Exploit the possiblities
Showing 1 - 25 of 32 RSS Feed

Files Date: 2005-11-04

Gentoo Linux Security Advisory 200511-3
Posted Nov 4, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200511-03 - Chris Evans and Daniel Eisenbud independently discovered two out-of-bounds memory write operations and a NULL pointer dereference in giflib. Versions less than 4.1.4 are affected.

tags | advisory
systems | linux, gentoo
MD5 | 6354303f236bff2b62bbc3e818842612
phpinfoXSS.txt
Posted Nov 4, 2005

Proof of concept code showing the simple syntax needed to exploit the cross site scripting vulnerability in phpinfo.php for PHP versions 4.4.0 and below and 5.0.5 and below.

tags | exploit, php, xss, proof of concept
MD5 | 4ff556410905697a208875fa60c64129
Debian Linux Security Advisory 881-1
Posted Nov 4, 2005
Authored by Debian | Site security.debian.org

Debian Security Advisory DSA 881-1 - Yutaka Oiwa discovered a vulnerability in the Open Secure Socket Layer (OpenSSL) library that can allow an attacker to perform active protocol-version rollback attacks that could lead to the use of the weaker SSL 2.0 protocol even though both ends support SSL 3.0 or TLS 1.0.

tags | advisory, protocol
systems | linux, debian
advisories | CVE-2005-2969
MD5 | 5462c15443d8a8bbf5cc624c9bc19dd4
cerberusDownload.txt
Posted Nov 4, 2005
Authored by cumhur onat

By playing with parameter manipulation, you can download other people's uploads in Cerberus Helpdesk.

tags | exploit
MD5 | 0c43ab5599acc8f4875c865a4d4b9278
quicktime-pict-adv.txt
Posted Nov 4, 2005
Authored by Piotr Bania | Site pb.specialised.info

Apple QuickTime PictureViewer is reported prone to remote memory overwrite vulnerability (exploitable via remotely originated content). Expansion of compressed PICT data could exceed the size of the destination buffer, this cause an memory overwrite. The vulnerability may lead to remote code execution when specially crafted picture file (PICT file) is being loaded. Software affected: QuickTime package 7.0.1 for Mac OS X 10.3, QuickTime package 7.0.1 for Mac OS X 10.4, QuickTime package 6.5.2 for Mac OS X 10.3, QuickTime package 6.5.2 for Mac OS X 10.2, QuickTime package 7x for Windows.

tags | advisory, remote, code execution
systems | windows, apple, osx
advisories | CVE-2005-2756
MD5 | b9e93bbe39bd79cdd794441f8de22a7a
quicktime-mov-dos-adv.txt
Posted Nov 4, 2005
Authored by Piotr Bania | Site pb.specialised.info

Apple QuickTime Player is reported prone to remote denial of service attack (exploitable via remotely originated content). A missing movie attribute is interpreted as an extension, but the absence of the extension is not flagged as an error, resulting in a de-reference of a NULL pointer. This will cause a denial of service against any application loading remotely-originated content. Software affected: QuickTime package 7.0.1 for Mac OS X 10.3, QuickTime package 7.0.1 for Mac OS X 10.4, QuickTime package 6.5.2 for Mac OS X 10.3, QuickTime package 6.5.2 for Mac OS X 10.2, QuickTime package 7x for Windows.

tags | advisory, remote, denial of service
systems | windows, apple, osx
advisories | CVE-2005-2755
MD5 | dbf7f3da1cbe4327e8bdad1bb062b127
quicktime-mov-io2-adv.txt
Posted Nov 4, 2005
Authored by Piotr Bania | Site pb.specialised.info

Apple QuickTime Player is reported prone to remote integer overflow vulnerability (exploitable via remotely originated content). Improper movie attributes could result in a very large memory copy, which lead to potential memory overwrite. The vulnerability may lead to remote code execution when specially crafted video file (MOV file) is being loaded. Software affected: QuickTime package 7.0.1 for Mac OS X 10.3, QuickTime package 7.0.1 for Mac OS X 10.4, QuickTime package 6.5.2 for Mac OS X 10.3, QuickTime package 6.5.2 for Mac OS X 10.2, QuickTime package 7x for Windows.

tags | advisory, remote, overflow, code execution
systems | windows, apple, osx
advisories | CVE-2005-2754
MD5 | 1924bf7429828fe9141d27e2dde3152f
quicktime-mov-io1-adv.txt
Posted Nov 4, 2005
Authored by Piotr Bania | Site pb.specialised.info

Apple QuickTime Player is reported prone to remote integer overflow vulnerability (exploitable via remotely originated content). A sign extension of an embedded "Pascal" style string could result in a very large memory copy, which lead to potential memory overwrite. The vulnerability may lead to remote code execution when specially crafted video file (MOV file) is being loaded. Software affected: QuickTime package 7.0.1 for Mac OS X 10.3, QuickTime package 7.0.1 for Mac OS X 10.4, QuickTime package 6.5.2 for Mac OS X 10.3, QuickTime package 6.5.2 for Mac OS X 10.2, QuickTime package 7x for Windows.

tags | advisory, remote, overflow, code execution
systems | windows, apple, osx
advisories | CVE-2005-2753
MD5 | 0e0441e5cc2b8166ee1a25124bab245d
H4-CREW-000003.txt
Posted Nov 4, 2005
Authored by h4 Crew

Superclick is susceptible to cross site scripting attacks in popup.php.

tags | exploit, php, xss
MD5 | a5a8e07c7b62bd8fb8b16ed975c2b627
Secunia Security Advisory 17417
Posted Nov 4, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Luigi Auriemma has reported a vulnerability in Battle Carry, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | 34f1ea6e4163babccda99bd57d45e902
Secunia Security Advisory 17422
Posted Nov 4, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Luigi Auriemma has reported a vulnerability in Glider collect'n kill with an unknown impact.

tags | advisory
MD5 | 07d23d896cc98ec1c21f497acc5b1626
Secunia Security Advisory 17423
Posted Nov 4, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Luigi Auriemma has reported some vulnerabilities in Scorched 3D, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
MD5 | ef27a8b134988e97e24411ed677eec45
Secunia Security Advisory 17424
Posted Nov 4, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Luigi Auriemma has reported a vulnerability in GO-Global for Windows, which potentially can be exploited by malicious users to compromise a vulnerable system.

tags | advisory
systems | windows
MD5 | 52feab50dd2f14d18a56a6a33eb241de
Secunia Security Advisory 17428
Posted Nov 4, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Piotr Bania has reported some vulnerabilities in Apple QuickTime, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system.

tags | advisory, denial of service, vulnerability
systems | apple
MD5 | b3a194eb5b2db92da5f1e5b776b58576
Secunia Security Advisory 17429
Posted Nov 4, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Lotus Domino, which potentially can be exploited by malicious users to cause a DoS (Denial of Service), or with unknown impact.

tags | advisory, denial of service, vulnerability
MD5 | ff5b24b246d960cba4e3014a1d2986d1
Secunia Security Advisory 17431
Posted Nov 4, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - cumhur onat has reported a vulnerability in Cerberus Helpdesk, which can be exploited by malicious users to disclose sensitive information.

tags | advisory
MD5 | 5aa15ad1296580e1e0b9a3c2a1170324
Secunia Security Advisory 17432
Posted Nov 4, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Blue Coat has acknowledged a vulnerability in some products, which potentially can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
MD5 | 15a46e174625d51a5c7858359719ddee
Secunia Security Advisory 17434
Posted Nov 4, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Clam AntiVirus (clamav), which potentially can be exploited by malicious people to cause a DoS (Denial of Service), or with unknown impact.

tags | advisory, denial of service, vulnerability
MD5 | 9e0f2de588400130ee2d14d53283c019
Secunia Security Advisory 17435
Posted Nov 4, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - rgod has discovered a vulnerability in CuteNews, which can be exploited by malicious people to disclose sensitive information and compromise a vulnerable system.

tags | advisory
MD5 | 7619c9734e373e149ea69bcc1c3c4412
Secunia Security Advisory 17436
Posted Nov 4, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Chris Evans has reported two vulnerabilities in libungif, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system.

tags | advisory, denial of service, vulnerability
MD5 | ba02a8642a464f183b562ecd27c6664a
Secunia Security Advisory 17438
Posted Nov 4, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for libungif. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system.

tags | advisory, denial of service, vulnerability
systems | linux, fedora
MD5 | 21b729f14b0e286ebf2ded52488af33a
Secunia Security Advisory 17439
Posted Nov 4, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in AIX, which has an unknown impact.

tags | advisory
systems | aix
MD5 | 63cfa0c90ea6a7b57e5499ff9e107b80
Secunia Security Advisory 17442
Posted Nov 4, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for libungif. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system.

tags | advisory, denial of service, vulnerability
systems | linux, redhat
MD5 | d1012328b59edd581f2447357ce98a5f
20051021.MS05-047.c
Posted Nov 4, 2005

Remote exploit that makes use of a buffer length checking issue in the Microsoft UMPNPMGR PNP_GetDeviceList (services.exe - ms05-047).

tags | exploit, remote
advisories | CVE-2005-2120
MD5 | 7da4be57b49181300f904d409eadbd69
qbrute.zip
Posted Nov 4, 2005
Authored by Qex

QBrute 1.0 is a MD5 Calculator and Cracker written in Perl.

tags | cracker, perl
MD5 | fff7ec23b7af022e2b304eb9762b560e
Page 1 of 2
Back12Next

File Archive:

December 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    15 Files
  • 2
    Dec 2nd
    2 Files
  • 3
    Dec 3rd
    1 Files
  • 4
    Dec 4th
    15 Files
  • 5
    Dec 5th
    15 Files
  • 6
    Dec 6th
    18 Files
  • 7
    Dec 7th
    17 Files
  • 8
    Dec 8th
    15 Files
  • 9
    Dec 9th
    13 Files
  • 10
    Dec 10th
    4 Files
  • 11
    Dec 11th
    28 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close