• Skip to main content
  • Skip to footer

Audit My PC - Free Internet Security Audit

Firewall Test and web tools to check your security and privacy

  • Firewall Test
  • Anti Spam
  • Internet Speed Test
  • Sitemap Generator
  • Whats My IP

Help Center Live chat_download.php fid Variable SQL Injection

Network Security News – Thursday, May 19, 2005 Events

Help Center Live chat_download.php fid Variable SQL Injection

Help Center Live contains a flaw that may allow an attacker to inject arbitrary SQL queries. The issue is due to the 'fid' variable in the chat_download.php script not being properly sanitized and may allow an attacker to inject or manipulate SQL queries.. Read more at osvdb.org/16658

Help Center Live icon.php status Variable SQL Injection

Help Center Live contains a flaw that may allow an attacker to inject arbitrary SQL queries. The issue is due to the 'status' variable in the icon.php script not being properly sanitized and may allow an attacker to inject or manipulate SQL queries.. Read more at osvdb.org/16657

Help Center Live download.php fid Variable SQL Injection

Help Center Live contains a flaw that may allow an attacker to inject arbitrary SQL queries. The issue is due to the 'fid' variable in the download.php script not being properly sanitized and may allow an attacker to inject or manipulate SQL queries.. Read more at osvdb.org/16656

Help Center Live view.php tid Variable SQL Injection

Help Center Live contains a flaw that may allow an attacker to inject arbitrary SQL queries. The issue is due to the 'tid' variable in the view.php script not being properly sanitized and may allow an attacker to inject or manipulate SQL queries.. Read more at osvdb.org/16655

Help Center Live faq/index.php id Variable SQL Injection

Help Center Live contains a flaw that may allow an attacker to inject arbitrary SQL queries. The issue is due to the 'id' variable in the faq/index.php script not being properly sanitized and may allow an attacker to inject or manipulate SQL queries.. Read more at osvdb.org/16654

Help Center Live view.php Cross Site Forgery

Help Center Live contains a flaw that may allow an attacker to execute arbitrary commands with elevated privileges. The issue is due to the application running user-supplied commands under the trust relationship between the server hosting the application and another machine. By embedding commands or URLs in an IMG tag, a user clicking on it may execute the command or establish a connection with a higher trust relationship than intended.. Read more at osvdb.org/16653

Help Center Live Multiple Field Arbitrary Operator Script Injection

Help Center Live contains a flaw that allows a remote script injection attack. This flaw exists because the application does not validate user-supplied input to the name or message fields upon submission to the operator scripts. This could allow a user to create a specially crafted script command that would execute arbitrary code in the operator's browser, leading to a loss of integrity.. Read more at osvdb.org/16652

Help Center Live faq/index.php find Variable XSS

Help Center Live contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'find' variable upon submission to the faq/index.php script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.. Read more at osvdb.org/16651

Mozilla Firefox Sidebar Panel Script Injection

Mozilla Firefox contains a flaw that may allow a malicious user to inject script code in the browser environment with the privleges of the locally-logged on user. The issue is triggered when a malicious web site is bookmarked as a sidebar panel. It is possible that the flaw may allow an attacker to run arbitrary code on the victim's machine, resulting in a loss of integrity.. Read more at osvdb.org/15009

Cisco PIX Firewall established Command Alternative Conduit Restriction Bypass

Cisco PIX Firewall contains a flaw that may allow a malicious remote user to connect to any port on a system where limited connections are explicitly allowed. The issue is triggered when the "established" command is used along with a normal conduit. The conduit is used to allow inbound traffic to a specific port on a host, for example port 25 on a mail server. The "established" command provides support for multiconnection protocols, where a host makes connection to an external host on one port, and the external host responds with an inbound connection on another port. If the firewall is configured with both a conduit and an "established" command for a host, it would be possible for a remote attacker to make a connection to the allowed port through the conduit, and then make a connection to any other port, bypassing normal firewall restrictions. If an attacker is able to make a connection to an FTP server that supports the PORT command, it is possible that the flaw may allow subsequent connections to any host behind the firewall, resulting in a potential loss of integrity.. Read more at osvdb.org/16644

Reader Interactions

Leave a Reply

Your email address will not be published. Required fields are marked *

Footer

Miscellaneous

  • Free Address Finder
  • HTML Encoder Decoder
  • Website Monitoring
  • Whats My IP Address?
  • Yes or No

Copyright © 2001-2021 Audit My PC .com All Rights Reserved. Our Privacy Policy and TOS

  • About
  • Acronyms
  • DLL Files
  • Ports
  • Computer Security News
  • Email Scams & Spam
  • Internet Safety
  • Free Software