exploit the possibilities
Showing 1 - 25 of 29 RSS Feed

Files Date: 2004-11-12

Technical Cyber Security Alert 2004-316A
Posted Nov 12, 2004
Authored by US-CERT | Site cert.org

Technical Cyber Security Alert TA04-316A - There is a vulnerability in the way Cisco IOS processes DHCP packets. Exploitation of this vulnerability may lead to a denial of service. The processing of DHCP packets is enabled by default.

tags | advisory, denial of service
systems | cisco
MD5 | 30f6202ff0bbbd77c9257fe3ea159596
Gentoo Linux Security Advisory 200411-22
Posted Nov 12, 2004
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200411-22 - Davfs2 and the lvmcreate_initrd script (included in the lvm-user package) are both vulnerable to symlink attacks, potentially allowing a local user to overwrite arbitrary files with the rights of the user running them.

tags | advisory, arbitrary, local
systems | linux, gentoo
MD5 | fdc440dbdb97a474b1efdded01f908c9
Gentoo Linux Security Advisory 200411-21
Posted Nov 12, 2004
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200411-21 - An input validation flaw in Samba may allow a remote attacker to cause a Denial of Service by excessive consumption of CPU cycles.

tags | advisory, remote, denial of service
systems | linux, gentoo
MD5 | f2a64449c956a3f554463702fb5da00b
zonelabsFilter.txt
Posted Nov 12, 2004
Authored by Paul Kurczaba

By using hex encoded characters, it is possible to bypass the Zone Labs IMsecure and IMsecure Pro Active Link filters in versions prior to 1.5.

tags | exploit
MD5 | b6d55cd6030469199d8a4f9c0562c539
phpwebsite.txt
Posted Nov 12, 2004
Authored by Maestro

phpWebSite 0.9.3-4 is susceptible to an HTTP response splitting vulnerability.

tags | exploit, web
MD5 | f84a1df64f88dc3f3e8f541a2fca2859
cyberguard.txt
Posted Nov 12, 2004
Authored by jericho | Site attrition.org

Additional information about recent discussion various entities have have with CyberGuard regarding their firewall.

tags | advisory
MD5 | e1778c48d90dfe66ca6683aa8c9d6cce
technote.pl
Posted Nov 12, 2004
Authored by SPABAM

Technote remote command execution that spawns bash style shell with the webserver uid.

tags | exploit, remote, shell, bash
MD5 | 48c69b4c9a92c741a4d33374e40e9da7
waraxe-2004-SA037.txt
Posted Nov 12, 2004
Authored by Janek Vind aka waraxe | Site waraxe.us

A SQL injection bug exists in Phorum versions 5.0.12 and below. Exploitation example given.

tags | exploit, sql injection
MD5 | 126da5f1fe68ed3742dd59eb079def15
Cisco Security Advisory 20041111-csa
Posted Nov 12, 2004
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - Cisco Security Agent (CSA) provides threat protection for server and desktop computing systems, also known as endpoints. It identifies and prevents malicious behavior, thereby eliminating known and unknown security risks. A vulnerability exists in which a properly timed buffer overflow attack may evade the protections offered by CSA. The system under attack must contain an unpatched underlying vulnerability in system software that CSA is configured to protect. Another prerequisite for the attack is that a user must be interactively logged in during the attack.

tags | advisory, overflow
systems | cisco
MD5 | ff215c245ddc90a4df81a8be1397a4a7
ezipupdate.txt
Posted Nov 12, 2004
Authored by Ulf Harnhammar

ez-ipupdate is susceptible to a format string bug. It, at the very least, affect versions 3.0.11b8, 3.0.11b7, 3.0.11b6, 3.0.11b5 and 3.0.10. It does not affect 2.9.6.

tags | advisory
MD5 | eb626dab285789ea0abf2ee7a8d4d95c
HOD-kerio-firewall-DoS-expl.c
Posted Nov 12, 2004
Authored by houseofdabus

Denial of service exploit for Kerio Personal Firewall version 4.1.1 and below. The vulnerability allows a remote attacker to reliably render a system inoperative with one single packet.

tags | exploit, remote, denial of service
MD5 | 2155470b61ae00f217da31c8c79a9285
vbul30x.txt
Posted Nov 12, 2004
Authored by Dr. Death

Another SQL injection has been discovered in VBulletin Forums 3.0.x.

tags | exploit, sql injection
MD5 | 0a368925cf1755b7c915b05b9e353208
Gentoo Linux Security Advisory 200411-19
Posted Nov 12, 2004
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200411-19 - Pavuk contains multiple buffer overflows that can allow a remote attacker to run arbitrary code.

tags | advisory, remote, overflow, arbitrary
systems | linux, gentoo
MD5 | ad143ff581a6d45311d3afcd39ee8deb
Secunia Security Advisory 13160
Posted Nov 12, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in MIMEsweeper for SMTP, which potentially can be exploited by malware to bypass the scanning functionality.

tags | advisory
MD5 | a984a574a2189bc9d38899655187bddb
Scan6.zip
Posted Nov 12, 2004
Authored by Marco Del Percio

Port scanner for Windows 2k/XP that is functional for both IPv4 and IPv6 networks. Binary, source code, and more information included in the archive.

systems | windows, 2k
MD5 | 116a4adbb452f58a2dba11369544b40e
THCSSLProxy.zip
Posted Nov 12, 2004
Authored by thc, Johnny Cyberpunk | Site thc.org

THCSSLProxy is a small command-line SSL proxy for Window that is useful for penetration testing SSL services like HTTPS, SMTPS, LDAPS, POP3S, and more.

tags | web
MD5 | 9aa49cdd200915ddd06ea022818e6153
Technical Cyber Security Alert 2004-315A
Posted Nov 12, 2004
Authored by US-CERT | Site cert.org

Technical Cyber Security Alert TA04-315A - Microsoft Internet Explorer (IE) contains a buffer overflow vulnerability that could allow a remote attacker to execute arbitrary code with the privileges of the user running IE. A buffer overflow vulnerability exists in the way IE handles the SRC and NAME attributes of various elements, including FRAME, IFRAME, and EMBED. Because IE fails to properly check the size of the NAME and SRC attributes, a specially crafted HTML document can cause a buffer overflow in heap memory. Due to the dynamic nature of the heap, it is usually difficult for attackers to execute arbitrary code using this type of vulnerability.

tags | advisory, remote, overflow, arbitrary
MD5 | 20c99413b69e1613b32257cf78c2f275
Secunia Security Advisory 13085
Posted Nov 12, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Isno has reported a vulnerability in CCProxy, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to a boundary error within the handling of HTTP requests. This can be exploited to cause a buffer overflow by sending an overly long HTTP GET request. Successful exploitation may allow execution of arbitrary code. The vulnerability has been reported in version 6.0. Other versions may also be affected.

tags | advisory, web, overflow, arbitrary
MD5 | f8e9e21468038e4d502605da4bf8a84c
04WebServer.txt
Posted Nov 12, 2004
Authored by Tan Chew Keong | Site security.org.sg

Documentation on three vulnerabilities that were found in version 1.42 of 04WebServer. It includes a XSS vulnerability, lack of character filtering when writing to log file, and potential server restart problems after requesting a DOS device in the URL.

tags | exploit, vulnerability
MD5 | b8f33c4f3e82717870f0a4047e3f19dc
Gentoo Linux Security Advisory 200411-18
Posted Nov 12, 2004
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200411-18 - Chintan Trivedi discovered a vulnerability in Apache httpd 2.0 that is caused by improper enforcing of the field length limit in the header-parsing code. Versions below 2.0.52 are affected.

tags | advisory
systems | linux, gentoo
MD5 | 89634012c0b1696c56a26a89d326a6bc
Cisco Security Advisory 20041110-dhcp
Posted Nov 12, 2004
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - Cisco IOS devices running branches of Cisco IOS version 12.2S that have Dynamic Host Configuration Protocol (DHCP) server or relay agent enabled, even if not configured, are vulnerable to a denial of service where the input queue becomes blocked when receiving specifically crafted DHCP packets.

tags | advisory, denial of service, protocol
systems | cisco
MD5 | 851088c1fa365c741777092a5b696a34
hotfoon.txt
Posted Nov 12, 2004
Authored by Saudi Linux

Hotfoon, an Internet telephony utility, is susceptible to automatically opening up malicious links.

tags | advisory
MD5 | 66f850f051ed2e983fd450aed2bd7bd2
101_slim.cpp
Posted Nov 12, 2004
Authored by class101

Remote buffer overflow exploit for SlimFTPd versions 3.15 and below. Binds a shell to port 101.

tags | exploit, remote, overflow, shell
MD5 | 3bd529c381a9d88fc5ed46d54c552c88
LSS-2004-11-3.txt
Posted Nov 12, 2004
Authored by Leon Juranic | Site security.lss.hr

LSS Security Advisory #LSS-2004-11-3 - There is a buffer overflow vulnerability in getnickuserhost() function that is called when BNC 2.8.9 is processing responses from an IRC server.

tags | advisory, overflow
MD5 | c0e0e1ce2606be50b9101c898d297435
binfmt_elf.txt
Posted Nov 12, 2004
Authored by Paul Starzetz

Five different flaws have been identified in the Linux ELF binary loader. Exploit included core dumps a non-readable but executable ELF file.

tags | exploit
systems | linux
MD5 | 89d38e2fe7148d28370803dcceda7a1d
Page 1 of 2
Back12Next

File Archive:

April 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    21 Files
  • 2
    Apr 2nd
    35 Files
  • 3
    Apr 3rd
    21 Files
  • 4
    Apr 4th
    16 Files
  • 5
    Apr 5th
    15 Files
  • 6
    Apr 6th
    1 Files
  • 7
    Apr 7th
    2 Files
  • 8
    Apr 8th
    23 Files
  • 9
    Apr 9th
    19 Files
  • 10
    Apr 10th
    15 Files
  • 11
    Apr 11th
    14 Files
  • 12
    Apr 12th
    11 Files
  • 13
    Apr 13th
    2 Files
  • 14
    Apr 14th
    5 Files
  • 15
    Apr 15th
    14 Files
  • 16
    Apr 16th
    19 Files
  • 17
    Apr 17th
    19 Files
  • 18
    Apr 18th
    8 Files
  • 19
    Apr 19th
    4 Files
  • 20
    Apr 20th
    5 Files
  • 21
    Apr 21st
    1 Files
  • 22
    Apr 22nd
    10 Files
  • 23
    Apr 23rd
    22 Files
  • 24
    Apr 24th
    11 Files
  • 25
    Apr 25th
    15 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close