what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 253 RSS Feed

Files

Next Generation Security Advisory 223122004L
Posted Dec 31, 2004
Authored by David Litchfield, NGSSoftware | Site ngssoftware.com

NGSSoftware Insight Security Research Advisory #NISR2122004L - IBM's DB2 database server contains a procedure, generate_distfile. This procedure suffers from a stack based buffer overflow vulnerability. Systems Affected: DB2 8.1/7.x.

tags | advisory, overflow
SHA-256 | 3ef55a702511cb8221131c88341c2991b45a10ee7c8b153e5ddda2eb0ad3028e
Next Generation Security Advisory 223122004K
Posted Dec 31, 2004
Authored by Mark Litchfield, NGSSoftware | Site ngssoftware.com

NGSSoftware Insight Security Research Advisory #NISR2122004J - IBM's DB2 database server contains a function, rec2xml, used to format a string in XML. This function suffers from a stack based buffer overflow vulnerability. Systems Affected: DB2 8.1/7.x.

tags | advisory, overflow
SHA-256 | b8613611d22ef6e27ef52155f6315c5d527c17d33199e9824cdca2fd21abca6f
oracle23122004J.txt
Posted Dec 31, 2004
Authored by David Litchfield | Site ngssoftware.com

NGSSoftware Insight Security Research Advisory #NISR2122004J - The code for PL/SQL procedures can be encrypted or wrapped to use the Oracle term. When a wrapped procedure is created a buffer overflow vulnerability can be triggered. Systems Affected: Oracle 10g/9i on all operating systems.

tags | advisory, overflow
SHA-256 | 6b25554fd71f5fe123c25e28820f4b1f31d38e591f699777f1bf2d6ed93ae82c
oracle23122004H.txt
Posted Dec 31, 2004
Authored by David Litchfield | Site ngssoftware.com

NGSSoftware Insight Security Research Advisory #NISR2122004H - Oracle 10g and 9i suffer from multiple PL/SQL injection vulnerabilities. Systems Affected: Oracle 10g/AS on all operating systems.

tags | advisory, vulnerability, sql injection
SHA-256 | 6e5d05e4c37be6abe44d5313fc7449e528c71dc7700e7622039d9692cc8be6e9
oracle23122004F.txt
Posted Dec 31, 2004
Authored by David Litchfield | Site ngssoftware.com

NGSSoftware Insight Security Research Advisory #NISR2122004F - The 10g Oracle TNS Listener is vulnerable to a denial of service vulnerability. Systems Affected: Oracle 10g on all operating systems.

tags | advisory, denial of service
SHA-256 | af6b33695e7d0331269bb9875337f50a3075042eadab32b1f8486a07d3fb6a67
oracle23122004E.txt
Posted Dec 31, 2004
Authored by David Litchfield | Site ngssoftware.com

NGSSoftware Insight Security Research Advisory #NISR2122004E - The 10g Oracle Application Server installs ISQL*Plus. Once logged in, an attacker can use load.uix to read files on the server. Systems Affected: Oracle 10g AS on all operating systems.

tags | advisory
SHA-256 | 41e4563892e55bab629dadaa582258738d586ada2b237ca6ef0b6b3ebb0209ca
oracle23122004D.txt
Posted Dec 31, 2004
Authored by David Litchfield | Site ngssoftware.com

NGSSoftware Insight Security Research Advisory #NISR2122004D - The 10g Oracle database server may have passwords in clear text in world readable files. Systems Affected: Oracle 10g on all operating systems.

tags | advisory
SHA-256 | d3b0b872bbed09a293cc3e6d16fa8f3fd84179096e93c1d42e83f550db052afe
oracle23122004C.txt
Posted Dec 31, 2004
Authored by David Litchfield | Site ngssoftware.com

NGSSoftware Insight Security Research Advisory #NISR23122004C - The Oracle database server supports PL/SQL, a programming language. PL/SQL can execute external procedures via extproc. Extproc is intended only to accept requests from the Oracle database server but local users can still execute commands bypassing this restriction. Systems Affected: Oracle 10g/9i on all operating systems.

tags | advisory, local
SHA-256 | d564ebb6b5748561ebcce49b8dface7849a65669daeb969695defa9c396adb17
oracle23122004B.txt
Posted Dec 31, 2004
Authored by David Litchfield | Site ngssoftware.com

NGSSoftware Insight Security Research Advisory #NISR23122004B - The Oracle database server supports PL/SQL, a programming language. PL/SQL can execute external procedures via extproc. Extproc has been found to suffer from a directory traversal problem that allows attackers access to arbitrary libraries. Systems Affected: Oracle 10g/9i on all operating systems.

tags | advisory, arbitrary
SHA-256 | 25c8b9a1837b4ad345045e140f4a5f8d0598d3455a856d252b974d56dca2fd4d
oracle23122004.txt
Posted Dec 31, 2004
Authored by David Litchfield | Site ngssoftware.com

NGSSoftware Insight Security Research Advisory #NISR2122004A - The Oracle database server supports PL/SQL, a programming language. PL/SQL can execute external procedures via extproc. Extproc has been found to suffer from another buffer overflow vulnerability. Systems Affected: Oracle 10g on all operating systems.

tags | advisory, overflow
SHA-256 | 40555a31fe2e6ad6539966721ecc71750f0e9aab14788315d6ec9c0e5f421632
oracle23122004G.txt
Posted Dec 31, 2004
Authored by David Litchfield | Site ngssoftware.com

NGSSoftware Insight Security Research Advisory #NISR2122004G - Due to character conversion problems in Oracle 10g with Oracle's Application server it is possible to bypass pl/sql exclusions and gain access to the database server as SYS. Systems Affected: Oracle 10g/AS on all operating systems.

tags | advisory
SHA-256 | 8d1abd33755d60617a7f206475214c1c02523008459acccc97aaeff0494e01ba
oracle23122004I.txt
Posted Dec 31, 2004
Site ngssoftware.com

NGSSoftware Insight Security Research Advisory #NISR2122004I - Database triggers exist to help maintain data integrity and perform certain actions when a table's data is modified. Many of the default triggers in Oracle can be abused to gain elevated privileges. Systems Affected: Oracle 10g/9i on all operating systems.

tags | advisory
SHA-256 | e72c95ea02cc6dce6f0b00cfde315e1752b174373db4397eb16a6eb2becf9523
Venustech AD-Lab Advisory 2004.6
Posted Dec 31, 2004
Authored by Bejing Venustech, Keji

Venustech AD-Lab Advisory AD_LAB-04006 - There is a vulnerability in Microsoft Windows .hlp file parsing program winhlp32.exe. The vulnerability is caused due to a decoding error within the windows .hlp header processing. This can be exploited to cause a heap-based buffer overflow. Vulnerable: Windows NT, Windows 2000 SP0, Windows 2000 SP1, Windows 2000 SP2, Windows 2000 SP3, Windows 2000 SP4, Windows XP SP0, Windows XP SP1, Windows 2003.

tags | advisory, overflow
systems | windows
SHA-256 | a4d0f4fd5ceaadb1c6e0a8112c7289a3a1d44aa6bc11cd18346109a009cb1efb
Venustech AD-Lab Advisory 2004.5
Posted Dec 31, 2004
Authored by FlashSky, Bejing Venustech

Venustech AD-Lab Advisory AD_LAB-04005 - Parsing a specially crafted ANI file causes the windows kernel to crash or stop to work properly. An attacker can crash or freeze a target system if he sends a specially crafted ANI file within an HTML page or within an Email. Vulnerable: Windows NT, Windows 2000 SP0, Windows 2000 SP1, Windows 2000 SP2, Windows 2000 SP3, Windows 2000 SP4, Windows XP SP0, Windows XP SP1, Windows 2003.

tags | advisory, kernel
systems | windows
SHA-256 | a4b61c9f9acb50b67f793629552a1104d23cf0c1bf9143acaaeb455b74faf2df
Venustech AD-Lab Advisory 2004.4
Posted Dec 31, 2004
Authored by FlashSky, Bejing Venustech

Venustech AD-Lab Advisory AD_LAB-04004 - An exploitable integer buffer overflow exists in the LoadImage API of the USER32 Lib. This function loads an icon, a cursor or a bitmap and then try to proceed the image. If an attacker sends a specially crafter bmp, cur, ico or ani file within an HTML page or in an Email, it is then possible to run arbitrary code on the affected system. Vulnerable: Windows NT, Windows 2000 SP0, Windows 2000 SP1, Windows 2000 SP2, Windows 2000 SP3, Windows 2000 SP4, Windows XP SP0, Windows XP SP1, Windows 2003.

tags | advisory, overflow, arbitrary
systems | windows
SHA-256 | c0a680adceb00e2746611c146dcfe6d92f290f0d6de2753e6424fdc90cb0746e
Venustech AD-Lab Advisory 2004.3
Posted Dec 31, 2004
Authored by ICBM, LiangBin, Bejing Venustech

Venustech AD-Lab Advisory AD_LAB-04003 - The Linux 2.6 kernel series POSIX Capability LSM module is problematic in that upon insertion, all the processes that currently exist from normal users will have root capabilities.

tags | advisory, kernel, root
systems | linux, osx
SHA-256 | 7ea5778763ac495c2c270616972c42efa4e093dcf90fd40d71f7547032c162c9
Secunia Security Advisory 13642
Posted Dec 31, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Docbook-to-Man, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges.

tags | advisory, local
SHA-256 | 27d5d01669e9047245e27cda3a9bf9553bb01a552d8b5b89403ced59b5aa15e5
Secunia Security Advisory 13640
Posted Dec 31, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in LPRng, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges.

tags | advisory, local
SHA-256 | 3a6c362b0e346c06177dff3d4250581cb9726128c4137b07648646ba3fe54681
KDE Security Advisory 2004-12-23.1
Posted Dec 31, 2004
Authored by KDE Desktop | Site kde.org

KDE Security Advisory: kpdf, the KDE pdf viewer, shares code with xpdf. xpdf contains a buffer overflow that can be triggered by a specially crafted PDF file.

tags | advisory, overflow
advisories | CVE-2004-1125
SHA-256 | 34a96e4ccfc6bc38f130061fe7d69adb1d54fb95e91f6eb8ea657e2605e23145
xssEverywhere.txt
Posted Dec 31, 2004
Authored by Michael Krax | Site mikx.de

A series of tests were performed to find Cross-Site Scripting (XSS) vulnerabilities. It quickly turned out that the majority of all major websites suffer from some kind of XSS flaw. This is a disclosure of 175 vulnerabilities at once.

tags | advisory, vulnerability, xss
SHA-256 | 542050829be68249f5087c7bfb911b172ced5e03a109ac853b43196bedcb2e29
ADVISORY-email.txt
Posted Dec 31, 2004
Authored by S G Masood

Several large Indian portals such as Rediffmail and the Indiatimes are susceptible to scripting attacks, putting millions at risk.

tags | advisory
SHA-256 | 7270595bc7701ff27f5dbe7e03cce6a3e77be239ec66559bdc34934a593f1633
PsychoStats.txt
Posted Dec 31, 2004
Authored by James Bercegay | Site gulftech.org

PsychoStats versions 2.2.4 Beta and earlier are susceptible to a cross site scripting attack.

tags | advisory, xss
SHA-256 | d1114f9c993573b815a04fd554ee7d17e53e511f5372e20336cecc502a7d68a0
realone2.txt
Posted Dec 31, 2004
Authored by Wei Li

A vulnerability has been found in the Internet Explorer browser with system installed Realone 2.0 build 6.0.11.868 in the processing of the EMBED tag.

tags | advisory
SHA-256 | 705ffb25bd28dfbdb6659300b6f399d4c05155581c6e6f51b36706a597ad0871
Secunia Security Advisory 13618
Posted Dec 31, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Citrix Metaframe XP, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to an unspecified boundary error, which can be exploited to cause a buffer overflow. Successful exploitation may allow execution of arbitrary code.

tags | advisory, overflow, arbitrary
SHA-256 | 30ac47909b7d3c1206ba83586cdf367aa64efecc2944660c26f5698e9c8e8943
NGS-Sybase.txt
Posted Dec 31, 2004
Authored by Sherief Hammad | Site ngssoftware.com

NGSSoftware has discovered three high risk security vulnerabilities in Sybase Adaptive Server Enterprise 12.5.2. Sybase ASE versions 12.5.2 and older are vulnerable to these issues.

tags | advisory, vulnerability
SHA-256 | 24e258ca92543143d8bb6573b1fbe63401dfb53c34b2cdde67c04b7f8fb904ed
Page 2 of 11
Back12345Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Google Patches Critical Chrome Vulnerability
Posted Apr 24, 2024

tags | headline, flaw, google, patch, chrome
Hackers Are Using Developing Countries For Ransomware Practice
Posted Apr 24, 2024

tags | headline, hacker, malware, cybercrime, fraud, cryptography
Authorities Investigate LabHost Users After Phishing Service Shutdown
Posted Apr 23, 2024

tags | headline, cybercrime, fraud, phish
Windows Vulnerability Reported By The NSA Exploited To Install Russian Malware
Posted Apr 23, 2024

tags | headline, government, microsoft, usa, russia, flaw, cyberwar, spyware, nsa
UnitedHealth Admits Breach Could Cover Substantial Proportion Of People In America
Posted Apr 23, 2024

tags | headline, hacker, privacy, data loss
Microsoft DRM Hack Could Allow Movie Downloads From Streaming
Posted Apr 23, 2024

tags | headline, microsoft, flaw, pirate
Over A Million Neighbourhood Watch Members Exposed
Posted Apr 23, 2024

tags | headline, privacy, britain, data loss
MITRE Hacked By State Sponsored Group Via Ivanti Zero Days
Posted Apr 23, 2024

tags | headline, hacker, government
Russia's Sandworm APT Linked To Attack On Texas Water Plant
Posted Apr 18, 2024

tags | headline, malware, usa, russia, cyberwar, scada
EU Tells Meta It Can't Paywall Privacy
Posted Apr 18, 2024

tags | headline, government, privacy, facebook, social
View More News →
packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close