Section:  .. / 0406-advisories  /

Page 6 of 6
<< 1 2 3 4 5 6 >> Files 125 - 129 of 129
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: firebirdDB.txt
Description:
A vulnerability in the Firebird Database's way of handling database names allows an unauthenticated user to cause the server to crash and overwrite a critical section of the stack used by the database. Version 1.0 is affected.
Author:Noam Rathaus
Homepage:http://www.SecuriTeam.com
File Size:3435
Last Modified:Jun 2 09:57:05 2004
MD5 Checksum:bfba51ae44823072d2e07f4d2c382ee2

 ///  File Name: RS-Labs-Advisory-2004-1.txt
Description:
A vulnerability has been discovered in SquirrelMail. Due to unsanitized user input, a specially crafted e-mail being read by the victim using SquirrelMail will make injection of arbitrary tags possible. When correctly exploited, it will permit the execution of scripts (JavaScript, VBScript, etc) running in the context of victim's browser.
Author:RoMaNSoFt
Homepage:http://www.rs-labs.com/adv/RS-Labs-Advisory-2004-1.txt
File Size:32167
Last Modified:Jun 2 09:48:08 2004
MD5 Checksum:f686d77939f6fe1e7452e864351610dd

 ///  File Name: linksysPage.txt
Description:
The LinkSys Wireless-G Broadband Router WRT54G allows world access to an administration server on ports 80 and 443 even when disabled.
Author:Alan W. Rateliff II
File Size:1685
Last Modified:Jun 2 09:39:57 2004
MD5 Checksum:2ed59dc547f6d2ee845336a46b6779a6

 ///  File Name: domainWhoops.txt
Description:
A big gaping hole has been found where users who have expired passwords can unexpectedly log on to a Microsoft Windows 2000 domain if their fully qualified domain name (FQDN) is exactly eight characters long. Platforms affected: Microsoft Windows 2000 Advanced Server, Microsoft Windows 2000 Professional, Microsoft Windows 2000 Server.
Author:albatross
File Size:4262
Last Modified:Jun 2 09:32:51 2004
MD5 Checksum:9d9e4d57f82da663506455b7b91657c4