exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 151 - 167 of 167 RSS Feed

Files

Secunia Security Advisory 13065
Posted Nov 5, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Lyndon Dubeau has reported a security issue in NetGear FWAG114 ProSafe Dual Band Wireless VPN Firewall, which can be exploited by malicious people to read or manipulate configuration information. The problem is that it is not possible to disable the SNMP service nor change the default SNMP community strings. The problem has been reported in firmware release 1.0.26RC4. Other versions may also be affected.

tags | advisory
SHA-256 | ce8088360acd36d27b92b5320bc300140c19379438b86e163025f5ac775e72bc
Gentoo Linux Security Advisory 200411-4
Posted Nov 5, 2004
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200411-04 - A vulnerability in the Speedtouch USB driver can be exploited to allow local users to execute arbitrary code with escalated privileges.

tags | advisory, arbitrary, local
systems | linux, gentoo
SHA-256 | f4350556f83cf6b1617ccc40ffd62de9f984c342079ae225d5d8e791d6841a37
Secunia Security Advisory 13062
Posted Nov 5, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability with an unknown impact has been reported in MailEnable Professional.

tags | advisory
SHA-256 | a117c76fe46a44c96fd60a4f3757e523e478a93916189e119ed3f85eda0fb9da
000077.txt
Posted Nov 5, 2004
Authored by Behrang Fouladi | Site hat-squad.com

Hat Squad Advisory - Helm Web Hosting Control Panel is susceptible to cross site scripting and SQL injection vulnerabilities. Versions 3.1.19 and below are affected.

tags | advisory, web, vulnerability, xss, sql injection
SHA-256 | c3b9809692743b6d9b75bd8868292a9f6686f574c566fd5c6ce763508c70554c
Secunia Security Advisory 13041
Posted Nov 5, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in HTML::Merge, which can be exploited by malicious people to perform a directory traversal attack.

tags | advisory
SHA-256 | 1b24f09f1efeae5f116cc7e5f7c3873ae48f93d7cabd3e4e768973cf706c12f8
safari_url_spoof.txt
Posted Nov 5, 2004
Authored by Gilbert Verdian | Site neoresearch.org

It is possible to spoof URLs in Safari 1.2.3 using the same method that MSIE is susceptible via.

tags | advisory, spoof
SHA-256 | 4b6334adb4443960a952c77ce1be74f64c2749216f072c76f85a8a3046324ba4
IEHTMLHelp.txt
Posted Nov 5, 2004
Authored by Roozbeh Afrasiabi

The HTML Help Control vulnerability in Internet Explorer that allows for bypass of local zone security restrictions can be further misused to cause cross-domain and cross-zone scripting attacks.

tags | advisory, local
SHA-256 | 4b31cd6edab309f03f68d5ec8fd8f1392c9a85dea523453ed47a5a202524eb32
Secunia Security Advisory 13031
Posted Nov 2, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in haserl, which can be exploited by malicious people to manipulate critical environment variables. haserl executes shell scripts embedded in HTML documents using a cgi wrapper and sets all input parameters as environment variables. This could be exploited to cause certain programs and utilities to behave unexpectedly and potentially be exploited to execute arbitrary system commands. The vulnerability has been reported in version 0.5.1. Other versions may also be affected.

tags | advisory, arbitrary, shell, cgi
SHA-256 | 45cb74d7716992e98fe6859da3e2b789a39b55b01feabba99a99e3f999f80e88
Secunia Security Advisory 13047
Posted Nov 2, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been discovered in Safari, which can be exploited by malicious people to trick users into visiting a malicious website by obfuscating URLs.

tags | advisory
SHA-256 | 65a93c2c41fea452cf3a867440ca6731f3db5de30cf6ec5961e685dfac53deb3
57606.html
Posted Nov 2, 2004
Site sunsolve.sun.com

Sun Security Advisory - Buffer overflow vulnerabilities in the Sun Java System Web Proxy Server may allow a remote unprivileged user to crash either the Web Proxy Server or the Admin Server (of the Web Proxy Server) or execute arbitrary code with the privileges of the respective server processes.

tags | advisory, java, remote, web, overflow, arbitrary, vulnerability
SHA-256 | acd876ad54be3275bf34d9450eb66d713c98d9389c9f88c2f6b4d609924c4302
Secunia Security Advisory 13040
Posted Nov 2, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Caudium 1.x, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 71ea16a19e18c0324b4eb2a840c6d616edab70e3d85f6de4e3e85a0662ff9921
qwik-smtpd.txt
Posted Nov 2, 2004
Authored by Dark Eagle | Site unl0ck.info

Unl0ck Team Security Advisory - qwik-smtpd is susceptible to a format string vulnerability.

tags | advisory
SHA-256 | 418658e48947300661cbd1ad921e3dc07c0dad1325ddccede292af4e45bf9c27
dsa-580.txt
Posted Nov 2, 2004
Site debian.org

Debian Security Advisory 580-1 - Faheem Mitha noticed that the iptables command, an administration tool for IPv4 packet filtering and NAT, did not always load the required modules on it own as it was supposed to. This could lead to firewall rules not being loaded on system startup. This caused a failure in connection with rules provided by lokkit at least.

tags | advisory
systems | linux, debian
advisories | CVE-2004-0986
SHA-256 | 9c4a77395c5077c790355fab68e5345bb659c87293cc553f354d21e32ec95f34
dsa-579.txt
Posted Nov 2, 2004
Site debian.org

Debian Security Advisory 579-1 - A buffer overflow vulnerability has been discovered in the wv library, used for converting and previewing word documents. On exploitation an attacker could execute arbitrary code with the privileges of the user running the vulnerable application.

tags | advisory, overflow, arbitrary
systems | linux, debian
advisories | CVE-2004-0645
SHA-256 | 69c769d46131fc44b4ecba2d68dcb975581f4cf2b5cf88380614ce8970ceec6c
Gentoo Linux Security Advisory 200411-2
Posted Nov 2, 2004
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200411-02 - Cherokee contains a format string vulnerability that could lead to denial of service or the execution of arbitary code.

tags | advisory, denial of service
systems | linux, gentoo
SHA-256 | 71fd8bfc14169f8a7ca1ff18284d2f1c6b3837a6556da7b79fedd7043d7c14cb
Ad20041026EN.txt
Posted Nov 2, 2004
Authored by Sowhat | Site secway.org

XDICT 2002 through 2005 all suffer from a buffer overrun vulnerability when attempting to examine a word for translation.

tags | advisory, overflow
SHA-256 | 5dbe9bbe636101bf3511f4a4133795ec15b27f6ee4b0120aec355af6a8c2814a
bogofilter-SA-2004-01.txt
Posted Nov 1, 2004
Authored by Antti-Juhani Kaijanaho, Clint Adams, David Relson

A vulnerability in bogofilter/bogolexer causes a segmentation fault due to malformed input.

tags | advisory
SHA-256 | 1c70b8e7a8196819104eaf49f8ce550c7af1b877080625366bbafb16be187dab
Page 7 of 7
Back34567Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Nation-State Hackers Exploit Cisco Firewall Zero Days To Backdoor Government Networks
Posted Apr 25, 2024

tags | headline, hacker, government, cyberwar, cisco, backdoor
FTC Sending $5.6 Million To Ring Customers Over Security Failures
Posted Apr 25, 2024

tags | headline, government, privacy, usa, amazon, flaw
Palo Alto Networks Shares Remediation Advice
Posted Apr 25, 2024

tags | headline, flaw
Russia, Iran Pose Most Aggressive Threat To 2024 Election
Posted Apr 25, 2024

tags | headline, government, usa, russia, fraud, cyberwar, iran
Google Patches Critical Chrome Vulnerability
Posted Apr 24, 2024

tags | headline, flaw, google, patch, chrome
Hackers Are Using Developing Countries For Ransomware Practice
Posted Apr 24, 2024

tags | headline, hacker, malware, cybercrime, fraud, cryptography
North Korean Hackers Hijack Antivirus Updates For Malware Delivery
Posted Apr 24, 2024

tags | headline, hacker, government, malware, flaw, cyberwar, military, north korea
CISA Warns Of Windows Print Spooler Flaw After Microsoft Sees Russian Exploitation
Posted Apr 24, 2024

tags | headline, government, microsoft, usa, russia, flaw, cyberwar
US Charges Iranians With Cyber Snooping On Government, Companies
Posted Apr 24, 2024

tags | headline, hacker, government, privacy, usa, cyberwar, spyware, iran
TensorFlow AI Models At Risk Due To Keras API Flaw
Posted Apr 24, 2024

tags | headline, flaw
View More News →
packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close