exploit the possibilities
Showing 51 - 75 of 80 RSS Feed

Files Date: 2004-10-27 to 2004-10-28

ubbthreads.txt
Posted Oct 27, 2004
Authored by Florian Rock

UBB.threads 3.4.x is susceptible to SQL injection attacks.

tags | exploit, sql injection
MD5 | fc344cd4224c2f21e802441c8c6ef5a9
serendipHTTP.txt
Posted Oct 27, 2004
Authored by Chaotic Evil

A HTTP Response Splitting vulnerability has been reported in Serendipity 0.7-beta4.

tags | advisory, web
MD5 | db6a51a1b0c6c6234457ba964db7b11c
dsa-573.txt
Posted Oct 27, 2004
Site debian.org

Debian Security Advisory 573-1 - Chris Evans discovered several integer overflows in xpdf, that are also present in CUPS, the Common UNIX Printing System, which can be exploited remotely by a specially crafted PDF document.

tags | advisory, overflow
systems | linux, unix, debian
advisories | CVE-2004-0888
MD5 | e2c4e1c29299b78f7da86159ed8d6fe6
Gentoo Linux Security Advisory 200410-19
Posted Oct 27, 2004
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200410-19 - The catchsegv script in the glibc package is vulnerable to symlink attacks, potentially allowing a local user to overwrite arbitrary files with the rights of the user running the script.

tags | advisory, arbitrary, local
systems | linux, gentoo
MD5 | 8c29131f33236e61b79b647c46f6c023
altiris.txt
Posted Oct 27, 2004
Authored by Brian Gallagher | Site DiamondSea.com

Altiris Deployment server versions 5.x, 6.x, and possibly others are susceptible to a design flaw that allows an attacker to take complete control over all Altiris clients on a network with relative ease.

tags | advisory
MD5 | 5d13cbee590d98efdbaccd8d914aacf4
Secunia Security Advisory 12916
Posted Oct 27, 2004
Authored by Secunia, Max Vozeler | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Speedtouch USB Driver, which potentially can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
MD5 | bd9eaac2e2cd8be12bcb3c9376cbb01e
Secunia Security Advisory 12909
Posted Oct 27, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Serendipity, which can be exploited by malicious people to conduct script insertion and cross-site scripting attacks.

tags | advisory, xss
MD5 | dc31fe52bd039d06afae8e196c57a50c
dsa-572.txt
Posted Oct 27, 2004
Site debian.org

Debian Security Advisory 572-1 - A problem has been discovered in ecartis, a mailing-list manager, which allows an attacker in the same domain as the list admin to gain administrator privileges and alter list settings.

tags | advisory
systems | linux, debian
advisories | CVE-2004-0913
MD5 | c59cb109affb7708979f4e265d2c07c6
SUSE Security Announcement 2004.37
Posted Oct 27, 2004
Authored by Novell | Site suse.com

SUSE Security Announcement - An integer underflow problem in the iptables firewall logging rules can allow a remote attacker to crash the machine by using a handcrafted IP packet. This attack is only possible with firewalling enabled.

tags | advisory, remote
systems | linux, suse
advisories | CVE-2004-0816, CVE-2004-0887
MD5 | 02b512e803e2900214b02d8177cd1ce5
NSFOCUS Security Advisory 2004.2
Posted Oct 27, 2004
Authored by NSFOCUS | Site nsfocus.com

NSFOCUS Security Advisory SA2004-02 - NSFOCUS Security Team found a security vulnerability in the program stmkfont of an HP-UX system. Exploiting this vulnerability, local attackers could gain group bin privileges.

tags | advisory, local
systems | hpux
advisories | CVE-2004-0965
MD5 | 0742a5f27abfff845168dab3ec030241
eSlate3000.txt
Posted Oct 27, 2004
Authored by Jason Coombs

Interesting write up of using an eSlate3000 made by Hart Intercivic. Due to their early arrival, Honolulu County has already started using them for walk-in absentee ballots.

tags | advisory
MD5 | 025a5931d8ee686fa6ee6d6bbffcd019
Gentoo Linux Security Advisory 200410-17
Posted Oct 27, 2004
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200410-17 - OpenOffice.org uses insecure temporary files which could allow a malicious local user to gain knowledge of sensitive information from other users' documents.

tags | advisory, local
systems | linux, gentoo
MD5 | 99fe4ec6a92f27c7a540acfa6731c090
Secunia Security Advisory 12881
Posted Oct 27, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Roger Sylvain has reported a vulnerability in Nortel Contivity VPN Client, potentially allowing malicious people to open a VPN tunnel to the client.

tags | advisory
MD5 | 24587c615bb3ca2d06a6e56da6c48ac4
linuxRace.txt
Posted Oct 27, 2004
Authored by Alan Cox

Linux 2.6.9 fixes a set of race conditions in the Linux terminal subsystem which are believed to go back to 2.2 kernels if not earlier. The race shows up problematically in two places.

tags | advisory, kernel
systems | linux
MD5 | 5a2a6f231a171671c09eb5fb9804d236
aos2bof.zip
Posted Oct 27, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Remote proof of concept exploit for Privateer's Bounty: Age of Sail II versions 1.04.151 and below that makes use of a buffer overflow.

tags | exploit, remote, overflow, proof of concept
MD5 | 86aaf022caa2185ad119f2c4e5e1d1f3
privateer104141.txt
Posted Oct 27, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Privateer's Bounty: Age of Sail II versions 1.04.151 and below is affected by a buffer overflow occurring when an attacker joins on the server using a nickname at least 144 bytes in length.

tags | advisory, overflow
MD5 | 25af558bcfdab021be410c93909f0826
dsa-570.txt
Posted Oct 27, 2004
Site debian.org

Debian Security Advisory 570-1 - Several integer overflows have been discovered by its upstream developers in libpng, a commonly used library to display PNG graphics. They could be exploited to cause arbitrary code to be executed when a specially crafted PNG image is processed.

tags | advisory, overflow, arbitrary
systems | linux, debian
advisories | CVE-2004-0955
MD5 | a5eeff813aaaaaaf3c5a04b0266922fb
dsa-571.txt
Posted Oct 27, 2004
Site debian.org

Debian Security Advisory 571-1 - Several integer overflows have been discovered by its upstream developers in libpng, a commonly used library to display PNG graphics. They could be exploited to cause arbitrary code to be executed when a specially crafted PNG image is processed.

tags | advisory, overflow, arbitrary
systems | linux, debian
advisories | CVE-2004-0955
MD5 | b330f88534c82e30bbf221dbaa75002d
Secunia Security Advisory 12896
Posted Oct 27, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - HP has acknowledged a vulnerability in the Java Runtime Environment software for HP-UX, which can be exploited by untrusted applets to gain escalated privileges on a vulnerable system.

tags | advisory, java
systems | hpux
MD5 | 7e2cc6c9a869f035594eb833ca2fde5f
Secunia Security Advisory 12895
Posted Oct 27, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - HP has acknowledged a vulnerability in HP CIFS Server, which can be exploited by malicious users to access arbitrary files and directories.

tags | advisory, arbitrary
MD5 | 3cefaf56e7b916d0df1cd6c37ee9da03
Secunia Security Advisory 12887
Posted Oct 27, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Gaim, which potentially can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error within the handling of MSN SLP messages. This can be exploited to cause a buffer overflow by supplying a specially crafted sequence of MSN SLP messages.

tags | advisory, overflow
MD5 | c9ff511efbf2de9dc8baecbb8e43d8e7
saMultiple.txt
Posted Oct 27, 2004
Authored by Jakob Balle | Site secunia.com

Secunia Research Advisory - Multiple browsers suffer from multiple vulnerabilities. It is possible for a inactive tab to spawn dialog boxes e.g. the JavaScript Prompt box or the Download dialog box, even if the user is browsing/viewing a completely different web site in another tab. It is also possible for an inactive tab to always gain focus on a form field in the inactive tab, even if the user is browsing/viewing a completely different web site in another tab.

tags | advisory, web, javascript, vulnerability
MD5 | 5d9bcf2b56ac00a434ce9b989b602923
malware10192004.txt
Posted Oct 27, 2004
Authored by http-equiv | Site malware.com

Technical exercise demonstrating the enormously elaborate methods required to defeat the current security mechanisms in place in both Microsoft Windows XP SP2 and Internet Explorer 6.00 SP2 fully patched.

tags | advisory
systems | windows, xp
MD5 | 51b24b1f7ff67c137b10c010626f02a9
netscapewebmail_advisory.txt
Posted Oct 27, 2004
Authored by Steven | Site lovebug.org

Netscape.net Webmail is susceptible to a cross site scripting attack.

tags | advisory, xss
MD5 | 80b7f34b2c05e4eb63aae8f232b64c25
aolwebmail_advisory.txt
Posted Oct 27, 2004
Authored by Steven | Site lovebug.org

AOL Webmail suffers from cross site scripting flaws.

tags | advisory, xss
MD5 | 9f0bdcc9129d7889bdfad4e7dbb5d11b
Page 3 of 4
Back1234Next

File Archive:

July 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    34 Files
  • 2
    Jul 2nd
    15 Files
  • 3
    Jul 3rd
    9 Files
  • 4
    Jul 4th
    8 Files
  • 5
    Jul 5th
    2 Files
  • 6
    Jul 6th
    3 Files
  • 7
    Jul 7th
    1 Files
  • 8
    Jul 8th
    15 Files
  • 9
    Jul 9th
    15 Files
  • 10
    Jul 10th
    20 Files
  • 11
    Jul 11th
    17 Files
  • 12
    Jul 12th
    16 Files
  • 13
    Jul 13th
    2 Files
  • 14
    Jul 14th
    1 Files
  • 15
    Jul 15th
    20 Files
  • 16
    Jul 16th
    27 Files
  • 17
    Jul 17th
    7 Files
  • 18
    Jul 18th
    5 Files
  • 19
    Jul 19th
    12 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close