Exploit the possiblities
Showing 1 - 25 of 253 RSS Feed

Files

Secunia Security Advisory 13012
Posted Oct 29, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in TortoiseCVS, which potentially can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | ba15dbd95a63096553fabcec0b1640e3
Secunia Security Advisory 13021
Posted Oct 29, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Colin Phipps has reported a vulnerability in catdoc, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges.

tags | advisory, local
MD5 | c02cb5d057e2f7972c76403e3000b251
Gentoo Linux Security Advisory 200410-31
Posted Oct 29, 2004
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200410-31 - Email virus scanning software relying on Archive::Zip can be fooled into thinking a ZIP attachment is empty while it contains a virus, allowing detection evasion.

tags | advisory, virus
systems | linux, gentoo
MD5 | 80806bd7d7fe6adee7f55b977afbf6e6
Secunia Security Advisory 13024
Posted Oct 29, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ziv Kamir has discovered a vulnerability in Cyber Web Filter, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory, web
MD5 | 8477225687e85738e935a31b52f578e4
1333htpasswd.txt
Posted Oct 29, 2004
Authored by Larry W. Cashdollar | Site vapid.ath.cx

It appears that the new Apache release 1.3.33 still is susceptible to a local buffer overflow discovered in htpasswd under release 1.3.31.

tags | advisory, overflow, local
MD5 | 0dffea6c50d00010978b25dafae6accc
msieLink.txt
Posted Oct 29, 2004
Authored by Benjamin Tobias Franz

Microsoft Internet Explorer 6.0.2800.1106 and possibly earlier versions fail to properly handle links embedded within links, allowing for spoofing of target addresses.

tags | advisory, spoof
MD5 | 078b1a079d263c5f03c2b409266baf46
Secunia Security Advisory 11711
Posted Oct 28, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Andrew Nakhla has discovered a vulnerability in Apple Remote Desktop, which can be exploited by malicious users to gain root access on a vulnerable system.

tags | advisory, remote, root
systems | apple
MD5 | f40c517a2ac34a181a884183ee4ec256
php4curl.txt
Posted Oct 28, 2004
Authored by FraMe | Site kernelpanik.org

PHP4 cURL functions bypass open_basedir protection allowing users to navigate through the filesystem.

tags | advisory
MD5 | 426f895856b6e38fa2c921ed2bfb7aaf
Gentoo Linux Security Advisory 200410-30
Posted Oct 28, 2004
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200410-30 - GPdf, KPDF and KOffice all include vulnerable xpdf code to handle PDF files, making them vulnerable to execution of arbitrary code upon viewing a malicious PDF file.

tags | advisory, arbitrary
systems | linux, gentoo
MD5 | ec0d0e12afdc3319a81cb647d77daebd
dsa-574.txt
Posted Oct 28, 2004
Site debian.org

Debian Security Advisory 574-1 - The upstream developers discovered a problem in cabextract, a tool to extract cabinet files. The program was able to overwrite files in upper directories. This could lead an attacker to overwrite arbitrary files.

tags | advisory, arbitrary
systems | linux, debian
advisories | CVE-2004-0916
MD5 | faf7cc0d58aa4be289b79b9fa7f2fc66
quicktime.txt
Posted Oct 28, 2004
Authored by John Heasman

A high risk vulnerability exists in Quicktime for Windows versions 6.5.2 and earlier.

tags | advisory
systems | windows
MD5 | d978934420addf9429ed881546cfc168
eEye.realplayerZIP.txt
Posted Oct 28, 2004
Authored by Yuji Ukai | Site eeye.com

eEye Security Advisory - eEye Digital Security has discovered a vulnerability in RealPlayer that allows a remote attacker to reliably overwrite the stack with arbitrary data and execute arbitrary code in the context of the user under which the player is running.

tags | advisory, remote, arbitrary
MD5 | 7e9a80453c6a97a5b320f84fd618fc7f
masterOrionIII.txt
Posted Oct 28, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Master of Orion III versions 1.2.5 and below suffer from buffer overflow and allocation errors.

tags | advisory, overflow
MD5 | 7ebde94aeb3c1a277833c9955d2dfa31
Secunia Security Advisory 12995
Posted Oct 28, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in ImageMagick, which potentially can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error within the EXIF parsing routine. This can be exploited to cause a buffer overflow via a malicious image file containing specially crafted EXIF information.

tags | advisory, overflow
MD5 | db6a7ca97913bc4817397b1dc241f713
iDEFENSE Security Advisory 2004-10-27.t
Posted Oct 28, 2004
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 10.27.04 - Remote exploitation of a buffer overflow vulnerability in Simon Tatham's PuTTY can allow attackers to execute arbitrary code. The vulnerability specifically exists due to insufficient bounds checking on SSH2_MSG_DEBUG packets.

tags | advisory, remote, overflow, arbitrary
MD5 | c0e6bc13918e769d8f7382ba7193a2f0
konqueror3221.txt
Posted Oct 28, 2004
Authored by Yanosz

KDE Konqueror 3.2.2-1 is susceptible to cross site scripting flaws.

tags | advisory, xss
MD5 | a45bfd3448999b6bb39c1eae2050456f
Secunia Security Advisory 12992
Posted Oct 28, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Horde Application Framework, which potentially can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | 93de6ad2eb0e93396dd55d615aef5a6d
Gentoo Linux Security Advisory 200410-27
Posted Oct 28, 2004
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200410-27 - Buffer overflow vulnerabilities have been found in mpg123 which could lead to execution of arbitrary code. The flaws in the getauthfromURL() and http_open() functions have been reported by Carlos Barros. Additionally, the Gentoo Linux Sound Team fixed additional boundary checks which were found to be lacking.

tags | advisory, overflow, arbitrary, vulnerability
systems | linux, gentoo
MD5 | 3aed7692680f5193ddc47e2dea420ee8
quakeII.txt
Posted Oct 28, 2004
Authored by Richard Stanway | Site r1ch.net

Quake II version 3.2.x is susceptible to multiple vulnerabilities. Due to unchecked input at various stages in the server, remote users are able to cause the server to crash, reveal sensitive information or potentially execute arbitrary code.

tags | advisory, remote, arbitrary, vulnerability
MD5 | 7bc381702143ab0259af8b0b05e89b7b
realplayer105.txt
Posted Oct 28, 2004
Authored by John Heasman

Realplayer 10.5 permits execution of arbitrary code via a malformed skin.

tags | advisory, arbitrary
MD5 | 74f922327a4f7f3c19e3b46ae38d0143
putty056.txt
Posted Oct 28, 2004

PuTTY 0.56 fixes a serious security hole which can allow a server to execute code of its choice on a PuTTY client connecting to it.

tags | advisory
MD5 | 90fc3823961fadf8492205f905db3eb3
SSRT3526.txt
Posted Oct 28, 2004
Site hp.com

HP Security Bulletin - A potential security vulnerability has been identified with HP Serviceguard running on HP-UX and Linux that may allow remote unauthorized privileges.

tags | advisory, remote
systems | linux, hpux
MD5 | b921659616eed613a0cc3cdc16d45589
zgv-55.txt
Posted Oct 28, 2004
Authored by infamous41md

zgv uses malloc() frequently to allocate memory for storing image data. When calculating how much to allocate, user supplied data from image headers is multiplied and/or added without any checks for arithmetic overflows. There are a total of 11 overflows that are exploitable to execute arbitrary code.

tags | advisory, overflow, arbitrary
MD5 | 4a235d5af57f08ade4a17ad8a542608f
Ubuntu Security Notice 8-1
Posted Oct 28, 2004
Authored by Ubuntu

A buffer overflow and two remote crashes were recently discovered in gaim's MSN protocol handler. An attacker could potentially execute arbitrary code with the user's privileges by crafting and sending a particular MSN message.

tags | advisory, remote, overflow, arbitrary, protocol
advisories | CVE-2004-0891
MD5 | ce6dab8cfae21bb1a8a69d8432dcb67f
Gentoo Linux Security Advisory 200410-23
Posted Oct 28, 2004
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200410-23 - Multiple vulnerabilities have been found in Gaim which could allow a remote attacker to crash the application, or possibly execute arbitrary code.

tags | advisory, remote, arbitrary, vulnerability
systems | linux, gentoo
MD5 | 22d16395188af69fdfa98d4958d6fc8e
Page 1 of 11
Back12345Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Cash Converters Reveals Data Breach
Posted Nov 16, 2017

tags | headline, hacker, cybercrime, data loss, fraud, identity theft
Kaspersky Defends Its Role In NSA Breach
Posted Nov 16, 2017

tags | headline, government, malware, usa, russia, data loss, spyware, nsa
McAfee Anti-Hacking Service Exposed Users To Banking Malware
Posted Nov 16, 2017

tags | headline, malware, bank, cybercrime, fraud, flaw, identity theft, mcafee
DJI Bug Bounty NDA Is 'Not Signable', Say Irate Infosec Researchers
Posted Nov 16, 2017

tags | headline, hacker, flaw
Government Just Figures Out You Can Hack Planes Remotely Due To Poor Design
Posted Nov 15, 2017

tags | headline, government, usa, flaw, terror
UK Security Chief Blames Russia For Hacks
Posted Nov 15, 2017

tags | headline, hacker, government, britain, russia, cyberwar
Forbes 30 Under 30 Conference Site Exposed Attendee Details
Posted Nov 15, 2017

tags | headline, privacy, data loss, flaw, conference
The Motherboard Guide To Not Getting Hacked
Posted Nov 15, 2017

tags | headline, hacker, privacy, data loss, fraud, identity theft
Votes In 18 Nations 'Hacked' In Last Year
Posted Nov 14, 2017

tags | headline, government, usa, russia, fraud, cyberwar, social
Shut The Front Door: Jewson Admits To Data Breach
Posted Nov 14, 2017

tags | headline, hacker, privacy, data loss
View More News →
packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close