exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 36 of 36 RSS Feed

Files from Marc Ruef

Real NameMarc Ruef
Email addressprivate
First Active2000-07-18
Last Active2013-10-28
View User Profile
novell.txt
Posted Jan 19, 2005
Authored by Marc Ruef | Site computec.ch

The Novell GroupWise WebAccess error module handling has a flaw where a malicious attacker can circumvent the login procedure.

tags | advisory
SHA-256 | 098deb19fae7350013e47a4e4b102a3848621eb8b4d993db52f880dc69b73b5e
atk-3.0src.zip
Posted Nov 20, 2004
Authored by Marc Ruef | Site computec.ch

The Attack Tool Kit (ATK) is an open-source utility to perform vulnerability checks and enhance security audits. The most important changes in ATK 3.0 are the introduction of a dedicated exploiting routine and the Plugin AutoUpdate (over HTTP). Check the website for more details. Source version.

tags | web
SHA-256 | 7f89c48dbd6e74ad67035543136179675a0328f040fcecf4319d6c1e658b63ee
atk-3.0.zip
Posted Nov 20, 2004
Authored by Marc Ruef | Site computec.ch

The Attack Tool Kit (ATK) is an open-source utility to perform vulnerability checks and enhance security audits. The most important changes in ATK 3.0 are the introduction of a dedicated exploiting routine and the Plugin AutoUpdate (over HTTP). Check the website for more details. Binary version.

tags | web
SHA-256 | fff78b654c27955434f6b2c513880a3a88ef5fdf1aa10a4ba630fa3f163f1362
pinnacleShow151.txt
Posted Sep 21, 2004
Authored by Marc Ruef | Site computec.ch

Pinnacle ShowCenter 1.51 is susceptible to a denial of service attack when sent a GET request that points to a non-existent skin.

tags | advisory, denial of service
SHA-256 | 6a080d6eece24294fe3cc7308971c400eef6bd1eda302eb234157353029917b3
atk-2.0.zip
Posted Sep 8, 2004
Authored by Marc Ruef | Site computec.ch

Attack Tool Kit, or ATK, was developed to provide a very small and handy tool for performing simple security checks on Windows. It requires minimal interaction and is very modular in design.

systems | windows
SHA-256 | e4118c463bd60d1138d0115a80e8d3c03d1f5a5792a9f6eee59b8668eecaa589
netgearURI.txt
Posted May 25, 2004
Authored by Marc Ruef | Site computec.ch

Netgear RP114 devices, and possibly other related Netgear hardware, have a URI filtering bypass vulnerability when the URI being evaluated is larger than 220 bytes long.

tags | advisory, bypass
SHA-256 | 7c2791d42f4fe25ac35ea87b471ff12f43f5d2022deaf13d5ef51f4d2621d65f
scip.msn.txt
Posted Jul 23, 2003
Authored by Marc Ruef | Site scip.ch

scip Advisory 2003-01 - MSN search is a link directory moderated by Microsoft. It is possible to inject some scripting with a search query. An attacker could initiate scripting attacks as denial of service attempts or cookie stealing.

tags | advisory, denial of service
SHA-256 | c36c2de0aabf0ef9474193ad304fe9cc33e18af8c68c0026acae466d99f577a2
blackicepro.txt
Posted Jun 14, 2003
Authored by Marc Ruef | Site computec.ch

It is possible to evade the BlackICE PC Protection IDS logging of cross site scripting attempts due to a lack of it checking HEAD, PUT, DELETE, and TRACE requests for the <script> pattern.

tags | exploit, xss
SHA-256 | ea50d43db68e3d4aeaaf1d9927e9cd734abfff473651ddcbc8ce4ef1fed187ae
NetGearFM114P.txt
Posted Sep 9, 2002
Authored by Marc Ruef | Site computec.ch

The NetGear FM114P is a hub, printer server, wireless access point, firewall and IDS. The firewalling module also supports filtering for domain names. This product does not resolve host and domain names by default. Due to this flaw, a user may access a site by entering the IP address instead of the host and domain name.

SHA-256 | 32ca50d10f76c08a1a6d948fd7845c7297eb3670d18b188200d7cb02da0cb701
SurfinGate.txt
Posted Sep 5, 2002
Authored by Marc Ruef | Site computec.ch

The Finjan SurfinGate 6.0x on Windows NT 4.0 and 2000 can be bypassed by using IP addresses instead of hostnames or by adding a dot to the end of hostnames.

tags | exploit
systems | windows
SHA-256 | 4fa5d59bbbd1bd8b2389b2c4cb99be00484375ec2b2ac05ca31117b4d560714e
icq-german.html
Posted Jul 18, 2000
Authored by Marc Ruef | Site computec.ch

Die Sicherheit von ICQ - This document explains ICQ security problems, in German.

SHA-256 | 8ceea704b4e028b03aa776a13d90a6f18d352741f933ea5b1b1a837d369c7b2e
Page 2 of 2
Back12Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close