Section:  .. / 0412-advisories  /

Page 8 of 11
<< 1 2 3 4 5 6 7 8 9 10 11 >> Files 175 - 200 of 253
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: sa13357.txt
Description:
Secunia Security Advisory - Stefan Esser has reported a vulnerability in Serendipity, which can be exploited by malicious people to conduct cross-site scripting attacks.
Homepage:http://secunia.com/advisories/13357/
File Size:1821
Last Modified:Dec 12 01:11:32 2004
MD5 Checksum:8d2d825016d47fb11ef013ab42557910

 ///  File Name: sa13358.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in Big Medium, which potentially can be exploited by malicious users to compromise a vulnerable system.
Homepage:http://secunia.com/advisories/13358/
File Size:1589
Last Modified:Dec 12 01:12:14 2004
MD5 Checksum:9efbe1625cbe9d5084d9ecfee27688b5

 ///  File Name: sa13360.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in Jakarta Lucene, which can be exploited by malicious people to conduct cross-site scripting attacks.
Homepage:http://secunia.com/advisories/13360/
File Size:1783
Last Modified:Dec 12 02:44:34 2004
MD5 Checksum:04d89966f2280c04d22517e747f0fc3b

 ///  File Name: sa13370.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in AIX, which can be exploited by malicious, local users to inject arbitrary data into the ODM (Object Data Manager) or cause a vulnerable system to hang during boot. The vulnerability is caused due to an unspecified error within the system startup scripts. The vulnerability affects versions 5.1, 5.2, and 5.3.
Homepage:http://secunia.com/advisories/13370/
File Size:1753
Last Modified:Dec 12 02:49:52 2004
MD5 Checksum:1ce0d75c61d357650fa775b1f35b687e

 ///  File Name: sa13374.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in Kerio WinRoute Firewall, which can be exploited by malicious people to poison the DNS cache. The vulnerability is caused due to an unspecified error and can be exploited to insert fake information in the DNS cache. The vulnerability has been reported in version 6.0.8. Prior versions may also be affected.
Homepage:http://secunia.com/advisories/13374/
File Size:1778
Last Modified:Dec 12 20:36:48 2004
MD5 Checksum:7f8ea855570cd448937efcd3404fea52

 ///  File Name: sa13377.txt
Description:
Secunia Security Advisory - A security issue has been reported in NetMail, which can be exploited by malicious people to access the mail store.
Homepage:http://secunia.com/advisories/13377/
File Size:2216
Last Modified:Dec 12 19:06:06 2004
MD5 Checksum:ff2da2c59a5df752dfa53660bb358f48

 ///  File Name: sa13393.txt
Description:
Secunia Security Advisory - A security issue has been reported in Codestriker, which can be exploited by malicious users to bypass certain security restrictions.
Homepage:http://secunia.com/advisories/13393/
File Size:1776
Last Modified:Dec 12 20:00:09 2004
MD5 Checksum:63d7b1983bd3c26867b33f436238ae2a

 ///  File Name: sa13402.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in Netscape, which can be exploited by malicious people to spoof the content of websites. The problem is that a website can inject content into another site's window if the target name of the window is known. This can e.g. be exploited by a malicious website to spoof the content of a pop-up window opened on a trusted website.
Homepage:http://secunia.com/advisories/13402/
File Size:2149
Last Modified:Dec 12 20:01:08 2004
MD5 Checksum:0aef008c7fe64fa654b08cb70e1f9d4c

 ///  File Name: sa13405.txt
Description:
Secunia Security Advisory - A security issue has been reported in rootsh, which can be exploited by malicious, local users to bypass the logging functionality.
Homepage:http://secunia.com/advisories/13405/
File Size:1675
Last Modified:Dec 12 20:16:05 2004
MD5 Checksum:748644b1736eba21054b5540ae135f3c

 ///  File Name: sa13408.txt
Description:
Secunia Security Advisory - Artur Szostak has reported a vulnerability in Squid, which can be exploited by malicious people to gain knowledge of potentially sensitive information.
Homepage:http://secunia.com/advisories/13408/
File Size:1890
Last Modified:Dec 12 20:17:09 2004
MD5 Checksum:c2592ba3f31ce5a5a1a528afeeb77898

 ///  File Name: sa13409.txt
Description:
Secunia Security Advisory - Alexander Fichman has reported a weakness in Microsoft Office SharePoint Portal Server 2003, which may disclose sensitive information to malicious, local users on the system.
Homepage:http://secunia.com/advisories/13409/
File Size:1901
Last Modified:Dec 12 20:41:27 2004
MD5 Checksum:54ff19f4dfe854673046de6b73b0587c

 ///  File Name: sa13410.txt
Description:
Secunia Security Advisory - Jeremy Fitzhardinge has reported some potential vulnerabilities with an unknown impact in the Linux Kernel.
Homepage:http://secunia.com/advisories/13410/
File Size:1735
Last Modified:Dec 12 20:18:36 2004
MD5 Checksum:35d9a443aafb3e2622ccc8f612c64ad0

 ///  File Name: sa13411.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in MIMEsweeper for SMTP, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to an error within the Security Service when processing PDF files. This can be exploited to crash the Security Service by sending an email containing a specially crafted PDF file as attachment.
Homepage:http://secunia.com/advisories/13411/
File Size:1813
Last Modified:Dec 12 20:35:46 2004
MD5 Checksum:37bc617883490e598c5a3c806b5700ba

 ///  File Name: sa13412.txt
Description:
Secunia Security Advisory - Secunia Research has reported a vulnerability in iCab, which can be exploited by malicious people to spoof the content of websites. The problem is that a website can inject content into another site's window if the target name of the window is known. This can e.g. be exploited by a malicious website to spoof the content of a pop-up window opened on a trusted website.
Homepage:http://secunia.com/advisories/13412/
File Size:2073
Last Modified:Dec 12 20:40:42 2004
MD5 Checksum:7531e49b89babc4fb79c7fc6e0e9a541

 ///  File Name: sa13414.txt
Description:
Secunia Security Advisory - Some vulnerabilities have been reported in PHP Gift Registry, which can be exploited by malicious people to conduct cross-site scripting attacks.
Homepage:http://secunia.com/advisories/13414/
File Size:1849
Last Modified:Dec 12 20:23:17 2004
MD5 Checksum:dd71e8f9a2d40f67a5ca17a68e8339a8

 ///  File Name: sa13418.txt
Description:
Secunia Security Advisory - Secunia Research has reported a vulnerability in OmniWeb, which can be exploited by malicious people to spoof the content of websites. The problem is that a website can inject content into another site's window if the target name of the window is known. This can e.g. be exploited by a malicious website to spoof the content of a pop-up window opened on a trusted website.
Homepage:http://secunia.com/advisories/13418/
File Size:2101
Last Modified:Dec 12 20:40:05 2004
MD5 Checksum:747f7b74d54647ff1db21130edfeec46

 ///  File Name: sa13419.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in MediaWiki, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to insufficient validation of files uploaded to the "images" directory located inside the web root. This can be exploited to upload and execute arbitrary malicious scripts. The vulnerability has been reported in version 1.3.8. Prior versions may also be affected.
Homepage:http://secunia.com/advisories/13419/
File Size:1740
Last Modified:Dec 30 07:21:19 2004
MD5 Checksum:26f47b168b90e2d069ab32adaf8616f1

 ///  File Name: sa13431.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in SQLgrey Postfix greylisting service, which can be exploited by malicious people to conduct SQL injection attacks.
Homepage:http://secunia.com/advisories/13431/
File Size:1697
Last Modified:Dec 30 07:23:31 2004
MD5 Checksum:cb34aa907a2e617d31f4a80804aae349

 ///  File Name: sa13432.txt
Description:
Secunia Security Advisory - Michael Krax and Mark J. Cox have reported some vulnerabilities in mnoGoSearch, which can be exploited by malicious people to conduct cross-site scripting attacks.
Homepage:http://secunia.com/advisories/13432/
File Size:1751
Last Modified:Dec 30 07:24:23 2004
MD5 Checksum:962a4f5be5850367735e4e43e7ece07e

 ///  File Name: sa13438.txt
Description:
Secunia Security Advisory - Ziv Kamir has reported a weakness in WinMail Server, which can be exploited by malicious people to disclose certain system information.
Homepage:http://secunia.com/advisories/13438/
File Size:1762
Last Modified:Dec 30 07:22:33 2004
MD5 Checksum:316650858ffaa3e89db33e3c8a813b8c

 ///  File Name: sa13443.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in OpenBSD, which can be exploited by malicious, local users to cause a DoS (Denial of Service). The vulnerability is caused due to an unspecified error in isakmpd and can be exploited by setting ipsec credentials on a socket. Successful exploitation corrupts kernel memory and causes a system panic.
Homepage:http://secunia.com/advisories/13443/
File Size:1886
Last Modified:Dec 30 09:01:31 2004
MD5 Checksum:266469dfe298c5f6ff1eb95f8564bfa7

 ///  File Name: sa13448.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in NetMail, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to an unspecified boundary error within IMAPD and can be exploited to cause a buffer overflow via the 101_mEna script.
Homepage:http://secunia.com/advisories/13448/
File Size:2141
Last Modified:Dec 30 09:11:33 2004
MD5 Checksum:74480cf25a22d38b205c38203896d6d0

 ///  File Name: sa13463.txt
Description:
Secunia Security Advisory - Kostya Kortchinsky has reported two vulnerabilities in Microsoft Windows NT, allowing malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system. Both are related to DHCP functionality.
Homepage:http://secunia.com/advisories/13463/
File Size:2392
Last Modified:Dec 30 08:49:04 2004
MD5 Checksum:18e6b4d1620bd3bd30bcc82dfd6c31a8

 ///  File Name: sa13465.txt
Description:
Secunia Security Advisory - Cesar Cerrudo has reported two vulnerabilities in Microsoft Windows, allowing malicious, local users to escalate their privileges. They involve both LPC and LSASS functionality.
Homepage:http://secunia.com/advisories/13465/
File Size:4024
Last Modified:Dec 30 08:48:07 2004
MD5 Checksum:2d18e221f9357a786cdb26a78d925b20

 ///  File Name: sa13466.txt
Description:
Secunia Security Advisory - Kostya Kortchinsky has reported two vulnerabilities in Microsoft Windows, allowing malicious people to compromise a vulnerable system via WINS.
Homepage:http://secunia.com/advisories/13466/
File Size:3298
Last Modified:Dec 30 08:49:48 2004
MD5 Checksum:ad4279b6166a8d6dce011c52ce340d3d