what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 100 RSS Feed

Files

Joomla BookLibrary Four SQL Injection
Posted Jul 1, 2010
Site secunia.com

Secunia Research has discovered multiple vulnerabilities in the BookLibrary component for Joomla, which can be exploited by malicious people to conduct SQL injection attacks. BookLibrary version 1.5.3 Basic is affected.

tags | advisory, vulnerability, sql injection
advisories | CVE-2010-1522
SHA-256 | 79e62e777c42c0442c253d71a69a21bb09fee2f843737ff0ba50757ab43d1fe8

Related Files

secunia-aolcddb.txt
Posted Dec 11, 2006
Authored by Carsten Eiram | Site secunia.com

Secunia Research has discovered a vulnerability in AOL, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error in the "CDDBControlAOL.CDDBAOLControl" ActiveX control (cddbcontrol.dll) when processing "ClientId" arguments passed to the "SetClientInfo()" method. This can be exploited to cause a stack-based buffer overflow by passing an overly long string (more than 256 bytes). Successful exploitation allows execution of arbitrary code when a user visits a malicious website with Internet Explorer. In order to exploit the vulnerability, a certain registry value has to be set to "1111". This is not set by default, but can be set up automatically by first instantiating the bundled CerberusCDPlayer ActiveX control. Affected software includes America Online 7.0 revision 4114.563, AOL 8.0 revision 4129.230, and AOL 9.0 Security Edition revision 4156.910.

tags | advisory, overflow, arbitrary, registry, activex
SHA-256 | e3b72455fae8d556eade84f6b95183d9fb3856484b23d09de4ad46012248b887
secunia-borland.txt
Posted Dec 6, 2006
Authored by JJ Reyes | Site secunia.com

Secunia Research has discovered a vulnerability in Borland products, which can be exploited by malicious people to compromise a vulnerable system. Borland idsql32.dll versions 5.1.0.4 (as used by RevilloC MailServer) and 5.2.0.2 as included with Borland Developer Studio 2006 are affected. Other versions may also be affected. The vulnerability is caused due to a boundary error in idsql32.dll when processing SQL statements using the "DbiQExec()" function. This can be exploited to cause a heap-based buffer overflow via an overly long SQL statement (more than 4000 bytes).

tags | advisory, overflow
SHA-256 | 09e6cf310cbb76af6a9fbf44ffae2569a37d8536a0df6dab6db3e695bd0abee8
secunia-aol.txt
Posted Aug 27, 2006
Authored by Carsten Eiram | Site secunia.com

Secunia Research has discovered a security issue in AOL, which can be exploited by malicious, local users to manipulate arbitrary files. The problem is that AOL sets insecure default permissions (grants "Everyone" group "Full Control") on the "America Online 9.0" directory and all child objects. This can be exploited to remove, manipulate, and replace any of the application's files.

tags | advisory, arbitrary, local
SHA-256 | 7be11af21a27703c6db82025cbfe982e4cd9379f5538e5cc9ebd858f45c303b2
secunia-AutoVue.txt
Posted Jul 28, 2006
Authored by Tan Chew Keong | Site secunia.com

Secunia Research has discovered a vulnerability in AutoVue SolidModel Professional Desktop Edition, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to a boundary error within the handling of ARJ, RAR, and ZIP archives. This can be exploited to cause a stack-based buffer overflow when a malicious archive containing a file with an overly long filename is opened. Successful exploitation allows execution of arbitrary code. AutoVue SolidModel Professional Desktop Edition version 19.1 Build 5993 is affected. Other versions may also be affected.

tags | advisory, overflow, arbitrary
advisories | CVE-2006-3350
SHA-256 | e93adff3a8f625d54d58dc9486926383f88de6f10f23d5b6f9a008feef926f49
secunia-BitZipper.txt
Posted Jul 20, 2006
Site secunia.com

Secunia Research has discovered a vulnerability in BitZipper, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error in UNACEV2.DLL when extracting an ACE archive containing a file with an overly long filename. This can be exploited to cause a stack-based buffer overflow when a user extracts a specially crafted ACE archive. BitZipper version 4.1 SR-1 is affected.

tags | advisory, overflow
advisories | CVE-2005-2856
SHA-256 | 7fdb872ca2833cabf09fea315d78509c20750c1c879788b34c7cc8be31075bed
secunia-deluxebb.txt
Posted Jun 21, 2006
Authored by Andreas Sandblad | Site secunia.com

Secunia Research has discovered some vulnerabilities in DeluxeBB version 1.06, which can be exploited by malicious people to conduct SQL injection attacks and compromise a vulnerable system.

tags | exploit, vulnerability, sql injection
advisories | CVE-2006-2914, CVE-2006-2915
SHA-256 | dabd3850dcb181b78f640f41286930158f735aa2641bb4e983e057e7c47f4b6b
secunia-cmsMundo.txt
Posted Jun 21, 2006
Authored by Andreas Sandblad | Site secunia.com

Secunia Research has discovered two vulnerabilities in CMS Mundo version 1.0 build 007, which can be exploited by malicious people to conduct SQL injection attacks and compromise a vulnerable system.

tags | advisory, vulnerability, sql injection
advisories | CVE-2006-2911, CVE-2006-2931
SHA-256 | c01cb438a40a860be28eb49b660964a6dcff479b929e888513af815a54a05093
secunia-AutoMate.txt
Posted Jun 12, 2006
Site secunia.com

Secunia Research has discovered a vulnerability in AutoMate version 6.1.0.0, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error in UNACEV2.DLL when extracting an ACE archive containing a file with an overly long filename. This can be exploited to cause a stack-based buffer overflow when a user extracts a specially crafted ACE archive.

tags | advisory, overflow
advisories | CVE-2005-2856
SHA-256 | 52e044d4c6394bb5428d5aa19fb3a82863f00449b983f5a0bc10b0067841ca60
secunia-CAM.txt
Posted May 22, 2006
Authored by Tan Chew Keong | Site secunia.com

Secunia Research has discovered a vulnerability in CAM UnZip versions 4.0 and 4.3, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error when listing the contents of a ZIP archive. This can be exploited to cause a stack-based buffer overflow when a malicious ZIP archive containing a file with an overly long filename is opened.

tags | advisory, overflow
advisories | CVE-2006-2161
SHA-256 | 15e13f5a99e65b3adbc306a4ea2fa32d802e0121972b3078e9f2fecd56fb97b1
secunia-Eazel.txt
Posted May 22, 2006
Site secunia.com

Secunia Research has discovered a vulnerability in Eazel version 1.0, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error in ztvunacev2.dll (UNACEV2.DLL) when extracting an ACE archive containing a file with an overly long filename. This can be exploited to cause a stack-based buffer overflow when a user extracts a specially crafted ACE archive.

tags | advisory, overflow
advisories | CVE-2005-2856
SHA-256 | 6e456760da60d76c4f1ce8d66aef6fa2a1e5bf87c7d8f535aa769d262c1a5584
secunia-Abakt.txt
Posted May 22, 2006
Authored by Tan Chew Keong | Site secunia.com

Secunia Research has discovered a vulnerability in Abakt, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error when listing the contents of a ZIP archive. This can be exploited to cause a stack-based buffer overflow when a malicious ZIP archive containing a file with an overly long filename is opened. Versions 0.9.2 and 0.9.3-beta1 are affected.

tags | advisory, overflow
advisories | CVE-2006-2161
SHA-256 | 67471673445159616ecc2805692c08221a6e6eceb4b399e199f2b6db8e227996
secunia-anti.txt
Posted May 9, 2006
Site secunia.com

Secunia Research has discovered a vulnerability in Anti-Trojan version 5.5.421, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error in UNACEV2.DLL when extracting an ACE archive containing a file with an overly long filename. This can be exploited to cause a stack-based buffer overflow when a user scans a specially crafted ACE archive.

tags | advisory, overflow, trojan
advisories | CVE-2005-2856
SHA-256 | b004e09b97667279cf951bdcf7c770c81f941af8129fc0aa335826759577e51c
Secunia-Adobe.txt
Posted Apr 19, 2006
Site secunia.com

Secunia Advisory 13/04/2006 - Adobe Document Server for Reader Extensions Multiple Vulnerabilities

tags | advisory, vulnerability
SHA-256 | a3337d74ce3e7f7d86956b521ab2ed6bba9f699ed9207943d08bfdd241f2ce26
secunia-an-httpd.txt
Posted Apr 6, 2006
Site secunia.com

Secunia Research 03/04/2006 - AN HTTPD Script Source Disclosure Vulnerability - The vulnerability is caused due to a validation error of the filename extension supplied by the user in the URL. This can be exploited to retrieve the source code of script files (e.g. PL, CGI, and BAT) from the server via specially crafted requests containing dot and space characters.

tags | advisory, cgi
SHA-256 | 3168e45f9455ce990326326f5827fc180003afd049d6d88213c158675d75fbe9
secunia-Blazix.txt
Posted Apr 1, 2006
Authored by Tan Chew Keong | Site secunia.com

Secunia Research has discovered a vulnerability in Blazix, which can be exploited by malicious people to disclose potentially sensitive information. The vulnerability is caused due to a validation error of the filename extension supplied by the user in the URL. This can be exploited to retrieve the source code of JSP files from the server via specially crafted requests containing dot, space, and slash characters. Version 1.2.5 is affected.

tags | advisory
SHA-256 | 3604e084018ebac5c828858ccaf9a13fdb6c16dd20d3d34b1392abab5ccb8b31
secunia-Adobe.txt
Posted Mar 15, 2006
Site secunia.com

Secunia Research 15/03/2006 - Adobe Document/Graphics Server File URI Resource Access - Secunia Research has discovered a vulnerability in Adobe Document Server and Adobe Graphics Server, which can be exploited by malicious people to gain knowledge of potentially sensitive information, overwrite arbitrary files, or compromise a vulnerable system.

tags | advisory, arbitrary
SHA-256 | f0e330f89ef6b6e06446d2c5d3d1e6a46994797ef6eeba88e2d2a73c0755ea67
secunia-dwarf.txt
Posted Mar 13, 2006
Site secunia.com

Secunia Research has discovered two vulnerabilities in Dwarf HTTP Server, which can be exploited by malicious people to disclose potentially sensitive information and to conduct cross-site scripting attacks.

tags | advisory, web, vulnerability, xss
SHA-256 | ae88c420d91c740fea3b205334cd447742a2fc54a2bdc918ff07f6418bc02894
secunia-ArGoSoft.txt
Posted Mar 2, 2006
Site secunia.com

Secunia Research has discovered a vulnerability in ArGoSoft Mail Server Pro, which can be exploited by malicious people to conduct script insertion attacks. ArGoSoft Mail Server Pro version 1.8.8.5 is affected. Earlier versions may also be affected.

tags | advisory
SHA-256 | 455394478eab464bfee5faea35ff3a9da617d60b91b89c9b5632c2ba4fcde5f7
secunia-ADOdb.txt
Posted Jan 10, 2006
Authored by Andreas Sandblad | Site secunia.com

Secunia Research has discovered two security issues in ADOdb, which can be exploited by malicious people to disclose system information, execute arbitrary SQL code, and potentially compromise a vulnerable system. Details provided. ADOdb versions 4.66 and 4.68 for PHP are affected.

tags | exploit, arbitrary, php
SHA-256 | a212b5763393fa5ec35a8dfe35d726cc4f7c2a8000c581074fd8516fbf88411b
secunia-ATutor.txt
Posted Oct 30, 2005
Authored by Andreas Sandblad | Site secunia.com

Secunia Research has discovered some vulnerabilities in ATutor, which can be exploited by malicious people to conduct cross-site scripting attacks, disclose sensitive information, and compromise a vulnerable system. The vulnerabilities have been confirmed in version 1.5.1-pl1. Other versions may also be affected.

tags | exploit, vulnerability, xss
SHA-256 | ea4981890b687d4caff07c6b7157202c331ffe371d5cb42efe41a196ad0226d2
secunia-Ahnlab-2.txt
Posted Oct 15, 2005
Authored by Tan Chew Keong | Site secunia.com

Secunia Research has discovered a vulnerability in AhnLab V3 Antivirus, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to a boundary error in the archive decompression library when reading the filename of a compressed file from an ALZ, UUE or XXE archive. This can be exploited to cause a stack-based buffer overflow (ALZ), or a heap-based buffer overflow (UUE/XXE), when a malicious ALZ/UUE/XXE archive is scanned. Successful exploitation allows arbitrary code execution, but requires that compressed file scanning is enabled.

tags | advisory, overflow, arbitrary, code execution, xxe
SHA-256 | 0bff14116cee96edd9a96cde5a18e497ac854da9b5c70332dd7da845b1b46b5d
secunia-ALZip.txt
Posted Oct 6, 2005
Authored by Tan Chew Keong | Site secunia.com

Secunia Research has discovered a vulnerability in ALZip, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to multiple boundary errors when reading the filename of a compressed file from ALZ, ARJ, ZIP, UUE or XXE archives. This can be exploited to cause a stack-based buffer overflow (ALZ), or a heap-based buffer overflow (ARJ / ZIP / UUE / XXE). Successful exploitation allows execution of arbitrary code when a malicious ALZ / ARJ archive is opened, or when a ZIP / UUE / XXE archive is extracted.

tags | advisory, overflow, arbitrary, xxe
SHA-256 | bffe2f2d11e5e5ac7d2a13dfed0e4b832c4f3cf66166441b3fe900aaf6803f3a
secunia-7zip.txt
Posted Sep 24, 2005
Authored by Tan Chew Keong | Site secunia.com

Secunia Research has discovered a vulnerability in 7-Zip, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error when handling an ARJ block that is larger than 2600 bytes. This can be exploited to cause a stack-based buffer overflow when a specially crafted ARJ file is opened. Successful exploitation allows arbitrary code execution. Affected versions are: 7-Zip Version 3.13, 4.23, and 4.26 BETA.

tags | advisory, overflow, arbitrary, code execution
SHA-256 | 21f735293b5f28bb27d6b63dd540c87041eb152dc9e1fbffb657bd18d8139676
secunia-Ahnlab.txt
Posted Sep 20, 2005
Authored by Secunia Research | Site secunia.com

Ahnlab V3 Antivirus suffers from multiple vulnerabilities including privilege escalation and security bypass.

tags | advisory, vulnerability
SHA-256 | 2ae763edf25b4f62ff2f3ef50c76412d6dae1da0517c6a1e8125b2eeb7569a1b
secunia-b2evolution.txt
Posted Sep 10, 2003
Site secunia.com

Secunia Security Advisory - b2evolution versions 0.8.2 and prior have been found vulnerable to cross site scripting and SQL injection attacks.

tags | advisory, xss, sql injection
SHA-256 | 59a5b8a155051613d73dfe8647ac6f7c5dac547fe83ce6caad2ad5b13bf62dbf
Page 4 of 4
Back1234Next

File Archive:

March 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    13 Files
  • 3
    Mar 3rd
    15 Files
  • 4
    Mar 4th
    0 Files
  • 5
    Mar 5th
    0 Files
  • 6
    Mar 6th
    16 Files
  • 7
    Mar 7th
    31 Files
  • 8
    Mar 8th
    16 Files
  • 9
    Mar 9th
    13 Files
  • 10
    Mar 10th
    9 Files
  • 11
    Mar 11th
    0 Files
  • 12
    Mar 12th
    0 Files
  • 13
    Mar 13th
    10 Files
  • 14
    Mar 14th
    6 Files
  • 15
    Mar 15th
    17 Files
  • 16
    Mar 16th
    22 Files
  • 17
    Mar 17th
    13 Files
  • 18
    Mar 18th
    0 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    16 Files
  • 21
    Mar 21st
    13 Files
  • 22
    Mar 22nd
    5 Files
  • 23
    Mar 23rd
    6 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close