Section:  .. / 0412-advisories  /

Page 8 of 11
<< 1 2 3 4 5 6 7 8 9 10 11 >> Files 175 - 200 of 253
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: sa13576.txt
Description:
Secunia Security Advisory - Some vulnerabilities have been reported in PHPFormMail, which can be exploited by malicious people to conduct cross-site scripting attacks.
Homepage:http://secunia.com/advisories/13576/
File Size:1868
Last Modified:Dec 31 10:27:19 2004
MD5 Checksum:3522011c483948903568133734ac6b8e

 ///  File Name: ieTrick.txt
Description:
Internet Explorer will accept %0a and %0d in URLs. In FTP URLs, it will accept them in the username part of the URL. Due to the similarity between the FTP and SMTP protocols, this can be used to send mail.
Author:Albert Puigsech Galicia
File Size:1862
Last Modified:Dec 31 23:04:48 2004
MD5 Checksum:ee66b2e6d49b546793170520a819053e

 ///  File Name: sa13679.txt
Description:
Secunia Security Advisory - A vulnerability in aStats can be exploited by malicious, local users to perform certain actions on a vulnerable system to gain escalated privileges.
Homepage:http://secunia.com/advisories/13679/
File Size:1855
Last Modified:Jan 2 21:05:53 2005
MD5 Checksum:5e99e06d49c8e5d32d24af52f548f05a

 ///  File Name: rtf2latex2e.txt
Description:
A buffer overflow in the ReadFontTbl() function of rtf2latex2e version 1.0fc2 allows for arbitrary code execution.
Author:Limin Wang
Homepage:http://tigger.uic.edu/~jlongs2/holes/rtf2latex2e.txt
File Size:1855
Last Modified:Dec 30 11:06:09 2004
MD5 Checksum:078d428f64800e2f85bab6f0a7c95ec9

 ///  File Name: sa13414.txt
Description:
Secunia Security Advisory - Some vulnerabilities have been reported in PHP Gift Registry, which can be exploited by malicious people to conduct cross-site scripting attacks.
Homepage:http://secunia.com/advisories/13414/
File Size:1849
Last Modified:Dec 12 20:23:17 2004
MD5 Checksum:dd71e8f9a2d40f67a5ca17a68e8339a8

 ///  File Name: sa13640.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in LPRng, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges.
Homepage:http://secunia.com/advisories/13640/
File Size:1836
Last Modified:Dec 31 22:10:19 2004
MD5 Checksum:aaf8d5f6b9983a156884f386aee0329e

 ///  File Name: ringtonetools.txt
Description:
Ringtone Tools version 2.22 is susceptible to a buffer overflow in the parse_emelody() function.
Author:Qiao Zhang
File Size:1831
Last Modified:Dec 30 21:48:54 2004
MD5 Checksum:49c072a2956cb35e4660bdb38e148aa6

 ///  File Name: abcm2ps.txt
Description:
A boundary error condition in the put_words() function of abcm2ps version 3.7.20 allows for arbitrary code execution.
Author:Limin Wang
Homepage:http://tigger.uic.edu/~jlongs2/holes/abcm2ps.txt
File Size:1831
Last Modified:Dec 30 10:39:18 2004
MD5 Checksum:54e0f622e9324e40942a6ebaf0eb7e71

 ///  File Name: sa13357.txt
Description:
Secunia Security Advisory - Stefan Esser has reported a vulnerability in Serendipity, which can be exploited by malicious people to conduct cross-site scripting attacks.
Homepage:http://secunia.com/advisories/13357/
File Size:1821
Last Modified:Dec 12 01:11:32 2004
MD5 Checksum:8d2d825016d47fb11ef013ab42557910

 ///  File Name: sa13411.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in MIMEsweeper for SMTP, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to an error within the Security Service when processing PDF files. This can be exploited to crash the Security Service by sending an email containing a specially crafted PDF file as attachment.
Homepage:http://secunia.com/advisories/13411/
File Size:1813
Last Modified:Dec 12 20:35:46 2004
MD5 Checksum:37bc617883490e598c5a3c806b5700ba

 ///  File Name: sa13665.txt
Description:
Secunia Security Advisory - snilabs has reported a security issue in PHP-Blogger, which can be exploited by malicious people to disclose sensitive information. The problem is that database files (.db) by default are stored inside the web root and are not correctly protected against being accessed directly on some server configurations. This can e.g. be exploited to disclose the admin password.
Homepage:http://secunia.com/advisories/13665/
File Size:1812
Last Modified:Jan 1 03:33:38 2005
MD5 Checksum:7af97deecc344ef6c750029906b994df

 ///  File Name: db223122004K.txt
Description:
NGSSoftware Insight Security Research Advisory #NISR2122004J - IBM's DB2 database server contains a function, rec2xml, used to format a string in XML. This function suffers from a stack based buffer overflow vulnerability. Systems Affected: DB2 8.1/7.x.
Author:Mark Litchfield
Homepage:http://www.ngssoftware.com/advisories/db223122004K.txt
File Size:1807
Last Modified:Dec 31 22:52:56 2004
MD5 Checksum:8131309f4210d2ed68cd045c14a04b82

 ///  File Name: sa13593.txt
Description:
Secunia Security Advisory - A weakness has been reported in Symantec Brightmail AntiSpam, which can be exploited by malicious people to cause a DoS (Denial of Service).
Homepage:http://secunia.com/advisories/13593/
File Size:1805
Last Modified:Dec 31 19:49:24 2004
MD5 Checksum:f7d8154710f751777c8dfd4f450e4c4f

 ///  File Name: sa13600.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in Namazu, which can be exploited by malicious people to conduct cross-site scripting attacks.
Homepage:http://secunia.com/advisories/13600/
File Size:1798
Last Modified:Dec 31 19:41:31 2004
MD5 Checksum:c66462ab3c216bd5290c1ebbeb3eca87

 ///  File Name: sa13566.txt
Description:
Secunia Security Advisory - Bennett R. Samowich has discovered a security issue in Crypt::ECB, which makes it easier for malicious people to brute force passwords. The security issue is caused due to an error, where plain texts containing the ASCII character 0 is incorrectly encoded. This results in a weaker encryption and encoding collisions and may e.g. make it easier to brute force passwords. The issue has been confirmed on version 1.1. Other versions may also be affected.
Homepage:http://secunia.com/advisories/13566/
File Size:1797
Last Modified:Dec 31 19:55:24 2004
MD5 Checksum:27599e3eb5db6bf62855c6c1bff2ec96

 ///  File Name: xine-lib.txt
Description:
A boundary error condition in xine-lib versions 1-rc5 and 1-rc7 allows for arbitrary code execution.
Author:Ariel Berkman
Homepage:http://tigger.uic.edu/~jlongs2/holes/xine-lib.txt
File Size:1793
Last Modified:Dec 30 10:28:38 2004
MD5 Checksum:ff26c74368757ae959f8e15478702404

 ///  File Name: vilistextum.txt
Description:
Vilistextum version 2.6.6 is susceptible to a buffer overflow in the get_attr() function.
Author:Ariel Berkman
File Size:1792
Last Modified:Dec 30 22:04:55 2004
MD5 Checksum:bf08708a98b0a42384791a1dce9df5fd

 ///  File Name: advisory-20041223-1.txt
Description:
KDE Security Advisory: kpdf, the KDE pdf viewer, shares code with xpdf. xpdf contains a buffer overflow that can be triggered by a specially crafted PDF file.
Homepage:http://www.kde.org/info/security/advisory-20041223-1.txt
File Size:1789
Related CVE(s):CAN-2004-1125
Last Modified:Dec 31 22:05:55 2004
MD5 Checksum:4cc8f052407c343665cb29f837bd73a6

 ///  File Name: sa13360.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in Jakarta Lucene, which can be exploited by malicious people to conduct cross-site scripting attacks.
Homepage:http://secunia.com/advisories/13360/
File Size:1783
Last Modified:Dec 12 02:44:34 2004
MD5 Checksum:04d89966f2280c04d22517e747f0fc3b

 ///  File Name: sa13374.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in Kerio WinRoute Firewall, which can be exploited by malicious people to poison the DNS cache. The vulnerability is caused due to an unspecified error and can be exploited to insert fake information in the DNS cache. The vulnerability has been reported in version 6.0.8. Prior versions may also be affected.
Homepage:http://secunia.com/advisories/13374/
File Size:1778
Last Modified:Dec 12 20:36:48 2004
MD5 Checksum:7f8ea855570cd448937efcd3404fea52

 ///  File Name: sa13393.txt
Description:
Secunia Security Advisory - A security issue has been reported in Codestriker, which can be exploited by malicious users to bypass certain security restrictions.
Homepage:http://secunia.com/advisories/13393/
File Size:1776
Last Modified:Dec 12 20:00:09 2004
MD5 Checksum:63d7b1983bd3c26867b33f436238ae2a

 ///  File Name: sa13630.txt
Description:
Secunia Security Advisory - First Last has reported a weakness in CleanCache, which can be exploited by malicious people to disclose securely deleted data on a disk.
Homepage:http://secunia.com/advisories/13630/
File Size:1775
Last Modified:Jan 2 20:29:40 2005
MD5 Checksum:c4d38c96b00eabde9c68c7519a045417

 ///  File Name: oracle23122004F.txt
Description:
NGSSoftware Insight Security Research Advisory #NISR2122004F - The 10g Oracle TNS Listener is vulnerable to a denial of service vulnerability. Systems Affected: Oracle 10g on all operating systems.
Author:David Litchfield
Homepage:http://www.ngssoftware.com/advisories/oracle23122004F.txt
File Size:1766
Last Modified:Dec 31 22:44:50 2004
MD5 Checksum:a6738a6d54561303d7c502149fc7f788

 ///  File Name: sa13438.txt
Description:
Secunia Security Advisory - Ziv Kamir has reported a weakness in WinMail Server, which can be exploited by malicious people to disclose certain system information.
Homepage:http://secunia.com/advisories/13438/
File Size:1762
Last Modified:Dec 30 07:22:33 2004
MD5 Checksum:316650858ffaa3e89db33e3c8a813b8c

 ///  File Name: oracle23122004J.txt
Description:
NGSSoftware Insight Security Research Advisory #NISR2122004J - The code for PL/SQL procedures can be encrypted or wrapped to use the Oracle term. When a wrapped procedure is created a buffer overflow vulnerability can be triggered. Systems Affected: Oracle 10g/9i on all operating systems.
Author:David Litchfield
Homepage:http://www.ngssoftware.com/advisories/oracle23122004J.txt
File Size:1761
Last Modified:Dec 31 22:51:14 2004
MD5 Checksum:d97ff3e3a1a5717cb97dfbedcec74635