Section:  .. / 0410-advisories  /

Page 5 of 11
<< 1 2 3 4 5 6 7 8 9 10 11 >> Files 100 - 125 of 254
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: cpanelChmod.txt
Description:
cPanel 9.4.1 allows logged in users to change permission of any file to 755.
Author:Karol Wiesek
File Size:1816
Last Modified:Oct 26 05:04:13 2004
MD5 Checksum:a1f10723c5e8bdfe91a178a8ea930a00

 ///  File Name: cpanelChown.txt
Description:
cPanel 9.4.1 allows logged in users the ability to change ownership of any file to their uid:gid.
Author:Karol Wiesek
File Size:1381
Last Modified:Oct 26 05:03:21 2004
MD5 Checksum:aff8db13eba0ffc7582d45dc04418fd2

 ///  File Name: cpanelBackup.txt
Description:
cPanel 9.4.1 is susceptible to a classic symbolic link attack.
Author:Karol Wiesek
File Size:1494
Last Modified:Oct 26 05:01:41 2004
MD5 Checksum:a297f531d4d9ee531fa3ecbbfca4cc25

 ///  File Name: javascript.txt
Description:
Interesting write up discussion how to use Javascript to spoof what page is actually being visited.
Author:Andrew Hunter
File Size:1626
Last Modified:Oct 26 04:53:34 2004
MD5 Checksum:e106683288b2a530f54b36931447dda2

 ///  File Name: pscriptForum.txt
Description:
Powie's PSCRIPT Forum is susceptible to multiple SQL injection vulnerabilities.
Author:Christoph Jeschke
File Size:2447
Last Modified:Oct 26 04:49:50 2004
MD5 Checksum:1440ba6ea0c4b79e08fb07a0f48c63d1

 ///  File Name: 3comRouter.txt
Description:
Further information about flaws in 3COM's 3cradsl72 wireless router that suffers from information disclosure and authentication issues.
Author:Ivan Casado
File Size:1178
Last Modified:Oct 26 04:33:05 2004
MD5 Checksum:92bdd665868a442ebab801dfd5e0e6e3

 ///  File Name: dsa-567.txt
Description:
Debian Security Advisory 567-1 - Several problems have been discovered in libtiff, the Tag Image File Format library for processing TIFF graphics files. An attacker could prepare a specially crafted TIFF graphic that would cause the client to execute arbitrary code or crash.
Homepage:http://www.debian.org/security/
File Size:8785
Related CVE(s):CAN-2004-0803, CAN-2004-0804, CAN-2004-0886
Last Modified:Oct 26 04:30:56 2004
MD5 Checksum:f8adf6641a5d566b9e73c2796a42bc95

 ///  File Name: proftpd12x.txt
Description:
ProFTPD 1.2.x suffers from a vulnerability that allow for remote user enumeration. It is possible to determine which user names are valid, which are special, and which ones do not exist on the remote system. This can be accomplished by code execution path timing analysis attack at the ProFTPD login procedure.
Homepage:http://security.lss.hr/
File Size:4917
Last Modified:Oct 26 04:29:35 2004
MD5 Checksum:1aeaa1eb452e6441593f2ccfbff5242d

 ///  File Name: sa12844.txt
Description:
Secunia Security Advisory - Positive Technologies has reported some vulnerabilities in AliveSites Forum, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks.
Homepage:http://secunia.com/advisories/12844/
File Size:2040
Last Modified:Oct 26 04:27:17 2004
MD5 Checksum:3d22804c18563aff1ba32433cce68c38

 ///  File Name: sa12842.txt
Description:
Secunia Security Advisory - Positive Technologies has reported a vulnerability in CyberStrong eShop ASP Shopping Card, which can be exploited by malicious people to conduct cross-site scripting attacks.
Homepage:http://secunia.com/advisories/12842/
File Size:1833
Last Modified:Oct 26 04:26:44 2004
MD5 Checksum:e30bc73a973cf3c3a0b5a81b04e742cc

 ///  File Name: sa12841.txt
Description:
Secunia Security Advisory - Positive Technologies has reported some vulnerabilities in Dmxready Site Chassis Manager, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks.
Homepage:http://secunia.com/advisories/12841/
File Size:1982
Last Modified:Oct 26 04:26:06 2004
MD5 Checksum:1e85481ed48c153bd4eeb3e2b9ed5715

 ///  File Name: sa12843.txt
Description:
Secunia Security Advisory - Positive Technologies has reported some vulnerabilities in WowBB Forum, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks.
Homepage:http://secunia.com/advisories/12843/
File Size:2026
Last Modified:Oct 26 04:25:08 2004
MD5 Checksum:960c7aad7cf0f0d8339098792974ea1b

 ///  File Name: sa12840.txt
Description:
Secunia Security Advisory - Positive Technologies has reported some vulnerabilities in DevoyBB, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks.
Homepage:http://secunia.com/advisories/12840/
File Size:2031
Last Modified:Oct 26 04:23:06 2004
MD5 Checksum:42f165d7a397db11d83b316574a4afb3

 ///  File Name: sa12846.txt
Description:
Secunia Security Advisory - Karb0nOxyde has reported a security issue in 3Com OfficeConnect ADSL Wireless 11g Firewall Router, which can be exploited by malicious people to gain knowledge of sensitive information.
Homepage:http://secunia.com/advisories/12846/
File Size:1895
Last Modified:Oct 26 04:21:49 2004
MD5 Checksum:eea3a499d8c15eac2945a4dc832d36b8

 ///  File Name: asycpict.txt
Description:
Microsoft asycpict.dll 1.0 Remote JPEG DoS attack vulnerability and other flaws are discussed in this write up.
Author:John Bissell A.K.A. HighT1mes
File Size:14403
Last Modified:Oct 26 04:21:12 2004
MD5 Checksum:10acc97c4a51455b8665c79c631c4ed6

 ///  File Name: sa12839.txt
Description:
Secunia Security Advisory - Positive Technologies has reported a vulnerability in Express-Web Content Management System, which can be exploited by malicious people to conduct cross-site scripting attacks.
Homepage:http://secunia.com/advisories/12839/
File Size:1763
Last Modified:Oct 26 04:19:06 2004
MD5 Checksum:009a5f3d05b3baee8ba12a5517b4f949

 ///  File Name: glsa-200410-13.txt
Description:
Gentoo Linux Security Advisory GLSA 200410-13 - BNC contains an input validation flaw which might allow a remote attacker to issue arbitrary IRC related commands.
Homepage:http://security.gentoo.org/
File Size:2432
Last Modified:Oct 26 04:16:19 2004
MD5 Checksum:9a4be30a8c4de96951a0236e6de59143

 ///  File Name: sa12831.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in WeHelpBUS, which can be exploited by malicious people to compromise a user's system.
Homepage:http://secunia.com/advisories/12831/
File Size:1685
Last Modified:Oct 26 04:15:20 2004
MD5 Checksum:48bbcf43f734288da73efb1354fcac48

 ///  File Name: 271040.htm
Description:
Veritas Security Advisory - A security flaw which allows for potential unauthorized root access in VERITAS Cluster Server (tm) for all UNIX platforms has been discovered.
Homepage:http://seer.support.veritas.com/docs/271040.htm
File Size:24943
Last Modified:Oct 26 03:52:22 2004
MD5 Checksum:b9b392abfebb8fd4c9a04e793df865bf

 ///  File Name: sa12835.txt
Description:
Secunia Security Advisory - Positive Technologies has reported some vulnerabilities in Ideal BB, which can be exploited by malicious people to conduct SQL injection, cross-site scripting and HTTP response splitting attacks.
Homepage:http://secunia.com/advisories/12835/
File Size:2075
Last Modified:Oct 26 03:47:10 2004
MD5 Checksum:26a10956049d44db02beb46a9da2fdde

 ///  File Name: sa12834.txt
Description:
Secunia Security Advisory - Positive Technologies has reported a vulnerability in NatterChat, which can be exploited by malicious people to conduct SQL injection attacks. Certain unspecified input is not properly sanitized before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. The vulnerability has been reported in version 1.12 Final. Other versions may also be affected.
Homepage:http://secunia.com/advisories/12834/
File Size:1678
Last Modified:Oct 26 03:46:37 2004
MD5 Checksum:8b6abe89f2477cce400c2eb9bcb286b1

 ///  File Name: thepeakUpload.txt
Description:
thepeak File Upload version 1.3 suffers from file upload and path disclosure vulnerabilities.
Author:Justin_T
File Size:7772
Last Modified:Oct 26 03:43:00 2004
MD5 Checksum:f782cf568353814027bc803683ebd2e1

 ///  File Name: navRant.txt
Description:
Long rant plus proof of concept regarding how easy it is to bypass Norton Antivirus.
Author:Daniel Milisic
File Size:6297
Last Modified:Oct 26 03:40:24 2004
MD5 Checksum:269cc3b2870ca1095531c26324fba906

 ///  File Name: sa12828.txt
Description:
Secunia Security Advisory - An unspecified vulnerability with an unknown impact has been reported in KDocker 0.x.
Homepage:http://secunia.com/advisories/12828/
File Size:1399
Last Modified:Oct 26 03:32:51 2004
MD5 Checksum:5cbc95b21de2b79165fe37ff2283071a

 ///  File Name: sa12613.txt
Description:
Secunia Security Advisory - Secunia Research has discovered a vulnerability in Pinnacle ShowCenter, which can be exploited by malicious people to conduct cross-site scripting attacks.
Homepage:http://secunia.com/advisories/12613/
File Size:2159
Last Modified:Oct 26 03:30:03 2004
MD5 Checksum:4c9f464d37b0b5705697f4cf0d3dd059