exploit the possibilities
Showing 1 - 18 of 18 RSS Feed

Files from 3APA3A

Email address3apa3a at security.nnov.ru
First Active2001-01-09
Last Active2007-03-09
msfilemanagement.txt
Posted Mar 9, 2007
Authored by 3APA3A | Site securityvulns.com

Article discussing file management security issues in Microsoft Windows Vista/2003/XP/2000.

tags | advisory
systems | windows, vista
MD5 | 60fcecd6b876c994b1fd5658afc80a4f
spydir.c
Posted Feb 24, 2007
Authored by 3APA3A | Site securityvulns.com

Exploit that demonstrates the vulnerability in ReadDirectoryChangesW() for Microsoft Windows 2000/XP/2003/Vista.

tags | exploit
systems | windows, 2k
advisories | CVE-2007-0843
MD5 | f7f6bf6fe0ea633cd5976b0a644ad70c
readirchange.txt
Posted Feb 24, 2007
Authored by 3APA3A | Site securityvulns.com

ReadDirectoryChangesW() in Microsoft Windows 2000/XP/2003/Vista does not check a user's permissions for child objects, making it possible to retrieve information about objects that a user has no LIST permissions for.

tags | advisory
systems | windows, 2k
advisories | CVE-2007-0843
MD5 | 6c04fac47932131d4237f8749f08f6fa
year3000.txt
Posted Feb 13, 2007
Authored by 3APA3A | Site SecurityVulns.com

Microsoft Visual C++ version 8.0 suffers from a denial of service condition.

tags | advisory, denial of service
advisories | CVE-2007-0842
MD5 | e7cd012fa91b331495001e288706d9b7
hpnnm750.txt
Posted Feb 13, 2007
Authored by 3APA3A

Hewlett-Packard Network Node Manager version 7.50 suffers from a weak file permission vulnerability.

tags | advisory
advisories | CVE-2007-0819
MD5 | 2374414d743488ac9751a84746b258bb
mb-ms.txt
Posted Dec 27, 2006
Authored by 3APA3A

Microsoft Windows XP/2003/Vista suffers from a memory corruption flaw.

tags | advisory
systems | windows, xp
MD5 | bfd23045022c2dead30c111f2929e546
pandais.txt
Posted Sep 8, 2006
Authored by 3APA3A | Site security.nnov.ru

Panda Platinum Internet Security 2006/2007 suffers from multiple vulnerabilities. Insecure file permissions allow an unprivileged local user the ability to obtain system-level access or access to account of another logged on user. Insecure design of the spam filtering control engine allows remote attackers to control bayesian self learning spam filtering process using a malicious web page.

tags | advisory, remote, web, local, vulnerability
MD5 | 158853187b3ce76c37ca3fe25fac646b
ICQ-xas.txt
Posted May 17, 2006
Authored by 3APA3A | Site security.nnov.ru

Under some conditions, the ICQ client is vulnerable to remote script injection into the My Computer Security Zone of the Internet Explorer component used to display advertisement banners.

tags | advisory, remote
MD5 | ff15c418248e0cb7fa4723a80a1026fd
thebatSpoof.txt
Posted Feb 8, 2006
Authored by 3APA3A | Site security.nnov.ru

The design flow in the way The Bat! 2.x displays messages allows attackers to spoof RFC 822 headers and more.

tags | exploit, spoof
MD5 | 212fb85e01a3ee49cc29be81def5dcca
SPIbad.txt
Posted Jul 28, 2005
Authored by 3APA3A

SPIDynamics WebInspect is susceptible to cross-application scripting attacks.

tags | advisory
MD5 | 4be16eabb1f4eeeb426edd19f4051175
wininet.dll_unicode_overflow.txt
Posted Apr 20, 2005
Authored by 3APA3A | Site security.nnov.ru

The InternetCreateUrlW function of wininet.dll, a core component of Internet Explorer, is vulnerable to a buffer overflow attack when the source buffer is copied into the destination buffer using WideCharToMultiByte. In practice this is probably only useful for Denial of Service attacks (if that) and still requires some social-engineering to actually exploit this.

tags | advisory, denial of service, overflow
MD5 | e8aa17f57952998a8d3c7cb862511780
fdset.txt
Posted Jan 25, 2005
Authored by 3APA3A | Site security.nnov.ru

Multiple applications that suffer from the fd_set overflow vulnerability can be exploited remotely.

tags | advisory, overflow
MD5 | a77a0c3d80733ab61d0f3e79b5a6cc85
bypassArticle.txt
Posted Oct 28, 2004
Authored by 3APA3A, offtopic | Site security.nnov.ru

Presentation: Bypassing client application protection techniques with notepad.

tags | paper
MD5 | bce063153c54781f687f0cd29fe5c972
timesync.html
Posted Aug 20, 2004
Authored by 3APA3A | Site security.nnov.ru

White paper discussing the fact that many modern networks are extremely dependant on a centralized time resource and the negative aspects of a network not having one.

tags | paper
MD5 | b4fcd8bce74ebb05e8db85ae5c200d7c
security-nnov.kav.txt
Posted Feb 12, 2003
Authored by 3APA3A | Site security.nnov.ru

Kaspersky Antivirus (KAV) crashes when it tries access a path that has more the 256 characters. In addition to this vulnerability, a long path can be used to hide malware. Also, malware with specially crafted names are not detected by this anti-virus product. Tested on Kaspersky Antivirus 4.0.9.0.

tags | advisory, virus
MD5 | 126928c9588b2eab41383e472ea23b6d
security-nnov.far.txt
Posted Feb 12, 2003
Authored by 3APA3A | Site security.nnov.ru

It has been found that the Far file manager does not handle path names correctly. This can result in a buffer overflow condition that allows code execution. An example script to crash Far 1.70beta1 and 1.70beta4 is included. The Far developers (Rarlab) will fix this in version 1.70beta5.

tags | advisory, overflow, code execution
MD5 | ea865741d0f1582bf1dc37c083f5c81c
nbtstream.c
Posted May 21, 2001
Authored by 3APA3A | Site security.nnov.ru

Nbtstream.c is a NetBIOS session request flooder which exploits the bug discussed in MS00-091. Causes unpatched Windows machines to hang or crash.

tags | denial of service
systems | windows
MD5 | 43407c61474cab2d55bb035be037b9c6
thebat.traverse.txt
Posted Jan 9, 2001
Authored by 3APA3A | Site security.nnov.ru

The Bat! v1.48f and below has a client side vulnerability which allows malicious mail messages to add any files in any directory on the disk where user stores his attachments.

tags | exploit
MD5 | ca77c4383a98f689f532016cfb080be4
Page 1 of 1
Back1Next

File Archive:

July 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    15 Files
  • 2
    Jul 2nd
    19 Files
  • 3
    Jul 3rd
    11 Files
  • 4
    Jul 4th
    0 Files
  • 5
    Jul 5th
    0 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    0 Files
  • 9
    Jul 9th
    0 Files
  • 10
    Jul 10th
    0 Files
  • 11
    Jul 11th
    0 Files
  • 12
    Jul 12th
    0 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close