exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 9 of 9 RSS Feed

Files Date: 2004-09-08

phpScheduleIt.txt
Posted Sep 8, 2004
Authored by Joxean Koret

phpScheduleIt 1.0.0 RC1 is susceptible to cross site scripting attacks.

tags | advisory, xss
SHA-256 | 83d7e1638d1df1c6ee19950e9c9c58fc8c1621aa46d9ded173e8d2257a5825eb
pads-1.1.2.tar.gz
Posted Sep 8, 2004
Authored by Matt Shelton | Site passive.sourceforge.net

Pads is a signature based detection engine used to passively detect network assets. It is designed to complement IDS technology by providing context to IDS alerts.

Changes: Bug fixes. Code optimization. New signatures.
tags | tool, intrusion detection
systems | unix
SHA-256 | 115c02dcf0b5d88634f7318a64e975886ee00b57caff1f689eb8f407c968454c
diebold.Backdoor.txt
Posted Sep 8, 2004
Site blackboxvoting.org

Diebold GEMS central tabulators have a flaw that allows locally authenticated users the ability to enter a two digit code in a certain hidden location and cause a second set of votes to be created on the system. This second set of votes can be modified by the local user and then read by the voting system as legitimate votes. GEMS 1.18.18, GEMS 1.18.19, and GEMS 1.18.23 are affected.

tags | advisory, local
SHA-256 | 564010be24cb1542998535b0c04aec8be289d3bed5bfb5b22c1ce33bf6f39a46
atk-2.0.zip
Posted Sep 8, 2004
Authored by Marc Ruef | Site computec.ch

Attack Tool Kit, or ATK, was developed to provide a very small and handy tool for performing simple security checks on Windows. It requires minimal interaction and is very modular in design.

systems | windows
SHA-256 | e4118c463bd60d1138d0115a80e8d3c03d1f5a5792a9f6eee59b8668eecaa589
Cisco Security Advisory 20040831-krb5
Posted Sep 8, 2004
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - Two vulnerabilities in the Massachusetts Institute of Technology (MIT) Kerberos 5 implementation that affect Cisco VPN 3000 Series Concentrators have been announced by the MIT Kerberos Team. Cisco VPN 3000 Series Concentrators authenticating users against a Kerberos Key Distribution Center (KDC) may be vulnerable to remote code execution and to Denial of Service (DoS) attacks.

tags | advisory, remote, denial of service, vulnerability, code execution
systems | cisco
SHA-256 | 7eb6d05ddaa3c7ecc362147258ab59631a5b72a9311ef317af30ce7bc5ef6484
mit-2004-003.txt
Posted Sep 8, 2004
Site web.mit.edu

MIT krb5 Security Advisory 2004-003 - The ASN.1 decoder library in the MIT Kerberos 5 distribution is vulnerable to a denial-of-service attack causing an infinite loop in the decoder. The KDC is vulnerable to this attack.

tags | advisory
SHA-256 | 4b2109c29e9989e5e67ce71b02139a53fc2c13e5eaf4a2bf4e66424813fd07e9
mit-2004-002.txt
Posted Sep 8, 2004
Site web.mit.edu

MIT krb5 Security Advisory 2004-002 - The MIT Kerberos 5 implementation's Key Distribution Center (KDC) program contains a double-free vulnerability that potentially allows a remote attacker to execute arbitrary code. Compromise of a KDC host compromises the security of the entire authentication realm served by the KDC. Additionally, double-free vulnerabilities exist in MIT Kerberos 5 library code, making client programs and application servers vulnerable.

tags | advisory, remote, arbitrary, vulnerability
advisories | CVE-2004-0642, CVE-2004-0772, CVE-2004-0643
SHA-256 | 16ff257fddc0998a5f6da56ebbdf309102fbd3f56729020f8e56995d76035635
MSInfoBOF.txt
Posted Sep 8, 2004
Authored by E. Kellinis | Site cipher.org.uk

A buffer overflow exists in the MSinfo32.exe binary.

tags | advisory, overflow
SHA-256 | f6c672d7afb81fc0b2ad46a7e0f48c64a72f3cfa2ec745e544ccf82295b3846d
Secunia Security Advisory 12404
Posted Sep 8, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in PvPGN, which can be exploited by malicious people to compromise a vulnerable system. The problem is caused due to boundary errors in the handling of the commands /watchall and /unwatchall. This can be exploited by supplying an overly long argument to cause a buffer overflow.

tags | advisory, overflow
SHA-256 | 27166d74519262b8157cbbee58aa9f2b36d4cd2bf1107739fb87616f85fda32a
Page 1 of 1
Back1Next

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close