exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files Date: 2004-03-16

Posted Mar 16, 2004
Authored by Chris Irvine | Site macromedia.com

Macromedia Security Bulletin MPSB04-03 - Macintosh versions of the Macromedia installers and e-licensing client install a service whose file permissions allow other users to write to the file. This may allow one local user to obtain the permissions of another local user, resulting in privilege escalation.

tags | advisory, local
SHA-256 | 06569fc73f56b134f1c6ccc379a1250b834fd97e8c4fbcb362ffbf3611186893
Posted Mar 16, 2004
Site support.novell.com

Novell has identified an issue with the default configuration of GroupWise 6 and 6.5 WebAccess that could allow unauthorized access to the WebAccess server. This issue affects only systems running GroupWise 6 or 6.5 WebAccess on NetWare using the Apache 1.3x web server and where Apache is loaded using the GWAPACHE.CONF file.

tags | advisory, web
SHA-256 | 3af321a0b71da464f106be0cbfd62b884c6d174fcc11563a1739cc9ed3673c13
Posted Mar 16, 2004
Site otn.oracle.com

Oracle Security Alert 66 - Security vulnerabilities have been discovered in Oracle Application Server Web Cache 10g ( and Oracle9i Application Server Web Cache.

tags | advisory, web, vulnerability
SHA-256 | 2265276da46e246bf16627f4b8bd512ba4c18a873a847af0740783b7284199f8
Posted Mar 16, 2004
Authored by Eric Gerbier | Site afick.sourceforge.net

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.

Changes: Various bug fixes and feature enhancements.
tags | tool, integrity
systems | windows, unix
SHA-256 | 13c2dfdd859d8d5178d0d1ad9dcc054cee17dac78a9d3eafda495df62b259f65
Posted Mar 16, 2004
Authored by Corvus V Corax | Site motiontrack.sourceforge.net

Motiontrack is a set of tools that detects motion between two images. It is able to successfully distinguish random flicker from real object movement by applying a set of filters to the images, and can optionally ignore given colors and/or image regions. The roadmap provides for being able to identify objects by pattern detection and AI routines. Currently, this tool is able to turn line-art images into ASCII-art text as a demo feature.

systems | linux
SHA-256 | a6939f44565f5b1c0b8a867e6690d784222af761336425e7e8d7c2b506415bf4
Posted Mar 16, 2004
Authored by Rafel Ivgi | Site theinsider.deep-ice.com

VocalTec Gateway version 8 has multiple vulnerabilities. Using an information disclosure vulnerability existant in this server, an attacker can then traverse directories when treating the file as a directory, and gain access to any file normally protected.

tags | exploit, vulnerability, info disclosure
SHA-256 | d2d7e12389fdeb8f5acccd3265801cd775e76256b88501a5b4d43b3d6ea8a296
Posted Mar 16, 2004
Authored by John Layman

WS_FTP Pro versions 8.02 and below suffer from a buffer overrun when ASCII mode directory data is passed to the client from the server. If the data exceeds 260 bytes without a terminating CR/LF, the application will crash. Arbitrary code execution is possible.

tags | advisory, overflow, arbitrary, code execution
SHA-256 | 053fdbe09d3248b0bcb77193ec1300cfa9c274c9284e37fa1da31338c10879d8
Posted Mar 16, 2004
Authored by Dave Aitel | Site immunitysec.com

Immunity Security Advisory - The Compaq Web Management system (HP HTTP) has a bug in its validation system that allows an anonymous user to upload trusted certificates.

tags | advisory, web
SHA-256 | abd992377e84fc44d38444954b8896715b7619fe2c505a46a3639e73084980f2
Posted Mar 16, 2004
Authored by Dave Aitel | Site immunitysec.com

Immunity Security Advisory - Remotely exploitable stack overflows exist in Computer Associates Unicenter TNG Utilities awservices.exe. Successful exploitation elevates an attacker to SYSTEM privileges. All known versions of Unicenter TNG 2.4 are affected.

tags | advisory, overflow
SHA-256 | 1625a608ed26cffca06238ca193f1bde9f9b610f98606c2b6088043899bef4c8
Posted Mar 16, 2004
Authored by Angelo Rosiello, rosiello | Site rosiello.org

Remote exploit for MDaemon Mail Server versions 6.52 to 6.85 that makes use of a buffer overflow in its raw message handler. This exploit has only been tested on Windows XP Home and Pro Edition (Dutch) SP1.

tags | exploit, remote, overflow
systems | windows
SHA-256 | f2ad6f0382c6310f3658254e54ad15974683f2ce8e29ff239c7888bb1e7b02fd
Page 1 of 1

File Archive:

October 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    10 Files
  • 2
    Oct 2nd
    0 Files
  • 3
    Oct 3rd
    0 Files
  • 4
    Oct 4th
    0 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    0 Files
  • 8
    Oct 8th
    0 Files
  • 9
    Oct 9th
    0 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    0 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By