exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 375 RSS Feed

Files Date: 2005-02-01 to 2005-02-28

unace.txt
Posted Feb 26, 2005
Site debian.org

unace-1.2b is susceptible to multiple buffer overflows and directory traversal bugs.

tags | advisory, overflow
advisories | CVE-2005-0160, CVE-2005-0161
SHA-256 | ff882cacfd0d1684115cc17b32a121c774532b65007f5755f93489b6f66f4492
HRG002.txt
Posted Feb 26, 2005
Site Hackerlounge.com

PBLang 4.65 is susceptible to a cross site scripting attack in its pmpshow.php code.

tags | advisory, php, xss
SHA-256 | e39caee6b8c1d5cd94291995be6512e89b449519419b2b0b9872ec6ad8cfdc02
HRG003.txt
Posted Feb 26, 2005
Site Hackerlounge.com

PBLang 4.65 is susceptible to a cross site scripting attack in its pm.php code.

tags | advisory, php, xss
SHA-256 | 35a3bcbeecdf4f270d0e8536ec0f877dc9d8574bb16de79441b812a36b055126
HRG001.txt
Posted Feb 26, 2005
Site Hackerlounge.com

PBLang 4.65 is susceptible to a cross site scripting attack in its search.php code.

tags | advisory, php, xss
SHA-256 | 125732699b6dea4687f025ff325a4f74757e11336099877951b759f2cbf1df10
Secunia Security Advisory 14328
Posted Feb 26, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in fallback-reboot, which potentially can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 372cf53b12277957434bd0b221aa6c5dbbaecead551d1641fee0e0c4b5b80784
Secunia Security Advisory 14338
Posted Feb 26, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Sun Solaris, which can be exploited by malicious, local users to manipulate the contents of arbitrary files.

tags | advisory, arbitrary, local
systems | solaris
SHA-256 | 832fed8a45ec9332fa43cf72fc0028d826995f1571a9403733d2c3d4db97c030
Secunia Security Advisory 14325
Posted Feb 26, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Andrey Rusyaev has discovered a vulnerability in Mono, which potentially can be exploited by malicious people to conduct cross-site scripting and script insertion attacks.

tags | advisory, xss
SHA-256 | fede8c42f16ff30e8f50cc529077f0de3693678d070189ccb138effb2b925d0b
Secunia Security Advisory 14360
Posted Feb 26, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in MediaWiki, which can be exploited by malicious users to delete arbitrary files, and by malicious people to conduct cross-site scripting attacks and bypass certain security restrictions.

tags | advisory, arbitrary, vulnerability, xss
SHA-256 | d9857fc6675f64b5c691fad48369528fbd8107fa763b33fa3623b8250a0b9c78
Secunia Security Advisory 14351
Posted Feb 26, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Jason Frisvold has reported a vulnerability in Biz Mail Form, which can be exploited by malicious people to use it as an open mail relay.

tags | advisory
SHA-256 | 2a9893802b3cfb651166348d41c083adf29f7129b0b975eed36d3afe4e06889e
Secunia Security Advisory 14354
Posted Feb 26, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Paul Craig has reported a vulnerability in glFTPd, which can be exploited by malicious users to detect the presence of local files and disclose some system and sensitive information.

tags | advisory, local
SHA-256 | 8d0365f968095d1be2d0cca34bb24e5f4e6a58747c605bac0ef97292856f3dfb
iDEFENSE Security Advisory 2005-02-22.2
Posted Feb 26, 2005
Authored by iDefense Labs, AnthraX101 | Site idefense.com

iDEFENSE Security Advisory 02.22.05 - Remote exploitation of an input validation vulnerability in the phpBB Group's phpBB2 bulletin board system allows attackers to unlink (delete) arbitrary system files under the privileges of the web server.

tags | advisory, remote, web, arbitrary
advisories | CVE-2005-0258
SHA-256 | 8a6f19eb9ba57da2748ca989db18c6ee62630c633912223b282be4427a4d42ef
iDEFENSE Security Advisory 2005-02-22.1
Posted Feb 26, 2005
Authored by iDefense Labs, AnthraX101 | Site idefense.com

iDEFENSE Security Advisory 02.22.05 - Remote exploitation of an input validation vulnerability in the phpBB Group's phpBB2 bulletin board system allows attackers to read the contents of arbitrary system files under the privileges of the webserver.

tags | advisory, remote, arbitrary
advisories | CVE-2005-0259
SHA-256 | 4ab9593103bf1ea38ef611234e57df93b7e8b9dd08dd4db923e59f22431edc8c
Secunia Security Advisory 14336
Posted Feb 26, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Batik, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | 6791f9181d8fdaa4dfc96a883c91ef607aad0fc5e52fdd7626c1c84d208d026f
Secunia Security Advisory 14367
Posted Feb 26, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Michael Krax has reported a vulnerability in Verity Ultraseek, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 8d9d6939856c483a16509e7c222cd9a213aa3d0f27c75d8b579db81293c23164
phpBBsql.txt
Posted Feb 26, 2005
Authored by AnthraX101

The phpbb_clean_username function in phpBB has an improper order of execution allowing path and SQL table disclosure.

tags | advisory
SHA-256 | a215577b17a268ad3849e2a705244e52a0184db08a9f805716fa54c6e0d2d79e
iGeneric12.txt
Posted Feb 26, 2005
Authored by John Cobb | Site nobytes.com

Multiple information disclosure and possible SQL injection vulnerabilities have been discovered in iGeneric eShop 1.2.

tags | exploit, vulnerability, sql injection, info disclosure
SHA-256 | f59d229f8ecc21f0abcef8bb3ede37c092a780a456329ed165f078318f19dc81
SDtraverse.txt
Posted Feb 26, 2005
Authored by CorryL

SD Server versions 4.0.70 and below suffer from a classic directory traversal flaw.

tags | exploit
SHA-256 | 0a6a0e0996717aed2c5d24bdc18e0f7e391365c5aca6a7f0b5c1f67e4b43cd99
Secunia Security Advisory 14342
Posted Feb 26, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fulvio Civitareale has reported a vulnerability in IRM, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | 66e6417be538fbe550967fb99310b52dde7467fd7b2b732635aa62b98596e092
Secunia Security Advisory 14321
Posted Feb 26, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Ulog-php, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, php, vulnerability, sql injection
SHA-256 | e7075ad0c8ab13d39547f3f38dcdcade4d3b5ad06984b487e760efb0f03b6bdc
Secunia Security Advisory 14337
Posted Feb 26, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Mambo, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 0f5fb70453f0c50a24fecfc0d5cad200b342cf43ea1f828e66ff530649fba285
iDEFENSE Security Advisory 2005-02-21.3
Posted Feb 26, 2005
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 02.21.05 - Remote exploitation of multiple integer overflow vulnerabilities in Simon Tatham's PuTTY can allow attackers to execute arbitrary code. Version 0.56 is verified as vulnerable.

tags | advisory, remote, overflow, arbitrary, vulnerability
advisories | CVE-2005-0467
SHA-256 | 787f7c39e577ad9d7cda00eb74b4e17ad131fe198792eb11fed13f80ea04d57a
iDEFENSE Security Advisory 2005-02-21.1
Posted Feb 26, 2005
Authored by iDefense Labs, infamous41md | Site idefense.com

iDEFENSE Security Advisory 02.21.05 - Remote exploitation of a stack-based buffer overflow in various Unix / Linux vendors implementations of cURL could allow for arbitrary code execution on the targeted host. An exploitable stack-based buffer overflow condition exists when using Kerberos authentication.

tags | advisory, remote, overflow, arbitrary, code execution
systems | linux, unix
SHA-256 | a50d1b9c40577ef0879856693b164ebd622ca9837cccf42b229ed787f877b279
iDEFENSE Security Advisory 2005-02-21.2
Posted Feb 26, 2005
Authored by iDefense Labs, infamous41md | Site idefense.com

iDEFENSE Security Advisory 02.21.05 - Remote exploitation of a stack-based buffer overflow in various Unix / Linux vendors implementations of cURL could allow for arbitrary code execution on the targeted host. An exploitable stack-based buffer overflow condition exists when using NT Lan Manager (NTLM) authentication.

tags | advisory, remote, overflow, arbitrary, code execution
systems | linux, unix
SHA-256 | 747bd27de063e14c01ea3bbdf599000f8a09b4f4b02690d729244fdbd998fe3e
usr-guard-1.0.bz2
Posted Feb 26, 2005
Authored by Mark Wadham

USR-Guard acts as a bridge between Snort and a US Robotics 9105 ADSL router. When a snort alert is generated, USR-Guard will connect into your US Robotics router and add rules to block the host. This block is then removed after a defined period of hours.

tags | tool, sniffer
SHA-256 | 764b2b47709981a3d439be75ac13bb7b80ff9c8b37c2569add38c5f3781ead40
Secunia Security Advisory 14348
Posted Feb 26, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in Secure Global Desktop Enterprise Edition and Tarantella Enterprise, which can be exploited by malicious people to enumerate valid user accounts and disclose some system information.

tags | advisory
SHA-256 | f1c7d0b03d1e48ec32d4037ea7af424971f863250939f41e2d2f5df45368e2db
Page 3 of 15
Back12345Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close