what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 101 - 125 of 190 RSS Feed

Files

ms-sqlbi.txt
Posted Jul 12, 2002
Authored by Mark Litchfield | Site ngssoftware.com

NGSSoftware Security Advisory - Microsoft's SQL Server 2000's BULK INSERT query contains a buffer overflow which allows remote code execution as LOCAL SYSTEM. To be able to use the 'BULK INSERT' query one must have the privileges of the database owner or dbo. Microsoft Security bulletin available here..

tags | remote, overflow, local, code execution, sql injection
SHA-256 | beed091eb087b240ade24c710d5e6642ca80b3f180a2cb4baf37c543862b35d4
wp-02-0012.txt
Posted Jul 11, 2002
Authored by Matt Moore | Site westpoint.ltd.uk

Westpoint Security Advisory wp-02-0012 - The Carello shopping cart v1.3 uses hidden fields to specify names of executables on the server, allowing an attacker to run arbitrary commands.

tags | arbitrary
SHA-256 | 9887d380b7d1e54dae208b58a265e0fcad7f19f519c4c30e79789a422c384c4c
wp-02-0008.txt
Posted Jul 11, 2002
Authored by Matt Moore | Site westpoint.ltd.uk

Westpoint Security Advisory wp-02-0008 - Apache Tomcat v4.0.3 is vulnerable to cross site scripting attacks by using the /servlet/ mapping. Linux and Win32 versions of Tomcat are vulnerable.

tags | xss
systems | linux, windows
SHA-256 | 7c8753a353b10b9fcac8e6d4fcd9c7fd8be17eae6139f7796cc2b8b8fa6dea83
wp-02-0001.txt
Posted Jul 11, 2002
Authored by Matt Moore | Site westpoint.ltd.uk

Westpoint Security Advisory wp-02-0001 - The GoAhead Web Server v2.1 for Windows NT/98/95/CE, Embedded Linux, Netware, and others contains directory traversal and cross site scripting vulnerabilities. Exploit URL's included.

tags | web, vulnerability, xss
systems | linux, windows
SHA-256 | 3e2b101f0ae13c006aead327c7e7c21f64f42fc6791980b2cd6bb6c96186df8d
bea.perfpack.txt
Posted Jul 10, 2002
Authored by Peter Grundl | Site kpmg.dk

The Bea Weblogic server v5.1.x - 7.0 on on Windows 2000 and NT s vulnerable to a data/connection flooding vulnerability that will result in the web service crashing with a report of an error in NTDLL.DLL.

tags | web
systems | windows
SHA-256 | dd160476ade9f37a3ffeb6de0034fa4f92660fc33d0466f882498e45e0c25e92
watchguard.dvcp.txt
Posted Jul 10, 2002
Authored by Peter Grundl, Andreas Sandor | Site kpmg.dk

Watchguard Firebox Dynamic VPN Configuration Protocol Denial of Service - Malicious users can crash the Dynamic VPN Configuration Protocol service (DVCP) by sending a malformed packet to the listener service on TCP port 4110. Watchguard Firebox firmware v5.x.x is vulnerable.

tags | denial of service, tcp, protocol
SHA-256 | f7fefdb893755ef161385dc353bea35abe34c677710fe9ef1b8f81eb0e3212b7
iplanet.search.txt
Posted Jul 10, 2002
Authored by David Litchfield | Site ngssoftware.com

The Sun iPlanet Web Server iWS 4.1 and 6.0 contains a remotely exploitable buffer overflow if the search feature is enabled.

tags | web, overflow
SHA-256 | 569fc6dbae95b454b1cb7139d2f9325513c3521f10923c0642d0afb59f288e67
2fax.txt
Posted Jul 8, 2002
Authored by Crazy Einstein

2fax prior to v2.02 for Linux and Windows contains a locally exploitable buffer overflow.

tags | overflow
systems | linux, windows
SHA-256 | 14214e7f949c470b58c600c51e76ebc4d256a68496c77854fa8efd95dc259861
Squid.2002.3.txt
Posted Jul 6, 2002
Site squid-cache.org

Squid Proxy Cache security advisory SQUID-2002:3 - Several vulnerabilities found in Squid can be used to remotely execute code on systems running this software. All versions prior to squid-2.4.STABLE7 are affected. The user executing the attack must be allowed to use the proxy for any potential attack to be successful.

tags | vulnerability
SHA-256 | 74819bb3cc70f2c8058a9215528fef9dc6eebee2059635d21306734aace9596e
ms-comsrvr.txt
Posted Jul 4, 2002
Authored by Mark Litchfield | Site ngssoftware.com

NGSSoftware Security Advisory - Microsoft's Commerce Server 2000 and 2002 contains several remotely exploitable buffer overruns in the Profile Service and a CGI executable that allows the execution of arbitrary commands.

tags | overflow, arbitrary, cgi
SHA-256 | 5f49c7b4916d833e0dce23ac8eb20f45b61dfa9a25d2ab7df12e6438d85ed78c
mod_ssl_off_by_one.txt
Posted Jul 3, 2002
Authored by Frank Denis

An off-by-one overflow in Apache mod_ssl v2.4.9 and below can be used to by local users to execute code with the privileges of the web server.

tags | web, overflow, local
SHA-256 | bc874d50af7de42b9e7892022426567f87b4cec80e88a6470ac08c1097e61b27
cifslogin.txt
Posted Jun 25, 2002
Authored by Alex Hernandez

Sharity Cifslogin Buffer Overflow - Several command line options can be made to crash /opt/cifsclient/bin/cifslogin, local root is possible.

tags | overflow, local, root
SHA-256 | 8f90a70db1881faaf91f285d05768df02e91bbfd9008ee9584cc954887ea8e03
angrypacket-cisco-vpnclient.txt
Posted Jun 20, 2002
Site sec.angrypacket.com

AngryPacket Security Advisory - A vulnerability found in the Cisco VPN client for Linux can allow local users to gain root level privileges. This vulnerability affects VPN client v3.5.1 and below.

tags | local, root
systems | cisco, linux
SHA-256 | 3f0616261733901823c963b777907ca611ed3bca722aab3941413458f07acfc2
apache-chunked.txt
Posted Jun 19, 2002
Authored by Mark Litchfield, Apache developers | Site httpd.apache.org

Apache Advisory - A vulnerability found in the chucked encoding implementation of the Apache 1.3.24 and 2.0.36 and below servers can under some conditions be used to remotely execute code on systems running this software.

advisories | CVE-2002-0392
SHA-256 | 3576dbeaf81b78b50b61214cbe4d286dbbfd04b6af6a433d492bc3bd471c2dfc
apache-chunked-xforce.txt
Posted Jun 19, 2002
Authored by ISS | Site iss.net

ISS reported a vulnerability found in the chucked encoding implementation of the Apache 1.3.24 and 2.0.36 and below servers that under some conditions can be used to remotely execute code on systems running this software. Note that the by ISS supplied patch, which is included in this advisory, does not fix this vulnerability.

advisories | CVE-2002-0392
SHA-256 | eda6ad9d37711b41b271339dd3102eebcf86b868e4acbe53efdd0b47ba875df1
cgiemail.relay.txt
Posted Jun 15, 2002
Authored by Detack GmbH | Site detack.de

Cgiemail has an open relaying bug which allows an attacker to send spam via the web because the developers did not filter out %0a's that are passed to sendmail -t.

tags | web
SHA-256 | 0385591b8975110385385d7d239933f23c045c3d5ffef248f5f3557d97865354
wp-02-0007.txt
Posted Jun 14, 2002
Authored by Matt Moore | Site westpoint.ltd.uk

Westpoint Security Advisory - SQLXML allows XML data to be transferred to and from SQL Server, returning database queries as XML. SQLXML has two vulnerabilities - a buffer overflow in the SQLXML ISAPI filter and a cross site scripting vulnerability. These bugs are discussed in MS02-030.

tags | overflow, vulnerability, xss
SHA-256 | 11b451a50a7794ab52be537a852add9ac09a0ab37b6dff3b1edbf49c061125b0
ircit-3.1.txt
Posted Jun 13, 2002
Authored by Gobbles Security | Site bugtraq.org

Gobbles Security Advisory - IrcIT v3.1 and below contains remotely exploitable buffer overflows.

tags | overflow
SHA-256 | 97ee352d2d7fd9fa4acd8cc8a695704a73bac3426eeff5e2abf032545734f145
ora-reports.txt
Posted Jun 13, 2002
Authored by David Litchfield | Site ngssoftware.com

The Oracle 9iAS Reports Server contains a remotely exploitable buffer overrun vulnerability in one of its CGI's. By supplying an overly long database name parameter to the rwcgi60 with the setauth method, an attacker can run code with the privileges of the web server, or SYSTEM on windows.

tags | web, overflow, cgi
systems | windows
SHA-256 | 36a7f0df817729ef91da8556ccad29083ab8e3a5fd0b1f644b31ce787342fffa
ora-lsnr.txt
Posted Jun 13, 2002
Authored by David Litchfield | Site ngssoftware.com

The Oracle TNS Listener version 9i contains a buffer overflow vulnerability which can be exploited over tcp port 1521 to gain remote SYSTEM / root access. By supplying an overly long SERVICE_NAME parameter an attacker can execute code before any logging is done.

tags | remote, overflow, root, tcp
SHA-256 | 09848a3033d275f59cf4d5ef91914e928a9a4fc43a64f46b30fa0e2a771e35d4
blackice.3.1.txt
Posted Jun 10, 2002
Site kpmg.dk

The BlackICE Agent v3.1 for Windows 2000 laptop can be bypassed. Fix available here.

systems | windows
SHA-256 | 29b2801570bed5f11b3e08f1b8cf265e4a34f19dc275214fdca91d363501156f
netric-adv006.txt
Posted Jun 5, 2002
Authored by eSDee, netric | Site netric.org

Nullsoft's SHOUTcast v1.8.9 contains a buffer overflow which can be exploited by a DJ to gain shell access to the system. Windows, Linux, and FreeBSD are known to be vulnerable.

tags | overflow, shell
systems | linux, windows, freebsd
SHA-256 | 7158bd00e24e44b040e478a07b40240d2a892aa29113f26ce162fe843ee4f733
telhack-shambala.txt
Posted Jun 3, 2002
Authored by Daniel Nystrum

A directory traversal vulnerability found in Shambala v4.5 can lead to the disclosure of files that are stored outside the served directories. More info on this bug available here.

SHA-256 | 792ce8a4307b49251659094a08eb30bb916bc5d232a44e48c27fb7fa5360260f
CLA-2002:490
Posted Jun 3, 2002
Site distro.conectiva.com.br

Conectiva Security Advisory CLA-2002:490 - Several vulnerabilities were found in the Mozilla package v1.0rc1 which allows hostile web sites to read and list local files. The vulnerability was related to the XMLHTTP, a component that is primarily used for retrieving XML documents from a web server. Fixed packages have now been released for Conectiva Linux 6.0, 7.0, and 8.

tags | web, local, vulnerability
systems | linux
SHA-256 | c7bcc06f713f54cc826c79b1c5b09093f8a35b0ee1fae86fccaad9566107e1f1
yahoo-im.txt
Posted May 30, 2002
Authored by AD Marshall

Yahoo! Instant Messenger (YIM) vulnerabilities. Affects Yahoo! Messenger v(5, 0, 0, 1061) for all Windows versions. Includes buffer overflow information and how to hijack another IM client.

tags | overflow, vulnerability
systems | windows
SHA-256 | 560f2f1480e78404b85ae116917fa30a3d36064a7073a97a2a19d1fc7fcd8d6c
Page 5 of 8
Back34567Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Google Patches Critical Chrome Vulnerability
Posted Apr 24, 2024

tags | headline, flaw, google, patch, chrome
Hackers Are Using Developing Countries For Ransomware Practice
Posted Apr 24, 2024

tags | headline, hacker, malware, cybercrime, fraud, cryptography
Authorities Investigate LabHost Users After Phishing Service Shutdown
Posted Apr 23, 2024

tags | headline, cybercrime, fraud, phish
Windows Vulnerability Reported By The NSA Exploited To Install Russian Malware
Posted Apr 23, 2024

tags | headline, government, microsoft, usa, russia, flaw, cyberwar, spyware, nsa
UnitedHealth Admits Breach Could Cover Substantial Proportion Of People In America
Posted Apr 23, 2024

tags | headline, hacker, privacy, data loss
Microsoft DRM Hack Could Allow Movie Downloads From Streaming
Posted Apr 23, 2024

tags | headline, microsoft, flaw, pirate
Over A Million Neighbourhood Watch Members Exposed
Posted Apr 23, 2024

tags | headline, privacy, britain, data loss
MITRE Hacked By State Sponsored Group Via Ivanti Zero Days
Posted Apr 23, 2024

tags | headline, hacker, government
Russia's Sandworm APT Linked To Attack On Texas Water Plant
Posted Apr 18, 2024

tags | headline, malware, usa, russia, cyberwar, scada
EU Tells Meta It Can't Paywall Privacy
Posted Apr 18, 2024

tags | headline, government, privacy, facebook, social
View More News →
packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close