Section:  .. / 0410-advisories  /

Page 10 of 11
<< 1 2 3 4 5 6 7 8 9 10 11 >> Files 225 - 250 of 254
Currently sorted by: File SizeSort By: File Name, Last Modified

 ///  File Name: sa12702.txt
Description:
Secunia Security Advisory - An unspecified security issue with an unknown impact has been reported in Kerio MailServer.
Homepage:http://secunia.com/advisories/12702/
File Size:1434
Last Modified:Oct 13 04:48:45 2004
MD5 Checksum:c0c2e581ae3f634665d84b9215e558df

 ///  File Name: cannonicalization.txt
Description:
Microsoft is currently investigating a reported vulnerability in Microsoft ASP.NET. An attacker can send specially crafted requests to the server and view secured content without providing the proper credentials. This reported vulnerability exists in ASP.NET and does not affect ASP.
File Size:1422
Last Modified:Oct 13 08:51:28 2004
MD5 Checksum:9a18dcdda0f1c08ba532d3ab35bc4c6f

 ///  File Name: sa12828.txt
Description:
Secunia Security Advisory - An unspecified vulnerability with an unknown impact has been reported in KDocker 0.x.
Homepage:http://secunia.com/advisories/12828/
File Size:1399
Last Modified:Oct 26 03:32:51 2004
MD5 Checksum:5cbc95b21de2b79165fe37ff2283071a

 ///  File Name: adobeReader6.txt
Description:
Version 6 of Adobe Acrobat has an issue with the way it handles embedding macromedia flash files directly into a pdf. This allows a malicious website operator to steal local files from a user's hard drive including cookie files.
Author:Jelmer
File Size:1392
Last Modified:Oct 13 10:40:54 2004
MD5 Checksum:afca4db1b05b72fc6565467b47db3c99

 ///  File Name: linuxRace.txt
Description:
Linux 2.6.9 fixes a set of race conditions in the Linux terminal subsystem which are believed to go back to 2.2 kernels if not earlier. The race shows up problematically in two places.
Author:Alan Cox
File Size:1390
Last Modified:Oct 27 04:38:19 2004
MD5 Checksum:5a2a6f231a171671c09eb5fb9804d236

 ///  File Name: cpanelChown.txt
Description:
cPanel 9.4.1 allows logged in users the ability to change ownership of any file to their uid:gid.
Author:Karol Wiesek
File Size:1381
Last Modified:Oct 26 05:03:21 2004
MD5 Checksum:aff8db13eba0ffc7582d45dc04418fd2

 ///  File Name: iis5x60.txt
Description:
Microsoft IIS 5.x and 6.0 suffer from a denial of service vulnerability regarding the WebDAV XML parser. An attacker can craft a malicious WebDAV PROPFIND request, which uses XML attributes in a way that inflicts a denial of service condition on the target machine (IIS web server). The result of this attack is that the XML parser consumes all the CPU resources for a long period of time (from seconds to minutes, depending on the size of the payload).
Author:Amit Klein, Ory Segal aka Watchfire
File Size:1354
Last Modified:Oct 13 10:46:38 2004
MD5 Checksum:d636fbfbfd62a943037a1b53f5ac87d5

 ///  File Name: serendipHTTP.txt
Description:
A HTTP Response Splitting vulnerability has been reported in Serendipity 0.7-beta4.
Author:Chaotic Evil
File Size:1338
Last Modified:Oct 27 05:09:15 2004
MD5 Checksum:db6a51a1b0c6c6234457ba964db7b11c

 ///  File Name: spider11.txt
Description:
A vulnerability has been discovered in the game spider version 1.1, an application contained in the Debian GNU/Linux distribution. The vulnerability allows a local attacker to gain elevated privileges by overflowing the -s parameter. Successful exploitation yields games group privileges.
Homepage:http://www.emuadmin.com
File Size:1273
Last Modified:Oct 13 05:10:18 2004
MD5 Checksum:e2f4720c4e853c91801f473322cbc6b9

 ///  File Name: maxpatrolXSS.txt
Description:
Invision Power Board version 2.0.0 is susceptible to cross site scripting attacks.
Homepage:http://www.maxpatrol.com
File Size:1239
Last Modified:Oct 13 05:54:38 2004
MD5 Checksum:9e10fdefbc05fb9c27cf7c3c946a8915

 ///  File Name: communXSS.txt
Description:
Various online German communities suffer from various cross site scripting flaws.
Author:Habonator
File Size:1233
Last Modified:Oct 27 06:22:45 2004
MD5 Checksum:161330d148f56f5a2f74fa7f3d8b29c6

 ///  File Name: wordpress12.txt
Description:
Wordpress 1.2 is susceptible to multiple cross site scripting flaws.
Author:Thomas Waldegger
File Size:1221
Last Modified:Oct 1 18:06:28 2004
MD5 Checksum:51650e6d818cf6a23d8fe7c15a23fb39

 ///  File Name: 3comRouter.txt
Description:
Further information about flaws in 3COM's 3cradsl72 wireless router that suffers from information disclosure and authentication issues.
Author:Ivan Casado
File Size:1178
Last Modified:Oct 26 04:33:05 2004
MD5 Checksum:92bdd665868a442ebab801dfd5e0e6e3

 ///  File Name: sct.xss.txt
Description:
Fusetalk SCT Campus Pipeline is susceptible to a cross site scripting flaw.
Author:Matthew Oyer
File Size:1127
Last Modified:Oct 24 23:30:47 2004
MD5 Checksum:db62e837dccc3e6649d51f639e06605d

 ///  File Name: ZanfiCmsLite.txt
Description:
ZanfiCmsLite is susceptible to remote file inclusion and path disclosure vulnerabilties.
Author:Cracklove
Homepage:http://ProxySky.com
File Size:1112
Last Modified:Oct 13 09:54:00 2004
MD5 Checksum:2d99712723916ab934c398b118aa02c9

 ///  File Name: msieLink.txt
Description:
Microsoft Internet Explorer 6.0.2800.1106 and possibly earlier versions fail to properly handle links embedded within links, allowing for spoofing of target addresses.
Author:Benjamin Tobias Franz
File Size:979
Last Modified:Oct 29 04:39:19 2004
MD5 Checksum:078b1a079d263c5f03c2b409266baf46

 ///  File Name: realplayer105.txt
Description:
Realplayer 10.5 permits execution of arbitrary code via a malformed skin.
Author:John Heasman
File Size:904
Last Modified:Oct 28 16:24:27 2004
MD5 Checksum:74f922327a4f7f3c19e3b46ae38d0143

 ///  File Name: php4curl.txt
Description:
PHP4 cURL functions bypass open_basedir protection allowing users to navigate through the filesystem.
Author:FraMe
Homepage:http://www.kernelpanik.org
File Size:865
Last Modified:Oct 28 16:53:43 2004
MD5 Checksum:426f895856b6e38fa2c921ed2bfb7aaf

 ///  File Name: dwcSQL.txt
Description:
dwc_articles versions 1.6 and below suffer from various SQL injection attacks.
Author:l0om
Homepage:http://www.excluded.org
File Size:853
Last Modified:Oct 27 05:56:52 2004
MD5 Checksum:c484862626521a28fa336229ddffa0a0

 ///  File Name: putty056.txt
Description:
PuTTY 0.56 fixes a serious security hole which can allow a server to execute code of its choice on a PuTTY client connecting to it.
File Size:831
Last Modified:Oct 28 16:23:00 2004
MD5 Checksum:90fc3823961fadf8492205f905db3eb3

 ///  File Name: xercesAmit.txt
Description:
Xerces-C++ versions below 2.6.0 allow an attacker to craft a malicious XML document using XML attributes in a way that inflicts a denial of service condition on the target machine.
Author:Amit Klein
File Size:825
Last Modified:Oct 13 05:05:32 2004
MD5 Checksum:cc1cf7946f46578c9b750ee4474e0a29

 ///  File Name: konqueror3221.txt
Description:
KDE Konqueror 3.2.2-1 is susceptible to cross site scripting flaws.
Author:yanosz
File Size:813
Last Modified:Oct 28 16:36:00 2004
MD5 Checksum:a45bfd3448999b6bb39c1eae2050456f

 ///  File Name: fusetalk.xss.txt
Description:
Fusetalk forum 4.0 is susceptible to a cross site scripting flaw due to a lack of filtering img tags.
Author:Matthew Oyer
File Size:792
Last Modified:Oct 24 23:31:57 2004
MD5 Checksum:460c89aa1e1e39e54f7c2497b73ba99c

 ///  File Name: quicktime.txt
Description:
A high risk vulnerability exists in Quicktime for Windows versions 6.5.2 and earlier.
Author:John Heasman
File Size:785
Last Modified:Oct 28 16:49:04 2004
MD5 Checksum:d978934420addf9429ed881546cfc168

 ///  File Name: lotusInject.txt
Description:
An attacker can bypass native Lotus Notes HTML encoding in a computed value by adding square brackets to the beginning and end of a field of the following types computed, computed for display, computed when composed or a computed text element, Injecting HTML and JavaScript as desired.
Author:Juan C Calderon
File Size:732
Last Modified:Oct 27 04:06:11 2004
MD5 Checksum:a530f3dbe467042b6de009436004101a