Section:  .. / 0411-advisories  /

Page 5 of 7
<< 1 2 3 4 5 6 7 >> Files 100 - 125 of 167
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: phpCMS121.txt
Description:
phpCMS versions 1.2.1 and below suffer from information disclosure and cross site scripting flaws.
Author:Cyrille Barthelemy
Homepage:http://www.cyrille-barthelemy.com
File Size:1907
Last Modified:Dec 11 23:03:57 2004
MD5 Checksum:b97ca5a9092ccc5324912daad7467f92

 ///  File Name: prevxhome.txt
Description:
Prevx Home's registry and buffer overflow protection features are implemented by hooking several native APIs in kernel-space by modifying entries within the SDT ServiceTable. This means that a malicious program with Administrator privilege can disable these features by restoring the running kernel's SDT ServiceTable with direct writes to \device\physicalmemory. Verified against Prevx Home Version 1.0 Build 2.1.0.0 on WinXP SP0, SP2.
Author:Tan Chew Keong
Homepage:http://www.security.org.sg/vuln/prevxhome.html
File Size:2726
Last Modified:Dec 11 19:16:26 2004
MD5 Checksum:986c79fd4f992cf251df0feb34f55926

 ///  File Name: qwik-smtpd.txt
Description:
Unl0ck Team Security Advisory - qwik-smtpd is susceptible to a format string vulnerability.
Author:Dark Eagle
Homepage:http://unl0ck.info/
File Size:1872
Last Modified:Nov 2 02:32:25 2004
MD5 Checksum:72d63649943c30e53555c1dd3cd54599

 ///  File Name: sa13031.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in haserl, which can be exploited by malicious people to manipulate critical environment variables. haserl executes shell scripts embedded in HTML documents using a cgi wrapper and sets all input parameters as environment variables. This could be exploited to cause certain programs and utilities to behave unexpectedly and potentially be exploited to execute arbitrary system commands. The vulnerability has been reported in version 0.5.1. Other versions may also be affected.
Homepage:http://secunia.com/advisories/13031/
File Size:1859
Last Modified:Nov 2 04:44:53 2004
MD5 Checksum:0be1dae9ae5d72fef17858127fcd8f88

 ///  File Name: sa13040.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in Caudium 1.x, which can be exploited by malicious people to cause a DoS (Denial of Service).
Homepage:http://secunia.com/advisories/13040/
File Size:1792
Last Modified:Nov 2 02:33:49 2004
MD5 Checksum:632fba5d62b0c0ebbdbf50c1446b79d5

 ///  File Name: sa13041.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in HTML::Merge, which can be exploited by malicious people to perform a directory traversal attack.
Homepage:http://secunia.com/advisories/13041/
File Size:1784
Last Modified:Nov 5 04:33:48 2004
MD5 Checksum:76d3d744e79d3412dedf92dae4c37e79

 ///  File Name: sa13047.txt
Description:
Secunia Security Advisory - A weakness has been discovered in Safari, which can be exploited by malicious people to trick users into visiting a malicious website by obfuscating URLs.
Homepage:http://secunia.com/advisories/13047/
File Size:1829
Last Modified:Nov 2 04:43:48 2004
MD5 Checksum:17c46a957820e94694856b045496034b

 ///  File Name: sa13062.txt
Description:
Secunia Security Advisory - A vulnerability with an unknown impact has been reported in MailEnable Professional.
Homepage:http://secunia.com/advisories/13062/
File Size:1493
Last Modified:Nov 5 04:46:26 2004
MD5 Checksum:9552e8514d85b0d94cdc1bec29e00e83

 ///  File Name: sa13065.txt
Description:
Secunia Security Advisory - Lyndon Dubeau has reported a security issue in NetGear FWAG114 ProSafe Dual Band Wireless VPN Firewall, which can be exploited by malicious people to read or manipulate configuration information. The problem is that it is not possible to disable the SNMP service nor change the default SNMP community strings. The problem has been reported in firmware release 1.0.26RC4. Other versions may also be affected.
Homepage:http://secunia.com/advisories/13065/
File Size:2180
Last Modified:Nov 5 04:50:45 2004
MD5 Checksum:ad00d6dbd8ed9d711edd223e8328d5f8

 ///  File Name: sa13071.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in Gallery, which can be exploited by malicious people to conduct script insertion attacks. Some unspecified input is not properly sanitised before being used. This can be exploited to inject arbitrary HTML and script code, which is executed in a user's browser session in context of an affected site when the malicious user data is viewed.
Homepage:http://secunia.com/advisories/13071/
File Size:2258
Last Modified:Nov 5 05:12:13 2004
MD5 Checksum:defbf0eb432caa1a5702da3935d28957

 ///  File Name: sa13073.txt
Description:
Secunia Security Advisory - Some vulnerabilities have been reported in Gbook MX, which can be exploited by malicious people to conduct SQL injection attacks. Gbook MX fails to verify input passed to various scripts properly before it is used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
Homepage:http://secunia.com/advisories/13073/
File Size:2080
Last Modified:Nov 5 05:09:59 2004
MD5 Checksum:7b5d24ef6e01f64d2d33ba9acb8cc978

 ///  File Name: sa13074.txt
Description:
Secunia Security Advisory - Two vulnerabilities have been reported in FsPHPGallery, which can be exploited by malicious people to cause a DoS (Denial of Service) and disclose system information.
Homepage:http://secunia.com/advisories/13074/
File Size:2355
Last Modified:Nov 5 05:10:37 2004
MD5 Checksum:8b25aa6c00e2789c264dd0f1de0575ae

 ///  File Name: sa13085.txt
Description:
Secunia Security Advisory - Isno has reported a vulnerability in CCProxy, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to a boundary error within the handling of HTTP requests. This can be exploited to cause a buffer overflow by sending an overly long HTTP GET request. Successful exploitation may allow execution of arbitrary code. The vulnerability has been reported in version 6.0. Other versions may also be affected.
Homepage:http://secunia.com/advisories/13085/
File Size:2119
Last Modified:Nov 12 05:18:45 2004
MD5 Checksum:f8e9e21468038e4d502605da4bf8a84c

 ///  File Name: sa13086.txt
Description:
Secunia Security Advisory - plonk has discovered a weakness in Mozilla and Thunderbird, which can be exploited by malicious people to enumerate valid email addresses.
Homepage:http://secunia.com/advisories/13086/
File Size:2259
Last Modified:Nov 5 05:14:16 2004
MD5 Checksum:2df221e5e4772fe05b8868596a49a010

 ///  File Name: sa13091.txt
Description:
Secunia Security Advisory - Some vulnerabilities have been reported in Moodle, which can be exploited by malicious people to conduct SQL injection attacks.
Homepage:http://secunia.com/advisories/13091/
File Size:2293
Last Modified:Nov 10 07:00:38 2004
MD5 Checksum:209acd160462d3e10dcbe14fb1c0ad2e

 ///  File Name: sa13093.txt
Description:
Secunia Security Advisory - Gemma Hughes has reported some vulnerabilities in MailPost, which can be exploited by malicious people to disclose some system information and conduct cross-site scripting attacks.
Homepage:http://secunia.com/advisories/13093/
File Size:3189
Last Modified:Nov 5 05:35:46 2004
MD5 Checksum:9d6230877ee15d2a760f8424ce98ab8b

 ///  File Name: sa13103.txt
Description:
Secunia Security Advisory - A vulnerability with an unknown impact has been reported in Sophos MailMonitor.
Homepage:http://secunia.com/advisories/13103/
File Size:2135
Last Modified:Nov 10 07:05:18 2004
MD5 Checksum:8e6abcac0e089a2f23c1fddef23f06d1

 ///  File Name: sa13104.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in JAF CMS, which can be exploited by malicious people to disclose sensitive information.
Homepage:http://secunia.com/advisories/13104/
File Size:2092
Last Modified:Nov 10 08:06:47 2004
MD5 Checksum:7d5b85212d50b3e130c1de3a00e485a1

 ///  File Name: sa13111.txt
Description:
Secunia Security Advisory - Two vulnerabilities have been reported in Mantis, which can be exploited by malicious users to gain knowledge of potentially sensitive information.
Homepage:http://secunia.com/advisories/13111/
File Size:2392
Last Modified:Nov 10 08:05:43 2004
MD5 Checksum:c9a2117b8e5b41023f61d07279ec52b8

 ///  File Name: sa13130.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in Samhain, which can be exploited by malicious, local users to gain escalated privileges. The vulnerability is caused due to a boundary error in the database update code. This can be exploited to cause a buffer overflow when a malicious directory is checked with Samhain. The vulnerability has been reported in versions 1.8.9 through 2.0.1.
Homepage:http://secunia.com/advisories/13130/
File Size:2283
Last Modified:Nov 10 08:34:00 2004
MD5 Checksum:7f879296efa6e2a310304673c46b41fe

 ///  File Name: sa13135.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in SQLgrey Postfix greylisting service, which can be exploited by malicious people to conduct SQL injection attacks.
Homepage:http://secunia.com/advisories/13135/
File Size:2060
Last Modified:Nov 10 08:35:33 2004
MD5 Checksum:9f6c9f8097901c09f79bec2c36439e3b

 ///  File Name: sa13136.txt
Description:
Secunia Security Advisory - Positive Technologies has reported some vulnerabilities in Nucleus, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks.
Homepage:http://secunia.com/advisories/13136/
File Size:2379
Last Modified:Nov 10 08:32:18 2004
MD5 Checksum:3af3c485ca5a0d0ccf2cde53bde350cf

 ///  File Name: sa13137.txt
Description:
Secunia Security Advisory - Positive Technologies has reported some vulnerabilities in Infuseum ASP Message Board, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks.
Homepage:http://secunia.com/advisories/13137/
File Size:2439
Last Modified:Nov 10 08:34:45 2004
MD5 Checksum:f7e2a463fa031151688e741ee7da1ed4

 ///  File Name: sa13160.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in MIMEsweeper for SMTP, which potentially can be exploited by malware to bypass the scanning functionality.
Homepage:http://secunia.com/advisories/13160/
File Size:2269
Last Modified:Nov 12 21:35:19 2004
MD5 Checksum:a984a574a2189bc9d38899655187bddb

 ///  File Name: sa13177.txt
Description:
Secunia Security Advisory - A vulnerability has been reported in UNARJ, which potentially can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error within the handling of long filenames in archives. This can be exploited to cause a buffer overflow by tricking a user into opening a malicious archive with a specially crafted path.
Homepage:http://secunia.com/advisories/13177/
File Size:2288
Last Modified:Nov 13 01:22:08 2004
MD5 Checksum:dcac0a9ac4e2f708cb05eb1652742ead