Section:  .. / 0412-advisories  /

Page 1 of 11
<< 1 2 3 4 5 6 7 8 9 10 11 >> Files 1 - 25 of 253
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: jackformail.txt
Description:
Jacks FormMail.php script can be manipulated into sending arbitrary files from the server. Version 5.0 is affected.
Author:Hack Hawk
File Size:1989
Last Modified:Jan 2 21:46:02 2005
MD5 Checksum:22270187b18f9066be356c1b18f11108

 ///  File Name: IbProfArcade.txt
Description:
A flaw exists in the high scores module of IbProArcade which allows for malicious SQL injection.
Author:Mike Bailey
File Size:1032
Last Modified:Jan 2 21:40:00 2005
MD5 Checksum:61df6b5f7531a438ed03d6ac7e19a18f

 ///  File Name: argosoft_advisory.txt
Description:
Versions prior to 1.4.2.1 of the ArGoSoft FTP server will disclose whether or not a supplied username is valid or not. A login name supplied with the USER command will not be accepted unless it is valid.
Author:Steven
Homepage:http://www.lovebug.org/argosoft_advisory.txt
File Size:2626
Last Modified:Jan 2 21:38:12 2005
MD5 Checksum:de8f3d772594d1e69c4b985eedc6f2b2

 ///  File Name: glsa-200412-27.txt
Description:
Gentoo Linux Security Advisory GLSA 200412-27 - cYon discovered that the authform.inc.php script allows a remote user to define the global variable path_pre.
Homepage:http://security.gentoo.org/
File Size:3199
Last Modified:Jan 2 21:27:23 2005
MD5 Checksum:5c78c8821c527d78708884dba7ffab40

 ///  File Name: glsa-200412-24.txt
Description:
Gentoo Linux Security Advisory GLSA 200412-24 - New integer overflows were discovered in Xpdf, potentially resulting in the execution of arbitrary code. GPdf includes Xpdf code and therefore is vulnerable to the same issues.
Homepage:http://security.gentoo.org/
File Size:3164
Last Modified:Jan 2 21:26:39 2005
MD5 Checksum:1d3121a5369875b3b2f17b0844cdf0cb

 ///  File Name: 7a69-17.txt
Description:
7a69ezine Advisories #17 - Internet Explorer version 6.0.3790.0 suffers from an FTP download path disclosure flaw.
Author:Albert Puigsech Galicia
Related Exploit:ftpd-iexpl.c"
File Size:3095
Last Modified:Jan 2 21:24:19 2005
MD5 Checksum:c90e32830006de416786d6541fff9884

 ///  File Name: sa13696.txt
Description:
Secunia Security Advisory - The vendor has acknowledged a vulnerability in kio_ftp, which can be exploited by malicious people to conduct FTP command injection attacks.
Homepage:http://secunia.com/advisories/13696/
File Size:1575
Last Modified:Jan 2 21:19:18 2005
MD5 Checksum:06ad05dd7b12d5c2f9d555081a20d6b0

 ///  File Name: sa13677.txt
Description:
Secunia Security Advisory - sullo has reported multiple vulnerabilities in Eventum, which can be exploited by malicious people to conduct cross-site scripting and script insertion attacks and potentially bypass certain security restrictions.
Homepage:http://secunia.com/advisories/13677/
File Size:2724
Last Modified:Jan 2 21:18:44 2005
MD5 Checksum:dcd60e2bb73e26378e1ab958b111aadc

 ///  File Name: sa13671.txt
Description:
Secunia Security Advisory - Symantec has acknowledged three vulnerabilities in the Nexland Firewall Appliances, which can be exploited by malicious people to cause a DoS (Denial of Service), identify active services, and manipulate the firewall configuration.
Homepage:http://secunia.com/advisories/13671/
File Size:2277
Last Modified:Jan 2 21:13:12 2005
MD5 Checksum:110f14a17c20e3cf0838dad233a1ff87

 ///  File Name: sa13679.txt
Description:
Secunia Security Advisory - A vulnerability in aStats can be exploited by malicious, local users to perform certain actions on a vulnerable system to gain escalated privileges.
Homepage:http://secunia.com/advisories/13679/
File Size:1855
Last Modified:Jan 2 21:05:53 2005
MD5 Checksum:5e99e06d49c8e5d32d24af52f548f05a

 ///  File Name: eEye.backdoors.txt
Description:
Multiple backdoors have been discovered in eEye's IRIS and SecureIIS products.
Author:L. Gusto
File Size:2927
Last Modified:Jan 2 21:04:27 2005
MD5 Checksum:ff3a8dd880572db0cf51675a4d2c4432

 ///  File Name: RLSA_06-2004.txt
Description:
QNX crttrap has a -c flag to specify where trap file will be written. Combined with the trap flag it is possible to read or write any file in the disk. QNX RTOS 2.4, 4.25, 6.1.0, 6.2.0 are all affected.
Author:Julio Cesar Fort
File Size:2847
Last Modified:Jan 2 21:01:56 2005
MD5 Checksum:5765faa4ad094a2c0a69ced0e9539975

 ///  File Name: sa13660.txt
Description:
Secunia Security Advisory - cYon has reported a vulnerability in PHProjekt, which can be exploited by malicious people to compromise a vulnerable system. Input passed to the path_pre parameter in authform.inc.php is not properly verified, before it is used to include files. This can be exploited to include arbitrary files from external and local resources.
Homepage:http://secunia.com/advisories/13660/
File Size:1869
Last Modified:Jan 2 20:57:41 2005
MD5 Checksum:bbc0574d1e1eae53944a5d3f31e787fc

 ///  File Name: sa13670.txt
Description:
Secunia Security Advisory - Some vulnerabilities have been reported in Atari800, which can be exploited by malicious, local users to gain escalated privileges. The vulnerabilities are caused due to unspecified boundary errors and can be exploited to cause buffer overflows. Successful exploitation may allow execution of arbitrary code with escalated privileges, if the SVGAlib version is used in a setuid binary.
Homepage:http://secunia.com/advisories/13670/
File Size:1702
Last Modified:Jan 2 20:45:42 2005
MD5 Checksum:6c0022d8a0fd1daec785445e1fea355f

 ///  File Name: htmltitle.txt
Description:
There is a weird denial of service issue with Internet Explorer and Mozilla Firefox when they attempt to render html files with long titles.
Author:bipin gautam
File Size:1204
Last Modified:Jan 2 20:39:45 2005
MD5 Checksum:3357dc5d3a06a4e2bac7976e80e693c9

 ///  File Name: sa13630.txt
Description:
Secunia Security Advisory - First Last has reported a weakness in CleanCache, which can be exploited by malicious people to disclose securely deleted data on a disk.
Homepage:http://secunia.com/advisories/13630/
File Size:1775
Last Modified:Jan 2 20:29:40 2005
MD5 Checksum:c4d38c96b00eabde9c68c7519a045417

 ///  File Name: sa13654.txt
Description:
Secunia Security Advisory - Martin Schwidefsky has reported a vulnerability in the Linux Kernel, which can be exploited by malicious, local users to gain escalated privileges. The vulnerability is caused due to the SACF (Set Address Space Control Fast) control instruction being handled insecurely on the S/390 platform.
Homepage:http://secunia.com/advisories/13654/
File Size:1607
Last Modified:Jan 2 20:20:58 2005
MD5 Checksum:7d9c2635d6e0aee58d0144bdfa9ba8af

 ///  File Name: sa13644.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in Crystal Enterprise, which can be exploited by malicious people to conduct cross-site scripting attacks.
Homepage:http://secunia.com/advisories/13644/
File Size:2413
Last Modified:Jan 2 20:15:15 2005
MD5 Checksum:0555ed56d6680e76b8a4edfa50f1e309

 ///  File Name: SantyB.php.txt
Description:
Santy.b phpBB worm that affects versions 2.0.10 and below and installs a bot. Uses AOL/Yahoo search.
File Size:3312
Last Modified:Jan 2 19:53:15 2005
MD5 Checksum:f4c02459ecd6bf099c06b116417f8a3e

 ///  File Name: sa13665.txt
Description:
Secunia Security Advisory - snilabs has reported a security issue in PHP-Blogger, which can be exploited by malicious people to disclose sensitive information. The problem is that database files (.db) by default are stored inside the web root and are not correctly protected against being accessed directly on some server configurations. This can e.g. be exploited to disclose the admin password.
Homepage:http://secunia.com/advisories/13665/
File Size:1812
Last Modified:Jan 1 03:33:38 2005
MD5 Checksum:7af97deecc344ef6c750029906b994df

 ///  File Name: sa13634.txt
Description:
Secunia Security Advisory - Nicolae Mihalache has reported a security issue in avelsieve, which potentially can be exploited by malicious users to cause a DoS (Denial of Service).
Homepage:http://secunia.com/advisories/13634/
File Size:1671
Last Modified:Dec 31 23:26:17 2004
MD5 Checksum:80fc9a8d4680fdd69e2dcabc51896311

 ///  File Name: ieTrick.txt
Description:
Internet Explorer will accept %0a and %0d in URLs. In FTP URLs, it will accept them in the username part of the URL. Due to the similarity between the FTP and SMTP protocols, this can be used to send mail.
Author:Albert Puigsech Galicia
File Size:1862
Last Modified:Dec 31 23:04:48 2004
MD5 Checksum:ee66b2e6d49b546793170520a819053e

 ///  File Name: plesk700.txt
Description:
Plesk, a popular server administration tool used by many web hosting companies, is susceptible to cross site scripting flaws.
Author:Andrew Smith
File Size:1160
Last Modified:Dec 31 23:03:45 2004
MD5 Checksum:2a40d7304bd1fd94d5a07e880ad27fa5

 ///  File Name: SSRT4699.txt
Description:
HP Security Bulletin - A potential security vulnerability has been identified with System Administration Manager (SAM) running on HP-UX that may allow local unauthorized privileges. Affected Versions: HP-UX B.11.00, B.11.11, B.11.22, and B.11.23.
Homepage:http://www.hp.com/
File Size:7174
Last Modified:Dec 31 22:59:23 2004
MD5 Checksum:c14db62e19bc70eeec74f51a043a334c

 ///  File Name: sa13635.txt
Description:
Secunia Security Advisory - Two vulnerabilities have been reported in Rpm Finder, which can be exploited by malicious people to compromise a user's system and by malicious, local users to perform certain actions with escalated privileges.
Homepage:http://secunia.com/advisories/13635/
File Size:2039
Last Modified:Dec 31 22:55:49 2004
MD5 Checksum:1697b6efedeca34e4236ed6e1b44decb