exploit the possibilities
Showing 26 - 36 of 36 RSS Feed

Files from Marc Ruef

Real NameMarc Ruef
Email addressprivate
First Active2000-07-18
Last Active2013-10-28
View User Profile
novell.txt
Posted Jan 19, 2005
Authored by Marc Ruef | Site computec.ch

The Novell GroupWise WebAccess error module handling has a flaw where a malicious attacker can circumvent the login procedure.

tags | advisory
MD5 | b0d1478da0d41ff19dbc734c7afca5ee
atk-3.0src.zip
Posted Nov 20, 2004
Authored by Marc Ruef | Site computec.ch

The Attack Tool Kit (ATK) is an open-source utility to perform vulnerability checks and enhance security audits. The most important changes in ATK 3.0 are the introduction of a dedicated exploiting routine and the Plugin AutoUpdate (over HTTP). Check the website for more details. Source version.

tags | web
MD5 | 81d9769516693346e33b68eb4d2f9a8e
atk-3.0.zip
Posted Nov 20, 2004
Authored by Marc Ruef | Site computec.ch

The Attack Tool Kit (ATK) is an open-source utility to perform vulnerability checks and enhance security audits. The most important changes in ATK 3.0 are the introduction of a dedicated exploiting routine and the Plugin AutoUpdate (over HTTP). Check the website for more details. Binary version.

tags | web
MD5 | b07eb5e0268aef658ac9205b772070cd
pinnacleShow151.txt
Posted Sep 21, 2004
Authored by Marc Ruef | Site computec.ch

Pinnacle ShowCenter 1.51 is susceptible to a denial of service attack when sent a GET request that points to a non-existent skin.

tags | advisory, denial of service
MD5 | 7301316e747bd1d838dc77d60e5e61e5
atk-2.0.zip
Posted Sep 8, 2004
Authored by Marc Ruef | Site computec.ch

Attack Tool Kit, or ATK, was developed to provide a very small and handy tool for performing simple security checks on Windows. It requires minimal interaction and is very modular in design.

systems | windows
MD5 | dd0ae72cd5aeefc2ae1d1ea3072ee6a4
netgearURI.txt
Posted May 25, 2004
Authored by Marc Ruef | Site computec.ch

Netgear RP114 devices, and possibly other related Netgear hardware, have a URI filtering bypass vulnerability when the URI being evaluated is larger than 220 bytes long.

tags | advisory, bypass
MD5 | ce323745796bf51d574d7ce28c0c46e4
scip.msn.txt
Posted Jul 23, 2003
Authored by Marc Ruef | Site scip.ch

scip Advisory 2003-01 - MSN search is a link directory moderated by Microsoft. It is possible to inject some scripting with a search query. An attacker could initiate scripting attacks as denial of service attempts or cookie stealing.

tags | advisory, denial of service
MD5 | 1c9ed118d6263b131ecaa0141fa0a8b3
blackicepro.txt
Posted Jun 14, 2003
Authored by Marc Ruef | Site computec.ch

It is possible to evade the BlackICE PC Protection IDS logging of cross site scripting attempts due to a lack of it checking HEAD, PUT, DELETE, and TRACE requests for the <script> pattern.

tags | exploit, xss
MD5 | 506b6b9aa1ee94ea6ecdba88149c1b4b
NetGearFM114P.txt
Posted Sep 9, 2002
Authored by Marc Ruef | Site computec.ch

The NetGear FM114P is a hub, printer server, wireless access point, firewall and IDS. The firewalling module also supports filtering for domain names. This product does not resolve host and domain names by default. Due to this flaw, a user may access a site by entering the IP address instead of the host and domain name.

MD5 | 877bfdd0edadbbd29ed8af98f22163b4
SurfinGate.txt
Posted Sep 5, 2002
Authored by Marc Ruef | Site computec.ch

The Finjan SurfinGate 6.0x on Windows NT 4.0 and 2000 can be bypassed by using IP addresses instead of hostnames or by adding a dot to the end of hostnames.

tags | exploit
systems | windows, nt
MD5 | 1458603dc6c13802ef082062b929b537
icq-german.html
Posted Jul 18, 2000
Authored by Marc Ruef | Site computec.ch

Die Sicherheit von ICQ - This document explains ICQ security problems, in German.

MD5 | 13482560cce4d72c00065837d1c29782
Page 2 of 2
Back12Next

File Archive:

November 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    2 Files
  • 2
    Nov 2nd
    9 Files
  • 3
    Nov 3rd
    15 Files
  • 4
    Nov 4th
    90 Files
  • 5
    Nov 5th
    22 Files
  • 6
    Nov 6th
    16 Files
  • 7
    Nov 7th
    1 Files
  • 8
    Nov 8th
    1 Files
  • 9
    Nov 9th
    40 Files
  • 10
    Nov 10th
    27 Files
  • 11
    Nov 11th
    28 Files
  • 12
    Nov 12th
    13 Files
  • 13
    Nov 13th
    18 Files
  • 14
    Nov 14th
    2 Files
  • 15
    Nov 15th
    2 Files
  • 16
    Nov 16th
    29 Files
  • 17
    Nov 17th
    15 Files
  • 18
    Nov 18th
    15 Files
  • 19
    Nov 19th
    21 Files
  • 20
    Nov 20th
    16 Files
  • 21
    Nov 21st
    1 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    19 Files
  • 24
    Nov 24th
    32 Files
  • 25
    Nov 25th
    9 Files
  • 26
    Nov 26th
    11 Files
  • 27
    Nov 27th
    15 Files
  • 28
    Nov 28th
    9 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close