exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 9 of 9 RSS Feed

Files Date: 2004-09-08

phpScheduleIt.txt
Posted Sep 8, 2004
Authored by Joxean Koret

phpScheduleIt 1.0.0 RC1 is susceptible to cross site scripting attacks.

tags | advisory, xss
SHA-256 | 83d7e1638d1df1c6ee19950e9c9c58fc8c1621aa46d9ded173e8d2257a5825eb
pads-1.1.2.tar.gz
Posted Sep 8, 2004
Authored by Matt Shelton | Site passive.sourceforge.net

Pads is a signature based detection engine used to passively detect network assets. It is designed to complement IDS technology by providing context to IDS alerts.

Changes: Bug fixes. Code optimization. New signatures.
tags | tool, intrusion detection
systems | unix
SHA-256 | 115c02dcf0b5d88634f7318a64e975886ee00b57caff1f689eb8f407c968454c
diebold.Backdoor.txt
Posted Sep 8, 2004
Site blackboxvoting.org

Diebold GEMS central tabulators have a flaw that allows locally authenticated users the ability to enter a two digit code in a certain hidden location and cause a second set of votes to be created on the system. This second set of votes can be modified by the local user and then read by the voting system as legitimate votes. GEMS 1.18.18, GEMS 1.18.19, and GEMS 1.18.23 are affected.

tags | advisory, local
SHA-256 | 564010be24cb1542998535b0c04aec8be289d3bed5bfb5b22c1ce33bf6f39a46
atk-2.0.zip
Posted Sep 8, 2004
Authored by Marc Ruef | Site computec.ch

Attack Tool Kit, or ATK, was developed to provide a very small and handy tool for performing simple security checks on Windows. It requires minimal interaction and is very modular in design.

systems | windows
SHA-256 | e4118c463bd60d1138d0115a80e8d3c03d1f5a5792a9f6eee59b8668eecaa589
Cisco Security Advisory 20040831-krb5
Posted Sep 8, 2004
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - Two vulnerabilities in the Massachusetts Institute of Technology (MIT) Kerberos 5 implementation that affect Cisco VPN 3000 Series Concentrators have been announced by the MIT Kerberos Team. Cisco VPN 3000 Series Concentrators authenticating users against a Kerberos Key Distribution Center (KDC) may be vulnerable to remote code execution and to Denial of Service (DoS) attacks.

tags | advisory, remote, denial of service, vulnerability, code execution
systems | cisco
SHA-256 | 7eb6d05ddaa3c7ecc362147258ab59631a5b72a9311ef317af30ce7bc5ef6484
mit-2004-003.txt
Posted Sep 8, 2004
Site web.mit.edu

MIT krb5 Security Advisory 2004-003 - The ASN.1 decoder library in the MIT Kerberos 5 distribution is vulnerable to a denial-of-service attack causing an infinite loop in the decoder. The KDC is vulnerable to this attack.

tags | advisory
SHA-256 | 4b2109c29e9989e5e67ce71b02139a53fc2c13e5eaf4a2bf4e66424813fd07e9
mit-2004-002.txt
Posted Sep 8, 2004
Site web.mit.edu

MIT krb5 Security Advisory 2004-002 - The MIT Kerberos 5 implementation's Key Distribution Center (KDC) program contains a double-free vulnerability that potentially allows a remote attacker to execute arbitrary code. Compromise of a KDC host compromises the security of the entire authentication realm served by the KDC. Additionally, double-free vulnerabilities exist in MIT Kerberos 5 library code, making client programs and application servers vulnerable.

tags | advisory, remote, arbitrary, vulnerability
advisories | CVE-2004-0642, CVE-2004-0772, CVE-2004-0643
SHA-256 | 16ff257fddc0998a5f6da56ebbdf309102fbd3f56729020f8e56995d76035635
MSInfoBOF.txt
Posted Sep 8, 2004
Authored by E. Kellinis | Site cipher.org.uk

A buffer overflow exists in the MSinfo32.exe binary.

tags | advisory, overflow
SHA-256 | f6c672d7afb81fc0b2ad46a7e0f48c64a72f3cfa2ec745e544ccf82295b3846d
Secunia Security Advisory 12404
Posted Sep 8, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in PvPGN, which can be exploited by malicious people to compromise a vulnerable system. The problem is caused due to boundary errors in the handling of the commands /watchall and /unwatchall. This can be exploited by supplying an overly long argument to cause a buffer overflow.

tags | advisory, overflow
SHA-256 | 27166d74519262b8157cbbee58aa9f2b36d4cd2bf1107739fb87616f85fda32a
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close