exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 36 of 36 RSS Feed

Files Date: 2004-09-10 to 2004-09-11

Secunia Security Advisory 12463
Posted Sep 10, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Cosminexus Portal Framework, which potentially can be exploited by malicious users to gain knowledge of sensitive information.

tags | advisory
SHA-256 | 76d20ab5ed868195dc4f3fcd01d059b6fe29b6c0206fb862ffe8e4137d7d377e
SNS Advisory 77
Posted Sep 10, 2004
Authored by Keigo Yamazaki, Little eArth Corporation, Jamie Cameron | Site lac.co.jp

SNS Advisory 77 - A vulnerability in Usermin's Web mail function could result in arbitrary command execution upon viewing a specially crafted HTML mail. Affected Versions: Usermin 1.070, 1.080.

tags | advisory, web, arbitrary
SHA-256 | e89bdbe5b952119110222b898006b2ef7e8f0aafe483e152787abb724d0ec24b
mpg123overflow.txt
Posted Sep 10, 2004
Authored by Davide Del Vecchio | Site alighieri.org

A malicious formatted mp3/2 causes mpg123 to fail header checks, this may allow arbitrary code to be executed with the privilege of the user trying to play the mp3. Versions affected: mpg123-0.59r and maybe mpg123-0.59s.

tags | advisory, arbitrary
advisories | CVE-2004-0805
SHA-256 | a2d0241fdb4fded60501294730f548ebfdea1f165c0724f731adb0b409c87f9f
Gentoo Linux Security Advisory 200409-10
Posted Sep 10, 2004
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200409-10 - Active keystroke logging in multi-gnome-terminal has been discovered in potentially world-readable files. This could allow any authorized user on the system to read sensitive data, including passwords.

tags | advisory
systems | linux, gentoo
SHA-256 | bae035ce2f875684c40b221ef41ac6b897cf0d7d45ede3f7c50754799d36dfa8
keylog.txt
Posted Sep 10, 2004
Authored by priestmaster | Site priestmaster.org

Small white paper regarding keyloggers and basic circumvention.

tags | paper
SHA-256 | 9e625c2d10f7855d72e6d471bb18629a3b4d78f9f4ace1c443a07dc73b3314f4
BJDExploit.rar
Posted Sep 10, 2004
Authored by Delikon | Site delikon.de

Buffer overflow exploit for BlackJumboDog FTP server version 3.6.1 that opens up port 7777 allowing for an executable upload.

tags | exploit, overflow
SHA-256 | d0a6cb671c15fdedc7d54c9417ea2d03b420c6181c6f36fa5782a5866cab377d
57614.html
Posted Sep 10, 2004
Site sunsolve.sun.com

Sun Security Advisory - A remote privileged user may be able to create a denial of the Domain Name System (DNS) service by killing the in.named(1M) daemon. As a result, applications, systems and devices relying on DNS may fail.

tags | advisory, remote
SHA-256 | 0826ed069fd2e0722808b547d408da35d4a2bdbefa22ea0710794abc6cfef2fa
serverviewInsecure.txt
Posted Sep 10, 2004
Authored by l0om | Site excluded.org

The Serverview server management product is susceptible to multiple denial of service and data corruption attacks due to insecure file permissions.

tags | advisory, denial of service
SHA-256 | 108fcccc833eb5fcd6c72e00dec99910326570a898687b5d0d5fcb0084408a96
Secunia Security Advisory 12467
Posted Sep 10, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Various unspecified vulnerabilities with an unknown impact have been reported in Tutti Nova. Successful exploitation reportedly requires that register_globals is enabled.

tags | advisory, vulnerability
SHA-256 | c4ed94876ef597e19cadbbd68b362e03571529326f3383140c317e885c4dd4e5
Secunia Security Advisory 12466
Posted Sep 10, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - An unspecified vulnerability has been reported in phpGroupWare, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 98742018ad84bf0b519f0a2cd8da05425b11f00020770e078acbeb61e2dedbbe
Secunia Security Advisory 12445
Posted Sep 10, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in gnubiff 1.x, which potentially can be exploited to cause a DoS (Denial of Service) or compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
SHA-256 | 01155a63fa5731110f17ff26e9106cc83a30d52992c534494f795e288c5f8507
Page 2 of 2
Back12Next

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    25 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close