Section:  .. / 0402-advisories  /

Page 5 of 5
<< 1 2 3 4 5 >> Files 100 - 107 of 107
Currently sorted by: File NameSort By: Last Modified, File Size

 ///  File Name: XBOXoverflow.txt
Description:
The XBOX EvolutionX dashboard has buffer overflows in both the ftp cd and telnet dir commands.
Author:Jokko
File Size:1988
Last Modified:Feb 10 17:00:00 2004
MD5 Checksum:9842125792702e3e853074e72ee471e2

 ///  File Name: xlight152.txt
Description:
Xlight FTP server version 1.52 is susceptible to a denial of service attack.
Author:intuit
File Size:3430
Last Modified:Feb 5 03:12:00 2004
MD5 Checksum:87e707beefaca8fc694699fdced3f417

 ///  File Name: XPimage.txt
Description:
The image preview code that explorer uses in Microsoft Windows XP allows a malformed .emf file to cause an exploitable heap overflow in shimgvw.dll.
Author:Jellytop
File Size:1877
Last Modified:Feb 21 22:23:00 2004
MD5 Checksum:4b985f074f5b2f320f249c8430ee15a9

 ///  File Name: XPkern.txt
Description:
There exist several vulnerabilities in one of Windows XP kernel's native API functions which allow any user with the SeDebugPrivilege privilege to execute arbitrary code in kernel mode, and read from and write to any memory address, including kernel memory. Tested against Windows XP Pro SP1.
Author:randnut
Related Exploit:xploit_dbg.cpp.txt
File Size:4345
Last Modified:Feb 19 05:52:00 2004
MD5 Checksum:cb7c6e9dd8b091e6c4a18421639501a9

 ///  File Name: yabb.infoleak.txt
Description:
YaBB version 1, SP 1.3.1, leaks whether or not a username is valid when an invalid password is given.
Author:David Cantrell
File Size:1218
Last Modified:Feb 17 20:03:00 2004
MD5 Checksum:78e258277a7f53399132aaded159a27c

 ///  File Name: yabbSE2.txt
Description:
YaBB SE versions 1.54 and 1.55 are susceptible to a SQL injection vulnerability that allows a remote attacker to execute malicious SQL statements on the database remotely.
Author:Backspace
File Size:2115
Last Modified:Feb 17 05:03:00 2004
MD5 Checksum:20fb54b982621646ae144439455a9bbd

 ///  File Name: ZL04-008.txt
Description:
A security vulnerability exists in specific versions of ZoneAlarm,ZoneAlarm Pro, ZoneAlarm Plus and the Zone Labs Integrity client. This vulnerability is caused by an unchecked buffer in Simple Mail Transfer Protocol (SMTP) processing which could lead to a buffer overflow. In order to exploit the vulnerability without user assistance, the target system must be operating as an SMTP server.
Homepage:http://www.zonelabs.com/
File Size:5286
Last Modified:Feb 19 13:02:00 2004
MD5 Checksum:6e6220ddbbede622b30b4fe3b08f0178