exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 53 of 53 RSS Feed

Files

xbox001.txt
Posted Jul 4, 2003
Authored by Stefan Esser

A vulnerability within the XBOX Dashboard allows a complete compromise of the security features. The problem lies in the handling of font files when the dashboard loads and allows a person with local access the ability to do anything they want on an XBox without having to open, solder, or swap a hard drive.

tags | advisory, local
SHA-256 | 1ba78f7ab3b8b8fec30b9ed4589338a62969e572c52acd5bd24baf88365b6875
rogerwilco.txt
Posted Jul 4, 2003
Authored by Luigi Auriemma | Site aluigi.altervista.org

Roger Wilco, the popular tool that lets gamers speak while playing online games, has two vulnerabilities. The first lies in a buffer overflow where a nickname that is longer than 516 bytes can be sent out in a broadcast message that will allow a remote attacker to take control of every client connected to the server. The second problem lies in a partially completely packet being sent to the server that will cause it to freeze.

tags | advisory, remote, overflow, vulnerability
SHA-256 | eb9ce2e3dad0a654a3c5aa35f45d02c0262452e17e4a8662f44ddb67bc164eab
visnetic.txt
Posted Jul 3, 2003
Authored by Peter Kruse | Site krusesecurity.dk

The VisNetic WebSite Server for Windows has a path disclosure vulnerability where a full path to the install server will be dished out whenever an invalid file is requested from the webserver.

tags | advisory
systems | windows
SHA-256 | 5adda22c80620943d7b514755963d7464f19ce6d779d6ea8e983f5aa17bae3c8
Page 3 of 3
Back123Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close