.
Homepage:http://secunia.com/advisories/12655/
File Size:2207
Last Modified:Oct 1 16:32:08 2004
MD5 Checksum:720ef7eadcd2895f15f2bf8cb9509e9b

 ///  File Name: sa12661.txt
Description:
Secunia Security Advisory - A weakness has been reported in Intellipeer Email Server, which can be exploited by malicious people to determine valid usernames.
Author:Ziv Kamir
Homepage:http://secunia.com/advisories/12661/
File Size:1728
Last Modified:Oct 1 16:34:07 2004
MD5 Checksum:74cc04e19e3fd9cbf54606063188e358

 ///  File Name: sa12662.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in PHP-Fusion that can be exploited by malicious users to conduct script insertion attacks.
Homepage:http://secunia.com/advisories/12662/
File Size:1813
Last Modified:Oct 1 16:46:21 2004
MD5 Checksum:278532df40737715641291e55515f131

 ///  File Name: sa12671.txt
Description:
Secunia Security Advisory - A vulnerability has been discovered in three Microsoft Office Viewers, which can be exploited by malicious people to compromise a user's system.
Homepage:http://secunia.com/advisories/12671/
File Size:2292
Last Modified:Oct 13 10:48:05 2004
MD5 Checksum:6a6310155e09080c1f5821e0106b3cb2

 ///  File Name: sa12685.txt
Description:
Secunia Security Advisory - A security issue has been reported in proxytunnel, which can be exploited by malicious, local users to gain knowledge of sensitive information.
Homepage:http://secunia.com/advisories/12685/
File Size:1579
Last Modified:Oct 13 04:48:06 2004
MD5 Checksum:270cea0acc78612dfcb92d9c6917ba9f

 ///  File Name: sa12686.txt
Description:
Secunia Security Advisory - Some vulnerabilities in PHP-Fusion can be exploited by malicious people to conduct SQL injection and script insertion attacks.
Author:r0ut3r
Homepage:http://secunia.com/advisories/12686/
File Size:2309
Last Modified:Oct 7 06:10:54 2004
MD5 Checksum:d0f463caa45b30366edd284faabb7960

 ///  File Name: sa12692.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in MediaWiki, which can be exploited by malicious people to conduct cross-site scripting attacks.
Homepage:http://secunia.com/advisories/12692/
File Size:1692
Last Modified:Oct 13 04:51:30 2004
MD5 Checksum:37b6a8efbcd0b473be5d9bc248eb74fe

 ///  File Name: sa12693.txt
Description:
Secunia Security Advisory - A vulnerability in ColdFusion MX 6.x can be exploited by malicious, authenticated users to bypass certain security restrictions.
Author:Eric Lackey
Homepage:http://secunia.com/advisories/12693/
File Size:1952
Last Modified:Oct 13 05:27:37 2004
MD5 Checksum:7ab017a34896d2f8ec8bfe3c63224f19

 ///  File Name: sa12702.txt
Description:
Secunia Security Advisory - An unspecified security issue with an unknown impact has been reported in Kerio MailServer.
Homepage:http://secunia.com/advisories/12702/
File Size:1434
Last Modified:Oct 13 04:48:45 2004
MD5 Checksum:c0c2e581ae3f634665d84b9215e558df

 ///  File Name: sa12703.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in Trading Partner Interchange 4.x, which can be exploited by malicious people to access arbitrary files. The vulnerability is caused due to an input validation error within the included Jetty HTTP server and can be exploited to gain access to arbitrary files and directories on the system.
Homepage:http://secunia.com/advisories/12703/
File Size:1868
Last Modified:Oct 13 05:50:03 2004
MD5 Checksum:77fde4c771474f4f26660467a3cc694d

 ///  File Name: sa12708.txt
Description:
Secunia Security Advisory - A vulnerability in Mozilla Firefox 0.1 can be exploited by malicious people to delete files on a user's system.
Author:Alex Vincent
Homepage:http://secunia.com/advisories/12708/
File Size:1874
Last Modified:Oct 13 05:25:45 2004
MD5 Checksum:9c75be3477a6e57b2c5ddc31d742b92a

 ///  File Name: sa12709.txt
Description:
Secunia Security Advisory - Georg Ragaz has reported a vulnerability with an unknown impact in yappa-ng.
Homepage:http://secunia.com/advisories/12709/
File Size:1500
Last Modified:Oct 13 05:18:51 2004
MD5 Checksum:8d1c85fe3fd41136dfd6752b15377633

 ///  File Name: sa12711.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in distcc, which potentially can be exploited by malicious people to bypass certain security restrictions.
Homepage:http://secunia.com/advisories/12711/
File Size:1660
Last Modified:Oct 13 05:28:46 2004
MD5 Checksum:5d5bdf3a635958aa5404c44c6eb67ba6