Exploit the possiblities
Showing 1 - 25 of 404 RSS Feed

Files Date: 2004-10-01 to 2004-10-31

ability-ftpd-exploit.tar.bz2
Posted Oct 29, 2004
Authored by David Jungerson

Remote root exploit for the STOR buffer overflow vulnerability in Code-Crafters Ability FTPd version 2.34. The EIP address only works on Windows 2000 SP4. Two shellcodes are included. One binds a shell and another streams a file and executes.

tags | exploit, remote, overflow, shell, root, shellcode
systems | windows, 2k
MD5 | fcd37a5c404065719a1feb126f7c5db3
Secunia Security Advisory 13012
Posted Oct 29, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in TortoiseCVS, which potentially can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | ba15dbd95a63096553fabcec0b1640e3
Secunia Security Advisory 13021
Posted Oct 29, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Colin Phipps has reported a vulnerability in catdoc, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges.

tags | advisory, local
MD5 | c02cb5d057e2f7972c76403e3000b251
Gentoo Linux Security Advisory 200410-31
Posted Oct 29, 2004
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200410-31 - Email virus scanning software relying on Archive::Zip can be fooled into thinking a ZIP attachment is empty while it contains a virus, allowing detection evasion.

tags | advisory, virus
systems | linux, gentoo
MD5 | 80806bd7d7fe6adee7f55b977afbf6e6
mimedefang-2.47.tar.gz
Posted Oct 29, 2004
Authored by Dianne Skoll | Site mimedefang.org

MIMEDefang is a flexible MIME email scanner designed to protect Windows clients from viruses. Includes the ability to do many other kinds of mail processing, such as replacing parts of messages with URLs. It can alter or delete various parts of a MIME message according to a very flexible configuration file. It can also bounce messages with unacceptable attachments. MIMEDefang works with Sendmail 8.11/8.12's new "Milter" API, which makes it more flexible and efficient than procmail-based approaches.

Changes: Fixed vulnerabilities related to insufficient validation.
systems | windows, unix
MD5 | ab5f9b052c7d5662a241d938add6557c
Secunia Security Advisory 13024
Posted Oct 29, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ziv Kamir has discovered a vulnerability in Cyber Web Filter, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory, web
MD5 | 8477225687e85738e935a31b52f578e4
1333htpasswd.txt
Posted Oct 29, 2004
Authored by Larry W. Cashdollar | Site vapid.ath.cx

It appears that the new Apache release 1.3.33 still is susceptible to a local buffer overflow discovered in htpasswd under release 1.3.31.

tags | advisory, overflow, local
MD5 | 0dffea6c50d00010978b25dafae6accc
apache_1.3.33.tar.gz
Posted Oct 29, 2004
Site apache.org

Apache is the most popular webserver on the Internet, quite possibly the best in terms of security, functionality, efficiency, and speed.

Changes: This release addresses security issues related to mod_include and mod_proxy.
systems | unix
advisories | CVE-2004-0492, CVE-2004-0940
MD5 | 3dfd2c3778f37a2dfc22b97417a61407
hydra-4.4-src.tar.gz
Posted Oct 29, 2004
Authored by van Hauser, thc | Site thc.org

THC-Hydra is a high quality parallelized login hacker for Samba, Smbnt, Cisco AAA, FTP, POP3, IMAP, Telnet, HTTP Auth, LDAP, NNTP, MySQL, VNC, ICQ, Socks5, PCNFS, Cisco and more. Includes SSL support, parallel scans, and is part of Nessus.

Changes: Fixed another floating point exception, fixed -C colon mode, and added EHLO support for the smtp-auth module, required for some smtpd variants.
tags | web, imap
systems | cisco
MD5 | 307e1434ae475088caa01e3b1aefbf43
mimedefang-2.46.tar.gz
Posted Oct 29, 2004
Authored by Dianne Skoll | Site mimedefang.org

MIMEDefang is a flexible MIME email scanner designed to protect Windows clients from viruses. Includes the ability to do many other kinds of mail processing, such as replacing parts of messages with URLs. It can alter or delete various parts of a MIME message according to a very flexible configuration file. It can also bounce messages with unacceptable attachments. MIMEDefang works with Sendmail 8.11/8.12's new "Milter" API, which makes it more flexible and efficient than procmail-based approaches.

Changes: Better interpretation of Trend Micro virus-scanner return code, much better algorithm for reconstructing messages that avoids creating useless multipart/mixed containers with only one sub-part, a few small security fixes, and more.
systems | windows, unix
MD5 | 9689e292821df5cf6b03df548a72182c
msieLink.txt
Posted Oct 29, 2004
Authored by Benjamin Tobias Franz

Microsoft Internet Explorer 6.0.2800.1106 and possibly earlier versions fail to properly handle links embedded within links, allowing for spoofing of target addresses.

tags | advisory, spoof
MD5 | 078b1a079d263c5f03c2b409266baf46
os-sim-0.9.7.tar.gz
Posted Oct 28, 2004
Authored by Dominique Karg, David Gil, Fabio Ospitia Trujillo, Julio Casal, Jesus D. Munoz | Site sourceforge.net

Os-sim attempts to unify network monitoring, security, correlation, and qualification in one single tool. It combines Snort, Acid, MRTG, NTOP, OpenNMS, nmap, nessus, and rrdtool to provide the user with full control over every aspect of networking or security. Supported platform is Linux.

Changes: Various bug fixes and feature enhancements.
tags | system logging
systems | linux, unix
MD5 | 6db9d84c49699f9213bcacc5c5841c94
bypassArticle.txt
Posted Oct 28, 2004
Authored by 3APA3A, offtopic | Site security.nnov.ru

Presentation: Bypassing client application protection techniques with notepad.

tags | paper
MD5 | bce063153c54781f687f0cd29fe5c972
Secunia Security Advisory 11711
Posted Oct 28, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Andrew Nakhla has discovered a vulnerability in Apple Remote Desktop, which can be exploited by malicious users to gain root access on a vulnerable system.

tags | advisory, remote, root
systems | apple
MD5 | f40c517a2ac34a181a884183ee4ec256
php4curl.txt
Posted Oct 28, 2004
Authored by FraMe | Site kernelpanik.org

PHP4 cURL functions bypass open_basedir protection allowing users to navigate through the filesystem.

tags | advisory
MD5 | 426f895856b6e38fa2c921ed2bfb7aaf
Gentoo Linux Security Advisory 200410-30
Posted Oct 28, 2004
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200410-30 - GPdf, KPDF and KOffice all include vulnerable xpdf code to handle PDF files, making them vulnerable to execution of arbitrary code upon viewing a malicious PDF file.

tags | advisory, arbitrary
systems | linux, gentoo
MD5 | ec0d0e12afdc3319a81cb647d77daebd
dsa-574.txt
Posted Oct 28, 2004
Site debian.org

Debian Security Advisory 574-1 - The upstream developers discovered a problem in cabextract, a tool to extract cabinet files. The program was able to overwrite files in upper directories. This could lead an attacker to overwrite arbitrary files.

tags | advisory, arbitrary
systems | linux, debian
advisories | CVE-2004-0916
MD5 | faf7cc0d58aa4be289b79b9fa7f2fc66
quicktime.txt
Posted Oct 28, 2004
Authored by John Heasman

A high risk vulnerability exists in Quicktime for Windows versions 6.5.2 and earlier.

tags | advisory
systems | windows
MD5 | d978934420addf9429ed881546cfc168
eEye.realplayerZIP.txt
Posted Oct 28, 2004
Authored by Yuji Ukai | Site eeye.com

eEye Security Advisory - eEye Digital Security has discovered a vulnerability in RealPlayer that allows a remote attacker to reliably overwrite the stack with arbitrary data and execute arbitrary code in the context of the user under which the player is running.

tags | advisory, remote, arbitrary
MD5 | 7e9a80453c6a97a5b320f84fd618fc7f
moo3boom.zip
Posted Oct 28, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Proof of concept exploit for Master of Orion III versions 1.2.5 and below which suffer from buffer overflow and allocation errors.

tags | exploit, overflow, proof of concept
MD5 | 695b4909f8472b35ca8bc0a8296012b1
masterOrionIII.txt
Posted Oct 28, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Master of Orion III versions 1.2.5 and below suffer from buffer overflow and allocation errors.

tags | advisory, overflow
MD5 | 7ebde94aeb3c1a277833c9955d2dfa31
Secunia Security Advisory 12995
Posted Oct 28, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in ImageMagick, which potentially can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error within the EXIF parsing routine. This can be exploited to cause a buffer overflow via a malicious image file containing specially crafted EXIF information.

tags | advisory, overflow
MD5 | db6a7ca97913bc4817397b1dc241f713
iDEFENSE Security Advisory 2004-10-27.t
Posted Oct 28, 2004
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 10.27.04 - Remote exploitation of a buffer overflow vulnerability in Simon Tatham's PuTTY can allow attackers to execute arbitrary code. The vulnerability specifically exists due to insufficient bounds checking on SSH2_MSG_DEBUG packets.

tags | advisory, remote, overflow, arbitrary
MD5 | c0e6bc13918e769d8f7382ba7193a2f0
konqueror3221.txt
Posted Oct 28, 2004
Authored by Yanosz

KDE Konqueror 3.2.2-1 is susceptible to cross site scripting flaws.

tags | advisory, xss
MD5 | a45bfd3448999b6bb39c1eae2050456f
Secunia Security Advisory 12992
Posted Oct 28, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Horde Application Framework, which potentially can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | 93de6ad2eb0e93396dd55d615aef5a6d
Page 1 of 17
Back12345Next

File Archive:

December 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    15 Files
  • 2
    Dec 2nd
    2 Files
  • 3
    Dec 3rd
    1 Files
  • 4
    Dec 4th
    15 Files
  • 5
    Dec 5th
    15 Files
  • 6
    Dec 6th
    18 Files
  • 7
    Dec 7th
    17 Files
  • 8
    Dec 8th
    15 Files
  • 9
    Dec 9th
    13 Files
  • 10
    Dec 10th
    4 Files
  • 11
    Dec 11th
    41 Files
  • 12
    Dec 12th
    44 Files
  • 13
    Dec 13th
    25 Files
  • 14
    Dec 14th
    10 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close