Section:  .. / 0410-advisories  /

Page 9 of 11
<< 1 2 3 4 5 6 7 8 9 10 11 >> Files 200 - 225 of 254
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: sa12789.txt
Description:
Secunia Security Advisory - Some vulnerabilities have been reported in IceWarp Web Mail, where some can be exploited by malicious people to conduct cross-site scripting attacks.
Homepage:http://secunia.com/advisories/12789/
File Size:1647
Last Modified:Oct 13 10:11:17 2004
MD5 Checksum:79bae4498d57093d8534364790d9f6e7

 ///  File Name: sa12769.txt
Description:
Secunia Security Advisory - A security issue with an unknown impact has been reported in Rippy the Aggregator.
Homepage:http://secunia.com/advisories/12769/
File Size:1647
Last Modified:Oct 13 09:17:21 2004
MD5 Checksum:bee13d6f724961bc94f27b123fe27869

 ///  File Name: sa13012.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in TortoiseCVS, which potentially can be exploited by malicious people to compromise a user's system.
Homepage:http://secunia.com/advisories/13012/
File Size:1633
Last Modified:Oct 30 00:38:24 2004
MD5 Checksum:ba15dbd95a63096553fabcec0b1640e3

 ///  File Name: vypressmesg.txt
Description:
The visualization function in Vypress Messenger versions 3.5.1 and below suffers from a buffer overflow bug.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related Exploit:vymesbof.zip"
File Size:1629
Last Modified:Oct 13 04:54:43 2004
MD5 Checksum:8f8ad59bde08aa0f48653b8d83758829

 ///  File Name: sa12960.txt
Description:
Secunia Security Advisory - Some vulnerabilities have been reported in IPplan 3.x, which can be exploited by malicious people to conduct SQL injection attacks. Some unspecified input is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
Homepage:http://secunia.com/advisories/12960/
File Size:1626
Last Modified:Oct 27 06:37:42 2004
MD5 Checksum:1248fd5125a46b004a17187f34ca9179

 ///  File Name: javascript.txt
Description:
Interesting write up discussion how to use Javascript to spoof what page is actually being visited.
Author:Andrew Hunter
File Size:1626
Last Modified:Oct 26 04:53:34 2004
MD5 Checksum:e106683288b2a530f54b36931447dda2

 ///  File Name: sa12882.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in cabextract, which potentially can be exploited to overwrite arbitrary files on a vulnerable system.
Homepage:http://secunia.com/advisories/12882/
File Size:1605
Last Modified:Oct 26 05:52:51 2004
MD5 Checksum:47364042e9ee2d7e4873a34f1ff4a8ea

 ///  File Name: sa12736.txt
Description:
Secunia Security Advisory - Gary Smith has reported a vulnerability in CUPS, which can be exploited by malicious, local users to gain knowledge of sensitive information. The problem is that user credentials are stored in the error_log log file when printing to a shared printer via Samba.
Homepage:http://secunia.com/advisories/12736/
File Size:1599
Last Modified:Oct 13 06:33:44 2004
MD5 Checksum:9206586a652631128d497a2a565f4d93

 ///  File Name: sa12648.txt
Description:
Secunia Security Advisory - A security issue with an unknown impact has been reported in fprobe 1.x.
Homepage:http://secunia.com/advisories/12648/
File Size:1591
Last Modified:Oct 1 16:24:21 2004
MD5 Checksum:ef913d0910aaa18f66ef07743f9becd4

 ///  File Name: sa12685.txt
Description:
Secunia Security Advisory - A security issue has been reported in proxytunnel, which can be exploited by malicious, local users to gain knowledge of sensitive information.
Homepage:http://secunia.com/advisories/12685/
File Size:1579
Last Modified:Oct 13 04:48:06 2004
MD5 Checksum:270cea0acc78612dfcb92d9c6917ba9f

 ///  File Name: gnutftp.txt
Description:
The GNU tftp client in the inetutils-1.4.2 is susceptible to buffer overflow attacks. Due to untrusted data from DNS resolved hostname being copied into finite static buffers without any bounds checking, several buffers can be overflowed in the .bss. Arbitrary code execution is possible.
Author:sean
File Size:1578
Last Modified:Oct 27 07:29:47 2004
MD5 Checksum:d2064ef8191770931d94dcb6c07d7330

 ///  File Name: Ad20041009.txt
Description:
Exploitation of design vulnerabilities in various AntiVirus products could allow malicious code to evade detection.
Author:Sowhat
Homepage:http://secway.org/Advisory/Ad20041009.txt
File Size:1571
Last Modified:Oct 26 05:18:47 2004
MD5 Checksum:5e0c822a0a20c9355dff21c1a2247c8c

 ///  File Name: sa12862.txt
Description:
Secunia Security Advisory - A security issue has been reported in ClientExec, which can be exploited by malicious people to gain knowledge of various system information.
Homepage:http://secunia.com/advisories/12862/
File Size:1570
Last Modified:Oct 26 05:21:36 2004
MD5 Checksum:91743f7388545654aad8bde8611eff31

 ///  File Name: sa12720.txt
Description:
Secunia Security Advisory - Online Recruitment Agency 1.x suffers from some vulnerabilities with an unknown impact.
Homepage:http://secunia.com/advisories/12720/
File Size:1550
Related OSVDB(s):10479
Last Modified:Oct 13 05:40:37 2004
MD5 Checksum:7284651cfd17ba23eb33312ede70468b

 ///  File Name: mywebServer103.txt
Description:
MyWebServer 1.0.3 is susceptible to a denial of service attack and allows for direct administrative access to ServerProperties.html.
Author:nekd0
Homepage:http://unl0ck.blackhatz.info/
File Size:1539
Last Modified:Oct 1 17:24:49 2004
MD5 Checksum:c77e575f154e41b87b6dd792b4ea76b2

 ///  File Name: sa12721.txt
Description:
Secunia Security Advisory - Some unspecified vulnerabilities with unknown impacts have been reported in Real Estate Management Software.
Homepage:http://secunia.com/advisories/12721/
File Size:1538
Last Modified:Oct 13 05:46:35 2004
MD5 Checksum:4db0a887e04ee02da98985b42e3b553a

 ///  File Name: sa12730.txt
Description:
Secunia Security Advisory - Eduardo Correia has reported a vulnerability with an unknown impact in BugPort.
Homepage:http://secunia.com/advisories/12730/
File Size:1536
Last Modified:Oct 13 05:42:59 2004
MD5 Checksum:6a2d5bd2c051e29a55e8471755cb6e66

 ///  File Name: privateer104141.txt
Description:
Privateer's Bounty: Age of Sail II versions 1.04.151 and below is affected by a buffer overflow occurring when an attacker joins on the server using a nickname at least 144 bytes in length.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related Exploit:aos2bof.zip"
File Size:1513
Last Modified:Oct 27 04:34:53 2004
MD5 Checksum:25af558bcfdab021be410c93909f0826

 ///  File Name: broadboard.txt
Description:
BroadBoard Instant ASP message board is susceptible to SQL injection attacks.
Author:pigrelax
File Size:1512
Last Modified:Oct 1 16:16:10 2004
MD5 Checksum:a6fe6761a4b062295c45b53ab9775ca3

 ///  File Name: sa12880.txt
Description:
Secunia Security Advisory - Some vulnerabilities with an unknown impact have been reported in PBLang 4.x.
Homepage:http://secunia.com/advisories/12880/
File Size:1502
Last Modified:Oct 26 05:51:58 2004
MD5 Checksum:fb3cb40dde306e4c4dc0bb31e923353c

 ///  File Name: sa12709.txt
Description:
Secunia Security Advisory - Georg Ragaz has reported a vulnerability with an unknown impact in yappa-ng.
Homepage:http://secunia.com/advisories/12709/
File Size:1500
Last Modified:Oct 13 05:18:51 2004
MD5 Checksum:8d1c85fe3fd41136dfd6752b15377633

 ///  File Name: cpanelBackup.txt
Description:
cPanel 9.4.1 is susceptible to a classic symbolic link attack.
Author:Karol Wiesek
File Size:1494
Last Modified:Oct 26 05:01:41 2004
MD5 Checksum:a297f531d4d9ee531fa3ecbbfca4cc25

 ///  File Name: sa12961.txt
Description:
Secunia Security Advisory - A vulnerability with an unknown impact has been reported in WindowMaker.
Homepage:http://secunia.com/advisories/12961/
File Size:1491
Last Modified:Oct 27 06:42:35 2004
MD5 Checksum:f7826b13f09f9482ad8322642affccc2

 ///  File Name: vypresstone.txt
Description:
Due to a mishandling of malformed streams, Vypress Tonecast versions 1.3 and below suffer from a denial of service vulnerability.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related Exploit:toneboom.zip"
File Size:1471
Last Modified:Oct 27 04:11:40 2004
MD5 Checksum:e137800e571641ae693da865c06b78c9

 ///  File Name: SSA-20041022-08.txt
Description:
Due to an input validation flaw, MoniWiki versions 1.0.8 and below are vulnerable to cross site scripting attacks.
Author:SSR Team
File Size:1439
Last Modified:Oct 27 06:24:31 2004
MD5 Checksum:8a3e1ca305014981494e506f15e8a31b