what you don't know can hurt you
Showing 1 - 25 of 167 RSS Feed

Files

ipcop141.txt
Posted Dec 11, 2004
Authored by Paul Kurczaba

IPCop suffers from a cross site scripting vulnerability in proxylog.dat. Version 1.4.1 is affected. Older versions have not been tested.

tags | advisory, xss
MD5 | d238e5bafa11188833b7f516a3580804
ipbBypass.txt
Posted Dec 11, 2004
Authored by Keyboard Criminal

It seems that the IPB forums has a password reset feature that allows a disabled account to regain access.

tags | advisory
MD5 | 59fc071c393e9751ce12c9f79ee61e24
janados.txt
Posted Dec 11, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Jana server 2 versions 2.4.4 and below are susceptible to denial of service attacks that result in 100% CPU utilization and endless loops.

tags | advisory, denial of service
MD5 | 2042e310f75df545078eb5a48d4a8427
Secunia Security Advisory 13331
Posted Dec 11, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in FreeImage, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system.

tags | advisory, denial of service
MD5 | f23b4b8b9bc68e1143acc35f37c380aa
cuteftp60.txt
Posted Dec 11, 2004
Authored by Felix Zhou

CuteFTP Professional version 6.0 suffers from a client side overflow.

tags | advisory, overflow
MD5 | bc550617d2ad34d33cac6e10c23b6d81
payflow.txt
Posted Dec 11, 2004
Site shirkdog.us

An attacker can change hidden fields to any dollar amount and misrepresent purchases for businesses providing products or services using the PayFlow Link system.

tags | advisory
MD5 | 3a582e3b889a0f3d8bee282de181ea1d
orbzbof.txt
Posted Dec 11, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Orbz versions 2.10 and below suffer from a buffer overflow in the password field of the join packet.

tags | advisory, overflow
MD5 | 2124259b9647e48383879438e07d0551
wsftp503.txt
Posted Dec 11, 2004
Authored by Reed Arvin

Multiple buffer overflows exist in WS_FTP Server Version 5.03, 2004.10.14. There are four vulnerable commands that can be used to cause these buffer overflows. Three of the vulnerable commands can be used to stop the WS_FTP Server service resulting in a denial of service. The vulnerable commands are SITE, XMKD, MKD, and RNFR.

tags | advisory, denial of service, overflow
MD5 | 8965bc3c144815e73d70ee13c356263a
dsa-602.txt
Posted Dec 11, 2004
Site debian.org

Debian Security Advisory 602-1 - Wait.. No.. what is this? Even more potential integer overflows have been found in the GD graphics library which were not covered by security advisory DSA 589 and DSA 601. They could be exploited by a specially crafted graphic and could lead to the execution of arbitrary code on the victim's machine.

tags | advisory, overflow, arbitrary
systems | linux, debian
advisories | CVE-2004-0941, CVE-2004-0990
MD5 | bd4903e565324f5a91637cbf70991aea
Secunia Security Advisory 13330
Posted Dec 11, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in IberAgents, which can be exploited by malicious, local users to gain knowledge of sensitive information.

tags | advisory, local
MD5 | a1beee20b0b46885930e4db3cb0639ca
dsa-601.txt
Posted Dec 11, 2004
Site debian.org

Debian Security Advisory 601-1 - More potential integer overflows have been found in the GD graphics library which were not covered by security advisory DSA 589. They could be exploited by a specially crafted graphic and could lead to the execution of arbitrary code on the victim's machine.

tags | advisory, overflow, arbitrary
systems | linux, debian
advisories | CVE-2004-0941, CVE-2004-0990
MD5 | b92367f7fa5587b09e1fe02b15b6e0c5
Secunia Security Advisory 13321
Posted Dec 11, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Groupmax World Wide Web and Groupmax World Wide Web Desktop, which can be exploited to conduct cross-site scripting attacks or access arbitrary HTML files.

tags | advisory, web, arbitrary, vulnerability, xss
MD5 | d518ebc53d84625b6ad79a0fe0f7f83d
nwclient.txt
Posted Dec 11, 2004
Authored by Karol Wiesek

Buffer overflows have been discovered in ncplogin and ncpmap in ncpfs.

tags | advisory, overflow
MD5 | 7afe873a3c2de6c146b55bbaaa492ed3
Secunia Security Advisory 13329
Posted Dec 11, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - XioNoX has reported a vulnerability in Nuked-Klan, which can be exploited by malicious people to conduct script insertion attacks.

tags | advisory
MD5 | f33b4d86cd9e1bd6999c5b4c350c7456
kdeSMB.txt
Posted Dec 11, 2004
Authored by Daniel Fabian

The KDE program Konquerer allows for browsing SMB shares comfortably through the GUI. By placing a shortcut to an SMB share on KDE's desktop, an attacker can disclose his victim's password in plaintext.

tags | advisory
MD5 | 8508f86470ecc4ddc611025de042ceb9
doubleByte.txt
Posted Dec 11, 2004
Authored by Liu Die Yu | Site umbrella.name

On Double Byte Character Set Locale systems, such as Chinese, Japanese, etc, there exists a spoofing vulnerability within Microsoft Internet Explorer that enables attackers to fake the Address field.

tags | advisory, spoof
MD5 | 82f813d3991957ef2c7fcbda0f270619
ssfakep.txt
Posted Dec 11, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

The Serious engine for games like Alpha Black Zero and Nitro family fails to limit the amount of new players joining a game, allowing for a denial of service. Only one UDP packet is needed to create a fake player.

tags | advisory, denial of service, udp
MD5 | 955520e43052f03cc7cba58f2fd9dc4f
Gentoo Linux Security Advisory 200411-36
Posted Dec 11, 2004
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200411-36 - phpMyAdmin is vulnerable to cross-site scripting attacks. Versions below 2.6.0_p3 are susceptible.

tags | advisory, xss
systems | linux, gentoo
MD5 | 0cba9bec4ac429bd0b575fcffd79e403
instantanea.pdf
Posted Dec 11, 2004
Authored by Nicolas Waisman | Site immunitysec.com

Security research discussing a new vulnerability discovered in WINS that allows for remote unauthenticated system access.

tags | advisory, remote
MD5 | 7aea5e2d175d6cd56a47b0a36edd4e25
Secunia Security Advisory 13319
Posted Dec 11, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in YaBB, which can be exploited by malicious people to conduct script insertion attacks.

tags | advisory
MD5 | 75aec0fe23ae0a75667aa145e816448c
Secunia Security Advisory 13317
Posted Dec 11, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - cyber flash has discovered a vulnerability in Microsoft Internet Explorer, which can be exploited by malicious people to trick users into downloading malicious files.

tags | advisory
MD5 | ee71934cad71cd404d9e96aaa6c4201d
phpCMS121.txt
Posted Dec 11, 2004
Authored by Cyrille Barthelemy | Site cyrille-barthelemy.com

phpCMS versions 1.2.1 and below suffer from information disclosure and cross site scripting flaws.

tags | advisory, xss, info disclosure
MD5 | b97ca5a9092ccc5324912daad7467f92
MDKSA-2004:140.txt
Posted Dec 11, 2004
Site mandrakesoft.com

Mandrake Linux Security Update Advisory - The GNU a2ps utility fails to properly sanitize filenames, which can be abused by a malicious user to execute arbitrary commands with the privileges of the user running the vulnerable application.

tags | advisory, arbitrary
systems | linux, mandrake
MD5 | d8e93f86af1b786f0bd3c3d4618007ff
dsa-598.txt
Posted Dec 11, 2004
Site debian.org

Debian Security Advisory 598-1 - Max Vozeler noticed that yardradius, the YARD radius authentication and accounting server, contained a stack overflow similar to the one from radiusd which is referenced as CVE-2001-0534. This could lead to the execution of arbitrary code as root.

tags | advisory, overflow, arbitrary, root
systems | linux, debian
advisories | CVE-2004-0987
MD5 | f8025faa2445a5de116af73f69f142e4
Secunia Security Advisory 13267
Posted Dec 11, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Cengiz Aykanat has reported a security issue in eTrust Antivirus, which can be exploited by malicious people to bypass certain security features.

tags | advisory
MD5 | 6fe48ecfde519a63fa4a6ceaf9fa1c07
Page 1 of 7
Back12345Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Microsoft Mocks Google For Failed Security Fix Deployment Methodology
Posted Oct 19, 2017

tags | headline, microsoft, flaw, google, chrome
Malicious Mineraft Apps In Google Play Enslave Your Device To A Botnet
Posted Oct 19, 2017

tags | headline, malware, microsoft, phone, botnet, google
OAIC Received 114 Voluntary Data Breach Notifications In Two Years
Posted Oct 19, 2017

tags | headline, hacker, privacy, australia, data loss
US-CERT Predicts Machine Learning To Become Security Risk
Posted Oct 19, 2017

tags | headline, flaw
ATM Malware Available Online For Online $5,000
Posted Oct 18, 2017

tags | headline, malware, bank, cybercrime, fraud
Oracle Swats 252 Bugs In Patch Update
Posted Oct 18, 2017

tags | headline, flaw, patch, oracle
Child Safety Smartwatches Easy To Hack, Watchdog Says
Posted Oct 18, 2017

tags | headline, privacy, flaw
Domino's Pizza Delivers User Details To Spammers
Posted Oct 18, 2017

tags | headline, privacy, email, spam, fraud
Microsoft Never Disclosed 2013 Hack Of Secret Vulnerability Database
Posted Oct 18, 2017

tags | headline, hacker, microsoft, data loss, flaw
Adobe Patches Zero-Day Used To Plant Gov't Spying Software
Posted Oct 17, 2017

tags | headline, hacker, government, usa, flaw, cyberwar, adobe, zero day, nsa
View More News →
packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close