exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 101 - 125 of 428 RSS Feed

Files Date: 2005-01-01 to 2005-01-31

Gentoo Linux Security Advisory 200501-28
Posted Jan 25, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200501-28 - A stack overflow was discovered in Xpdf, potentially resulting in the execution of arbitrary code. GPdf includes Xpdf code and therefore is vulnerable to the same issue.

tags | advisory, overflow, arbitrary
systems | linux, gentoo
SHA-256 | 6d3333856e42b7c6ad1eb56d1005d508fb653af894b3fb5d1b523cf052b14bb7
NOVL-2005-10096251.txt
Posted Jan 25, 2005
Site support.novell.com

GroupWise 6.5 suffers from a flaw where an unauthenticated user can get read access to various data.

tags | advisory
SHA-256 | 39413578d2bf2ff35b828532fffd5974f3692be8c07c037819c3e88ee3e24666
divxplayerbug.dps
Posted Jan 25, 2005
Authored by Luigi Auriemma | Site aluigi.altervista.org

Proof of concept exploit for DivX player versions 2.6 and below that allow for arbitrary file overwriting via a flaw in handling skins.

tags | exploit, arbitrary, proof of concept
SHA-256 | 528c24d73ee874822073440071c6461caba58ba67d803ce1718840bd7827fbff
divxplayerbug.txt
Posted Jan 25, 2005
Authored by Luigi Auriemma | Site aluigi.altervista.org

DivX player versions 2.6 and below allow for arbitrary file overwriting via a flaw in handling skins.

tags | advisory, arbitrary
SHA-256 | e0b91ab213ef109d3e7d5ee589275919f9cf35746ad3daa9a71e452a7be88ebe
Comersus60.txt
Posted Jan 25, 2005

Comersus ASP shopping cart version 6.0 is susceptible to administrator login bypass, SQL injection, and cross site scripting attacks.

tags | advisory, xss, sql injection, asp
SHA-256 | fa4955168f9fcd7c71beff76ff8d521cc4ebd0d3663310ad159a5f3893552497
netddefull.txt
Posted Jan 25, 2005
Authored by John Heasman | Site ngssoftware.com

NGSSoftware Insight Security Research Advisory - A vulnerability has been discovered in the Microsoft NetDDE service which can allow a remote attacker to execute arbitrary code on a system without authentication. This vulnerability can also be used by any low privileged local user to gain Local System privileges. Systems Affected: Microsoft Windows NT/2000/XP/2003 Server.

tags | advisory, remote, arbitrary, local
systems | windows
SHA-256 | 7fe7b3cd43a05089bc18d0500d8382f190e1c29289808a9a8cd64afe62566c0d
cfp_final.txt
Posted Jan 25, 2005
Site phrack.org

Call for papers for the final issue of Phrack. Phrack number 63 will be released in hard cover format. The deadline for paper submission is July 10, 2005.

tags | paper, conference
SHA-256 | e253b29e59b3c6154c8c143a5ebc24019564a1fe1ad3ee157fd0f7811b43555e
dsa-654.txt
Posted Jan 25, 2005
Site debian.org

Debian Security Advisory 654-1 - Several security problems have been discovered in enscript.

tags | advisory
systems | linux, debian
advisories | CVE-2004-1184, CVE-2004-1185, CVE-2004-1186
SHA-256 | 5d28208ac57d5625dda59adf9f8c04c2de000131ef1678db9a147c58c7f214a7
airt-0.4-1.tar.bz2
Posted Jan 25, 2005
Authored by madsys, CoolQ

AIRT (Advanced incident response tool) is a set of incident response assistance tools for Linux. Tools allow you to look for hidden modules, processes, and ports. Additionally, two tools will dump and analyze hidden modules.

Changes: Bug fix release and made the mod_hunter more heuristic.
tags | tool, forensics
systems | linux
SHA-256 | 9686c7f859e29a96749089080f8f3ae874bff6d2ed8eca513afe8e9c935f527e
Gentoo Linux Security Advisory 200501-27
Posted Jan 25, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200501-27 - Multiple vulnerabilities exist in Ethereal, which may allow an attacker to run arbitrary code, crash the program or perform DoS by CPU and disk utilization.

tags | advisory, arbitrary, vulnerability
systems | linux, gentoo
SHA-256 | 0828975659f7baf994aa7d61bb99530dfcd6577a681f5c5fc41c6cac7b15ba5b
iDEFENSE Security Advisory 2005-01-20.t
Posted Jan 25, 2005
Authored by Patrik Karlsson, iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 01.20.05 - Remote exploitation of an input validation vulnerability in 3Com Corp.'s OfficeConnect Wireless 11g Access Point allows attackers to glean sensitive router information.

tags | advisory, remote
advisories | CVE-2005-0112
SHA-256 | 20d6f9dae34c3b4c99c46cf39adab6cad55fcb5b45259ad5e2453aaf25d2108c
OracleBOs.txt
Posted Jan 25, 2005
Authored by Joxean Koret

This advisory covers nine of the 23 vulnerabilities recently discovered in various versions of Oracle's database server.

tags | advisory, vulnerability
SHA-256 | 05f58b02101062b1f57e0de5e3166ee29294c50e446a28ff4adfd2aaf99ca936
siteman.txt
Posted Jan 25, 2005
Authored by amironline452

Siteman version 1.0.x is susceptible to administrative account injection due to a lack of variable sanitization.

tags | exploit
SHA-256 | e5a5bf492a4c40f297327f5f1d1daa9de444247c8372eae725e2f1b6c19ca055
Secunia Security Advisory 13925
Posted Jan 25, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in the Apache check_forensic script that allows for local privilege escalation.

tags | advisory, local
SHA-256 | d4bd5c4ffda2aac9e74cafa67e43fbd8f1658d51600f2cb56c42471205d50f78
Secunia Security Advisory 13942
Posted Jan 25, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in 3Com OfficeConnect Wireless 11g Access Point, which can be exploited by malicious people to gain knowledge of sensitive information.

tags | advisory
SHA-256 | 4f592f511c62e88075d0e9e04e3a75eada218e949fe02b570f10602507ec9b6f
dsa-651.txt
Posted Jan 25, 2005
Site debian.org

Debian Security Advisory 651-1 - A couple different overflows have been discovered in Squid. One is in the parser for Gopher and another is in the receiver for WCCP messages.

tags | advisory, overflow
systems | linux, debian
advisories | CVE-2005-0094, CVE-2005-0095
SHA-256 | 836558daf3b8225ee83be23b5502e47ecb6c82c7286dfd447db0ca184d7f8ab5
Secunia Security Advisory 13929
Posted Jan 25, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in AntiGen for Domino, which can be exploited by malicious people to cause a DoS (Denial of Service) and by malware to bypass certain scanning functionality.

tags | advisory, denial of service, vulnerability
SHA-256 | 32287f8e52ff5ebe7d2934853f6926bea12e4cabc6b4437b3b9719960dec2988
dsa-650.txt
Posted Jan 25, 2005
Site debian.org

Debian Security Advisory 650-1 - Sword, a package for making a bible web site, is susceptible to a remote command execution flaw due to a lack of sanitizing input. Not even your god can save you now.

tags | advisory, remote, web
systems | linux, debian
advisories | CVE-2005-0015
SHA-256 | 286c2640651ad4437f0111a699bc755f9e50d7537c9e72161cbab7ce90041134
57708.html
Posted Jan 25, 2005
Site sunsolve.sun.com

Sun Security Advisory - A vulnerability in the Java Plug-in may allow an untrusted applet to elevate privileges through JavaScript calling into Java code. For example, an untrusted applet may grant itself permissions to read and write local files or execute local applications that are accessible to the user running the untrusted applet. A second vulnerability may allow an untrusted applet to inappropriately interfere with another applet in the same web page which may include causing it to incorrectly load non-code resources such as files and web pages.

tags | advisory, web, local, javascript
SHA-256 | fff12819e999f2aa04fd9023287b35be822c905487fcb22420f818a51a1e653f
GeCAD1381.txt
Posted Jan 25, 2005
Site gecadnet.ro

GeCAD NET Security Advisory - The HTML Help Control patch issued from Microsoft may be subverted via other known vulnerabilities that are left unpatched in Internet Explorer.

tags | advisory, vulnerability
SHA-256 | d32c5cf90c2bbe8ef625797db1169224db31dcd4ce0d0477dd0575f3454eb37f
dsa-649.txt
Posted Jan 25, 2005
Site debian.org

Debian Security Advisory 649-1 - A buffer overflow has been discovered in xtrlock, a minimal X display lock program which can be exploited by a malicious local attacker to crash the lock program and take over the desktop session.

tags | advisory, overflow, local
systems | linux, debian
advisories | CVE-2005-0079
SHA-256 | 61962f41f5e7339d97af3a6ced5488ce1a0da7b3ca851f38ddf0359b7a4f2d92
KDE Security Advisory 2005-01-19.1
Posted Jan 25, 2005
Authored by KDE Desktop | Site kde.org

KDE Security Advisory: kpdf, the KDE pdf viewer, shares code with xpdf. xpdf contains a buffer overflow that can be triggered by a specially crafted PDF file.

tags | advisory, overflow
advisories | CVE-2005-0064
SHA-256 | 6b15ccf0b7bec83aa5472d69ac47e0982d0440956056b53788eaaf87744463e3
xfkey.c
Posted Jan 25, 2005
Authored by vade79 | Site fakehalo.us

fkey version 0.0.2 local file accessibility exploit.

tags | exploit, local
SHA-256 | dfb6bbb2d3c62d255c655605b6d08045515378ba0ce5439df34cced8c6849b4a
STG Security Advisory 2005-01-20.22
Posted Jan 25, 2005
Authored by STG Security | Site stgsecurity.com

STG Security Advisory: JSBoard versions 2.0.9 and below suffer from an input validation flaw that allows for arbitrary file reading.

tags | exploit, arbitrary
SHA-256 | 04fa973bf4b6839924d1a72282fd12936c652ed1299fc3906090b148f9953989
STG Security Advisory 2005-01-20.24
Posted Jan 25, 2005
Authored by STG Security | Site stgsecurity.com

STG Security Advisory: GForge versions 3.3 and below are susceptible to directory traversal attacks.

tags | exploit
SHA-256 | 8dc2e1f4564aa448435f8b3771a3642f05fd3c4d9e6cbbf1dbd81ef08a7da42a
Page 5 of 18
Back34567Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close