Section:  .. / 0410-advisories  /

Page 6 of 11
<< 1 2 3 4 5 6 7 8 9 10 11 >> Files 125 - 150 of 254
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: cjoverkill403.txt
Description:
There is no user input sanitation for some parameters in trade.php in CJOverkill version 4.0.3, allowing for cross site scripting attacks to take place.
Author:aCiDBiTS
File Size:2316
Last Modified:Oct 13 09:44:02 2004
MD5 Checksum:59936b0eb76b2ed97453c2194f3095b1

 ///  File Name: sa12686.txt
Description:
Secunia Security Advisory - Some vulnerabilities in PHP-Fusion can be exploited by malicious people to conduct SQL injection and script insertion attacks.
Author:r0ut3r
Homepage:http://secunia.com/advisories/12686/
File Size:2309
Last Modified:Oct 7 06:10:54 2004
MD5 Checksum:d0f463caa45b30366edd284faabb7960

 ///  File Name: 3com3crwe754g72-a2.txt
Description:
The 3COM 3crwe754g72-a has a flaw with handling DHCP requests that allows an attacker to inject code into the administration interface.
Author:Cyrille Barthelemy
File Size:2306
Last Modified:Oct 26 05:17:50 2004
MD5 Checksum:a209fba5838b726d7dd665f09ae2d571

 ///  File Name: sa12671.txt
Description:
Secunia Security Advisory - A vulnerability has been discovered in three Microsoft Office Viewers, which can be exploited by malicious people to compromise a user's system.
Homepage:http://secunia.com/advisories/12671/
File Size:2292
Last Modified:Oct 13 10:48:05 2004
MD5 Checksum:6a6310155e09080c1f5821e0106b3cb2

 ///  File Name: sa12655.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in HP StorageWorks Command View XP, which can be exploited by malicious, local users to bypass certain access restrictions.
Homepage:http://secunia.com/advisories/12655/
File Size:2207
Last Modified:Oct 1 16:32:08 2004
MD5 Checksum:720ef7eadcd2895f15f2bf8cb9509e9b

 ///  File Name: eEye.ZIP.txt
Description:
eEye Security Advisory - eEye Digital Security has discovered a buffer overflow in DUNZIP32.DLL, a module that offers support for ZIP compressed folders in the Windows shell. An exploitable buffer overflow occurs when a user opens a ZIP folder that contains a long file name.
Author:Yuji Ukai
Homepage:http://www.eeye.com/
File Size:2165
Last Modified:Oct 24 22:56:53 2004
MD5 Checksum:babe8911914d1f8fa9f56ec7004f33c4

 ///  File Name: sa12613.txt
Description:
Secunia Security Advisory - Secunia Research has discovered a vulnerability in Pinnacle ShowCenter, which can be exploited by malicious people to conduct cross-site scripting attacks.
Homepage:http://secunia.com/advisories/12613/
File Size:2159
Last Modified:Oct 26 03:30:03 2004
MD5 Checksum:4c9f464d37b0b5705697f4cf0d3dd059

 ///  File Name: sa11711.txt
Description:
Secunia Security Advisory - Andrew Nakhla has discovered a vulnerability in Apple Remote Desktop, which can be exploited by malicious users to gain root access on a vulnerable system.
Homepage:http://secunia.com/advisories/11711/
File Size:2130
Last Modified:Oct 28 16:55:22 2004
MD5 Checksum:f40c517a2ac34a181a884183ee4ec256

 ///  File Name: sa12881.txt
Description:
Secunia Security Advisory - Roger Sylvain has reported a vulnerability in Nortel Contivity VPN Client, potentially allowing malicious people to open a VPN tunnel to the client.
Homepage:http://secunia.com/advisories/12881/
File Size:2125
Last Modified:Oct 27 04:42:07 2004
MD5 Checksum:24587c615bb3ca2d06a6e56da6c48ac4

 ///  File Name: flash520g.txt
Description:
Flash Messaging versions 5.2.0g and below suffer from a denial of service attack.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related Exploit:flashmsg.zip"
File Size:2117
Last Modified:Oct 13 08:48:39 2004
MD5 Checksum:b1ae4a74fda8952a53be248438a9bc6d

 ///  File Name: SCN200409-1.txt
Description:
A SQL injection vulnerability exists in bBlog 0.7.3 that will allow a remote user administrative privileges.
Author:James McGlinn
Homepage:http://www.servers.co.nz/
File Size:2099
Last Modified:Oct 7 07:16:08 2004
MD5 Checksum:81fbe9934c95fa1ee67c4569423c2af3

 ///  File Name: sa12887.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in Gaim, which potentially can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error within the handling of MSN SLP messages. This can be exploited to cause a buffer overflow by supplying a specially crafted sequence of MSN SLP messages.
Homepage:http://secunia.com/advisories/12887/
File Size:2097
Last Modified:Oct 27 04:25:24 2004
MD5 Checksum:c9ff511efbf2de9dc8baecbb8e43d8e7

 ///  File Name: sa12835.txt
Description:
Secunia Security Advisory - Positive Technologies has reported some vulnerabilities in Ideal BB, which can be exploited by malicious people to conduct SQL injection, cross-site scripting and HTTP response splitting attacks.
Homepage:http://secunia.com/advisories/12835/
File Size:2075
Last Modified:Oct 26 03:47:10 2004
MD5 Checksum:26a10956049d44db02beb46a9da2fdde

 ///  File Name: PMASA-2004-2.txt
Description:
When specifying specially formatted options to external MIME transformation, an attacker can execute any shell command restricted by privileges of httpd user.
Homepage:http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2004-2
File Size:2059
Last Modified:Oct 25 00:12:46 2004
MD5 Checksum:e8d18169cff29628d778c02a90d1d39b

 ///  File Name: sa12844.txt
Description:
Secunia Security Advisory - Positive Technologies has reported some vulnerabilities in AliveSites Forum, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks.
Homepage:http://secunia.com/advisories/12844/
File Size:2040
Last Modified:Oct 26 04:27:17 2004
MD5 Checksum:3d22804c18563aff1ba32433cce68c38

 ///  File Name: sa12946.txt
Description:
Secunia Security Advisory - An vulnerability has been reported in HP Serviceguard, which potentially can be exploited by malicious people to compromise a vulnerable system.
Homepage:http://secunia.com/advisories/12946/
File Size:2034
Last Modified:Oct 27 05:35:21 2004
MD5 Checksum:43d715efe96a672010a370eea2eb9d7c

 ///  File Name: sa12840.txt
Description:
Secunia Security Advisory - Positive Technologies has reported some vulnerabilities in DevoyBB, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks.
Homepage:http://secunia.com/advisories/12840/
File Size:2031
Last Modified:Oct 26 04:23:06 2004
MD5 Checksum:42f165d7a397db11d83b316574a4afb3

 ///  File Name: sa12843.txt
Description:
Secunia Security Advisory - Positive Technologies has reported some vulnerabilities in WowBB Forum, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks.
Homepage:http://secunia.com/advisories/12843/
File Size:2026
Last Modified:Oct 26 04:25:08 2004
MD5 Checksum:960c7aad7cf0f0d8339098792974ea1b

 ///  File Name: sa12861.txt
Description:
Secunia Security Advisory - Zero X has discovered a vulnerability in Anaconda Foundation Directory, which can be exploited by malicious people to disclose sensitive information.
Homepage:http://secunia.com/advisories/12861/
File Size:2021
Last Modified:Oct 26 05:53:24 2004
MD5 Checksum:042675ddc178f05ab2f36fefd4cc4aa9

 ///  File Name: masterOrionIII.txt
Description:
Master of Orion III versions 1.2.5 and below suffer from buffer overflow and allocation errors.
Author:Luigi Auriemma
Homepage:http://aluigi.altervista.org
Related Exploit:moo3boom.zip"
File Size:2014
Last Modified:Oct 28 16:45:36 2004
MD5 Checksum:7ebde94aeb3c1a277833c9955d2dfa31

 ///  File Name: sa12980.txt
Description:
Secunia Security Advisory - Positive Technologies has reported some vulnerabilities in Phorum, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks.
Homepage:http://secunia.com/advisories/12980/
File Size:2013
Last Modified:Oct 27 07:33:31 2004
MD5 Checksum:3ae5e11887096bec6e6f4ad1d2287b7d

 ///  File Name: sa12969.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in Novell ZENworks for Desktops, which can be exploited by malicious, local users to gain escalated privileges. The vulnerability is caused due to the Remote Management Agent invoking the ZENworks Remote Control Help functionality with SYSTEM privileges. This can be exploited to execute arbitrary programs with escalated privileges.
Homepage:http://secunia.com/advisories/12969/
File Size:2007
Last Modified:Oct 27 07:34:44 2004
MD5 Checksum:a222fa04d6b6f7eb2cc756b8281629a7

 ///  File Name: sa12955.txt
Description:
Secunia Security Advisory - Elac has discovered a vulnerability in dadaIMC, which can be exploited by malicious people to conduct script insertion attacks.
Homepage:http://secunia.com/advisories/12955/
File Size:2002
Last Modified:Oct 27 07:15:06 2004
MD5 Checksum:77df106892de12c6587988e06fc14b6f

 ///  File Name: 008-firefox.thunderbird.txt
Description:
Mozilla Thunderbird 0.8 and Firefox 0.9.3 allows a temporary file to become world readable when using secondary applications to view the data.
Author:Martin
File Size:1986
Last Modified:Oct 27 06:20:58 2004
MD5 Checksum:5c9385d5e5c42d7316c6e63b3954a1d9

 ///  File Name: sa12992.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in Horde Application Framework, which potentially can be exploited by malicious people to conduct cross-site scripting attacks.
Homepage:http://secunia.com/advisories/12992/
File Size:1985
Last Modified:Oct 28 16:34:42 2004
MD5 Checksum:93de6ad2eb0e93396dd55d615aef5a6d