exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 546 RSS Feed

Files

NTAdos.txt
Posted Aug 14, 2005
Authored by Roy Hills | Site nta-monitor.com

Nortel VPN Router products are susceptible to a denial of service attack via a malformed IPsec IKE packet.

tags | advisory, denial of service
SHA-256 | 3757ae9bdbba6788484a12d306d65e40e70d5721c7b1adb352c54fee941eaf06
MyBB10rc4XSS.txt
Posted Aug 14, 2005
Authored by August Christopher

MyBB 1.0 RC4 suffers from cross site scripting bugs.

tags | advisory, xss
SHA-256 | 5f2d60d55221f0b3d1a8728024b7021c92a1aefcd2d82e5f0c05ebadc9f1178d
strong2boom.txt
Posted Aug 14, 2005
Authored by Luigi Auriemma | Site aluigi.altervista.org

Stronghold 2 versions 1.2 and below suffers from a denial of service flaw due to memory allocation issues with the STLport library.

tags | advisory, denial of service
SHA-256 | 976ad9a4db45122c9f94a89aa1c05cbc12d33cdf624c11b05ef389d9ba69831c
sice-adv.txt
Posted Aug 14, 2005
Authored by Piotr Bania

Compuware Softice (DbgMsg driver) is susceptible to a local denial of service flaw.

tags | advisory, denial of service, local
SHA-256 | d0d925f20dc1bd78fb072fe01d69a8f72c38b5e48e7add0ec1a5c2ccb079a802
peercast01211.txt
Posted Aug 14, 2005
Authored by James Bercegay | Site gulftech.org

Peercast versions 0.1211 and below suffer from a format string vulnerability.

tags | advisory
SHA-256 | 86bed774296909ae7c9df7c542098dbef171bbf6e1232a0e69c12cbfefe573b5
msCrashStack.txt
Posted Aug 14, 2005
Authored by Benjamin Tobias Franz

Microsoft Internet Explorer crashes when it attempts to handle more than 110 stack overflows.

tags | advisory, overflow
SHA-256 | 96d3ac8d6d0eb988502dbd7b292b5bc5f542e8c52e9c2691b4f61a1458a08621
msCrashEmbed.txt
Posted Aug 14, 2005
Authored by Benjamin Tobias Franz

There is a bug in Microsoft Internet Explorer, which causes a crash in it. The bug occurs, because Microsoft Internet Explorer doesn't limit the depth of embedded files.

tags | advisory
SHA-256 | 8f25fcb6f63c485539677e1666ef70f07aaf092897e24335b28034b74164bcd9
msCrashJava.txt
Posted Aug 14, 2005
Authored by Benjamin Tobias Franz

A crash causing flaw exists in Microsoft Internet Explorer when calling a javascript function with the name of the window() object.

tags | advisory, javascript
SHA-256 | e3a4ab880dae51393f3337c040dd0dd7bf8beb61d4026f35452b9149f1c7e8c4
msCrashZone.txt
Posted Aug 14, 2005
Authored by Benjamin Tobias Franz

A crash causing flaw exists in Microsoft Internet Explorer when adding a specially formed URL to a restricted zone.

tags | advisory
SHA-256 | 12a891cd7d0208f529a447e53a1438f652a9ac1adc44dc5fd02098f5595e0a13
invision.txt
Posted Aug 14, 2005

Invision Power Board versions 1.x and 2.x allow users to move themselves into the root group.

tags | advisory, root
SHA-256 | 53b37a7b6e63cf6cab018ece179117f1582accb73faa79eaddb81485e42be49c
clamavMac.txt
Posted Aug 14, 2005
Authored by Kevin Amorin, Timothy Morgan

A vulnerability was discovered in ClamAV during a code audit. This vulnerability could allow a local attacker on a MacOS system to elevate privileges to that of a user running a ClamAV process. This problem affects ClamAV versions 0.80rc4 through 0.84rc2, and is fixed in versions 0.84 and later.

tags | advisory, local
SHA-256 | 564b49d55e78da11d6825a8d653c8b71d3ec5587ec5359a008574997aa1a9cbb
phpmailerLoop.txt
Posted Aug 14, 2005
Site cybsec.com

PHPMailer versions 1.72 and below suffer from a denial of service flaw.

tags | advisory, denial of service
SHA-256 | 6fb2ba63ab1889eb2afc5738e6883e8a3e2aa64611f1ded1bf962eeb374517bf
Ubuntu Security Notice 136-1
Posted Aug 14, 2005
Authored by Ubuntu | Site ubuntu.com

Ubuntu Security Notice USN-136-1 - Tavis Ormandy found an integer overflow in the Binary File Descriptor (BFD) parser in the GNU debugger. The same vulnerable code is also present in binutils.

tags | advisory, overflow
systems | linux, ubuntu
advisories | CVE-2005-1704
SHA-256 | 0bc065376df3be3e4b8a6b85cea9dee13741031ec0acafcb8afbcdcc17685938
Ubuntu Security Notice 135-1
Posted Aug 14, 2005
Authored by Ubuntu | Site ubuntu.com

Ubuntu Security Notice USN-135-1 - Tavis Ormandy found an integer overflow in the GNU debugger. By tricking an user into merely load a specially crafted executable, an attacker could exploit this to execute arbitrary code with the privileges of the user running gdb. However, loading untrusted binaries without actually executing them is rather uncommon, so the risk of this flaw is low.

tags | advisory, overflow, arbitrary
systems | linux, ubuntu
advisories | CVE-2005-1704, CVE-2005-1705
SHA-256 | 7c5648a058e7e4ca8c24ec362c6206594c7b7ce477081ef5cb8e23dfe0b87b5b
cnedrabof.txt
Posted Aug 14, 2005
Authored by Luigi Auriemma | Site aluigi.altervista.org

C'Nedra versions 0.4.0 and below suffer from a buffer overflow in READ_TCP_STRING.

tags | advisory, overflow
SHA-256 | b01f20831b364f4f2872e26380baf8fe9a3fa40575e82217a543fa4d7424808c
t3wmbof.txt
Posted Aug 14, 2005
Authored by Luigi Auriemma | Site aluigi.altervista.org

Terminator 3: War of the Machines versions 1.16 and below suffer from a buffer overflow vulnerability and a big nickname access violation flaw.

tags | advisory, overflow
SHA-256 | 00adc67030cff409307ef77327665b5e2a237ffaa5156f38ecff10640c5a0f55
avast-adv.txt
Posted Aug 14, 2005
Authored by Piotr Bania

Avast Antivirus version 4.6 is susceptible to a memory overwrite flaw.

tags | advisory
SHA-256 | f4380498c50a332513fd5dee3684d0fb9501eccc1dce7d957f5eda5c87e85606
user32dll.txt
Posted Aug 14, 2005
Authored by Andres Rey

user32.dll suffers from an Icon size crash.

tags | advisory
SHA-256 | 4016a33231a5bbb2392a143ce25199385302b45512e8f56034bdf4b6c416498c
shtool-05252005.txt
Posted Aug 14, 2005
Authored by Eric Romang

shtool suffers from an insecure temporary file creation vulnerability. Versions 2.0.1 and below are affected.

tags | advisory
SHA-256 | f462542f401d5467cc710b4a9eefe73e22f0176de033abfdf0c5cba8a7747f76
iDEFENSE Security Advisory 2005-05-25.4
Posted Aug 14, 2005
Authored by iDefense Labs, infamous41md | Site idefense.com

iDEFENSE Security Advisory 05.25.05-4 - Remote exploitation of a format string vulnerability in the imap4d server within version 0.6 of the GNU Project's Mailutils package could allow an unauthenticated attacker to execute arbitrary code. iDEFENSE Labs has verified the existence of this vulnerability in versions 0.5 and 0.6 of the GNU Mailutils package. It is suspected that any previous versions which contain the imap4d server are also affected.

tags | advisory, remote, arbitrary
advisories | CVE-2005-1523
SHA-256 | 4cf6b51e3b3de7821c70ccf23e85db00e625d0bb564cf87adce27d31b50b5a98
iDEFENSE Security Advisory 2005-05-25.3
Posted Aug 14, 2005
Authored by iDefense Labs, infamous41md | Site idefense.com

iDEFENSE Security Advisory 05.25.05-3 - Remote exploitation of an input validation in the FETCH command of the imap4d server from the GNU Project's Mailutils package error may allow an authenticated remote attacker to perform a denial of service against an affected system. iDEFENSE Labs has verified the existence of this vulnerability in versions 0.5 and 0.6 of the GNU Mailutils package. It is suspected that any previous versions which contain the imap4d server are also affected.

tags | advisory, remote, denial of service
advisories | CVE-2005-1522
SHA-256 | 4c5aa30186c7162b02ebf906f88e2e4cd4f93d8df4ce8ddb3d8efc62e4187276
iDEFENSE Security Advisory 2005-05-25.2
Posted Aug 14, 2005
Authored by iDefense Labs, infamous41md | Site idefense.com

iDEFENSE Security Advisory 05.25.05-2 - Remote exploitation of an integer overflow in the fetch_io function of the imap4d server from the GNU Project's Mailutils package error may allow an authenticated remote attacker to execute arbitrary code. iDEFENSE Labs has verified the existence of this vulnerability in versions 0.5 and 0.6 of the GNU Mailutils package. It is suspected that any previous versions which contain the imap4d server are also affected.

tags | advisory, remote, overflow, arbitrary
advisories | CVE-2005-1521
SHA-256 | 7fb4d239272860005e990f7075e20c3f020b270fdedb6c8daade3f143553ad88
iDEFENSE Security Advisory 2005-05-25.1
Posted Aug 14, 2005
Authored by iDefense Labs, infamous41md | Site idefense.com

iDEFENSE Security Advisory 05.25.05-1 - Exploitation of a buffer overflow vulnerability in the mail binary of the GNU Projects Mailutils package may allow a remote attacker to execute commands with the privileges of the targeted user. iDEFENSE Labs has verified the existence of this vulnerability in versions 0.5 and 0.6 of the GNU Mailutils package. It is suspected that any previous versions may also be affected.

tags | advisory, remote, overflow
advisories | CVE-2005-1520
SHA-256 | 1ceee07eb37061ac9fd8bec29cf4094c916eb57a1044ae25e6c4c819f1873008
zlaveOLE.txt
Posted Aug 14, 2005
Authored by Alex Wheeler

A security vulnerability existed in the anti-virus engine of specific versions of ZoneAlarm Anti-Virus and ZoneAlarm Security Suite (ZoneAlarm and ZoneAlarm Pro are not affected.) The vulnerability was caused due to an integer overflow in the Vet anti-virus engine (VetE.dll) when analyzing OLE streams. This can be exploited to cause a heap-based buffer overflow via a specially crafted Microsoft Office document.

tags | advisory, overflow, virus
SHA-256 | abceb822d39f24e96444992c0b7cb55f415bb170d323db66f5e7c797b94aceb8
Debian Linux Security Advisory 728-1
Posted Aug 14, 2005
Authored by Debian | Site security.debian.org

Debian Security Advisory DSA 728-1 - Two bugs have been discovered in qpopper, an enhanced Post Office Protocol (POP3) server.

tags | advisory, protocol
systems | linux, debian
advisories | CVE-2005-1151, CVE-2005-1152
SHA-256 | 927280b0c3ad8ac3ca14d34a5b06d1dd107b04f47f4659be2203b9852d787834
Page 1 of 22
Back12345Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
US Senators Propose Law To Require Bare Minimum Security Standards
Posted Nov 27, 2024

tags | headline, government, usa, password
Telco Engineer Who Spied On Employer For Beijing Gets 4 Years
Posted Nov 27, 2024

tags | headline, government, privacy, usa, phone, china, cyberwar, spyware, voip
New York Fines GEICO And Travelers $11.3 Million In Data Breach Cases
Posted Nov 27, 2024

tags | headline, hacker, government, privacy, usa, data loss
ProjectSend Vulnerability Exploited In The Wild
Posted Nov 27, 2024

tags | headline, hacker, flaw
CyberVolk Analysis Explores Ransomware, Hacktivism Connections
Posted Nov 27, 2024

tags | headline, hacker, malware, russia, cybercrime, cryptography
Russian Cyberspies Hacked Building Across Street From Target For W-Fi Attack
Posted Nov 25, 2024

tags | headline, hacker, government, russia, wireless, spyware
Cyberattacks Cost British Businesses $55 Billion In Past 5 Years
Posted Nov 25, 2024

tags | headline, malware, britain, cybercrime, fraud, cryptography
How The ZX Spectrum Became A 1980s Icon
Posted Nov 25, 2024

tags | headline, science
China Has Pwned Thousands And Thousands Of Telco Devices
Posted Nov 25, 2024

tags | headline, government, privacy, usa, china, cyberwar, spyware
Here's What Happens If You Don't Layer Network Security Or Remove Unused Web Shells
Posted Nov 22, 2024

tags | headline, government, privacy, cybercrime, data loss, japan
View More News →
packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close