Section:  .. / 0402-advisories  /

Page 5 of 5
<< 1 2 3 4 5 >> Files 100 - 107 of 107
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: livejournalXSS.txt
Description:
LiveJournal is vulnerable to a cross site scripting vulnerability.
Author:Joshua Miller
File Size:1276
Last Modified:Feb 19 23:32:00 2004
MD5 Checksum:e9d41f06621b8ba3970b959288ecda53

 ///  File Name: yabb.infoleak.txt
Description:
YaBB version 1, SP 1.3.1, leaks whether or not a username is valid when an invalid password is given.
Author:David Cantrell
File Size:1218
Last Modified:Feb 17 20:03:00 2004
MD5 Checksum:78e258277a7f53399132aaded159a27c

 ///  File Name: ezboardXSS.txt
Description:
ezBoard versions 7.3u and below are vulnerable to a cross site scripting attack.
Author:Cheng Peng Su
File Size:1206
Last Modified:Feb 23 23:01:00 2004
MD5 Checksum:763a44b4e5b0218d30ded5e7097fe284

 ///  File Name: Lam3rZ-032004.txt
Description:
Lam3rZ Security Advisory #3/2004 - Confirm versions 0.62 and below allow for forged email headers to execute arbitrary code as the uid the script runs under for procmail.
Author:Mariusz Woloszyn
File Size:1121
Last Modified:Feb 24 03:45:00 2004
MD5 Checksum:af6a46460589f4b374f74859982daf70

 ///  File Name: ApacheSSLvuln.txt
Description:
If configured with SSLVerifyClient set to 1 or 3 and SSLFakeBasicAuth, Apache-SSL 1.3.28+1.52 and all earlier versions would permit a client to use real basic authentication to forge a client certificate.
Author:Adam Laurie
File Size:1037
Last Modified:Feb 7 00:05:00 2004
MD5 Checksum:f48d12492c4f43b76543173a50146a20

 ///  File Name: linksysSNMP.txt
Description:
The Linksys WAP55AG does not properly secure SNMP community strings.
Author:NN Poster
File Size:384
Last Modified:Feb 18 08:08:00 2004
MD5 Checksum:bb29eb1215f03927a712e8902f59dab5

 ///  File Name: ISS_alert_163
Description:
ISS X-Force has discovered a flaw in the ISAKMP processing for both the Checkpoint VPN-1 server and Checkpoint VPN clients(Securemote/ SecureClient). The IKE component of these products allows for the unidirectional or bidirectional authentication of two remote nodes as well as the negotiation of cryptographic capabilities and keys. A buffer overflow vulnerability exists when attempting to handle large certificate payloads. A remote attacker may exploit this flaw to remotely compromise any VPN-1 server and/or client system running Securemote/SecureClient.
Homepage:http://xforce.iss.net/
File Size:-
Last Modified:Remote File
MD5 Checksum:-