Section:  .. / 0410-advisories  /

Page 9 of 11
<< 1 2 3 4 5 6 7 8 9 10 11 >> Files 200 - 225 of 254
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: sa12855.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in Gnofract 4D, which potentially can be exploited by malicious people to compromise a user's system.
Homepage:http://secunia.com/advisories/12855/
File Size:1773
Last Modified:Oct 26 05:22:09 2004
MD5 Checksum:5faa2638e47a49cb03ae6913a3336bbe

 ///  File Name: sa12857.txt
Description:
Secunia Security Advisory - Doubles has discovered a vulnerability in Unzoo, which potentially can be exploited by malicious people to compromise a user's system.
Homepage:http://secunia.com/advisories/12857/
File Size:1743
Last Modified:Oct 26 05:20:54 2004
MD5 Checksum:e7ae8b34e35cd0ccc6725b1713eb6131

 ///  File Name: sa12861.txt
Description:
Secunia Security Advisory - Zero X has discovered a vulnerability in Anaconda Foundation Directory, which can be exploited by malicious people to disclose sensitive information.
Homepage:http://secunia.com/advisories/12861/
File Size:2021
Last Modified:Oct 26 05:53:24 2004
MD5 Checksum:042675ddc178f05ab2f36fefd4cc4aa9

 ///  File Name: sa12862.txt
Description:
Secunia Security Advisory - A security issue has been reported in ClientExec, which can be exploited by malicious people to gain knowledge of various system information.
Homepage:http://secunia.com/advisories/12862/
File Size:1570
Last Modified:Oct 26 05:21:36 2004
MD5 Checksum:91743f7388545654aad8bde8611eff31

 ///  File Name: sa12880.txt
Description:
Secunia Security Advisory - Some vulnerabilities with an unknown impact have been reported in PBLang 4.x.
Homepage:http://secunia.com/advisories/12880/
File Size:1502
Last Modified:Oct 26 05:51:58 2004
MD5 Checksum:fb3cb40dde306e4c4dc0bb31e923353c

 ///  File Name: sa12881.txt
Description:
Secunia Security Advisory - Roger Sylvain has reported a vulnerability in Nortel Contivity VPN Client, potentially allowing malicious people to open a VPN tunnel to the client.
Homepage:http://secunia.com/advisories/12881/
File Size:2125
Last Modified:Oct 27 04:42:07 2004
MD5 Checksum:24587c615bb3ca2d06a6e56da6c48ac4

 ///  File Name: sa12882.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in cabextract, which potentially can be exploited to overwrite arbitrary files on a vulnerable system.
Homepage:http://secunia.com/advisories/12882/
File Size:1605
Last Modified:Oct 26 05:52:51 2004
MD5 Checksum:47364042e9ee2d7e4873a34f1ff4a8ea

 ///  File Name: sa12887.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in Gaim, which potentially can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error within the handling of MSN SLP messages. This can be exploited to cause a buffer overflow by supplying a specially crafted sequence of MSN SLP messages.
Homepage:http://secunia.com/advisories/12887/
File Size:2097
Last Modified:Oct 27 04:25:24 2004
MD5 Checksum:c9ff511efbf2de9dc8baecbb8e43d8e7

 ///  File Name: sa12895.txt
Description:
Secunia Security Advisory - HP has acknowledged a vulnerability in HP CIFS Server, which can be exploited by malicious users to access arbitrary files and directories.
Homepage:http://secunia.com/advisories/12895/
File Size:1656
Last Modified:Oct 27 04:27:56 2004
MD5 Checksum:3cefaf56e7b916d0df1cd6c37ee9da03

 ///  File Name: sa12896.txt
Description:
Secunia Security Advisory - HP has acknowledged a vulnerability in the Java Runtime Environment software for HP-UX, which can be exploited by untrusted applets to gain escalated privileges on a vulnerable system.
Homepage:http://secunia.com/advisories/12896/
File Size:1676
Last Modified:Oct 27 04:28:29 2004
MD5 Checksum:7e2cc6c9a869f035594eb833ca2fde5f

 ///  File Name: sa12909.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in Serendipity, which can be exploited by malicious people to conduct script insertion and cross-site scripting attacks.
Homepage:http://secunia.com/advisories/12909/
File Size:1873
Last Modified:Oct 27 04:56:28 2004
MD5 Checksum:dc31fe52bd039d06afae8e196c57a50c

 ///  File Name: sa12916.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in Speedtouch USB Driver, which potentially can be exploited by malicious, local users to gain escalated privileges.
Author:Max Vozeler
Homepage:http://secunia.com/advisories/12916/
File Size:1833
Last Modified:Oct 27 04:58:00 2004
MD5 Checksum:bd9eaac2e2cd8be12bcb3c9376cbb01e

 ///  File Name: sa12946.txt
Description:
Secunia Security Advisory - An vulnerability has been reported in HP Serviceguard, which potentially can be exploited by malicious people to compromise a vulnerable system.
Homepage:http://secunia.com/advisories/12946/
File Size:2034
Last Modified:Oct 27 05:35:21 2004
MD5 Checksum:43d715efe96a672010a370eea2eb9d7c

 ///  File Name: sa12955.txt
Description:
Secunia Security Advisory - Elac has discovered a vulnerability in dadaIMC, which can be exploited by malicious people to conduct script insertion attacks.
Homepage:http://secunia.com/advisories/12955/
File Size:2002
Last Modified:Oct 27 07:15:06 2004
MD5 Checksum:77df106892de12c6587988e06fc14b6f

 ///  File Name: sa12960.txt
Description:
Secunia Security Advisory - Some vulnerabilities have been reported in IPplan 3.x, which can be exploited by malicious people to conduct SQL injection attacks. Some unspecified input is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
Homepage:http://secunia.com/advisories/12960/
File Size:1626
Last Modified:Oct 27 06:37:42 2004
MD5 Checksum:1248fd5125a46b004a17187f34ca9179

 ///  File Name: sa12961.txt
Description:
Secunia Security Advisory - A vulnerability with an unknown impact has been reported in WindowMaker.
Homepage:http://secunia.com/advisories/12961/
File Size:1491
Last Modified:Oct 27 06:42:35 2004
MD5 Checksum:f7826b13f09f9482ad8322642affccc2

 ///  File Name: sa12963.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in LinuxStat, which can be exploited by malicious people to disclose sensitive information.
Homepage:http://secunia.com/advisories/12963/
File Size:1682
Last Modified:Oct 27 06:33:44 2004
MD5 Checksum:c6ceb25a8e5f06d686ae35457140640b

 ///  File Name: sa12969.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in Novell ZENworks for Desktops, which can be exploited by malicious, local users to gain escalated privileges. The vulnerability is caused due to the Remote Management Agent invoking the ZENworks Remote Control Help functionality with SYSTEM privileges. This can be exploited to execute arbitrary programs with escalated privileges.
Homepage:http://secunia.com/advisories/12969/
File Size:2007
Last Modified:Oct 27 07:34:44 2004
MD5 Checksum:a222fa04d6b6f7eb2cc756b8281629a7

 ///  File Name: sa12973.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in OpenSSL, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. The vulnerability is caused due to the der_chop script creating temporary files insecurely. This can be exploited via symlink attacks to create or overwrite arbitrary files with the privileges of the user executing the vulnerable. The vulnerability has been reported in versions 0.9.6m, 0.9.7d, and 0.9.7e. Other versions may also be affected.
Homepage:http://secunia.com/advisories/12973/
File Size:1906
Last Modified:Oct 27 07:31:54 2004
MD5 Checksum:9a5eb82b7b4b465cc57f27fe71b2c279

 ///  File Name: sa12980.txt
Description:
Secunia Security Advisory - Positive Technologies has reported some vulnerabilities in Phorum, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks.
Homepage:http://secunia.com/advisories/12980/
File Size:2013
Last Modified:Oct 27 07:33:31 2004
MD5 Checksum:3ae5e11887096bec6e6f4ad1d2287b7d

 ///  File Name: sa12992.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in Horde Application Framework, which potentially can be exploited by malicious people to conduct cross-site scripting attacks.
Homepage:http://secunia.com/advisories/12992/
File Size:1985
Last Modified:Oct 28 16:34:42 2004
MD5 Checksum:93de6ad2eb0e93396dd55d615aef5a6d

 ///  File Name: sa12995.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in ImageMagick, which potentially can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error within the EXIF parsing routine. This can be exploited to cause a buffer overflow via a malicious image file containing specially crafted EXIF information.
Homepage:http://secunia.com/advisories/12995/
File Size:1794
Last Modified:Oct 28 16:43:34 2004
MD5 Checksum:db6a7ca97913bc4817397b1dc241f713

 ///  File Name: sa13012.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in TortoiseCVS, which potentially can be exploited by malicious people to compromise a user's system.
Homepage:http://secunia.com/advisories/13012/
File Size:1633
Last Modified:Oct 30 00:38:24 2004
MD5 Checksum:ba15dbd95a63096553fabcec0b1640e3

 ///  File Name: sa13021.txt
Description:
Secunia Security Advisory - Colin Phipps has reported a vulnerability in catdoc, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges.
Homepage:http://secunia.com/advisories/13021/
File Size:1671
Last Modified:Oct 30 00:37:24 2004
MD5 Checksum:c02cb5d057e2f7972c76403e3000b251

 ///  File Name: sa13024.txt
Description:
Secunia Security Advisory - Ziv Kamir has discovered a vulnerability in Cyber Web Filter, which can be exploited by malicious people to bypass certain security restrictions.
Homepage:http://secunia.com/advisories/13024/
File Size:1849
Last Modified:Oct 30 00:21:55 2004
MD5 Checksum:8477225687e85738e935a31b52f578e4