what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 70 RSS Feed

Files from Tim Brown

Email addresstimb at nth-dimension.org.uk
First Active2005-08-17
Last Active2023-05-18
QNX Neutrino RTOS Runtime Linker Arbitrary File Creation
Posted Mar 11, 2011
Authored by Tim Brown

The QNX Neutrino RTOS runtime linker allows the creation or overwriting of an arbitrary file. Moreover the technique by which this can be achieved can be triggered even where the binary being executed is setUID and is running as another user. Version 6.5.0 is affected.

tags | advisory, arbitrary
SHA-256 | 7d1751f1d7538142a5f545dae3d6e0f64cbacc7f8b27be5bec111384542a5645
Apache Traffic Server DNS Cache Poisoning
Posted Sep 11, 2010
Authored by Tim Brown | Site nth-dimension.org.uk

The Apache Traffic Server versions 2.1.1 and 2.0.0 suffer from a DNS cache poisoning vulnerability.

tags | advisory
advisories | CVE-2010-2952
SHA-256 | 1dc0e9378f377c2bbcc492f5d1dc879dd8fb8b702f63ec2c802e48c3bdc43d67
Exploiting The Linux Linker
Posted Aug 26, 2010
Authored by Tim Brown | Site nth-dimension.org.uk

Brief write up discussing exploitation of the Linux linker.

tags | paper
systems | linux
SHA-256 | e6a4092d9c7f6bfe19a47771315ef0b1edbedff573ad3adc8783e68166ac9c97
Rekonq 0.5 Cross Site Scripting
Posted Aug 19, 2010
Authored by Tim Brown | Site nth-dimension.org.uk

The Rekonq web browser is vulnerable to Javascript injection in a number of components of the user interface. Depending on the exact component affected this can lead to Javascript being executed in a number of contexts which in the worst case could allow an arbitrary web site to be spoofed or even for the Javascript to be executed in the context of an arbitrary context.

tags | exploit, web, arbitrary, spoof, javascript
SHA-256 | b604a1d5db6b3f8fe6875b468e0971c8b0a5c62c937984575dbb59a86d78a575
SSHatter Brute Forcer 1.0
Posted Dec 15, 2009
Authored by Tim Brown | Site nth-dimension.org.uk

SSHatter is a remote brute force utility that attempts every password from a given list against a target.

Changes: This release adds dumb mode, where SSHatter will check password equals password, username, and blank. It adds sudo mode, where SSHatter will echo the password to STDIN. It adds rudimentry file transfer modes, which also work interactively via "put" and "get". It improves the usage message. There is a new command line interface based on Getops. There is a modular design to allow more code reuse, a new threading model, support for SSH private keys, mass mode for post brute force command execution, and interactive mode for post brute force command execution. Timing attack based username enumeration has been removed for now.
tags | remote
SHA-256 | 9c288bea73f302b726bbb13e21594df22b82f73f874f130fb60e626f3abd3b2a
TekRADIUS Privilege Escalation
Posted Jul 6, 2009
Authored by Tim Brown | Site nth-dimension.org.uk

The TekRADIUS radius server for Windows suffers from a SQL injection vulnerability that allows for privilege escalation. Details provided.

tags | exploit, sql injection
systems | windows
SHA-256 | 04e03394380b7c464a8bd6dabc94060b07b1420c44f813a363aca9d1aa17f13d
NullLogic Groupware Flaws
Posted Jul 6, 2009
Authored by Tim Brown | Site nth-dimension.org.uk

NullLogic Groupware suffers from account compromise, denial of service, and possibly remote code execution vulnerabilities.

tags | advisory, remote, denial of service, vulnerability, code execution
SHA-256 | c36c4bc118817c73caa7e27e4882f82a005ab7e206e99a27d5d2b690d6443b2a
PSA08-009.txt
Posted Nov 14, 2008
Authored by Tim Brown, Mark Lowe | Site portcullis-security.com

Portcullis Security Advisory - By sending crafted packets to ports on the Checkpoint VPN-1 which are mapped by port address translation (PAT) to ports on internal devices, information about the internal network may be disclosed in the resulting ICMP error packets.

tags | advisory
SHA-256 | 51a82eb1b4c5f4d3532a75bb76489bb144459f7cdb950cf9b248f0ab003575f5
aftemplatesxss-08_003.txt
Posted Jul 31, 2008
Authored by Tim Brown | Site portcullis-security.com

Affinium Campaign version 7.2.1.0.55 suffers from a javascript injection vulnerability in the templates web page.

tags | advisory, web, javascript
SHA-256 | c82b2a5713558c8a53fa779387549a6224ad899d490bc09ef23b7240a40aa8ec
afstatuslogxss-08_004.txt
Posted Jul 31, 2008
Authored by Tim Brown | Site portcullis-security.com

Affinium Campaign version 7.2.1.0.55 suffers from a log related cross site scripting vulnerability.

tags | advisory, xss
SHA-256 | 053bcfa9891524f83f4ed4442a156d466047db8007c7ab7e014bb87db5b74a7a
aflistenerdos-08_007.txt
Posted Jul 31, 2008
Authored by mu-b, Tim Brown | Site portcullis-security.com

Affinium Campaign version 7.2.1.0.55 suffers from a denial of service vulnerability in its Listener.

tags | exploit, denial of service
SHA-256 | 409f174deb2734fb33455f715be458ca7771b4452e3a584a4fd9708637195cb7
aflistenerdirectorytraversal-08_006.txt
Posted Jul 31, 2008
Authored by Tim Brown | Site portcullis-security.com

Affinium Campaign version 7.2.1.0.55 suffers from a directory traversal vulnerability in its Listener.

tags | exploit
SHA-256 | 361a5fe7947bd8d0cd258ec7c536f58cde024e1a42d39189fab582b98aaed12d
affolderdirectorytraversal-08_002.txt
Posted Jul 31, 2008
Authored by mu-b, Tim Brown | Site portcullis-security.com

Affinium Campaign version 7.2.1.0.55 suffers from a directory traversal vulnerability.

tags | exploit
SHA-256 | 5aa4e14f00895220101919783b0a5c8fe0eb4337483e36ca303cd968223bc8bc
afbookmarkxss-08_001.txt
Posted Jul 31, 2008
Authored by Tim Brown | Site portcullis-security.com

Affinium Campaign version 7.2.1.0.55 suffers from a javascript insertion vulnerability.

tags | exploit, javascript
SHA-256 | 921ca5ae7e6ec08e4305b4dee7180b165fad9feed97d8ed15c114b81e10f83fd
afurlxss-08_005.txt
Posted Jul 31, 2008
Authored by Tim Brown | Site portcullis-security.com

Affinium Campaign version 7.2.1.0.55 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 05611b417843f52ea40678830e68b64d55d8267452c95284bad6f9bea704a4df
NDSA20080215.txt
Posted Apr 5, 2008
Authored by Tim Brown | Site nth-dimension.org.uk

Nth Dimension Security Advisory (NDSA20080215) - The Festival server is vulnerable to unauthenticated remote code execution. Further research indicates that this vulnerability has already been reported as a local privilege escalation against both the Gentoo and SuSE GNU/Linux distributions. The remote form of this vulnerability was identified in 1.96~beta-5 as distributed in Debian unstable but it is also believed that Ubuntu Hardy Heron was affected.

tags | advisory, remote, local, code execution
systems | linux, suse, debian, gentoo, ubuntu
SHA-256 | 679be8c3c5c41b4fce67f2ff8f104fcb7afbc9d058857614bb4a84ab75341837
NDSA20071016.txt
Posted Oct 22, 2007
Authored by Tim Brown | Site nth-dimension.org.uk

Nth Dimension Security Advisory (NDSA20071016) - The SiteBar application has single high risk issues with its translation module. It can can be made to retrieve any file to which the web server user has read access. The SiteBar application has multiple high risk issues with its translation module. It can be made to execute arbitrary code to gain remote access as the web server user typically nobody. The SiteBar application has multiple medium risk issues where it is vulnerable to Javascript injection within the requested URL. The SiteBar application has single medium risk issue where it is vulnerable to malicious redirects within the requested URL. Version 3.3.8 is affected.

tags | exploit, remote, web, arbitrary, javascript
advisories | CVE-2006-3320, CVE-2007-5492, CVE-2007-5491
SHA-256 | f9787ab6aeb07593ce7cda6de093a36855c1a84a926762bb230871ba4fa62bdb
SSHatter-0.6.tar.gz
Posted Oct 8, 2007
Authored by Tim Brown | Site nth-dimension.org.uk

SSHatter is a remote brute force utility that attempts every password from a given list against a target.

tags | remote
SHA-256 | 74989fe4b419899604f6db0946f0e0314f97a42cecc49672b4bf78d580842226
SSHatter-0.5.tar.gz
Posted Sep 26, 2007
Authored by Tim Brown | Site nth-dimension.org.uk

SSHatter is a remote brute force utility that attempts every password from a given list against a target.

tags | remote
SHA-256 | 690c0e0d317026df8d9c423cc3c6e552372dbbaaab16953a32d76b120fd720c5
SSHatter-0.3.tar.gz
Posted Sep 11, 2007
Authored by Tim Brown | Site nth-dimension.org.uk

SSHatter is a remote brute force utility that attempts every password from a given list against a target.

tags | remote
SHA-256 | ccf0f5f7aa39fb59f5f5b2bd959ec841ca04f761de5c1c2da76f97a1bfa7976b
WAFUTFF.pdf
Posted Sep 5, 2007
Authored by Tim Brown | Site nth-dimension.org.uk

Whitepaper entitled "Writing a fuzzer using the Fuzzled framework". The paper includes some of the techniques used to dismantle protocols including documentation, observation and static analysis.

tags | paper, protocol, fuzzer
SHA-256 | 85eff0372eb6b927c7f66e8380f04f54c2152fb1202fd191238c82796096ff34
SSHatter-0.2.tar.gz
Posted Aug 11, 2007
Authored by Tim Brown | Site nth-dimension.org.uk

SSHatter is a remote brute force utility that attempts every password from a given list against a target.

tags | remote
SHA-256 | f36698575e0aefc1ed0903dc22c54cd9ffdeb171aa4341ea9cc93b770555d3ad
imgsvr-overflow.txt
Posted Jul 11, 2007
Authored by mu-b, Tim Brown | Site portcullis-security.com

ImgSvr suffers from a stack overflow vulnerability.

tags | advisory, overflow
SHA-256 | 565d22b95eca8b9f9bc666c22a941d4f22918caf966cb2431c62ee0ee7aa6b51
imgsvr-traverse.txt
Posted Jul 11, 2007
Authored by Tim Brown | Site portcullis-security.com

ImgSvr suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | 587cd55bbcebb9efada9fd3e9fcfc6871ab6005bad8bc15228ce890a7df36ba8
easql-06-057.txt
Posted Jul 11, 2007
Authored by Tim Brown | Site portcullis-security.com

eVisit Analyst is susceptible to SQL injection vulnerabilities.

tags | advisory, vulnerability, sql injection
SHA-256 | 64578dc3aa5280d374e5a5e33556efa48bdbd09dd432b0ed80d48f0beb44bd5b
Page 2 of 3
Back123Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close