exploit the possibilities
Showing 1 - 25 of 33 RSS Feed

Files Date: 2005-02-28

Secunia Security Advisory 14416
Posted Feb 28, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Lostmon has reported multiple vulnerabilities in CubeCart, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
MD5 | 5ad765bc0ea6c6d3130c7242574e09b0
Secunia Security Advisory 14413
Posted Feb 28, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in phpBB, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
MD5 | 8e9754cd0b4f27572b3c6bec53437cf7
Secunia Security Advisory 14417
Posted Feb 28, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two security issues have been reported in NX Server, which can be exploited by malicious, local users to bypass certain security restrictions.

tags | advisory, local
MD5 | e71d1ac38d8fcc87f33338fba25a95b9
mimeenCap.txt
Posted Feb 28, 2005
Authored by bitlance winter

A possible cross site scripting issue exists with Internet Explorer on Windows XP SP2 via MIME Encapsulation of aggregate HTML documents.

tags | advisory, xss
systems | windows, xp
MD5 | 18089aedd28b7af689e23b871d25539b
Ubuntu Security Notice 89-1
Posted Feb 28, 2005
Authored by Ubuntu | Site ubuntu.com

Ubuntu Security Notice USN-89-1 - Several buffer overflows have been discovered in libxml's FTP connection and DNS resolution functions. Supplying very long FTP URLs or IP addresses might result in execution of arbitrary code with the privileges of the process using libxml.

tags | advisory, overflow, arbitrary
systems | linux, ubuntu
MD5 | baa042cc79ff8a4db238261a6c2a3240
7a69ezine Advisory 22
Posted Feb 28, 2005
Authored by 7a69ezine | Site 7a69ezine.org

7a69ezine Advisory - unzip will extract setuid files from an archive without warning a user when doing so. This is probably a poor design flaw but not necessarily unexpected.

tags | advisory
MD5 | a56797892d1f446d09a9b3750bad88e6
Ubuntu Security Notice 88-1
Posted Feb 28, 2005
Authored by Ubuntu, Rolf Leggewie | Site ubuntu.com

Ubuntu Security Notice USN-88-1 - A couple information disclosure bugs were found in reportbug.

tags | advisory, info disclosure
systems | linux, ubuntu
MD5 | 0d1a4fc532aa9444bcab9ef90cf39e2b
einstein101.txt
Posted Feb 28, 2005
Authored by ATmaCA, Kozan | Site netmagister.com

Einstein versions 1.01 and below local password disclosure exploit.

tags | exploit, local
MD5 | c55ebe92966f7294f9cbea76d60c2610
iDEFENSE Security Advisory 2005-02-28.2
Posted Feb 28, 2005
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 02.28.05 - Local exploitation of a privileged file descriptor leak in KPPP can allow attackers to hijack a system's domain name resolution function. The vulnerability specifically exists due to kppp's failure to properly close privileged file descriptors.

tags | advisory, local
advisories | CVE-2005-0205
MD5 | 7c9635bd682b9738fcdd47a45ee64f06
iDEFENSE Security Advisory 2005-02-28.1
Posted Feb 28, 2005
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 02.28.05 - Remote exploitation of a design error in Mozilla 1.7.3 and Firefox 1.0 may allow an attacker to cause heap corruption, resulting in execution of arbitrary code.

tags | advisory, remote, arbitrary
advisories | CVE-2005-0255
MD5 | eac26605c759004ed6f1bbe6fb8e05f8
Secunia Security Advisory 14402
Posted Feb 28, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in FreeNX, which can be exploited by malicious, local users to bypass certain security restrictions.

tags | advisory, local
MD5 | 61fc0e57bc0cc3e65b629a2603a66438
Secunia Security Advisory 14411
Posted Feb 28, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Adam Zabrocki has reported a vulnerability in WU-FTPD, which can be exploited by malicious users to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | 29d0586f63cc9e090609421108ef0bb4
Secunia Security Advisory 14387
Posted Feb 28, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Randall Perry has reported a weakness in Gaim, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | 21270720cd83d1e1a4defd5cc919d4ba
Secunia Security Advisory 14302
Posted Feb 28, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Kevin Masterson has reported a vulnerability in the WebMod plugin for Half-Life Dedicated Server, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system.

tags | advisory, denial of service
MD5 | 77153511165c97882a42da3944756f47
Secunia Security Advisory 14386
Posted Feb 28, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in Gaim, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | 1fcb287f77e778ae2f94903b2702e468
Advisory-06.txt
Posted Feb 28, 2005
Authored by HaCkZaTaN | Site neossecurity.net

phpBB version 2.0.12 is susceptible a full path disclosure flaw.

tags | advisory
MD5 | 7ff927eed0720c6ca65b73d4124b6eae
firefoxFlaw.txt
Posted Feb 28, 2005
Authored by Paul From Greyhats | Site greyhatsecurity.org

A minor security vulnerability exists in the way that Firefox handles cross-domain image dragging. Versions 1.0.0 and 1.0.1 are affected.

tags | advisory
MD5 | e69c09bb958643390aa2585b90789ea5
badblue-adv.txt
Posted Feb 28, 2005
Authored by Andres Tarasco

SIA has discovered a buffer overflow in EXT.DLL, a module that handles HTTP requests in BadBlue versions below 2.6.

tags | advisory, web, overflow
MD5 | 2430d6f3674e77544e7ba18d6c6ac2ee
Nmap-Parser-0.79.tar.gz
Posted Feb 28, 2005
Authored by Anthony G Persaud | Site npx.sourceforge.net

Nmap Parser is a Perl module that simplifies the process of developing scripts and collecting information from the XML nmap scan data, which can be obtained by using nmap's -oX switch or from the file handle of a pipe to an nmap process. It uses the XML twig library for parsing, and supports filters.

Changes: Various bug fixes and small updates.
tags | tool, perl, nmap
systems | unix
MD5 | 5f9d31586ddd4ec154ac36275ba82405
badblue.cpp
Posted Feb 28, 2005
Authored by Andres Tarasco, Miguel

BadBlue webserver version 2.55 remote buffer overflow exploit. Tested under Windows 2000 Professional SP3/SP4 Spanish, Windows 2000 Server SP4 Spanish, and Windows XP SP1 Spanish.

tags | exploit, remote, overflow
systems | windows, 2k, xp
MD5 | 5529b72cb5a1e55ee5a545eee55e8adc
badblue25.c
Posted Feb 28, 2005
Authored by class101, Andres Tarasco | Site Hat-Squad.com

BadBlue webserver version 2.5 is susceptible to a remote buffer overflow vulnerability that allows for code execution. Full exploit provided.

tags | exploit, remote, overflow, code execution
MD5 | b199afc5574630ee6ece67c8d1c7d8af
knetDoS104c.txt
Posted Feb 28, 2005
Authored by CorryL | Site x0n3-h4ck.org

Knet versions 1.04c and below are susceptible to a remote buffer overflow vulnerability that allows for execution of code. Exploit provided.

tags | exploit, remote, overflow
MD5 | c9d2eb21aeeefd9b8a87f0393fc2cb12
Gentoo Linux Security Advisory 200502-30
Posted Feb 28, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200502-30 - cmd5checkpw contains a flaw allowing local users to access other users cmd5checkpw passwords. Versions 0.22-r1 and below are affected.

tags | advisory, local
systems | linux, gentoo
MD5 | 2cb4c1e153482f5a6eca56dfafbf4131
iDEFENSE Security Advisory 2005-02-25.t
Posted Feb 28, 2005
Authored by iDefense Labs, Adam Zabrocki | Site idefense.com

iDEFENSE Security Advisory 02.25.05 - Remote exploitation of an input validation vulnerability in version 2.6.2 of WU-FPTD could allow for a denial of service of the system by resource exhaustion.

tags | advisory, remote, denial of service
advisories | CVE-2005-0256
MD5 | f08aa952a396e70cea5386b8192c48ac
CIS3513.txt
Posted Feb 28, 2005
Authored by CorryL

CIS WebServer version 3.5.13 is susceptible to a classic directory traversal attack.

tags | exploit
MD5 | 8ddb6a4d31dd61f9b9a44f94d44f79fa
Page 1 of 2
Back12Next

File Archive:

December 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    18 Files
  • 2
    Dec 2nd
    11 Files
  • 3
    Dec 3rd
    23 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close