exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 16 of 16 RSS Feed

Files Date: 2004-02-24

Posted Feb 24, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

The Gamespy SDK used for online cd-keys validation in third party code has various vulnerabilities. Game servers getting crashed and privacy problems persist. Gamespy themselves sent the author a cease and desist due to his research.

tags | advisory, vulnerability
SHA-256 | 508be26b049e786d8ba2d9500a23b57d3bd980bdd84494999ac53b40d0ed4ede
Posted Feb 24, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

The Ghost Recon engine versions 1.4 and below along with some other games developed by Redstorm are vulnerable to a remote crash.

tags | advisory, remote
SHA-256 | 062615fe20f9e43892163c7a4cfd3022ebebbc5ad07227f14d59689a553a93a9
Posted Feb 24, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Haegemonia versions 1.07 and below have a remote vulnerability where the reading of unallocated memory causes a crash.

tags | advisory, remote
SHA-256 | 71612dcd0b3195ee5a2b49861682273a773a9112ce0ccfbaecb6d6f49e189790
Posted Feb 24, 2004
Authored by Stefan Esser | Site security.e-matters.de

Trillian versions 0.71 through 0.74 and Pro versions 1.0 through 2.01 have two vulnerabilities that allow for remote compromise.

tags | advisory, remote, vulnerability
SHA-256 | 644a67bf065bdd9369181f79afb3191465a69dcc5c87f7d823e73f8dfeee5add
Posted Feb 24, 2004
Authored by Rafel Ivgi | Site theinsider.deep-ice.com

BadBlue web server version 2.4 has a local path disclosure vulnerability in phptest.php.

tags | advisory, web, local, php
SHA-256 | 61526ad7e90d57897a735b25cd5b3a4fed70406fc831efc5ad1c0098950b1c52
Posted Feb 24, 2004
Authored by Rafel Ivgi | Site theinsider.deep-ice.com

FlexWATCH-Webs versions 2.2 (NTSC) and below suffer from an authorization bypass via double slashes and also a cross site scripting attack.

tags | exploit, web, xss
SHA-256 | 30f2d7d384b06c83532dccf7d1af6e57c41375c5a13abfadfe0e4861c59106a0
Posted Feb 24, 2004
Authored by Rafel Ivgi | Site theinsider.deep-ice.com

Gigabyte Broadband Router version Gn-B46B with firmware version 1.003.00 is vulnerable to a remote authorization bypass.

tags | advisory, remote
SHA-256 | e3149a74a9c9b81c93c795bacc90d54e97eece5c31f0f9a3dd7a8c272d3b6b3f
Posted Feb 24, 2004
Authored by Petter Nordahl-Hagen | Site home.eunet.no

chntpw is a Linux utility to (re)set the password of any user that has a valid (local) account on your WinNT or Win2000 system, by modifying the crypted password in the registry's SAM file. You do not need to know the old password to set a new one. It works offline (i.e., you have to shutdown your computer and boot off a linux floppy disk). The bootdisk includes stuff to access NTFS partitions and scripts to glue the whole thing together. This utility works with SYSKEY and includes the option to turn it off. A bootdisk image is provided.

tags | local, registry
systems | linux, windows
SHA-256 | 65dbbeafff881919c106decc466b7752d52cc68632baebbbb704a3dd7016433a
Posted Feb 24, 2004
Authored by Brain | Site sourceforge.net

IRC Defender is a Perl program for protecting your IRC network against virus drones, general troublemakers, ban evasion, and attacks. It is fully modular, able to unload and load modules on the fly, and comes with several modules to ban anatoly/fyle virus drones, block unauthorised cgi:irc sites, conduct ctcp version surveys, maintain ctcp version blacklists, and (most importantly) set regexp-based akills.

tags | cgi, perl, virus
SHA-256 | 952f2ea50ff04b95e6292c122538c184fbaba0c22bbfa3b7d19bd3c737cc5dc9
Posted Feb 24, 2004
Site netspoc.berlios.de

Network Security Policy Compiler (NetSPoC) is a tool for security management of large networks with different security domains. It generates configuration files for packet filters controlling the borders of security domains. It provides its own language for describing security policy and the topology of a network. The security policy is a set of rules that state which packets are allowed to pass the network and which are not. NetSPoC is topology aware - a rule for traffic from A to B is automatically applied to all managed packet filters on the path from A to B.

Changes: Routing protocol EIGRP is supported. Trailing comma is allowed at end of lists now.
systems | unix
SHA-256 | 54d61d636c96d5d398a4b34945bc256c442d6d1f232877f25f75a52a1bee7523
iDEFENSE Security Advisory 2004-02-23.t
Posted Feb 24, 2004
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 02.23.04: Exploitation of a flaw in Apple Computer Inc's Darwin Streaming Server allows unauthenticated remote attackers to prevent legitimate usage.

tags | advisory, remote
systems | apple
SHA-256 | f372c7d4abe5c81061d94571dca2e30e3fbfca98b98ff04b3ccdf60adc28c1e9
Atstake Security Advisory 04-02-23.1
Posted Feb 24, 2004
Authored by David Goldsmith, Atstake | Site atstake.com

Atstake Security Advisory A022304-1 - The ppp daemon that comes installed by default in Mac OS X is vulnerable to a format string vulnerability. It is possible to read arbitrary data out of pppd's process. Under certain circumstances, it is also possible to 'steal' PAP/CHAP authentication credentials.

tags | advisory, arbitrary
systems | apple, osx
advisories | CVE-2004-0165
SHA-256 | ac39259d91e80a21a84083dd2d5ed03a1ab274c26fa3d74162b3afe90c544152
Posted Feb 24, 2004
Authored by intuit | Site rootshells.tk

TYPSoft FTP Server version 1.10 is susceptible to denial of service attacks via most standard FTP commands.

tags | advisory, denial of service
SHA-256 | 9896cd1b5ce2e75750ee8ad25c0668ceb68ffb05d3a115a758fc7e382ab93b2e
Posted Feb 24, 2004
Authored by Mariusz Woloszyn

Lam3rZ Security Advisory #3/2004 - Confirm versions 0.62 and below allow for forged email headers to execute arbitrary code as the uid the script runs under for procmail.

tags | advisory, arbitrary
SHA-256 | 634b2b6e2e473082e8c96998040c28f72299b5f0b7d63fbea545f69d86f36438
Posted Feb 24, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Team Factor versions 1.25 and below are susceptible to a remote server crash. Both the Windows and Linux platforms are affected.

tags | advisory, remote
systems | linux, windows
SHA-256 | ecf6ae877cd6f230a6ca6cfcb248d330cfbe231379638e55923f3b71bcf037f3
Posted Feb 24, 2004
Authored by Janek Vind aka waraxe

Extreme Messageboard aka XMB version 1.8 Partagium Final SP2 is vulnerable to multiple SQL injection and cross site scripting attacks.

tags | exploit, xss, sql injection
SHA-256 | 94202bebf3a32f786fd685a5f8e27fde71d3af5d8268b3550c55c6d9a2fd6d7f
Page 1 of 1

File Archive:

February 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    11 Files
  • 2
    Feb 2nd
    9 Files
  • 3
    Feb 3rd
    5 Files
  • 4
    Feb 4th
    0 Files
  • 5
    Feb 5th
    0 Files
  • 6
    Feb 6th
    0 Files
  • 7
    Feb 7th
    0 Files
  • 8
    Feb 8th
    0 Files
  • 9
    Feb 9th
    0 Files
  • 10
    Feb 10th
    0 Files
  • 11
    Feb 11th
    0 Files
  • 12
    Feb 12th
    0 Files
  • 13
    Feb 13th
    0 Files
  • 14
    Feb 14th
    0 Files
  • 15
    Feb 15th
    0 Files
  • 16
    Feb 16th
    0 Files
  • 17
    Feb 17th
    0 Files
  • 18
    Feb 18th
    0 Files
  • 19
    Feb 19th
    0 Files
  • 20
    Feb 20th
    0 Files
  • 21
    Feb 21st
    0 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By