what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 136 RSS Feed

Files Date: 2005-04-17 to 2005-04-18

sybase-ase.txt
Posted Apr 17, 2005
Authored by Mark Litchfield, Chris Anley, Sherief Hammad | Site ngssoftware.com

NGSSoftware Insight Security Research Advisory - Sybase ASE versions prior to 12.5.3 ESD#1 suffer from multiple buffer overflows and denial of service vulnerabilities.

tags | advisory, denial of service, overflow, vulnerability
SHA-256 | 8057a9b0c4794a5ecce8eb94c3a4e21b6ee749420f1666aa849c032a94346f39
getdataBack.c
Posted Apr 17, 2005
Authored by ATmaCA, Kozan | Site netmagister.com

GetDataBack for NTFS version 2.31 local exploit that discloses license information.

tags | exploit, local
SHA-256 | b9b7850792ada1f876d2eb2833c70fb4c080e47390484b8f3dc3ee7dcfe88e7f
cal_phpbb.pl.txt
Posted Apr 17, 2005
Authored by Axl, CereBrums

phpBB versions 2.0.13 and below Calendar Pro module exploit that retrieves a users md5 hash.

tags | exploit
SHA-256 | 0f04661253e7e687c9e1cb6d4064332660d54872f81d046a364a4b144862e32b
linkslinks.txt
Posted Apr 17, 2005
Authored by LovER BOY | Site securitygurus.net

A SQL injection vulnerability was found in the LinksLinks Pro module in phpBB 2.0.x systems.

tags | exploit, sql injection
SHA-256 | 712f4b48d89e4d4a3c6e61b887f72e4f150bad97d36613141ead06e1d11038ee
dlmanphpBB.txt
Posted Apr 17, 2005
Authored by LovER BOY | Site securitygurus.net

The DLMan Pro module in phpBB 2.0.x suffers from a SQL injection vulnerability.

tags | exploit, sql injection
SHA-256 | ac4a11a1debf791b23f2807567b8c7fe63bc9e6fae7c956f41bed354dbabc924
PHPNukeXSS2.txt
Posted Apr 17, 2005
Authored by Maksymilian Arciemowicz | Site securityreason.com

PHPNuke versions 7.6 and below are susceptible to multiple cross site scripting flaws.

tags | exploit, xss
SHA-256 | 757c0b0c4429a8cfe493f5b2030cdc70b2533656808865517f4c8f88c1085bee
23laeon.c.txt
Posted Apr 17, 2005
Authored by patr0n | Site security-tmp.h14.ru

Local exploit for Aeon versions 0.2a and below.

tags | exploit, local
SHA-256 | e46410f95e8698179d98463f059bb03003e93be4b99108aa3a30dda031b82559
aeon02a.txt
Posted Apr 17, 2005
Authored by patr0n | Site security-tmp.h14.ru

Aeon versions 0.2a and below suffer from a locally exploitable buffer overflow.

tags | advisory, overflow
SHA-256 | 47756df3fd4a0fd00b44d0cd3d44e8997cf5effb93d26617996f99e9e25298f7
gzipPerm.txt
Posted Apr 17, 2005
Authored by Imran Ghory

If a malicious local user has write access to a directory in which a target user is using gzip to extract or compress a file to then a TOCTOU bug can be exploited to change the permission of any file belonging to that user. Versions 1.2.4 and 1.3.3 of gzip are affected.

tags | advisory, local
SHA-256 | 5854e58147b30441763747f7c80602edbb8467d416034d870faf6f5a84ee25a5
as400ftp.txt
Posted Apr 17, 2005
Authored by Shalom Carmel

AS/400 servers suffer from a user account disclosure flaw due to a symbolic link vulnerability.

tags | advisory
SHA-256 | 56f7a4240acf2236ffb5d2182829895933929bdd93a94c2baa3c1456bf52cfc0
aiodio_read.c
Posted Apr 17, 2005
Authored by Daniel McNeil

Linux kernel AIO local denial of service exploit for the PPC64 and IA64 architecture.

tags | exploit, denial of service, kernel, local
systems | linux
SHA-256 | b4ec227687d1d9fbb3688ec020ff933e66574c049a3a5415e6d199b4d00d0992
phpMyAdmin262XSS.txt
Posted Apr 17, 2005
Authored by Oriol Torrent Santiago

phpMyAdmin versions 2.6.2-beta1 and below are susceptible to cross site scripting attacks.

tags | exploit, xss
SHA-256 | fe35dd20f7e21cc35d5001f22ce9cef244e53a2e03ebfd21c1170b0e0b286071
PayProCart30.txt
Posted Apr 17, 2005
Authored by Diabolic Crab | Site hackerscenter.com

PayProCart 3.0 is susceptible to directory traversal, authentication bypass, and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 9d8641008ccf131e7ce7e872deae55c88e6b5e8f22e3983e98d1fc947b4179ec
dsa-705.txt
Posted Apr 17, 2005
Site debian.org

Debian Security Advisory 705-1 - Several denial of service conditions have been discovered in wu-ftpd, the popular FTP daemon.

tags | advisory, denial of service
systems | linux, debian
advisories | CVE-2005-0256, CVE-2005-0854
SHA-256 | f6aa0570596d607d644fdea45e98c354235ed6a6984f7cfea2704e5491e1b6e7
Secunia Security Advisory 14837
Posted Apr 17, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in CA eTrust Intrusion Detection, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 75d19767e84ecbd34643372035db299dfea48e249c3dbdb61bf473e030a28b41
Secunia Security Advisory 14815
Posted Apr 17, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Three weaknesses have been reported in Gaim, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | f4417199673e3ac2de89a6802da511c8a446fce535ece8596c9a678a0aa652e1
Secunia Security Advisory 14836
Posted Apr 17, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Pasquale Minervini has reported a vulnerability in SCO OpenServer, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
SHA-256 | a38a5c64164f1cf0821c75308e791835feb222982c2bd51718a7aeef75ee8b38
Secunia Security Advisory 14829
Posted Apr 17, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in DameWare NT Utilities and DameWare Mini Remote Control, which can be exploited by malicious users to gain escalated privileges.

tags | advisory, remote
SHA-256 | d5f72283a980f2e281572ddde7f9fc310cc28771f2da16612d50f9932be6c9fc
Secunia Security Advisory 14865
Posted Apr 17, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in OpenView Network Node Manager (OV NNM), which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | b6292ac5d094bf0961c8391ebb4be7886050e36b4e0a7453f1d205766c5d1351
Secunia Security Advisory 14851
Posted Apr 17, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Pedro Vi

tags | advisory
SHA-256 | d9dc955c2ac0611472d289fa5c079ff0bde51be701d5b53afa2dad57293e0e93
Secunia Security Advisory 14768
Posted Apr 17, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Bahaa Naamneh has reported two vulnerabilities in RUMBA, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 3414ed36ee577c87eaf886af501fdae30eed3a966700521ce6ea6eb8f6dd425f
Secunia Security Advisory 14831
Posted Apr 17, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Axel, which potentially can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | d006f159e8dcf1c121e5f9dc1d7f6a2f0512495c888e838ec221fa13552a444c
Secunia Security Advisory 14864
Posted Apr 17, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Zinho has reported two vulnerabilities in Ocean12 Membership Manager Pro, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks.

tags | advisory, vulnerability, xss, sql injection
SHA-256 | 65abd9bc16eaea832b6cd937497fd4bae23ede47e5ab58e71a527058e64f7e67
Secunia Security Advisory 14858
Posted Apr 17, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Lotus Domino, which potentially can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 96ae1b36b1bda3230e6f75c1e51a1cb6b480db8e7061917d59177245fd252be8
Secunia Security Advisory 14871
Posted Apr 17, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Kristian Hermansen has reported a vulnerability in Linksys WET11, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | c975001971bc6db70c9f4e50b604dd6c9d445ac2cba85f5a8ac950fef73a18f1
Page 4 of 6
Back23456Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close