exploit the possibilities
Showing 1 - 15 of 15 RSS Feed

Files Date: 2004-03-24

hpjadmadv.txt
Posted Mar 24, 2004
Authored by wirepair

HP Web JetAdmin Version 7.5.2546 has multiple vulnerables. They include denial of service, the ability to upload any file to the server, the ability to write to any file on the filesystem, and the ability to read any file via a directory traversal attack.

tags | exploit, web, denial of service
MD5 | e6f0dc1235b0d0236d656ada61472d58
picobof.zip
Posted Mar 24, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Proof of concept exploit for PicoPhone versions 1.63 and below that makes use of a buffer overflow in the logging functionality.

tags | exploit, overflow, proof of concept
MD5 | 7b97fc4e9b1b9d51052ae11b7a4d08a8
picophone163.txt
Posted Mar 24, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

PicoPhone versions 1.63 and below have a buffer overflow in their logging function that allows an attacker to take over the server.

tags | advisory, overflow
MD5 | c58c41988177769677bdbda6666df03f
trendmicro.txt
Posted Mar 24, 2004
Authored by Tri Huynh

TrendMicro Interscan Viruswall versions 3.5 and below suffer from a directory traversal vulnerability that allow a remote attacker to access any files outside of the web root.

tags | exploit, remote, web, root
MD5 | ec8b6587245cb7d6b0ea630d03b0e0cd
Rapid7 Security Advisory 18
Posted Mar 24, 2004
Authored by Rapid7 | Site rapid7.com

Rapid7 Security Advisory - OpenBSD isakmpd payload handling is subject to multiple denial of service vulnerabilities. Known vulnerable: OpenBSD 3.4 and earlier, OpenBSD-current as of March 17, 2004.

tags | advisory, denial of service, vulnerability
systems | openbsd
advisories | CVE-2004-0218, CVE-2004-0219, CVE-2004-0220, CVE-2004-0221, CVE-2004-0222
MD5 | ff6add0baf9cf2fe0508ba814bc1c676
solaris_kernel_vfs.sxw.pdf
Posted Mar 24, 2004
Authored by Sinan Eren | Site immunitysec.com

Immunity Security Advisory - A vulnerability lies in Solaris 2.6 through 10 that allows a local user to load kernel modules without being root due to a directory traversal problem in vfs_getvfssw().

tags | advisory, kernel, local, root
systems | solaris
MD5 | e384712d8c329650378a979c1a34b004
t3cbof.zip
Posted Mar 24, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Remote proof of concept denial of service exploit for Terminator 3 that makes use of a broadcast client buffer overflow.

tags | exploit, remote, denial of service, overflow, proof of concept
MD5 | a0488bcfc89f8c89bb396b3c7e80cc10
terminator3.txt
Posted Mar 24, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Terminator 3: War of the Machines version 1.0 for Windows has a broadcast client buffer overflow that results in a game network denial of service.

tags | advisory, denial of service, overflow
systems | windows
MD5 | 1d8feacdcbdfff8ab28a2bd66d86d166
Beltane Web-Based Management For Samhain
Posted Mar 24, 2004
Site la-samhna.de

Beltane is a web-based central management console for the Samhain file integrity / intrusion detection system. It enables the administrator to browse client messages, acknowledge them, and update centrally stored file signature databases. Beltane requires a Samhain (version 1.6.0 or higher) client/server installation, with file signature databases stored on the central server, and logging to a SQL database enabled.

Changes: Two bug fixes.
tags | tool, web, intrusion detection
systems | unix
MD5 | d84122404fa52ba9034595d0f30da600
Samhain File Integrity Checker
Posted Mar 24, 2004
Authored by Rainer Wichmann | Site samhain.sourceforge.net

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.

Changes: See documentation.
tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
MD5 | a01dcf544c30e5d156e8eabd2361d871
dtlogin.sxw.pdf
Posted Mar 24, 2004
Authored by Dave Aitel | Site immunitysec.com

Immunity Security Advisory - A double-free weakness in the XDMCP parser of dtlogin (CDE) results in remote code execution against popular server operating systems, such as Solaris. This attack is performed over UDP port 177.

tags | advisory, remote, udp, code execution
systems | solaris
MD5 | 01c14a6a98f0a677463029b74cc20f5c
dameware4100.txt
Posted Mar 24, 2004
Authored by ax09001h

Dameware Mini Remote Control version 4.1.0.0 passes its Blowfish encryption key on the wire in the clear. It also uses a poor random bit generator to create the key.

tags | advisory, remote
MD5 | bb8347a1595e5a0e7b01a6872944a841
032004.txt
Posted Mar 24, 2004
Authored by Stefan Esser | Site security.e-matters.de

Ethereal versions 0.8.14 through 0.10.2 were found to be vulnerable to thirteen remote stack overflows during a code audit. The vulnerable dissectors in question are namely: BGP, EIGRP, IGAP, IRDA, ISUP, NetFlow, PGM, TCAP and UCP. Ten of the overflows allow for arbitrary code execution.

tags | advisory, remote, overflow, arbitrary, code execution
advisories | CVE-2004-0176
MD5 | 68b1a8f4d3a89c77a5ba179a4b799202
ragefreeze.zip
Posted Mar 24, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Remote denial of service exploit for The Rage game versions 1.01 and below.

tags | exploit, remote, denial of service
MD5 | 4bf17b3df82c0f6ebc4c73592086592a
therage101.txt
Posted Mar 24, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

The Rage game versions 1.01 and below are vulnerable to a remote denial of service. The packet used by the client to join the match hosted on the server contains a sockaddr_in structure inside the data that is composed by the AF_INET family, the source port and the IP address of the client. This structure is used by the server to send the next packets to the client. If an attacker fills it with a port and an IP equal to zero the server will enter in an infinite loop.

tags | advisory, remote, denial of service
MD5 | ed247d4aa5cacdbb878c9181d22ecc49
Page 1 of 1
Back1Next

File Archive:

October 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    24 Files
  • 2
    Oct 2nd
    15 Files
  • 3
    Oct 3rd
    7 Files
  • 4
    Oct 4th
    4 Files
  • 5
    Oct 5th
    10 Files
  • 6
    Oct 6th
    1 Files
  • 7
    Oct 7th
    21 Files
  • 8
    Oct 8th
    19 Files
  • 9
    Oct 9th
    5 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    17 Files
  • 12
    Oct 12th
    4 Files
  • 13
    Oct 13th
    4 Files
  • 14
    Oct 14th
    15 Files
  • 15
    Oct 15th
    19 Files
  • 16
    Oct 16th
    25 Files
  • 17
    Oct 17th
    17 Files
  • 18
    Oct 18th
    7 Files
  • 19
    Oct 19th
    1 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close