Section:  .. / 0408-advisories  /

Page 6 of 6
<< 1 2 3 4 5 6 >> Files 125 - 147 of 147
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: wackowikixss.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in WackoWiki, which can be exploited by malicious people to conduct cross-site scripting attacks.
Homepage:http://secunia.com/advisories/12209/
File Size:1636
Last Modified:Aug 5 07:54:42 2004
MD5 Checksum:1419d7517865ed3c9e004b9f36734403

 ///  File Name: CESA-2004-004.txt
Description:
qt version 3.3.2 has a heap overflow in its BMP parser.
Author:Chris Evans
Homepage:http://scary.beasts.org/
File Size:1596
Related CVE(s):CAN-2004-0691
Last Modified:Aug 20 08:46:44 2004
MD5 Checksum:51d0163515f11d4578a9278f3d4ba12d

 ///  File Name: sa12297.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in Simple Form, which can be exploited by malicious people to use it as an open mail relay. Versions below 2.2 are affected.
Homepage:http://secunia.com/advisories/12297/
File Size:1588
Last Modified:Aug 17 02:05:56 2004
MD5 Checksum:b63812744ba04c270c7583e56a74557e

 ///  File Name: lostBook11.txt
Description:
A vulnerability in lostBook versions 1.1 and below allows script insertion attacks.
Author:r3d5pik3
File Size:1560
Last Modified:Aug 5 05:29:21 2004
MD5 Checksum:93bd8127b8e7e100d64c9c254a39fc7c

 ///  File Name: sa12280.txt
Description:
Secunia Security Advisory - A vulnerability has been discovered in Nokia IPSO, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability affects versions 3.5, 3.5.1, 3.6, 3.7, 3.7.1, and 3.8.
Homepage:http://secunia.com/advisories/12280/
File Size:1539
Last Modified:Aug 13 09:02:03 2004
MD5 Checksum:af66a726c59680d0b613876212579cae

 ///  File Name: zoneAlarmed.txt
Description:
It has been discovered that Zone Alarm stores its configuration files in a directory that is forcibly left accessible to EVERYONE under Windows.
Author:Bipin Gautam
Homepage:http://www.geocities.com/visitbipin/
File Size:1535
Last Modified:Aug 24 08:33:46 2004
MD5 Checksum:8fd02c5a822a684cd07cdfafef3c3534

 ///  File Name: webbsyte.txt
Description:
When over 40 connections are made to Webbsyte 0.9.0, the service crashes.
Author:Donato Ferrante
Homepage:http://www.autistici.org/fdonato
File Size:1534
Last Modified:Aug 5 08:08:21 2004
MD5 Checksum:9e0bb4f36d041ee36552eacb315d8b54

 ///  File Name: dansguardian.txt
Description:
DansGuardian versions 2.8 and below may allow malicious users to bypass the extension filter rules when processing URLs which contain a hex encoded filename.
Author:Ruben Molina
File Size:1496
Last Modified:Aug 5 05:38:42 2004
MD5 Checksum:75d1c482dc37dc06083928e92c873dab

 ///  File Name: rsync.nochroot.html
Description:
rsync versions 2.6.2 and below have a flaw that allows malicious users to read or write arbitrary files on a vulnerable system. In order to exploit this vulnerability, the rsync daemon cannot be running in a chroot.
Homepage:http://samba.org/rsync/#security_aug04
File Size:1482
Last Modified:Aug 17 06:01:54 2004
MD5 Checksum:bde1df497be1b07569709c32f3c9a261

 ///  File Name: sa12364.txt
Description:
Secunia Security Advisory - An unspecified vulnerability with an unknown impact has been reported in SugarCRM versions below 1.1f.
Homepage:http://secunia.com/advisories/12364/
File Size:1464
Last Modified:Aug 31 04:26:11 2004
MD5 Checksum:4bad8783ac506022448353648997112a

 ///  File Name: kotikWinAmp.txt
Description:
Advisory addendum for the Winamp vulnerability where insufficient restrictions on Winamp skin zip files (.wsz) allow a malicious attacker to place and execute arbitrary programs.
Homepage:http://www.k-otik.com
Related Exploit:winampExploit.txt"
File Size:1462
Last Modified:Aug 31 02:34:55 2004
MD5 Checksum:a017f7187f410f1253d2dec3b040be47

 ///  File Name: birdChat161.txt
Description:
Bird Chat version 1.61 is susceptible to a denial of service attack.
Author:Donato Ferrante
Homepage:http://www.autistici.org/fdonato
File Size:1408
Last Modified:Aug 24 10:27:45 2004
MD5 Checksum:a195c0f9b087b5ba971b60c69e7669ea

 ///  File Name: cutenews136.txt
Description:
Cute news versions 1.3.6 and below have a world writable news.txt file that allows for site defacement.
Author:e0r
File Size:1393
Last Modified:Aug 31 05:22:08 2004
MD5 Checksum:b4cb4a9a78153ee63a1d36488fbaafdb

 ///  File Name: TID10094233.txt
Description:
An unspecified vulnerability with an unknown impact has been reported in Novell Web Manager on Novell NetWare 6.5.
File Size:1308
Last Modified:Aug 24 09:53:44 2004
MD5 Checksum:db119648199c75cb94429ffb399deff3

 ///  File Name: phpMyWeb.txt
Description:
phpmywebhosting 0.3.4 has a SQL injection vulnerability where an attacker can be authenticated as an admin by just using [usr= admin"-(] and [pass="asdf].
Author:Matias Neiff
File Size:1064
Last Modified:Aug 20 09:04:57 2004
MD5 Checksum:ed3f16e9ac6ef06ba409a0b3068c9753

 ///  File Name: typepadXSS.txt
Description:
Typepad weblogging service is susceptible to a cross site scripting flaw.
Author:Matt Oyer
Homepage:http://Spiffomatic64.com
File Size:1007
Last Modified:Aug 10 02:02:16 2004
MD5 Checksum:9f1f92faf4fb3c0e10f27f17bd961ac9

 ///  File Name: phpWeird.txt
Description:
Special requests using PHP on Apache go unlogged and cause a segfault. Tested systems: Windows / Apache 1.3.31 / PHP 5.0.0, Windows / Apache 1.3.27 / PHP 4.3.3, Linux / Apache 1.3.24 / PHP 4.2.
Author:Anthony Debhian
File Size:941
Last Modified:Aug 10 02:04:37 2004
MD5 Checksum:61b2fd5728f1287bef46a27d2f1ad3f1

 ///  File Name: DynixWebpac.txt
Description:
Epixtech Dynix Webpac suffers from SQL injection attacks that allow for login bypass, command execution, and more.
Author:Wil Allsopp
File Size:847
Last Modified:Aug 26 20:41:56 2004
MD5 Checksum:afc84328a0fe6ca2ef6f07e6c71f2387

 ///  File Name: phpcodeXSS.txt
Description:
The PHP Code Snippet Library suffers from multiple cross site scripting flaws.
Author:Nikyt0x
Homepage:http://nikyt0x.webcindario.com
File Size:799
Last Modified:Aug 26 21:54:10 2004
MD5 Checksum:aff61ed38393ebfb61960afb38496665

 ///  File Name: wsFTP-DoS.txt
Description:
A vulnerability has been found in WS_FTP Server version 5.0.2. The problem is in the module handling the file path parsing.
Author:lion
File Size:792
Last Modified:Aug 31 05:29:04 2004
MD5 Checksum:45f8ca017c4f17ceda928639cf45fc29

 ///  File Name: ripMIME.txt
Description:
A security flaw in ripMIME version 1.x allows attackers to bypass filtering software.
Homepage:http://www.pldaniels.com/ripmime/CHANGELOG
File Size:665
Last Modified:Aug 5 07:06:56 2004
MD5 Checksum:096acc5cdc5f1361b2c6174229e47b36

 ///  File Name: yastControl.txt
Description:
By placing the preferences submenu in a K Menu, the SuSE YAST Control Center can be accessed with needing root authentication.
Author:Jordan Pilat
File Size:494
Last Modified:Aug 7 22:30:22 2004
MD5 Checksum:77583c4e279c33f08c2bbd06c105d870