exploit the possibilities
Showing 26 - 36 of 36 RSS Feed

Files from Marc Ruef

Real NameMarc Ruef
Email addressprivate
First Active2000-07-18
Last Active2013-10-28
View User Profile
novell.txt
Posted Jan 19, 2005
Authored by Marc Ruef | Site computec.ch

The Novell GroupWise WebAccess error module handling has a flaw where a malicious attacker can circumvent the login procedure.

tags | advisory
SHA-256 | 098deb19fae7350013e47a4e4b102a3848621eb8b4d993db52f880dc69b73b5e
atk-3.0src.zip
Posted Nov 20, 2004
Authored by Marc Ruef | Site computec.ch

The Attack Tool Kit (ATK) is an open-source utility to perform vulnerability checks and enhance security audits. The most important changes in ATK 3.0 are the introduction of a dedicated exploiting routine and the Plugin AutoUpdate (over HTTP). Check the website for more details. Source version.

tags | web
SHA-256 | 7f89c48dbd6e74ad67035543136179675a0328f040fcecf4319d6c1e658b63ee
atk-3.0.zip
Posted Nov 20, 2004
Authored by Marc Ruef | Site computec.ch

The Attack Tool Kit (ATK) is an open-source utility to perform vulnerability checks and enhance security audits. The most important changes in ATK 3.0 are the introduction of a dedicated exploiting routine and the Plugin AutoUpdate (over HTTP). Check the website for more details. Binary version.

tags | web
SHA-256 | fff78b654c27955434f6b2c513880a3a88ef5fdf1aa10a4ba630fa3f163f1362
pinnacleShow151.txt
Posted Sep 21, 2004
Authored by Marc Ruef | Site computec.ch

Pinnacle ShowCenter 1.51 is susceptible to a denial of service attack when sent a GET request that points to a non-existent skin.

tags | advisory, denial of service
SHA-256 | 6a080d6eece24294fe3cc7308971c400eef6bd1eda302eb234157353029917b3
atk-2.0.zip
Posted Sep 8, 2004
Authored by Marc Ruef | Site computec.ch

Attack Tool Kit, or ATK, was developed to provide a very small and handy tool for performing simple security checks on Windows. It requires minimal interaction and is very modular in design.

systems | windows
SHA-256 | e4118c463bd60d1138d0115a80e8d3c03d1f5a5792a9f6eee59b8668eecaa589
netgearURI.txt
Posted May 25, 2004
Authored by Marc Ruef | Site computec.ch

Netgear RP114 devices, and possibly other related Netgear hardware, have a URI filtering bypass vulnerability when the URI being evaluated is larger than 220 bytes long.

tags | advisory, bypass
SHA-256 | 7c2791d42f4fe25ac35ea87b471ff12f43f5d2022deaf13d5ef51f4d2621d65f
scip.msn.txt
Posted Jul 23, 2003
Authored by Marc Ruef | Site scip.ch

scip Advisory 2003-01 - MSN search is a link directory moderated by Microsoft. It is possible to inject some scripting with a search query. An attacker could initiate scripting attacks as denial of service attempts or cookie stealing.

tags | advisory, denial of service
SHA-256 | c36c2de0aabf0ef9474193ad304fe9cc33e18af8c68c0026acae466d99f577a2
blackicepro.txt
Posted Jun 14, 2003
Authored by Marc Ruef | Site computec.ch

It is possible to evade the BlackICE PC Protection IDS logging of cross site scripting attempts due to a lack of it checking HEAD, PUT, DELETE, and TRACE requests for the <script> pattern.

tags | exploit, xss
SHA-256 | ea50d43db68e3d4aeaaf1d9927e9cd734abfff473651ddcbc8ce4ef1fed187ae
NetGearFM114P.txt
Posted Sep 9, 2002
Authored by Marc Ruef | Site computec.ch

The NetGear FM114P is a hub, printer server, wireless access point, firewall and IDS. The firewalling module also supports filtering for domain names. This product does not resolve host and domain names by default. Due to this flaw, a user may access a site by entering the IP address instead of the host and domain name.

SHA-256 | 32ca50d10f76c08a1a6d948fd7845c7297eb3670d18b188200d7cb02da0cb701
SurfinGate.txt
Posted Sep 5, 2002
Authored by Marc Ruef | Site computec.ch

The Finjan SurfinGate 6.0x on Windows NT 4.0 and 2000 can be bypassed by using IP addresses instead of hostnames or by adding a dot to the end of hostnames.

tags | exploit
systems | windows
SHA-256 | 4fa5d59bbbd1bd8b2389b2c4cb99be00484375ec2b2ac05ca31117b4d560714e
icq-german.html
Posted Jul 18, 2000
Authored by Marc Ruef | Site computec.ch

Die Sicherheit von ICQ - This document explains ICQ security problems, in German.

SHA-256 | 8ceea704b4e028b03aa776a13d90a6f18d352741f933ea5b1b1a837d369c7b2e
Page 2 of 2
Back12Next

File Archive:

May 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    0 Files
  • 2
    May 2nd
    15 Files
  • 3
    May 3rd
    19 Files
  • 4
    May 4th
    24 Files
  • 5
    May 5th
    15 Files
  • 6
    May 6th
    14 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    13 Files
  • 10
    May 10th
    7 Files
  • 11
    May 11th
    99 Files
  • 12
    May 12th
    45 Files
  • 13
    May 13th
    7 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    16 Files
  • 17
    May 17th
    26 Files
  • 18
    May 18th
    4 Files
  • 19
    May 19th
    17 Files
  • 20
    May 20th
    2 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    6 Files
  • 24
    May 24th
    19 Files
  • 25
    May 25th
    5 Files
  • 26
    May 26th
    12 Files
  • 27
    May 27th
    12 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close