Section:  .. / 0410-advisories  /

Page 7 of 11
<< 1 2 3 4 5 6 7 8 9 10 11 >> Files 150 - 175 of 254
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: sa12841.txt
Description:
Secunia Security Advisory - Positive Technologies has reported some vulnerabilities in Dmxready Site Chassis Manager, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks.
Homepage:http://secunia.com/advisories/12841/
File Size:1982
Last Modified:Oct 26 04:26:06 2004
MD5 Checksum:1e85481ed48c153bd4eeb3e2b9ed5715

 ///  File Name: sa12654.txt
Description:
Secunia Security Advisory - Two vulnerabilities have been reported in PHP-Fusion, which can be exploited by malicious people to conduct cross-site scripting attacks and potentially perform an identity spoof.
Author:Grindordie, Nolan West
Homepage:http://secunia.com/advisories/12654/
File Size:1978
Last Modified:Oct 1 16:28:00 2004
MD5 Checksum:2e6f9c8341419e2bb9e93e694bac0427

 ///  File Name: Yeemp.html
Description:
A vulnerability has been reported in Yeemp, which can be exploited by malicious people to spoof their identity. If you are using Yeemp 0.9.9 or earlier, upgrading is recommended.
Author:deekoo
File Size:1964
Last Modified:Oct 13 10:37:51 2004
MD5 Checksum:76dac4d20b158f3c40b739fab7969b80

 ///  File Name: sa12853.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in phpCodeGenie, which can be exploited by malicious people to compromise a vulnerable system.
Homepage:http://secunia.com/advisories/12853/
File Size:1958
Last Modified:Oct 27 07:42:19 2004
MD5 Checksum:31af6fa5b4bffbb91cb605d12fbd17a4

 ///  File Name: sa12639.txt
Description:
Secunia Security Advisory - A security issue has been reported in Computer Associates Unicenter Common Services, which may disclose sensitive information to malicious, local users.
Homepage:http://secunia.com/advisories/12639/
File Size:1956
Last Modified:Oct 7 05:27:15 2004
MD5 Checksum:995113b649e55c96c05990710802d264

 ///  File Name: sa12693.txt
Description:
Secunia Security Advisory - A vulnerability in ColdFusion MX 6.x can be exploited by malicious, authenticated users to bypass certain security restrictions.
Author:Eric Lackey
Homepage:http://secunia.com/advisories/12693/
File Size:1952
Last Modified:Oct 13 05:27:37 2004
MD5 Checksum:7ab017a34896d2f8ec8bfe3c63224f19

 ///  File Name: judgedredd.txt
Description:
Judge Dredd: Dredd vs. Death versions 1.01 and below suffer from a format string vulnerability.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
File Size:1941
Last Modified:Oct 13 05:07:04 2004
MD5 Checksum:a0ec22e03ff5f5e36f7ea45beb2676f1

 ///  File Name: sa12533.txt
Description:
Secunia Security Advisory - A format string vulnerability in QNX RTOS can be exploited by malicious, local users to gain escalated privileges.
Homepage:http://secunia.com/advisories/12533/
File Size:1940
Last Modified:Oct 7 04:52:05 2004
MD5 Checksum:25cb5e6da49d34284afeed6abe128881

 ///  File Name: IEaperture.txt
Description:
Georgi Guninski security advisory #71 - By opening html in IE it is possible to read at least well formed xml from arbitrary servers. The info then may be transmitted.
Author:Georgi Guninski
Homepage:http://www.guninski.com
File Size:1926
Last Modified:Oct 13 07:58:53 2004
MD5 Checksum:07a3e977e24d41f26534d346ec4cb3f7

 ///  File Name: sa12973.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in OpenSSL, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. The vulnerability is caused due to the der_chop script creating temporary files insecurely. This can be exploited via symlink attacks to create or overwrite arbitrary files with the privileges of the user executing the vulnerable. The vulnerability has been reported in versions 0.9.6m, 0.9.7d, and 0.9.7e. Other versions may also be affected.
Homepage:http://secunia.com/advisories/12973/
File Size:1906
Last Modified:Oct 27 07:31:54 2004
MD5 Checksum:9a5eb82b7b4b465cc57f27fe71b2c279

 ///  File Name: icecast201.txt
Description:
Icecast versions 2.0.1 and below on win32 suffer from an overflow that allows arbitrary code execution.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org/
Related Exploit:iceexec.zip"
File Size:1901
Last Modified:Oct 7 05:05:16 2004
MD5 Checksum:adbd758cdcca4ed8e472dfbe4401100d

 ///  File Name: samba22x.txt
Description:
Samba versions 2.2.11 and below and versions below and equal to 3.0.5 allow a remote attacker that ability to gain access to files that exist outside of the share's defined path. Such files must still be readable by the account used for the connection.
Author:Karol Wiesek
Homepage:http://www.samba.org/
File Size:1895
Last Modified:Oct 7 05:59:30 2004
MD5 Checksum:557f0e83f9827bdf1169f7659e894be9

 ///  File Name: sa12846.txt
Description:
Secunia Security Advisory - Karb0nOxyde has reported a security issue in 3Com OfficeConnect ADSL Wireless 11g Firewall Router, which can be exploited by malicious people to gain knowledge of sensitive information.
Homepage:http://secunia.com/advisories/12846/
File Size:1895
Last Modified:Oct 26 04:21:49 2004
MD5 Checksum:eea3a499d8c15eac2945a4dc832d36b8

 ///  File Name: sa12719.txt
Description:
Secunia Security Advisory - Ziv Kamir has reported a vulnerability in NetworkActiv Web Server, which can be exploited by malicious people to cause a DoS (Denial of Service).
Homepage:http://secunia.com/advisories/12719/
File Size:1891
Last Modified:Oct 13 05:47:25 2004
MD5 Checksum:c049c56c10713eff4eb6ff8d51e8d4ff

 ///  File Name: shixxnote6.txt
Description:
A buffer overflow vulnerability exists in the field used to specify the font to use in the messages sent by Shixxnote 6.net. If this specific field is bigger than 1698 bytes the return address will be fully overwritten.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related Exploit:shixxbof.zip"
File Size:1890
Last Modified:Oct 25 00:19:22 2004
MD5 Checksum:82c68efeb40174b81df0a4584a982c1a

 ///  File Name: sa12708.txt
Description:
Secunia Security Advisory - A vulnerability in Mozilla Firefox 0.1 can be exploited by malicious people to delete files on a user's system.
Author:Alex Vincent
Homepage:http://secunia.com/advisories/12708/
File Size:1874
Last Modified:Oct 13 05:25:45 2004
MD5 Checksum:9c75be3477a6e57b2c5ddc31d742b92a

 ///  File Name: sa12909.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in Serendipity, which can be exploited by malicious people to conduct script insertion and cross-site scripting attacks.
Homepage:http://secunia.com/advisories/12909/
File Size:1873
Last Modified:Oct 27 04:56:28 2004
MD5 Checksum:dc31fe52bd039d06afae8e196c57a50c

 ///  File Name: razor.ms_rpc_vuln_oct12_2004.txt
Description:
Bindview Advisory - Critical Flaw in rpc__mgmt_inq_stats. A remote attacker can read large amounts of memory from and/or crash any NT4 RPC server.
Homepage:http://www.bindview.com/Support/RAZOR/Current_Advisories/ADV_MSFTRPCVuln_10-13-04.cfm
File Size:1871
Related OSVDB(s):10686
Related CVE(s):CAN-2004-0569
Last Modified:Oct 24 20:29:45 2004
MD5 Checksum:9fbf23248dcac505c6edd397bda2b257

 ///  File Name: sa12703.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in Trading Partner Interchange 4.x, which can be exploited by malicious people to access arbitrary files. The vulnerability is caused due to an input validation error within the included Jetty HTTP server and can be exploited to gain access to arbitrary files and directories on the system.
Homepage:http://secunia.com/advisories/12703/
File Size:1868
Last Modified:Oct 13 05:50:03 2004
MD5 Checksum:77fde4c771474f4f26660467a3cc694d

 ///  File Name: googlePhish.txt
Description:
Google's custom websearch does not prevent javascript from being inserted into the url of the image, allowing malicious users to modify the content of the google page allowing in phishing attacks, or silently steal search terms/results/clicks or modify actual searches to always contain controlled results.
Author:Jim Ley
Homepage:http://jibbering.com/
File Size:1866
Last Modified:Oct 27 04:09:39 2004
MD5 Checksum:8198e08d8b7af0509965ff6ae8fd406e

 ///  File Name: sa13024.txt
Description:
Secunia Security Advisory - Ziv Kamir has discovered a vulnerability in Cyber Web Filter, which can be exploited by malicious people to bypass certain security restrictions.
Homepage:http://secunia.com/advisories/13024/
File Size:1849
Last Modified:Oct 30 00:21:55 2004
MD5 Checksum:8477225687e85738e935a31b52f578e4

 ///  File Name: chatman151.txt
Description:
Improper memory allocation in Chatman versions 1.5.1 RC1 and below leave it susceptible to a denial of service attack.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related Exploit:chatmanx.zip"
File Size:1846
Last Modified:Oct 1 16:56:56 2004
MD5 Checksum:0c57c8b31643625ba7610ac12b13de3e

 ///  File Name: sa12916.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in Speedtouch USB Driver, which potentially can be exploited by malicious, local users to gain escalated privileges.
Author:Max Vozeler
Homepage:http://secunia.com/advisories/12916/
File Size:1833
Last Modified:Oct 27 04:58:00 2004
MD5 Checksum:bd9eaac2e2cd8be12bcb3c9376cbb01e

 ///  File Name: sa12842.txt
Description:
Secunia Security Advisory - Positive Technologies has reported a vulnerability in CyberStrong eShop ASP Shopping Card, which can be exploited by malicious people to conduct cross-site scripting attacks.
Homepage:http://secunia.com/advisories/12842/
File Size:1833
Last Modified:Oct 26 04:26:44 2004
MD5 Checksum:e30bc73a973cf3c3a0b5a81b04e742cc

 ///  File Name: cpanelChmod.txt
Description:
cPanel 9.4.1 allows logged in users to change permission of any file to 755.
Author:Karol Wiesek
File Size:1816
Last Modified:Oct 26 05:04:13 2004
MD5 Checksum:a1f10723c5e8bdfe91a178a8ea930a00