exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 126 - 136 of 136 RSS Feed

Files Date: 2005-04-17 to 2005-04-18

Secunia Security Advisory 14804
Posted Apr 17, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Netscape, which can be exploited by malicious people to gain knowledge of potentially sensitive information.

tags | advisory
SHA-256 | 2d0c2bcce80e8c376238b2443b00f0f92ce5207f7971ba44da1897e472dc0728
Secunia Security Advisory 14571
Posted Apr 17, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities with unknown impacts have been reported in Pavuk.

tags | advisory, vulnerability
SHA-256 | 4205eaccab8ae1572b19f07bfa551d9582d2c461b88403ef29472658981ca8e4
turnkeyShopping.txt
Posted Apr 17, 2005
Authored by Diabolic Crab | Site hackerscenter.com

The Turnkey Shopping Cart software is susceptible to multiple SQL injection attacks.

tags | exploit, sql injection
SHA-256 | 0315b95ae054162c8cab75915c4efbbdac50e2bb3d1f1eb8aaf08190aab7827a
callOfDuty.txt
Posted Apr 17, 2005
Authored by Luigi Auriemma | Site aluigi.altervista.org

Call of Duty versions 1.5b and below and Call of Duty: Untied Offensive versions 1.51b and below are susceptible to remote buffer overflows.

tags | advisory, remote, overflow
SHA-256 | bc9681a80144965210de638d00d0fb3b7d12997c80404767fc17eac9bad7d456
starWars.txt
Posted Apr 17, 2005
Authored by Luigi Auriemma | Site aluigi.altervista.org

Star Wars Jedi Knight: Jedi Academy versions 1.0.11 and below are susceptible to a buffer overflow during the visualization of big messages.

tags | advisory, overflow
SHA-256 | 692135c0d15cb66ed8fecd280cc46ab63c89e4ea7af31e64dde9918ff0815b52
quake3bad.txt
Posted Apr 17, 2005
Authored by Luigi Auriemma | Site aluigi.altervista.org

The Quake 3 engine is susceptible to a logic error when attempting to handle commands longer than 1022 characters.

tags | advisory
SHA-256 | 4232a1cbf08bfd071aee222a31f60668b4f7d09ef3c8b6d0e7e8af8d7e64322d
yersinia-053.tgz
Posted Apr 17, 2005
Authored by David Barroso, Alfredo Andres Omella | Site yersinia.sf.net

Yersinia implements several attacks for the following protocols: Spanning Tree (STP), Cisco Discovery (CDP), Dynamic Host Configuration (DHCP), Hot Standby Router (HSRP), Dynamic Trunking (DTP), 802.1q and VLAN Trunking (VTP), helping a pen-tester with different tasks.

tags | tool, protocol
systems | cisco, unix
SHA-256 | 572f05fedca1219d3a5b2aa239d02aa89cc594618ef41c1344526be80793f1c5
yafXSS099.txt
Posted Apr 17, 2005
Authored by Maty Siman | Site checkmarx.com

Yet Another Forum.net is susceptible to cross site scripting flaws. Version 0.9.9 is vulnerable to this issue.

tags | advisory, xss
SHA-256 | b5b13555b62502b99eb9e8fa7ac7de98240aeeb82753716c407c931c18f5d194
RUMBA.txt
Posted Apr 17, 2005
Authored by Bahaa Naamnmeh | Site bsecurity.tk

There are several buffer overflow vulnerabilities that can be triggered when loading a specially crafted profile into RUMBA Office 7.3.

tags | advisory, overflow, vulnerability
SHA-256 | ddc021caa5195851b76ce25e60084b865be505a0a82d133687d33b9815e75145
AlstraSoft20.txt
Posted Apr 17, 2005
Authored by Diabolic Crab | Site hackerscenter.com

AlstraSoft EPay Pro version 2.0 has file include and multiple cross site scripting flaws.

tags | exploit, xss
SHA-256 | 41a421339fefd9706dbe6b1928fe8c17fa15574d2aad1e7d5d18cba6fb06d018
Gentoo Linux Security Advisory 200504-3
Posted Apr 17, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200504-03 - Dnsmasq does not properly detect that DNS replies received do not correspond to any DNS query that was sent. Rob Holland of the Gentoo Linux Security Audit team also discovered two off-by-one buffer overflows that could crash DHCP lease files parsing. Versions less than 2.22 are affected.

tags | advisory, overflow
systems | linux, gentoo
SHA-256 | 54f75245d5cec0f0f7e14fbf6eb5da4e4b985f0f554b538baebe4b6739ae4dcf
Page 6 of 6
Back23456Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close