exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 60 RSS Feed

Files Date: 2006-01-15 to 2006-01-16

FSA-2006-06.txt
Posted Jan 15, 2006
Authored by Dejun Meng

Fortinet Security Advisory - Fortinet Security Research Team (FSRT) has discovered a buffer overflow vulnerability in the Apple QuickTime Player. Apple QuickTime has a buffer overflow vulnerability in parsing specially crafted TGA image files. This is due to an application failure to sanitize the parameter Color Map Entry Size while parsing TGA image files. A remote attacker could construct a web page with a specially crafted TGA file and entice a victim to view it, when the user opens the TGA image with Internet Explorer or Apple QuickTime Player, it will cause a memory access violation, leading to potential arbitrary command execution.

tags | advisory, remote, web, overflow, arbitrary
systems | apple
advisories | CVE-2005-3709
SHA-256 | cd67a822ff370f9dc2ed6a580dba164b1c12edeed9edaa46caf6dc4a6956aab4
FSA-2006-05.txt
Posted Jan 15, 2006
Authored by Dejun Meng

Fortinet Security Advisory - Fortinet Security Research Team (FSRT) has discovered a buffer overflow vulnerability in the Apple QuickTime Player. Apple QuickTime has a buffer overflow vulnerability in parsing the specially crafted TGA image files. This is due to application failure to sanitize the parameter ImageWidth value while parsing TGA image files. A remote attacker could construct a web page with a specially crafted TGA file and entice a victim to view it, when the user opens the TGA image with Internet Explorer or Apple QuickTime Player, it will cause a memory access violation, leading to potential arbitrary command execution.

tags | advisory, remote, web, overflow, arbitrary
systems | apple
advisories | CVE-2005-3708
SHA-256 | 7f7c93d74581c8bf0e5a052e5abee464179161e6e4b50965e105653b5072be4c
FSA-2006-04.txt
Posted Jan 15, 2006
Authored by Dejun Meng

Fortinet Security Advisory - Fortinet Security Research Team (FSRT) has discovered an improper memory access vulnerability in the Apple QuickTime Player. The vulnerability exists when parsing specially crafted TGA image files. A remote attacker could construct a web page with a specially crafted TGA file and entice a victim to view it, when the user opens the TGA image with Internet Explorer or Apple QuickTime Player, it will cause memory access violation, leading to potential arbitrary command execution.

tags | advisory, remote, web, arbitrary
systems | apple
advisories | CVE-2005-3707
SHA-256 | b631a860862da4e90b8e54eb3187262c7fb600075606e26c73dd38261da6474f
FSA-2006-03.txt
Posted Jan 15, 2006
Authored by Dejun Meng

Fortinet Security Advisory - Fortinet Security Research Team (FSRT) has discovered a Denial of Service Vulnerability in the Apple QuickTime Player. Apple QuickTime has a denial of service vulnerability in parsing the specially crafted TIFF image files. This is due to an application failure to sanitize the parameter ImageWidth value while parsing TIFF image files. A remote attacker could construct a web page with a specially crafted tiff file and entice a victim to view it, when the user opens the TIFF image with Internet Explorer or Apple QuickTime Player, it will a cause memory access violation, leading to denial of service.

tags | advisory, remote, web, denial of service
systems | apple
advisories | CVE-2005-3710
SHA-256 | baab435debc09cc8f4dc4ab92b9e3e3b495072880b982fe42813601b6099cba5
FSA-2006-02.txt
Posted Jan 15, 2006
Authored by Dejun Meng

Fortinet Security Advisory - Fortinet Security Research Team (FSRT) has discovered a vulnerability in the Apple QuickTime Player. Apple QuickTime has a vulnerability in parsing the specially crafted TIFF image files. This is due to application failure to sanitize the parameter StripOffsets value while parsing TIFF image files. A remote attacker could construct a web page with specially crafted tiff file and entice a victim to view it, when the user opens the TIFF image with Internet Explorer or Apple QuickTime Player, it will cause a memory access violation, leading to potential arbitrary command execution.

tags | advisory, remote, web, arbitrary
systems | apple
advisories | CVE-2005-3711
SHA-256 | 3b588cf7f6f92dd97bbaf61f07231058a4a3d25ed43f154b696b82c9a40f1898
FSA-2006-01.txt
Posted Jan 15, 2006
Authored by Dejun Meng

Fortinet Security Advisory - Fortinet Security Research Team (FSRT) has discovered a buffer overflow vulnerability in the Apple QuickTime Player. Apple QuickTime has a buffer overflow vulnerability in parsing the specially crafted TIFF image files. This is due to application failure to sanitize the parameter StripByteCounts while parsing TIFF image files. A remote attacker could construct a web page with specially crafted tiff file and entice a victim to view it, when the user opens the TIFF image with Internet Explorer or Apple QuickTime Player, it will cause a memory access violation, and leading to potential arbitrary command execution.

tags | advisory, remote, web, overflow, arbitrary
systems | apple
advisories | CVE-2005-3711
SHA-256 | 09a92ec1846789359ad9a5d09cdc149c4401610255743ba875be582f9035afd4
EV0028.txt
Posted Jan 15, 2006
Authored by Aliaksandr Hartsuyeu

Wordcircle 2.17 is susceptible to SQL injection and cross site scripting flaws. Exploitation details provided.

tags | exploit, xss, sql injection
SHA-256 | cfbaca141f33fbd3f94c5292e59db592091d0f2814113d049ab2029dff58c815
EV0027.txt
Posted Jan 15, 2006
Authored by Aliaksandr Hartsuyeu

Wordcircle version 2.17 is susceptible to SQL injection attacks that allows for authentication bypass. Exploitation details provided.

tags | exploit, sql injection
SHA-256 | 03db31b609ab28517fa463c90a4a6207e7660ea232e5adca2d71d60c52e5f467
EV0026.txt
Posted Jan 15, 2006
Authored by Aliaksandr Hartsuyeu

TankLogger version 2.4 is susceptible to SQL injection attacks. Exploitation details provided.

tags | exploit, sql injection
SHA-256 | 1d6a67762af5cc3470ae87fa925528892796b1ed012e1ccb5c48482c3ac921da
EV0025.txt
Posted Jan 15, 2006
Authored by Aliaksandr Hartsuyeu

ACal version 2.2.5 is susceptible to system bypass.

tags | advisory
SHA-256 | a7032d684662eea5898f916e53684a1d0583490dbd527e001fa32e026c8a5a2e
HelmXSS.txt
Posted Jan 15, 2006
Authored by M.Neset KABAKLI | Site wakiza.com

Helm version 3.2.8 is susceptible to cross site scripting attacks.

tags | exploit, xss
SHA-256 | 98f6d7f5855ce6ab1b9554f2db091a9884c3041a4f6b80c4407d78668a2a8c46
Zero Day Initiative Advisory 06-01
Posted Jan 15, 2006
Authored by Tipping Point | Site zerodayinitiative.com

Clam AntiVirus versions 0.80 through 0.87.1 suffer from a code execution flaw during the uncompressing of files compressed with with FSG version 1.33.

tags | advisory, code execution
advisories | CVE-2006-0162
SHA-256 | e5cbb610d8a410d3a4bfe8dea11e86e4a99a95bd75e78fb2dfe90c27cd0fef1f
hsphereXSS.txt
Posted Jan 15, 2006
Authored by M.Neset KABAKLI | Site wakiza.com

H-Sphere versions 2.4.3 Patch 8 and below suffer from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 01f1b7916b7aa517c3d61becc582f024b4788ff0c1e2cb131e4e4417227b4346
Hardened-PHP Project Security Advisory 2006-02.113
Posted Jan 15, 2006
Authored by Stefan Esser, Hardened-PHP Project | Site hardened-php.net

Hardened-PHP Project Security Advisory - PHP5 comes with the new mysqli extension, which recently got a new error reporting feature using exceptions. When an exception for such an error is thrown the error message is used as format string. Depending on the situation and configuration, f.e. a malicious MySQL server or an erroneous SQL query (f.e. through SQL injection) can result in PHP reporting a (partly) user supplied error message, which can result in triggering the format string vulnerability, which can lead to remote code execution. Versions 5.1 through 5.1.1 are affected. PHP4 is not affected.

tags | advisory, remote, php, code execution, sql injection
SHA-256 | 18ec3642ab2d62fd5a42bd5d1437d23a8fe3f61f1cff06e814d6b1aa5c3b93ad
Hardened-PHP Project Security Advisory 2006-01.112
Posted Jan 15, 2006
Authored by Stefan Esser, Hardened-PHP Project | Site hardened-php.net

Hardened-PHP Project Security Advisory - Since PHP5 a user supplied session ID is sent back to the user within a Set-Cookie HTTP header. Because there were no checks performed on the validity of this session id, it was possible to inject arbitrary HTTP headers into the response body of applications using PHP's builtin session functionality by supplying a special crafted session id. Versions 5.1.1 and below are affected. PHP4 is not affected.

tags | advisory, web, arbitrary, php
SHA-256 | 4971bbe2e06b48a7908ab9d7d47baf826e68790f86a6405adda7b5e886c9d6e9
Cisco Security Advisory 20060112-wireless
Posted Jan 15, 2006
Authored by Cisco Systems, Eric Smith | Site cisco.com

Cisco Security Advisory - A vulnerability exists in Cisco Aironet Wireless Access Points (AP) running IOS which may allow a malicious user to send a crafted attack via IP address Resolution Protocol (ARP) to the Access point which will cause the device to stop passing traffic and/or drop user connections. Repeated exploitation of this vulnerability will create a sustained DoS.

tags | advisory, protocol
systems | cisco
SHA-256 | 9e44188c7f19445fc07867995b3ef8eac60426ddd5499d48f8cca001d063c680
phpPayPal.txt
Posted Jan 15, 2006
Authored by .cens

The PHP Toolkit for PayPal version 0.50 is susceptible to payment system bypass and sensitive information disclosure.

tags | advisory, php, info disclosure
SHA-256 | 43b246935bab9babfa249877cd96f914cbb0f5db65ce90946baa156f04205185
Debian Linux Security Advisory 937-1
Posted Jan 15, 2006
Authored by Debian | Site debian.org

Debian Security Advisory DSA 937-1 - infamous41md and Chris Evans discovered several heap based buffer overflows in xpdf, the Portable Document Format (PDF) suite, which is also present in tetex-bin, the binary files of teTeX, and which can lead to a denial of service by crashing the application or possibly to the execution of arbitrary code.

tags | advisory, denial of service, overflow, arbitrary
systems | linux, debian
advisories | CVE-2005-3191, CVE-2005-3192, CVE-2005-3624, CVE-2005-3625, CVE-2005-3626, CVE-2005-3627, CVE-2005-3628
SHA-256 | cdc9ec56d3dcb6f9b94ad26d56a66168bd2d076d82981f4c60ca29a34219df94
FogBugzXSS.txt
Posted Jan 15, 2006
Authored by M.Neset KABAKLI | Site wakiza.com

FogBugz versions 4.029 and below suffer from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 69bcc10ae466ddfbc9181b97006a4351051b6e3e1b49b31a209a3bf0c849a5cb
interspireXSS.txt
Posted Jan 15, 2006
Authored by M.Neset KABAKLI | Site wakiza.com

Interspire TrackPoint NX versions below 0.1 suffer from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | bc4986d450edf7480ea5ddb37c233abdcb96810d7403be4ed571727bcb7da91b
Technical Cyber Security Alert 2006-11A
Posted Jan 15, 2006
Authored by US-CERT | Site us-cert.gov

Technical Cyber Security Alert TA06-011A - Apple has released QuickTime 7.0.4 to correct multiple vulnerabilities. The impacts of these vulnerabilities include execution of arbitrary code and denial of service.

tags | advisory, denial of service, arbitrary, vulnerability
systems | apple
advisories | CVE-2005-4092, CVE-2005-3707, CVE-2005-3710, CVE-2005-3713, CVE-2005-2340
SHA-256 | 0c0b8f8abdfddc63d81776abdf6b6b68c7a274f47f34ee7f05bdec6bf949f506
RHSA-2006-0157.txt
Posted Jan 15, 2006
Authored by Red Hat | Site rhn.redhat.com

Red Hat Security Advisory - A cross-site scripting flaw was found in the way Struts displays error pages. It may be possible for an attacker to construct a specially crafted URL which could fool a victim into believing they are viewing a trusted site.

tags | advisory, xss
systems | linux, redhat
advisories | CVE-2005-3745
SHA-256 | 27a1781d3d2f97e4e625310dacf41e0c2fee5bf4defb046d8925ae3d6a770540
EEYEB-20051031.txt
Posted Jan 15, 2006
Authored by Fang Xing | Site eeye.com

eEye Security Advisory - eEye Digital Security has discovered a critical heap overflow in the Apple Quicktime player that allows for the execution of arbitrary code via a maliciously crafted GIF file. This flaw has proven to allow for reliable control of data on the heap chunk and can be exploited via a web site by using ActiveX controls.

tags | advisory, web, overflow, arbitrary, activex
systems | apple
advisories | CVE-2005-3713
SHA-256 | cc94c3ea3b6b057626aed1b68cf54134be69b95753dba40f5fb6627667ad207f
EEYEB-20051117A.txt
Posted Jan 15, 2006
Authored by Karl Lynn | Site eeye.com

eEye Security Advisory - eEye Digital Security has discovered a critical vulnerability in QuickTime Player. The vulnerability allows a remote attacker to reliably overwrite heap memory with user-controlled data and execute arbitrary code in the context of the user who executed the player or application hosting the QuickTime plug-in. This specific flaw exists within the QuickTime.qts file which many applications access QuickTime's functionality through. By specially crafting atoms within a movie file, a direct heap overwrite is triggered, and reliable code execution is then possible.

tags | advisory, remote, arbitrary, code execution
advisories | CVE-2005-4092
SHA-256 | 18acba653b6ffeaa75541090e022e221bd6522834bc69e991dccdbe23eff3ff3
EEYEB-20051117B.txt
Posted Jan 15, 2006
Authored by Karl Lynn | Site eeye.com

eEye Security Advisory - eEye Digital Security has discovered a critical vulnerability in QuickTime Player. The vulnerability allows a remote attacker to reliably overwrite heap memory with user-controlled data and execute arbitrary code in the context of the user who executed the player or application hosting the QuickTime plug-in. This specific flaw exists within the QuickTime.qts file which many applications access QuickTime's functionality through. By specially crafting atoms within a movie file, a direct heap overwrite is triggered, and reliable code execution is then possible.

tags | advisory, remote, arbitrary, code execution
advisories | CVE-2005-4092
SHA-256 | de6c4384d0c4457c6aa83c3b2b67e9967d072d34865aa140328debd4221776b4
Page 2 of 3
Back123Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close