exploit the possibilities
Showing 1 - 18 of 18 RSS Feed

Files Date: 2004-09-17

Technical Cyber Security Alert 2004-260A
Posted Sep 17, 2004
Authored by US-CERT | Site cert.org

Technical Cyber Security Alert TA04-260A - Microsoft's Graphic Device Interface Plus (GDI+) contains a vulnerability in the processing of JPEG images. This vulnerability may allow attackers to remotely execute arbitrary code on the affected system. Exploitation may occur as the result of viewing a malicious web site, reading an HTML-rendered email message, or opening a crafted JPEG image in any vulnerable application. The privileges gained by a remote attacker depend on the software component being attacked.

tags | advisory, remote, web, arbitrary
advisories | CVE-2004-0200
MD5 | 48fc2f0a102082a846aaac33df78ce20
Secunia Security Advisory 12535
Posted Sep 17, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Netscape, which can be exploited by malicious people to conduct cross-site scripting attacks, access and modify sensitive information, and compromise a user's system.

tags | advisory, vulnerability, xss
MD5 | 8bbc61259ac43eacdddb6807b933cfc1
Posted Sep 17, 2004
Site gulftech.org

Proof of concept exploit for the recent JPEG buffer overrun vulnerability that crashes any Windows XP system that has not been patched for this flaw.

tags | exploit, overflow, proof of concept
systems | windows, xp
advisories | CVE-2004-0200
MD5 | 4ad5d8988446467319a2cc56f786cbfb
Posted Sep 17, 2004
Authored by nikyt0x | Site nikyt0x.webcindario.com

A file inclusion vulnerability exists in PerlDesk 1.x due to insufficient input validation.

tags | exploit, file inclusion
MD5 | b1e71646dba001852482ea03fa889848
Posted Sep 17, 2004
Authored by Marcus Meissner | Site debian.org

Debian Security Advisory DSA 548-1 - A heap overflow error in imlib could be abused by an attacker to execute arbitrary code on the vicim's machine.

tags | advisory, overflow, arbitrary
systems | linux, debian
advisories | CVE-2004-0817
MD5 | 81695d972d74981c7b1ded330a177ed0
Posted Sep 17, 2004
Authored by Marcus Meissner | Site debian.org

Debian Security Advisory DSA 547-1 - SUSE has discovered several buffer overflows in the ImageMagick graphics library. An attacker could create a malicious image or video file in AVI, BMP, or DIB format that could crash the reading process. It might be possible that carefully crafted images could also allow to execute arbitrary code with the capabilities of the invoking process.

tags | advisory, overflow, arbitrary
systems | linux, suse, debian
advisories | CVE-2004-0827
MD5 | a91fa4ea1964c77a604058d074714c80
Posted Sep 17, 2004
Authored by Delikon | Site delikon.de

UPolyX version 0.3 is a simple polymorphic open-source UPX scrambler. Comes with VC6 source code.

MD5 | 6cb294f883b08ac702017356931a87bb
Posted Sep 17, 2004
Authored by LJ Lemke

ProBoards, based off of the YaBB Forums, is susceptible to a cross site scripting flaw.

tags | advisory, xss
MD5 | 7c0cb377aa677b9975df0a281ac78b2e
iDEFENSE Security Advisory 2004-09-15.t
Posted Sep 17, 2004
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 09.15.04 - Remote exploitation of an input validation error in version 1.2 of GNU radiusd could allow a denial of service. The vulnerability specifically exists within the asn_decode_string() function defined in snmplib/asn1.c. When a very large unsigned number is supplied, it is possible that an integer overflow will occur in the bounds-checking code. The daemon will then attempt to reference unallocated memory, resulting in an access violation that causes the process to terminate.

tags | advisory, remote, denial of service, overflow
advisories | CVE-2004-0849
MD5 | c955131260496f45cbcfeda92c30acfc
Posted Sep 17, 2004
Authored by Tangui Morlier | Site lri.fr

Sandbox for Grids (s4g) is a Linux user-mode sandbox. It offers a secure execution environment for suspicious applications. Written in C, it tries to solve some typical problems of quarantine applications: efficiency and security.

systems | linux
MD5 | fb0db7064e5ad0e97f2fcbfac5cfa103
Posted Sep 17, 2004
Authored by Enrico Kern | Site hzeroseven.org

AntiExploit is an exploit scanner to detect local intruders. It scans for over 3900 suspicious files, has daily database updates, and will act if a file is accessed. It uses the dazuko kernel module, which is also used by clamAV, Amavis, and other virus scanners.

Changes: Added proxy support, SSL support to the update function, and various other enhancements.
tags | kernel, local, virus
systems | unix
MD5 | 7f9b4827fbcb8d7c98816888e3b9da8c
Chris Evans Security Advisory 2004.5
Posted Sep 17, 2004
Authored by Chris Evans

gtk+ version 2.4.4 has heap and stack-based overflows that can allow for the compromise of an account used to browse a malicious XPM file.

tags | advisory, overflow
advisories | CVE-2004-0782, CVE-2004-0783
MD5 | 85691971eba050ddab22aac301a8a167
Chris Evans Security Advisory 2004.3
Posted Sep 17, 2004
Authored by Chris Evans

libXpm versions below 6.8.1 suffer from multiple stack and integer overflows.

tags | advisory, overflow
advisories | CVE-2004-0782, CVE-2004-0783
MD5 | aab6715e16b3b1a7e49bc762fd4978de
Posted Sep 17, 2004
Authored by Stefano Di Paola

PHP versions above 4.1.2 and below or equal to 5.0.1 suffer from an exposure of arbitrary memory due to bad array parsing in php_variables.c.

tags | advisory, arbitrary, php
MD5 | cbe8b992f622c696f3423793c80d3622
SUSE Security Announcement 2004.31
Posted Sep 17, 2004
Authored by Novell, Alvaro Martinez, SUSE | Site suse.com

SUSE Security Announcement - Alvaro Martinez Echevarria has found a remote Denial of Service condition within CUPS which allows remote users to make the cups server unresponsive. Additionally the SUSE Security Team has discovered a flaw in the foomatic-rip print filter which is commonly installed along with cups. It allows remote attackers, which are listed in the printing ACLs, to execute arbitrary commands as the printing user 'lp'.

tags | advisory, remote, denial of service, arbitrary
systems | linux, suse
advisories | CVE-2004-0801, CVE-2004-0558
MD5 | bcdd3c34b76481d7c6e5dfb74adfe134
SITIC Security Advisory 2004.2
Posted Sep 17, 2004
Authored by Swedish IT Incident Center | Site sitic.se

SITIC Vulnerability Advisory - Apache 2.0.x suffers from a buffer overflow when expanding environment variables in configuration files such as .htaccess and httpd.conf. In a setup typical of ISPs, for instance, users are allowed to configure their own public_html directories with .htaccess files, leading to possible privilege escalation.

tags | advisory, overflow
advisories | CVE-2004-0747
MD5 | 71ef694e4ec5ffe97343a8f3e650e977
Posted Sep 17, 2004
Authored by Gael Delalleau

New Firefox, Thunderbird, and Mozilla releases between September 13 and 14 address 7 critical security issues. If you have not already, upgrade today.

tags | advisory
MD5 | d23698cd2c7e6824d796a8cd5276d119
Posted Sep 17, 2004
Authored by Jimmy Scott

The SMC7004VWBR and SMC7008ABR wireless routers allow a spoofed visitor to have administrative access to the devices and to retrieve the real administrator password.

tags | advisory, spoof
MD5 | 39a2f0c90dd9cc7d20e8a06e28e65cce
Page 1 of 1

File Archive:

July 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    34 Files
  • 2
    Jul 2nd
    15 Files
  • 3
    Jul 3rd
    9 Files
  • 4
    Jul 4th
    8 Files
  • 5
    Jul 5th
    2 Files
  • 6
    Jul 6th
    3 Files
  • 7
    Jul 7th
    1 Files
  • 8
    Jul 8th
    15 Files
  • 9
    Jul 9th
    15 Files
  • 10
    Jul 10th
    20 Files
  • 11
    Jul 11th
    17 Files
  • 12
    Jul 12th
    15 Files
  • 13
    Jul 13th
    2 Files
  • 14
    Jul 14th
    1 Files
  • 15
    Jul 15th
    20 Files
  • 16
    Jul 16th
    27 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2019 Packet Storm. All rights reserved.

Security Services
Hosting By