Exploit the possiblities
Showing 1 - 25 of 725 RSS Feed

Files

W-AgoraXSS.txt
Posted Apr 30, 2006
Authored by r0xes

W-Agora version 4.20 is susceptible to cross site scripting attacks.

tags | advisory, xss
MD5 | 537ec81ac86fd2a483ed0ffe12bc2cd0
textfilebbXSS.txt
Posted Apr 30, 2006
Authored by r0xes

TextFileBB is susceptible to three cross site scripting vulnerabilities.

tags | advisory, vulnerability, xss
MD5 | dc38b40236d1084fcd97edac17ed6b3b
LandDownUnder.txt
Posted Apr 29, 2006
Site Aria-Security.net

Land Down Under 802 and below suffer from a path disclosure vulnerability.

tags | advisory
MD5 | cf438c534aa71ec36ac81b7aaa160cea
yahoo-xss-2.txt
Posted Apr 29, 2006
Authored by Cesar

Description of a Yahoo! Mail XSS vulnerability that has been patched silently by Yahoo.

tags | advisory, xss
MD5 | 3ef71a9ee64288891dd09692c33d1a05
Secunia-Salamander.txt
Posted Apr 29, 2006
Site secunia.com

Secunia Research 28/04/2006 - Servant Salamander unacev2.dll Buffer Overflow Vulnerability - Secunia Research has discovered a vulnerability in Servant Salamander, which can be exploited by malicious people to compromise a user's system.

tags | advisory, overflow
MD5 | 6756d93d5103a222cef27135b7cfd662
ECHO_ADV_31_2006.txt
Posted Apr 29, 2006
Authored by the_day | Site advisories.echo.or.id

[ECHO_ADV_31$2006] Sws Web Server 0.1.7 Strcpy() & Syslog() Format String Vulnerability. A format string vulnerability in Sws Web Server allows remote attackers to cause the program to execute arbitrary. The format string vulnerability and buffer overflow can be found in sws_web_server.c ayardosyasi.h file.

tags | advisory, remote, web, overflow, arbitrary
MD5 | 95a30061d7337115db1d1840d78a8877
Neomail_pl.txt
Posted Apr 29, 2006
Authored by Aria-Security | Site aria-security.net

Neomail suffers from XSS in Neomail.pl.

tags | advisory
MD5 | 5f9db4e6cb3d969328a835193af94fc3
Cireos.txt
Posted Apr 29, 2006
Site aria-security.net

Cireos Portal from SirceOS suffers from XSS in buscar.php.

tags | advisory, php
MD5 | aaa2e8f30230a77ae0ca80e20399f370
AD20060428.txt
Posted Apr 29, 2006
Site secway.org

There is a vulnerability exists in WinISO and UltraISO, which potentially can be exploited by malicious people to compromise a user's system. The vulnerability has been confirmed in version WinISO 5.3,UltraISO V8.0.0.1392, PowerISO v2.9,Magic ISO 5.0 Build 0166

tags | advisory
MD5 | f774737162f3f7718e685159e8d2addd
IE-UserInterface.txt
Posted Apr 29, 2006
Authored by Matthew Murphy | Site student.missouristate.edu

Microsoft Internet Explorer suffers from a potential user interaction race in its handling of security dialogs. As a result, it may be possible for a malicious web site to install software on a visiting system or take other actions that may compromise the privacy or the security of the visitor.

tags | advisory, web
MD5 | 6eaac5db57a5b06689dc6f14bcce938e
EEYEB-20060227.txt
Posted Apr 29, 2006
Site eeye.com

eEye Digital Security has discovered a critical vulnerability in Juniper Networks SSL-VPN Client ActiveX Control. JuniperSetup.ocx ActiveX control is automatically loaded through the web interface of Juniper Networks SSL-VPN. There is an exploitable buffer overflow in the handling a parameter of ActiveX control that will allow a remote attacker to reliably overwrite the stack with arbitrary data and execute arbitrary code though the web browser.

tags | advisory, remote, web, overflow, arbitrary, activex
systems | juniper
MD5 | acbdd272cf9a87bfaa3c00f312ca0440
OpenBulletinBoard.txt
Posted Apr 29, 2006
Authored by Qex

Open Bulletin Board suffers from multiple XSS and SQL injection vulnerabilities.

tags | advisory, vulnerability, sql injection
MD5 | 9d2b6aecb7e49650e8a770fc8564c014
Cisco Security Advisory 20060126-vpn
Posted Apr 29, 2006
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory: Cisco VPN 3000 Concentrator Vulnerable to Crafted HTTP Attack. A malicious user may be able to send crafted packets to a concentrator which may cause the device to halt and/or drop user connections. The power must then be reset on the device to recover.

tags | advisory, web
systems | cisco
MD5 | da29984048b1834dceeaa6299ad0ceaa
MySmartBB-1.1.x.txt
Posted Apr 29, 2006
Authored by BoNy-m

MySmartBB v1.1.x suffers from SQL injection and XSS.

tags | advisory, sql injection
MD5 | ff425bd76f857fd8b3610536b665f564
DevBB-1.0.0.txt
Posted Apr 29, 2006
Authored by Qex

DevBB versions less than or equal to 1.0.0 suffer from XSS.

tags | advisory
MD5 | 99ee68e89602af03815e2ede19284aa3
Secunia-SpeedProject.txt
Posted Apr 29, 2006
Site secunia.com

Secunia Research 26/04/2006 - SpeedProject Products ACE Archive Handling Buffer Overflow: Secunia Research has discovered a vulnerability in various SpeedProject products, which can be exploited by malicious people to compromise a user's system.

tags | advisory, overflow
MD5 | 71ab68726c4ce180e48b726ad86e0a15
EV0125.txt
Posted Apr 29, 2006
Authored by Aliaksandr Hartsuyeu | Site evuln.com

eVuln ID: EV0125 - warforge.NEWS SQL Injection and Multiple XSS Vulnerabilities.

tags | advisory, vulnerability, sql injection
MD5 | eb25b5b1645cb206f4c5d24728f2703f
HP Security Bulletin 2006-11.48
Posted Apr 29, 2006
Authored by Hewlett Packard | Site hp.com

HPSBMA02113 SSRT061148 rev.1 - HP Oracle for OpenView (OfO) Critical Patch Update April 2006: Oracle(R) has issued a Critical Patch Update which contains solutions for a number of potential security vulnerabilities. These vulnerabilities may be exploited locally or remotely to compromise the confidentiality, availability or integrity of Oracle for OpenView (OfO).

tags | advisory, vulnerability
MD5 | 8d18e73b7da99433a37969f6c0814671
HP Security Bulletin 2005-10.74
Posted Apr 29, 2006
Authored by Hewlett Packard | Site hp.com

HPSBUX02075 SSRT051074 rev.4 - HP-UX Running xterm Local Unauthorized Access: A potential security vulnerability has been identified with HP-UX running xterm. The vulnerability could be exploited by a local user to gain unauthorized access.

tags | advisory, local
systems | hpux
MD5 | ecbeda06feed5582c535d393f5be5281
HP Security Bulletin 2006-11.33
Posted Apr 29, 2006
Authored by Hewlett Packard | Site hp.com

HPSBUX02108 SSRT061133 rev.9 - HP-UX running Sendmail, Remote Execution of Arbitrary Code

tags | advisory, remote, arbitrary
systems | hpux
MD5 | c2ea59897237b1015a5d3f5ea829a86d
Zero Day Initiative Advisory 06-011
Posted Apr 29, 2006
Authored by Tipping Point | Site zerodayinitiative.com

ZDI-06-011: Mozilla Firefox Table Rebuilding Code Execution Vulnerability. This vulnerability allows attackers to execute arbitrary code on vulnerable installations of the Mozilla/Firefox web browser and Thunderbird e-mail client. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious e-mail.

tags | advisory, web, arbitrary, code execution
MD5 | e7653be784ba9888857807b479e13c12
Zero Day Initiative Advisory 06-011
Posted Apr 29, 2006
Authored by Tipping Point | Site zerodayinitiative.com

ZDI-06-011: Mozilla Firefox Table Rebuilding Code Execution Vulnerability: This vulnerability allows attackers to execute arbitrary code on vulnerable installations of the Mozilla/Firefox web browser and Thunderbird e-mail client. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious e-mail.

tags | advisory, web, arbitrary, code execution
MD5 | 8d2dba6bbe612172ec200cfd83e7a0e0
Gentoo Linux Security Advisory 200604-18
Posted Apr 29, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200604-18 - Several vulnerabilities were found in Mozilla Suite. Version 1.7.13 was released to fix them. Versions less than 1.7.13 are affected.

tags | advisory, vulnerability
systems | linux, gentoo
MD5 | 95005cf1fb52e3c3eb4d5ad375a5e2d0
Ubuntu Security Notice 275-1
Posted Apr 29, 2006
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 275-1: multiple vulnerabilities in mozilla.

tags | advisory, vulnerability
systems | linux, ubuntu
MD5 | ac004322e7c051a3f99c46605444723d
Ubuntu Security Notice 274-1
Posted Apr 29, 2006
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 274-1: A logging bypass was discovered in the MySQL query parser. A local attacker could exploit this by inserting NUL characters into query strings (even into comments), which would cause the query to be logged incompletely.

tags | advisory, local
systems | linux, ubuntu
MD5 | fc12df206692e97ce1d4ceca1655a86c
Page 1 of 29
Back12345Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Cash Converters Reveals Data Breach
Posted Nov 16, 2017

tags | headline, hacker, cybercrime, data loss, fraud, identity theft
Kaspersky Defends Its Role In NSA Breach
Posted Nov 16, 2017

tags | headline, government, malware, usa, russia, data loss, spyware, nsa
McAfee Anti-Hacking Service Exposed Users To Banking Malware
Posted Nov 16, 2017

tags | headline, malware, bank, cybercrime, fraud, flaw, identity theft, mcafee
DJI Bug Bounty NDA Is 'Not Signable', Say Irate Infosec Researchers
Posted Nov 16, 2017

tags | headline, hacker, flaw
Government Just Figures Out You Can Hack Planes Remotely Due To Poor Design
Posted Nov 15, 2017

tags | headline, government, usa, flaw, terror
UK Security Chief Blames Russia For Hacks
Posted Nov 15, 2017

tags | headline, hacker, government, britain, russia, cyberwar
Forbes 30 Under 30 Conference Site Exposed Attendee Details
Posted Nov 15, 2017

tags | headline, privacy, data loss, flaw, conference
The Motherboard Guide To Not Getting Hacked
Posted Nov 15, 2017

tags | headline, hacker, privacy, data loss, fraud, identity theft
Votes In 18 Nations 'Hacked' In Last Year
Posted Nov 14, 2017

tags | headline, government, usa, russia, fraud, cyberwar, social
Shut The Front Door: Jewson Admits To Data Breach
Posted Nov 14, 2017

tags | headline, hacker, privacy, data loss
View More News →
packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close