• Skip to main content
  • Skip to footer

Audit My PC - Free Internet Security Audit

Firewall Test and web tools to check your security and privacy

  • Firewall Test
  • Anti Spam
  • Internet Speed Test
  • Sitemap Generator
  • Whats My IP

Sun Java System Directory Server LDAP Bind Password Expiration Bypass

Network Security News – Thursday, October 27, 2005 Events

Sun Java System Directory Server LDAP Bind Password Expiration Bypass

Sun Java System Directory Server contains a flaw related to LDAP password expiration that may allow a malicious user with an expired password to perform LDAP operations (such as changing the user's phone number) as though the password were still valid, resulting in a loss of integrity.. Read more at osvdb.org/20313

Ethereal SLIMP3 Dissector Remote Overflow

Ethereal contains an unspecified flaw related to the SLIMP3 dissector that may allow an attacker to execute arbitrary code. No further details have been provided.. Read more at osvdb.org/20126

Ethereal SRVLOC Dissector Remote Overflow

A remote overflow exists in Ethereal. The SVRLOC dissector fails to validate user-supplied data to the byte_array array resulting in a buffer overflow. With a specially crafted request, an attacker can cause arbitrary code execution resulting in a loss of integrity.. Read more at osvdb.org/20137

Ethereal AgentX Dissector Remote Overflow

Ethereal contains an unspecified flaw related to a buffer overflow in the AgentX dissector that may allow an attacker to execute arbitrary code. No further details have been provided.. Read more at osvdb.org/20135

CubeCart index.php Multiple Variable XSS

CubeCart contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'searchStr' and 'redir' variables upon submission to the 'index.php' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.. Read more at osvdb.org/19860

CMS Made Simple index.php page Variable XSS

CMS Made Simple contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'page' variable upon submission to the 'index.php' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.. Read more at osvdb.org/19725

CubeCart cart.php redir Variable XSS

CubeCart contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'redir' variable upon submission to the 'cart.php' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.. Read more at osvdb.org/19861

CjWeb2Mail web2mail.php emsg Variable XSS

CJWeb2Mail contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'emsg' variable upon submission to the 'web2mail.php' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.. Read more at osvdb.org/19498

Tellme whois Function Arbitrary Command Option Execution

Tellme contains a flaw that allows a remote attacker to execute arbitrary commands. This flaw exists because the application does not validate the 'q_Host' variable upon submission to the 'index.php' script, which may allow a remote attacker to access and execute arbitrary 'whois' command options resulting in a loss of integrity.. Read more at osvdb.org/19871

Tellme index.php q_Host Variable XSS

Tellme contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'q_Host' variable upon submission to the 'index.php' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.. Read more at osvdb.org/19870

Vuln: Ethereal IRC Protocol Dissector Denial of Service Vulnerability

Ethereal IRC Protocol Dissector Denial of Service Vulnerability. Read more at securityfocus.com/bid/15219

Vuln: Info-ZIP UnZip CHMod File Permission Modification Race Condition Weakness

Info-ZIP UnZip CHMod File Permission Modification Race Condition Weakness. Read more at securityfocus.com/bid/14450

Reader Interactions

Leave a Reply

Your email address will not be published. Required fields are marked *

Footer

Miscellaneous

  • Free Address Finder
  • HTML Encoder Decoder
  • Website Monitoring
  • Whats My IP Address?
  • Yes or No

Copyright © 2001-2024 Audit My PC .com All Rights Reserved. Our Privacy Policy and TOS

  • About
  • Acronyms
  • DLL Files
  • Ports
  • Computer Security News
  • Email Scams & Spam
  • Internet Safety
  • Free Software