what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 66 RSS Feed

Files Date: 2004-10-26 to 2004-10-27

Secunia Security Advisory 12862
Posted Oct 26, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in ClientExec, which can be exploited by malicious people to gain knowledge of various system information.

tags | advisory
SHA-256 | e34f9f7c210030fa2a146be5aaac788f3ddaeb44c8e541a5f34e9fe987be9dc6
Secunia Security Advisory 12857
Posted Oct 26, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Doubles has discovered a vulnerability in Unzoo, which potentially can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 3cdabeba3d1dc3dffb169bbd5bd0b58c2185742b4fe785e4011e6d760822aae1
Ad20041009.txt
Posted Oct 26, 2004
Authored by Sowhat | Site secway.org

Exploitation of design vulnerabilities in various AntiVirus products could allow malicious code to evade detection.

tags | advisory, vulnerability
SHA-256 | 5898f2fbe542b139be43a7c88281c41740d27dda7118eceef4fc2ac0a8b500ce
3com3crwe754g72-a2.txt
Posted Oct 26, 2004
Authored by Cyrille Barthelemy

The 3COM 3crwe754g72-a has a flaw with handling DHCP requests that allows an attacker to inject code into the administration interface.

tags | advisory
SHA-256 | 280e58d7692513ce37b35eb0eebfe4976fc07c5de3e8002b238daf76d8bcc6fa
3com3crwe754g72-a.txt
Posted Oct 26, 2004
Authored by Cyrille Barthelemy

The 3COM 3crwe754g72-a products suffers from information disclosure, clear text information text storage, and bad authentication design.

tags | advisory, info disclosure
SHA-256 | b1fb66a6be2e7d57fed5cdea33bf6148a8a23f8f7598e22ff9e1572cdf898b89
cpanelChmod.txt
Posted Oct 26, 2004
Authored by Karol Wiesek

cPanel 9.4.1 allows logged in users to change permission of any file to 755.

tags | advisory
SHA-256 | 2dbd2ffc962d08b971f885ce0649ce6e7308777ab6e9b6843abb9792970232ac
cpanelChown.txt
Posted Oct 26, 2004
Authored by Karol Wiesek

cPanel 9.4.1 allows logged in users the ability to change ownership of any file to their uid:gid.

tags | advisory
SHA-256 | f2a62268ae0d95df13b67e1ba2aaa36b4ea8a6260de6349f34fa4b680d8793f5
cpanelBackup.txt
Posted Oct 26, 2004
Authored by Karol Wiesek

cPanel 9.4.1 is susceptible to a classic symbolic link attack.

tags | advisory
SHA-256 | 9d09c284862856b892c22b1f28f3233bec231367ca526c5480075e9ddc323a21
proftpdEnum.c
Posted Oct 26, 2004
Authored by Leon Juranic | Site security.lss.hr

Remote proof of concept exploit for the ProFTPD 1.2.x user enumeration vulnerability.

tags | exploit, remote, proof of concept
SHA-256 | 1a9f67d4e3a545bb044fe39bd1c9b16e5d474cf940899ecfd73d586444949990
cht-security.txt
Posted Oct 26, 2004
Authored by R00tCr4ck

CoolPHP 1.0-stable is susceptible to cross site scripting, path disclosure, and directory traversal attacks.

tags | exploit, xss
SHA-256 | e2e1f48f15660fe2081380445cadfd0431fd941dc2a499a07f2c1a2fc79ee69e
javascript.txt
Posted Oct 26, 2004
Authored by Andrew Hunter

Interesting write up discussion how to use Javascript to spoof what page is actually being visited.

tags | advisory, spoof, javascript
SHA-256 | 38085161b297d18b428b1f370a3d241bfbbf219d99c67d2e0d89b2152fe97098
pscriptForum.txt
Posted Oct 26, 2004
Authored by Christoph Jeschke

Powie's PSCRIPT Forum is susceptible to multiple SQL injection vulnerabilities.

tags | advisory, vulnerability, sql injection
SHA-256 | 4d7cb83bc15a5215fda88bb9e4017fcdae79fe47e57fa134c3ca21b47839b2e0
mod_ssl-2.8.21-1.3.32.tar.gz
Posted Oct 26, 2004
Site modssl.org

mod_ssl provides provides strong cryptography for the Apache 1.3 webserver via the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1). It is based on the SSL/TLS toolkit OpenSSL and supports all SSL/TLS related functionality, including RSA and DSA/DH cipher support, X.509 CRL checking, etc. Additionally it provides special Apache related facilities like DBM and shared memory based inter-process SSL session caching. per-URL SSL session renegotiations, DSO support, etc.

Changes: Upgraded to Apache 1.3.32.
tags | encryption
SHA-256 | 1717eb96e9de60a24d73e9616fb7e6bcc9d47891c6e77cb26d4bf529c4382260
yak212.txt
Posted Oct 26, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Yak! versions 2.1.2 and below suffer from remote directory traversal and arbitrary file upload vulnerabilities.

tags | exploit, remote, arbitrary, vulnerability, file upload
SHA-256 | e9eca6add7ddbd7ddf31c47cc1614f574b9a113f384abf9d9a64091993ae4fca
osx86_mmdfdeliver.c
Posted Oct 26, 2004
Authored by Ramon de C Valle

MMDF deliver local root exploit for SCO OpenServer 5.0.7 x86.

tags | exploit, x86, local, root
advisories | CVE-2004-0510
SHA-256 | 5a32e0e43ec0a91696cd2732619706797117d91a12166e0b705430b2a2d691a5
mod_ssl-2.8.20-1.3.31.tar.gz
Posted Oct 26, 2004
Site modssl.org

mod_ssl provides provides strong cryptography for the Apache 1.3 webserver via the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1). It is based on the SSL/TLS toolkit OpenSSL and supports all SSL/TLS related functionality, including RSA and DSA/DH cipher support, X.509 CRL checking, etc. Additionally it provides special Apache related facilities like DBM and shared memory based inter-process SSL session caching. per-URL SSL session renegotiations, DSO support, etc.

Changes: With OpenSSL 0.9.7, prevent session resumption during a renegotiation to force the client to negotiate a new (and acceptable to mod_ssl) cipher suite. Additionally, ensure that a correct cipher suite has been negotiated afterwards.
tags | encryption
advisories | CVE-2004-0885
SHA-256 | 4f307413360dcdc90283082e77179b8aa65256afaf718a5a7bc9668e25c6a72d
3comRouter.txt
Posted Oct 26, 2004
Authored by Ivan Casado

Further information about flaws in 3COM's 3cradsl72 wireless router that suffers from information disclosure and authentication issues.

tags | advisory, info disclosure
SHA-256 | fda580d8674de81d42d6cd8245bcceed32d1ec127b6d704551f4b5de50711eb1
dsa-567.txt
Posted Oct 26, 2004
Site debian.org

Debian Security Advisory 567-1 - Several problems have been discovered in libtiff, the Tag Image File Format library for processing TIFF graphics files. An attacker could prepare a specially crafted TIFF graphic that would cause the client to execute arbitrary code or crash.

tags | advisory, arbitrary
systems | linux, debian
advisories | CVE-2004-0803, CVE-2004-0804, CVE-2004-0886
SHA-256 | 2cafaf13ebb7074ae7a42bf0b32fe9c8377dab4268ad778771b627fc90977295
proftpd12x.txt
Posted Oct 26, 2004
Site security.lss.hr

ProFTPD 1.2.x suffers from a vulnerability that allow for remote user enumeration. It is possible to determine which user names are valid, which are special, and which ones do not exist on the remote system. This can be accomplished by code execution path timing analysis attack at the ProFTPD login procedure.

tags | advisory, remote, code execution
SHA-256 | 2f9b4a192cb97ddf88d2f6a8b9f9136a5959de40a1d46bb06e05a1ac3cfe8582
Secunia Security Advisory 12844
Posted Oct 26, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Positive Technologies has reported some vulnerabilities in AliveSites Forum, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks.

tags | advisory, vulnerability, xss, sql injection
SHA-256 | 374be109ca87132366e44cffcfad2b0aad5368a3ba7c6d86055ce9351f2b7124
Secunia Security Advisory 12842
Posted Oct 26, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Positive Technologies has reported a vulnerability in CyberStrong eShop ASP Shopping Card, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss, asp
SHA-256 | f5a979d861214a19573dc471f793c81f5c37b45fa30a942f3ac15b840a5f48ac
Secunia Security Advisory 12841
Posted Oct 26, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Positive Technologies has reported some vulnerabilities in Dmxready Site Chassis Manager, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks.

tags | advisory, vulnerability, xss, sql injection
SHA-256 | d5757e1e4508ed5c859032585c74edad380d9be9046a321d2b7d69b9c5a60b18
Secunia Security Advisory 12843
Posted Oct 26, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Positive Technologies has reported some vulnerabilities in WowBB Forum, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks.

tags | advisory, vulnerability, xss, sql injection
SHA-256 | e62c985df96bd890c91e339391f7a3ca6237b054a533590d55143fbad3311d95
Secunia Security Advisory 12840
Posted Oct 26, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Positive Technologies has reported some vulnerabilities in DevoyBB, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks.

tags | advisory, vulnerability, xss, sql injection
SHA-256 | 0077b7667403456a9effc10bda118443e9aa1d9ce9f2283fffc6b9fbd8357051
Secunia Security Advisory 12846
Posted Oct 26, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Karb0nOxyde has reported a security issue in 3Com OfficeConnect ADSL Wireless 11g Firewall Router, which can be exploited by malicious people to gain knowledge of sensitive information.

tags | advisory
SHA-256 | 47c9ad97041ed6ea731c0e17894f3bedb373b021b2b8a8d4ca3c7d37224264c5
Page 2 of 3
Back123Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    17 Files
  • 21
    May 21st
    18 Files
  • 22
    May 22nd
    7 Files
  • 23
    May 23rd
    111 Files
  • 24
    May 24th
    27 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    6 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close