what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 15 of 15 RSS Feed

Files Date: 2004-03-24

hpjadmadv.txt
Posted Mar 24, 2004
Authored by wirepair

HP Web JetAdmin Version 7.5.2546 has multiple vulnerables. They include denial of service, the ability to upload any file to the server, the ability to write to any file on the filesystem, and the ability to read any file via a directory traversal attack.

tags | exploit, web, denial of service
SHA-256 | 780900bad23973701e54c68a4f7f56ef66254bb168b915fea16bf8201c311dc8
picobof.zip
Posted Mar 24, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Proof of concept exploit for PicoPhone versions 1.63 and below that makes use of a buffer overflow in the logging functionality.

tags | exploit, overflow, proof of concept
SHA-256 | e0631cf6bec415c1808b84f96b56815afd7052f75d64d713abeba40da34a113c
picophone163.txt
Posted Mar 24, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

PicoPhone versions 1.63 and below have a buffer overflow in their logging function that allows an attacker to take over the server.

tags | advisory, overflow
SHA-256 | 272375c297125602b9c603522ebc037890efc0a2961dea48470bef45f3d0af4c
trendmicro.txt
Posted Mar 24, 2004
Authored by Tri Huynh

TrendMicro Interscan Viruswall versions 3.5 and below suffer from a directory traversal vulnerability that allow a remote attacker to access any files outside of the web root.

tags | exploit, remote, web, root
SHA-256 | f25f638f906ad129cdbb8d328799330facc7b5d94a900c921325721bd2ecf3f8
Rapid7 Security Advisory 18
Posted Mar 24, 2004
Authored by Rapid7 | Site rapid7.com

Rapid7 Security Advisory - OpenBSD isakmpd payload handling is subject to multiple denial of service vulnerabilities. Known vulnerable: OpenBSD 3.4 and earlier, OpenBSD-current as of March 17, 2004.

tags | advisory, denial of service, vulnerability
systems | openbsd
advisories | CVE-2004-0218, CVE-2004-0219, CVE-2004-0220, CVE-2004-0221, CVE-2004-0222
SHA-256 | 8da0f659cc2f01757fe76a02ef81c99462ce0723e0c7b0c9c6d5be0d74ba2547
solaris_kernel_vfs.sxw.pdf
Posted Mar 24, 2004
Authored by Sinan Eren | Site immunitysec.com

Immunity Security Advisory - A vulnerability lies in Solaris 2.6 through 10 that allows a local user to load kernel modules without being root due to a directory traversal problem in vfs_getvfssw().

tags | advisory, kernel, local, root
systems | solaris
SHA-256 | 5c936a09f4f3f66b70760fb5d3f874837bb9b5030610fd82f6ddf49325674c4f
t3cbof.zip
Posted Mar 24, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Remote proof of concept denial of service exploit for Terminator 3 that makes use of a broadcast client buffer overflow.

tags | exploit, remote, denial of service, overflow, proof of concept
SHA-256 | 0d641c022483a59a51b40970eba53e0b52c0c58762425942c400509db3dae76f
terminator3.txt
Posted Mar 24, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Terminator 3: War of the Machines version 1.0 for Windows has a broadcast client buffer overflow that results in a game network denial of service.

tags | advisory, denial of service, overflow
systems | windows
SHA-256 | 5bbd57e0ea47f9ad7dbc552039e2126709a71fe804eaa6a809e07653ccee4b47
Beltane Web-Based Management For Samhain
Posted Mar 24, 2004
Site la-samhna.de

Beltane is a web-based central management console for the Samhain file integrity / intrusion detection system. It enables the administrator to browse client messages, acknowledge them, and update centrally stored file signature databases. Beltane requires a Samhain (version 1.6.0 or higher) client/server installation, with file signature databases stored on the central server, and logging to a SQL database enabled.

Changes: Two bug fixes.
tags | tool, web, intrusion detection
systems | unix
SHA-256 | f9980469af70423a03cca7209195819965d3b667de384c8a420a9898545aae73
Samhain File Integrity Checker
Posted Mar 24, 2004
Authored by Rainer Wichmann | Site samhain.sourceforge.net

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.

Changes: See documentation.
tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
SHA-256 | 6ec449abbb90d4b10e1c2d055d508d51d568ec0af561890b9085f14ed8dff0f2
dtlogin.sxw.pdf
Posted Mar 24, 2004
Authored by Dave Aitel | Site immunitysec.com

Immunity Security Advisory - A double-free weakness in the XDMCP parser of dtlogin (CDE) results in remote code execution against popular server operating systems, such as Solaris. This attack is performed over UDP port 177.

tags | advisory, remote, udp, code execution
systems | solaris
SHA-256 | 34a2ff7508addcf429bd6658dd04890ff4df50eab6a7461c5b52a69bb51e0b7d
dameware4100.txt
Posted Mar 24, 2004
Authored by ax09001h

Dameware Mini Remote Control version 4.1.0.0 passes its Blowfish encryption key on the wire in the clear. It also uses a poor random bit generator to create the key.

tags | advisory, remote
SHA-256 | 7645b350d10e4bf407c1b67c4e1ccaee2cc5aade90a07b7a4ea069e8f53107a6
032004.txt
Posted Mar 24, 2004
Authored by Stefan Esser | Site security.e-matters.de

Ethereal versions 0.8.14 through 0.10.2 were found to be vulnerable to thirteen remote stack overflows during a code audit. The vulnerable dissectors in question are namely: BGP, EIGRP, IGAP, IRDA, ISUP, NetFlow, PGM, TCAP and UCP. Ten of the overflows allow for arbitrary code execution.

tags | advisory, remote, overflow, arbitrary, code execution
advisories | CVE-2004-0176
SHA-256 | 381080b5ef005f71331d2984b019292db1046026552c446cfec0adc047875699
ragefreeze.zip
Posted Mar 24, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Remote denial of service exploit for The Rage game versions 1.01 and below.

tags | exploit, remote, denial of service
SHA-256 | 4cce12588b3ef0ace39cff4594e1a48cf42cba02f088ee85aa601d736d465c5a
therage101.txt
Posted Mar 24, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

The Rage game versions 1.01 and below are vulnerable to a remote denial of service. The packet used by the client to join the match hosted on the server contains a sockaddr_in structure inside the data that is composed by the AF_INET family, the source port and the IP address of the client. This structure is used by the server to send the next packets to the client. If an attacker fills it with a port and an IP equal to zero the server will enter in an infinite loop.

tags | advisory, remote, denial of service
SHA-256 | 714d794129be89c2a51454b4e92a78a136797ae0d00e5463617b167b2a64d08f
Page 1 of 1
Back1Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    0 Files
  • 9
    Aug 9th
    0 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close