Exploit the possiblities
Showing 1 - 25 of 227 RSS Feed

Files Date: 2004-06-01 to 2004-06-30

linux.SbusPROM.txt
Posted Jun 29, 2004
Authored by infamous41md

There exists multiple integer overflows in routines that handle copying in user supplied data for the Linux Sbus PROM driver. They allow for a local denial of service attack and possible code execution.

tags | advisory, denial of service, overflow, local, code execution
systems | linux
MD5 | 1af0442de4e8dfb62ee1aea95250a9b6
SSRT3552.txt
Posted Jun 29, 2004
Site hp.com

A potential vulnerability has been identified in the HP-UX ARPA Transport which could be exploited by a local user to create a Denial of Service. Impacted versions: HP-UX B.11.00, B.11.04, B.11.11.

tags | advisory, denial of service, local
systems | hpux
MD5 | 2722dc60aa6e99f8549197d80b437536
SSRT4758.txt
Posted Jun 29, 2004
Site hp.com

A potential vulnerability has been identified with HP-UX running ObAM 5.0 with the WebAdmin capability enabled. This vulnerability could be exploited remotely to allow unauthorized access. Impacted version: HP-UX B.11.11 running ObAM 5.0.

tags | advisory
systems | hpux
MD5 | 9ed87a78b6cbedd00fdf61b116af9b32
Secunia Security Advisory 11950
Posted Jun 29, 2004
Authored by Secunia | Site secunia.com

A vulnerability in JUNOS can be exploited by transmitting specially-crafted IPv6 packets.

tags | advisory
advisories | CVE-2004-0468
MD5 | fd4b86d888b70777512552f554032c2f
Clam AntiVirus Toolkit 0.74
Posted Jun 29, 2004
Authored by Tomasz Kojm | Site clamav.net

Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a commandline scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.

Changes: Various fixes.
tags | virus
systems | unix
MD5 | d0e07a0287fa484b376392734a417706
p_atari800.c
Posted Jun 29, 2004
Site pi3.int.pl

Exploit for the atari800 atari emulator. This exploit is local, and may in some circumstances give local root.

tags | exploit, local, root
advisories | CVE-2003-0630
MD5 | c80b76a6307ff17e08717de2e6550916
BEA Systems Security Advisory 04-64.00
Posted Jun 29, 2004
Authored by Oracle | Site dev2dev.bea.com

A security issue has been discovered in BEA WebLogic, potentially allowing unauthorised users to access affected web applications. Due to improper filtering of data, an asterisk may be used in a spot to allow for a random user to get loaded into a role. The issue affects WebLogic Server and WebLogic Express version 8.1 and 7.0.

tags | advisory, web
MD5 | fb3f7f6a2b9d9f0dc6bf0fd32c665828
httpd1.html
Posted Jun 29, 2004
Authored by Georgi Guninski | Site guninski.com

There is denial of service in Apache httpd 2.0.49. It is possible to consume arbitrary amount of memory. On 64 bit systems with more than 4GB virtual memory this may lead to heap based buffer overflow whose exploitation is unclear at the moment.

tags | advisory, denial of service, overflow, arbitrary
MD5 | b801e23971a881cdb1d8b49c6f20eaf1
confixx.txt
Posted Jun 29, 2004
Authored by Dirk Pirschel

Confixx Pro 2 and 3 are susceptible to an attack where files in /root can be accessed due to an error in the backup script.

tags | advisory, root
MD5 | aa49e0496e3367fc6148ad75af43a5ec
Openswan.txt
Posted Jun 29, 2004
Site openswan.org

Two authentication errors within a verify_x509cert() function allows for malicious people to bypass security restrictions. Affected products include: superfreeswan 1.x, openswan 1.x to 2.x, strongSwan below 2.1.3, and any version of FreeS/WAN 1.x or 2.x with the X.509 patch.

tags | advisory
advisories | CVE-2004-0590
MD5 | 11ffb49d499310404cb98c08715e7f54
Secunia Security Advisory 11944
Posted Jun 29, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Valerie Holfield has discovered a vulnerability in phpmyfamily, which can be exploited by malicious people to gain edit privileges. It is possible to be automatically logged in as user nobody when clicking to download a document and then leaving the page. This grants the person ability to add people, change information, upload and delete documents and images.

tags | advisory
MD5 | 7a48b2c53f4f7d2095df499a86c435b1
popclient30b6.txt
Posted Jun 29, 2004
Authored by Dean White, John Cartwright

An off-by-one condition exists in the POP3 handler code present in popclient 3.0b6. By crafting a malicious email a remote attacker may cause a denial of service against users of this software.

tags | advisory, remote, denial of service
MD5 | d9c05396bc794653e724547dc8bc06fa
TSSA-2004-012.txt
Posted Jun 29, 2004
Site http.tinysofa.org

A remote exploit has been discovered in the Apache 2.0.49 HTTP server which allows an attacker to cause the server to allocate increasing amounts of memory until system memory is exhausted or until process limits are reached.

tags | advisory, remote, web
MD5 | 8b9a4bac6716b2602875a36b7005774a
scob.trojan.zip
Posted Jun 28, 2004
Site k-otik.com

Full source code of the Scob trojan downloader. Archive password is set to p4ssw0rd. Use at your own risk.

tags | trojan
MD5 | a9856c91e925fe7ef8f8649bfcd87b75
dhcpdDOS.txt
Posted Jun 28, 2004
Authored by Gregory Duchemin

Original research data regarding ISC DHCPD 3.0.1 rc12 and rc13 denial of service attacks.

tags | advisory, denial of service
MD5 | 71c767cbd65b9b93218deebabc584425
advisory-08.txt
Posted Jun 28, 2004
Authored by DarkBicho | Site darkbicho.tk

csFAQ is susceptible to a path disclosure vulnerability.

tags | advisory
MD5 | e819136f86ae261f1e4f5d3529d02ec7
advisory-07.txt
Posted Jun 28, 2004
Authored by DarkBicho | Site darkbicho.tk

PowerPortal version 1.x suffers from full path disclosure, cross site scripting, and arbitrary directory browsing flaws.

tags | advisory, arbitrary, xss
MD5 | ae390ffaf8d537a7f21d85cc8c896a5e
advisory-06.txt
Posted Jun 28, 2004
Authored by DarkBicho | Site darkbicho.tk

CuteNews version 1.3.1 is susceptible to a cross site scripting flaw.

tags | advisory, xss
MD5 | 28e1aa84a563d7c72d823db701b20576
lotus.inject.txt
Posted Jun 27, 2004
Authored by Jouko Pynnonen | Site klikki.fi

During the client-side Windows installation of Lotus Notes, a notes: URL handler is registered in the registry. An argument injection attack allows an intruder to pass command line arguments to notes.exe, which can lead to execution of arbitrary code.

tags | advisory, arbitrary, registry
systems | windows
MD5 | 2fd0f23c99e3a334d8b5d70d022b19b8
ZH2004-14SA.txt
Posted Jun 27, 2004
Authored by D'Amato Luigi | Site zone-h.org

The Zone-H Security Team has discovered a SQL injection flaw in Infinity WEB that allows malicious attackers to bypass the authentication mechanism without having an account.

tags | advisory, web, sql injection
MD5 | ae27d470e14094dd4efd8295947d7e86
memplayer.c
Posted Jun 27, 2004
Authored by c0ntex

All versions of MPlayer, the movie player for Linux, are vulnerable to a buffer overflow attack that allows for privilege escalation. Local exploit included. Tested against Redhat Linux with Gnome, FreeBSD and latest cvsup plus ports with Gnome.

tags | exploit, overflow, local
systems | linux, redhat, freebsd
MD5 | cbe5d9e292378ea65f396eb994717fdb
artmedic.txt
Posted Jun 25, 2004
Authored by Adam Simuntis aka n30n

artmedic_links 5, the PHP script, is susceptible to a file and URL inclusion vulnerability.

tags | advisory, php
MD5 | 06b7a3d4edf9218f5f3326d2f089d12e
DumpSIS-0.81.zip
Posted Jun 25, 2004
Authored by Jimmy Shah

Symbian SIS file dumping utility that allows for analysis of potential malware without actual installation of files. It provides information on file headers (UIDs, Version, Number of Languages, Number of files), file list (Destination name by default, Source filename and file type).

Changes: Minor fix for decoding If/Else If statements in SIS files.
systems | unix
MD5 | 18bdc6011d498e6180b07e400c066f9c
Secunia Security Advisory 11941
Posted Jun 25, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Alan Fitton has discovered a vulnerability in giFT-FastTrack, allowing malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to an unspecified error, which can be exploited to crash the giFT daemon via a specially crafted signal. Version 0.8.6 and prior are reportedly affected.

tags | advisory, denial of service
MD5 | e8f02f477651c78c7e3266cbe640d6d0
57587.html
Posted Jun 25, 2004
Site sunsolve.sun.com

A flaw in Kerberos password handling under Sun Solaris 9 allows for passwords to be logged in clear text on clients with services using pam_krb5 as an auth module.

tags | advisory
systems | solaris
MD5 | 9cbfc28498aa0afd113d15af3bf8dcd4
Page 1 of 10
Back12345Next

File Archive:

December 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    15 Files
  • 2
    Dec 2nd
    2 Files
  • 3
    Dec 3rd
    1 Files
  • 4
    Dec 4th
    15 Files
  • 5
    Dec 5th
    15 Files
  • 6
    Dec 6th
    18 Files
  • 7
    Dec 7th
    17 Files
  • 8
    Dec 8th
    15 Files
  • 9
    Dec 9th
    13 Files
  • 10
    Dec 10th
    4 Files
  • 11
    Dec 11th
    41 Files
  • 12
    Dec 12th
    44 Files
  • 13
    Dec 13th
    25 Files
  • 14
    Dec 14th
    15 Files
  • 15
    Dec 15th
    28 Files
  • 16
    Dec 16th
    3 Files
  • 17
    Dec 17th
    13 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close