exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 14 of 14 RSS Feed

Files Date: 2004-03-19

avscan-0.1.1.tar.bz2
Posted Mar 19, 2004
Authored by Tara Milana | Site wolfpack.twu.net

Endeavour Mark II AntiVirus Scanner is an anti-virus scanner for Endeavour Mark II that uses the ClamAV library (libclamav). It allows you to create a list of scan items for frequently scanned locations and features easy virus database updating, all in a simple GUI environment.

tags | virus
systems | unix
SHA-256 | dc9f097b7b33ffc6123308c5caffc0e5b20f5916dca866f2c6c47878f6d3cd69
fwanalog-0.6.4.tar.gz
Posted Mar 19, 2004
Authored by Balazs | Site tud.at

fwanalog is a shell script that parses and summarizes firewall logfiles. It understands logs from ipf (xBSD, Solaris), OpenBSD 3.x pf, Linux 2.2 ipchains, Linux 2.4 iptables, and a few types of routers and firewalls (Cisco, Checkpoint FW-1, and Watchguard). The excellent log analysis program Analog is used to create the reports.

Changes: Various bug fixes.
tags | tool, shell, firewall
systems | cisco, linux, unix, solaris, openbsd
SHA-256 | 8ddc4c7ec16e59a27691e25fdd1f266838230ee08c3495fa289db0e7fc008e13
apache2049.txt
Posted Mar 19, 2004
Site apache.org

Apache 2.0.49 has been released to address three security vulnerabilities. A race condition that allows for a denial of service attack, a condition that allow arbitrary strings to get written to the error log, and a memory leak in mod_ssl have all been addressed.

tags | advisory, denial of service, arbitrary, vulnerability, memory leak
advisories | CVE-2004-0174, CVE-2003-0020, CVE-2004-0113
SHA-256 | 666378a2dac755746ebe339e702406b4148bfa0f7e45b8cfb45a932c59ff3931
iDEFENSE Security Advisory 2004-03-19.t
Posted Mar 19, 2004
Authored by Larry W. Cashdollar, iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 03.19.04: Exploitation of default file permissions in Borland Interbase can allow local attackers to gain database administrative privileges. The vulnerability specifically exists due to insecure permissions on the admin.ib user database file. Local attackers can add or modify existing accounts to gain administrative privileges.

tags | advisory, local
SHA-256 | b71f1e19f5d04a562354ac69ff0c4e4809b8054067ce74ebf7ae83fa5306c438
smbprintsymlink.txt
Posted Mar 19, 2004
Authored by Shaun Colley aka shaun2k2

smbprint insecurely writes to files in /tmp allowing for a symbolic link attack. Full details on exploitation included.

tags | exploit
SHA-256 | 5f8fabd4db56afb335dc8f91646c031c7ae3fbc783d0d675174bdc907f203a29
expcrashnp.txt
Posted Mar 19, 2004
Authored by Rafel Ivgi | Site theinsider.deep-ice.com

Internet Explorer and Explorer.exe can be crashed when a null pointer exception occurs during a shell: call with a double backslash for a filename.

tags | advisory, shell
SHA-256 | e6a8af3cb27b9431ff48b3e871cc42063063123890dc7539a0dde1e45344aba8
nisrce.txt
Posted Mar 19, 2004
Authored by Mark Litchfield | Site ngssoftware.com

NGSSoftware Insight Security Research Advisory #NISR19042004b - Symantec's Norton Internet Security 2004 Professional makes use of an ActiveX component that is marked safe for scripting, particularly WrapUM.dll. Using the LaunchURL method an attacker has the ability to force the browser to run arbitrary executables on the target.

tags | advisory, arbitrary, activex
SHA-256 | 11d31d97538a7637add15397dc05b7907d588a0e9216c80ae9fa4a9502a8ba11
antispam.txt
Posted Mar 19, 2004
Authored by Mark Litchfield | Site ngssoftware.com

NGSSoftware Insight Security Research Advisory #NISR19042004a - Installed with Symantec's Norton AntiSpam 2004 product is an ActiveX component that is marked safe for scripting, particularly symspam.dll. However, when the method LaunchCustomRuleWizard is called with an overly long parameter, an attacker can cause a stack based overflow allowing for arbitrary code execution.

tags | advisory, overflow, arbitrary, code execution, activex
SHA-256 | b73892705e2a76c1e0de0b2b6bf520d003b24ba8a85ea693d80dca4775212c39
eudora603.pl
Posted Mar 19, 2004
Authored by Paul Szabo

Exploit that performs an attachment spoofing demo for Eudora versions 6.0.3 and below.

tags | exploit, spoof
SHA-256 | 0c214a6830a6b38f208d91c88ccce9d0df221e499a4b82c10d438246c122aa6b
eEye.iss.txt
Posted Mar 19, 2004
Authored by eEye Digital Security | Site eEye.com

eEye Security Advisory - A critical vulnerability has been discovered in the PAM component used in all current ISS host, server, and network device solutions. A routine within the Protocol Analysis Module (PAM) that monitors ICQ server responses contains a series of stack based buffer overflow vulnerabilities. If the source port of an incoming UDP packet is 4000, it is assumed to be an ICQ v5 server response. Any incoming packet matching this criterion will be forwarded to the vulnerable routine. By delivering a carefully crafted response packet to the broadcast address of a network operating RealSecure/BlackICE agents an attacker can achieve anonymous, remote SYSTEM access across all vulnerable nodes.

tags | advisory, remote, overflow, udp, vulnerability, protocol
SHA-256 | c6c0d8948e71c161a5add829f745ebab0f86413f58d23225b1380cf524cb01c0
macadmin.txt
Posted Mar 19, 2004
Authored by crEp | Site crepinc.com

The admin service on Mac OS-X, which runs on port 660, has a buffer overflow vulnerability.

tags | advisory, overflow
systems | apple, osx
SHA-256 | 482c55a3dd124804fd01164bf03aea33dfda82b3251f554ad7338459e27e23d4
chromeboom.zip
Posted Mar 19, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Remote exploit that causes a server crash in Chrome versions 1.2.0.0 and below.

tags | exploit, remote
SHA-256 | dcf8df6f24acf38d664322e4c28369904c5ff6469a4572a3985c4476cc1af158
chrome1200.txt
Posted Mar 19, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Chrome versions 1.2.0.0 and below allow for reading and writing into allocated memory resulting in a server crash.

tags | advisory
SHA-256 | c118fcc08c222f28213ddc5a22bf1c4b4784f736134f761325a8cedb02c3edcc
hotmailfun.txt
Posted Mar 19, 2004
Authored by http-equiv | Site malware.com

Some amusing flaws in Hotmail.com allows for credential theft.

tags | advisory
SHA-256 | 36c149ffb66c8fd45646c4c58eb4976dbea678cc3ed3634af594e00d8731dca8
Page 1 of 1
Back1Next

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close