exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 14 of 14 RSS Feed

Files Date: 2004-03-19

Posted Mar 19, 2004
Authored by Tara Milana | Site wolfpack.twu.net

Endeavour Mark II AntiVirus Scanner is an anti-virus scanner for Endeavour Mark II that uses the ClamAV library (libclamav). It allows you to create a list of scan items for frequently scanned locations and features easy virus database updating, all in a simple GUI environment.

tags | virus
systems | unix
SHA-256 | dc9f097b7b33ffc6123308c5caffc0e5b20f5916dca866f2c6c47878f6d3cd69
Posted Mar 19, 2004
Authored by Balazs | Site tud.at

fwanalog is a shell script that parses and summarizes firewall logfiles. It understands logs from ipf (xBSD, Solaris), OpenBSD 3.x pf, Linux 2.2 ipchains, Linux 2.4 iptables, and a few types of routers and firewalls (Cisco, Checkpoint FW-1, and Watchguard). The excellent log analysis program Analog is used to create the reports.

Changes: Various bug fixes.
tags | tool, shell, firewall
systems | cisco, linux, unix, solaris, openbsd
SHA-256 | 8ddc4c7ec16e59a27691e25fdd1f266838230ee08c3495fa289db0e7fc008e13
Posted Mar 19, 2004
Site apache.org

Apache 2.0.49 has been released to address three security vulnerabilities. A race condition that allows for a denial of service attack, a condition that allow arbitrary strings to get written to the error log, and a memory leak in mod_ssl have all been addressed.

tags | advisory, denial of service, arbitrary, vulnerability, memory leak
advisories | CVE-2004-0174, CVE-2003-0020, CVE-2004-0113
SHA-256 | 666378a2dac755746ebe339e702406b4148bfa0f7e45b8cfb45a932c59ff3931
iDEFENSE Security Advisory 2004-03-19.t
Posted Mar 19, 2004
Authored by Larry W. Cashdollar, iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 03.19.04: Exploitation of default file permissions in Borland Interbase can allow local attackers to gain database administrative privileges. The vulnerability specifically exists due to insecure permissions on the admin.ib user database file. Local attackers can add or modify existing accounts to gain administrative privileges.

tags | advisory, local
SHA-256 | b71f1e19f5d04a562354ac69ff0c4e4809b8054067ce74ebf7ae83fa5306c438
Posted Mar 19, 2004
Authored by Shaun Colley aka shaun2k2

smbprint insecurely writes to files in /tmp allowing for a symbolic link attack. Full details on exploitation included.

tags | exploit
SHA-256 | 5f8fabd4db56afb335dc8f91646c031c7ae3fbc783d0d675174bdc907f203a29
Posted Mar 19, 2004
Authored by Rafel Ivgi | Site theinsider.deep-ice.com

Internet Explorer and Explorer.exe can be crashed when a null pointer exception occurs during a shell: call with a double backslash for a filename.

tags | advisory, shell
SHA-256 | e6a8af3cb27b9431ff48b3e871cc42063063123890dc7539a0dde1e45344aba8
Posted Mar 19, 2004
Authored by Mark Litchfield | Site ngssoftware.com

NGSSoftware Insight Security Research Advisory #NISR19042004b - Symantec's Norton Internet Security 2004 Professional makes use of an ActiveX component that is marked safe for scripting, particularly WrapUM.dll. Using the LaunchURL method an attacker has the ability to force the browser to run arbitrary executables on the target.

tags | advisory, arbitrary, activex
SHA-256 | 11d31d97538a7637add15397dc05b7907d588a0e9216c80ae9fa4a9502a8ba11
Posted Mar 19, 2004
Authored by Mark Litchfield | Site ngssoftware.com

NGSSoftware Insight Security Research Advisory #NISR19042004a - Installed with Symantec's Norton AntiSpam 2004 product is an ActiveX component that is marked safe for scripting, particularly symspam.dll. However, when the method LaunchCustomRuleWizard is called with an overly long parameter, an attacker can cause a stack based overflow allowing for arbitrary code execution.

tags | advisory, overflow, arbitrary, code execution, activex
SHA-256 | b73892705e2a76c1e0de0b2b6bf520d003b24ba8a85ea693d80dca4775212c39
Posted Mar 19, 2004
Authored by Paul Szabo

Exploit that performs an attachment spoofing demo for Eudora versions 6.0.3 and below.

tags | exploit, spoof
SHA-256 | 0c214a6830a6b38f208d91c88ccce9d0df221e499a4b82c10d438246c122aa6b
Posted Mar 19, 2004
Authored by eEye Digital Security | Site eEye.com

eEye Security Advisory - A critical vulnerability has been discovered in the PAM component used in all current ISS host, server, and network device solutions. A routine within the Protocol Analysis Module (PAM) that monitors ICQ server responses contains a series of stack based buffer overflow vulnerabilities. If the source port of an incoming UDP packet is 4000, it is assumed to be an ICQ v5 server response. Any incoming packet matching this criterion will be forwarded to the vulnerable routine. By delivering a carefully crafted response packet to the broadcast address of a network operating RealSecure/BlackICE agents an attacker can achieve anonymous, remote SYSTEM access across all vulnerable nodes.

tags | advisory, remote, overflow, udp, vulnerability, protocol
SHA-256 | c6c0d8948e71c161a5add829f745ebab0f86413f58d23225b1380cf524cb01c0
Posted Mar 19, 2004
Authored by crEp | Site crepinc.com

The admin service on Mac OS-X, which runs on port 660, has a buffer overflow vulnerability.

tags | advisory, overflow
systems | apple, osx
SHA-256 | 482c55a3dd124804fd01164bf03aea33dfda82b3251f554ad7338459e27e23d4
Posted Mar 19, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Remote exploit that causes a server crash in Chrome versions and below.

tags | exploit, remote
SHA-256 | dcf8df6f24acf38d664322e4c28369904c5ff6469a4572a3985c4476cc1af158
Posted Mar 19, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Chrome versions and below allow for reading and writing into allocated memory resulting in a server crash.

tags | advisory
SHA-256 | c118fcc08c222f28213ddc5a22bf1c4b4784f736134f761325a8cedb02c3edcc
Posted Mar 19, 2004
Authored by http-equiv | Site malware.com

Some amusing flaws in Hotmail.com allows for credential theft.

tags | advisory
SHA-256 | 36c149ffb66c8fd45646c4c58eb4976dbea678cc3ed3634af594e00d8731dca8
Page 1 of 1

File Archive:

June 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    0 Files
  • 2
    Jun 2nd
    0 Files
  • 3
    Jun 3rd
    18 Files
  • 4
    Jun 4th
    21 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    57 Files
  • 7
    Jun 7th
    6 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    12 Files
  • 11
    Jun 11th
    27 Files
  • 12
    Jun 12th
    38 Files
  • 13
    Jun 13th
    16 Files
  • 14
    Jun 14th
    14 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Security Services
Hosting By