Twenty Year Anniversary
Showing 1 - 25 of 93 RSS Feed

Files Date: 2004-12-11

57675.html
Posted Dec 11, 2004
Site sunsolve.sun.com

Sun Security Advisory - There is a potential buffer overflow in ping which could result in a local unprivileged user gaining elevated privileges.

tags | advisory, overflow, local
MD5 | 32263036558f0cc0737498f95ca3d352
ipcop141.txt
Posted Dec 11, 2004
Authored by Paul Kurczaba

IPCop suffers from a cross site scripting vulnerability in proxylog.dat. Version 1.4.1 is affected. Older versions have not been tested.

tags | advisory, xss
MD5 | d238e5bafa11188833b7f516a3580804
ipbBypass.txt
Posted Dec 11, 2004
Authored by Keyboard Criminal

It seems that the IPB forums has a password reset feature that allows a disabled account to regain access.

tags | advisory
MD5 | 59fc071c393e9751ce12c9f79ee61e24
symbian.txt
Posted Dec 11, 2004
Authored by Geza

Brief analysis on the Symb/Cabir-B worm that was written specifically for the Nokia Series 60 mobile phones running the Symbian operating system.

tags | paper, worm
MD5 | f28694cfcdc0b7e360e68d2a26810386
janados.zip
Posted Dec 11, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Remote denial of service exploit for Jana server 2 versions 2.4.4 and below.

tags | exploit, remote, denial of service
MD5 | 22ecc84b906bffd5bc9d5d101be7570f
janados.txt
Posted Dec 11, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Jana server 2 versions 2.4.4 and below are susceptible to denial of service attacks that result in 100% CPU utilization and endless loops.

tags | advisory, denial of service
MD5 | 2042e310f75df545078eb5a48d4a8427
Secunia Security Advisory 13331
Posted Dec 11, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in FreeImage, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system.

tags | advisory, denial of service
MD5 | f23b4b8b9bc68e1143acc35f37c380aa
ex_MERCURY.c
Posted Dec 11, 2004
Authored by John H.

Universal remote exploit for the buffer overflow vulnerability in Mercury Mail 4.01 (Pegasus) IMAP server.

tags | exploit, remote, overflow, imap
MD5 | df3670644acf63435dd9a77c428eb3cf
mercury.c
Posted Dec 11, 2004
Authored by Mati Aharoni | Site whitehat.co.il

Mercury Mail 4.01 (Pegasus) IMAP remote buffer overflow exploit.

tags | exploit, remote, overflow, imap
MD5 | f016a7e00aaf8c91e97a3f1f0e9aa791
cuteftp60.txt
Posted Dec 11, 2004
Authored by Felix Zhou

CuteFTP Professional version 6.0 suffers from a client side overflow.

tags | advisory, overflow
MD5 | bc550617d2ad34d33cac6e10c23b6d81
payflow.txt
Posted Dec 11, 2004
Site shirkdog.us

An attacker can change hidden fields to any dollar amount and misrepresent purchases for businesses providing products or services using the PayFlow Link system.

tags | advisory
MD5 | 3a582e3b889a0f3d8bee282de181ea1d
orbzbof.zip
Posted Dec 11, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Remote proof of concept exploit for Orbz versions 2.10 and below which suffer from a buffer overflow in the password field of the join packet.

tags | exploit, remote, overflow, proof of concept
MD5 | a35a9e2f70a3186a2be48a01942794d8
orbzbof.txt
Posted Dec 11, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Orbz versions 2.10 and below suffer from a buffer overflow in the password field of the join packet.

tags | advisory, overflow
MD5 | 2124259b9647e48383879438e07d0551
IPSWSFTP-exploit.c
Posted Dec 11, 2004
Authored by NoPh0BiA

Remote exploit for IPSwitch WS_FTP version 5.03 that binds a shell to port 4444.

tags | exploit, remote, shell
MD5 | bdf3611955ed2ad4e6a80a5a5b0adfa7
wsftp503.txt
Posted Dec 11, 2004
Authored by Reed Arvin

Multiple buffer overflows exist in WS_FTP Server Version 5.03, 2004.10.14. There are four vulnerable commands that can be used to cause these buffer overflows. Three of the vulnerable commands can be used to stop the WS_FTP Server service resulting in a denial of service. The vulnerable commands are SITE, XMKD, MKD, and RNFR.

tags | advisory, denial of service, overflow
MD5 | 8965bc3c144815e73d70ee13c356263a
dsa-602.txt
Posted Dec 11, 2004
Site debian.org

Debian Security Advisory 602-1 - Wait.. No.. what is this? Even more potential integer overflows have been found in the GD graphics library which were not covered by security advisory DSA 589 and DSA 601. They could be exploited by a specially crafted graphic and could lead to the execution of arbitrary code on the victim's machine.

tags | advisory, overflow, arbitrary
systems | linux, debian
advisories | CVE-2004-0941, CVE-2004-0990
MD5 | bd4903e565324f5a91637cbf70991aea
mdaemon72.txt
Posted Dec 11, 2004
Authored by Reed Arvin

A local privilege escalation vulnerability exists with MDaemon 7.2 that allows a user to gain SYSTEM level access.

tags | exploit, local
MD5 | ab98079c7abf569bb92b4d337713545b
Secunia Security Advisory 13330
Posted Dec 11, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in IberAgents, which can be exploited by malicious, local users to gain knowledge of sensitive information.

tags | advisory, local
MD5 | a1beee20b0b46885930e4db3cb0639ca
dsa-601.txt
Posted Dec 11, 2004
Site debian.org

Debian Security Advisory 601-1 - More potential integer overflows have been found in the GD graphics library which were not covered by security advisory DSA 589. They could be exploited by a specially crafted graphic and could lead to the execution of arbitrary code on the victim's machine.

tags | advisory, overflow, arbitrary
systems | linux, debian
advisories | CVE-2004-0941, CVE-2004-0990
MD5 | b92367f7fa5587b09e1fe02b15b6e0c5
Secunia Security Advisory 13321
Posted Dec 11, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Groupmax World Wide Web and Groupmax World Wide Web Desktop, which can be exploited to conduct cross-site scripting attacks or access arbitrary HTML files.

tags | advisory, web, arbitrary, vulnerability, xss
MD5 | d518ebc53d84625b6ad79a0fe0f7f83d
nwclient.txt
Posted Dec 11, 2004
Authored by Karol Wiesek

Buffer overflows have been discovered in ncplogin and ncpmap in ncpfs.

tags | advisory, overflow
MD5 | 7afe873a3c2de6c146b55bbaaa492ed3
Secunia Security Advisory 13329
Posted Dec 11, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - XioNoX has reported a vulnerability in Nuked-Klan, which can be exploited by malicious people to conduct script insertion attacks.

tags | advisory
MD5 | f33b4d86cd9e1bd6999c5b4c350c7456
kdeSMB.txt
Posted Dec 11, 2004
Authored by Daniel Fabian

The KDE program Konquerer allows for browsing SMB shares comfortably through the GUI. By placing a shortcut to an SMB share on KDE's desktop, an attacker can disclose his victim's password in plaintext.

tags | advisory
MD5 | 8508f86470ecc4ddc611025de042ceb9
doubleByte.txt
Posted Dec 11, 2004
Authored by Liu Die Yu | Site umbrella.name

On Double Byte Character Set Locale systems, such as Chinese, Japanese, etc, there exists a spoofing vulnerability within Microsoft Internet Explorer that enables attackers to fake the Address field.

tags | advisory, spoof
MD5 | 82f813d3991957ef2c7fcbda0f270619
ssfakep.zip
Posted Dec 11, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Remote denial of service exploit for games using the Serious engine. Generates UDP packets that have fake players enter a room. The system fails to limit the amount of users that can enter.

tags | exploit, remote, denial of service, udp
MD5 | 0ad8fba41b88800236ee2330ecee1271
Page 1 of 4
Back1234Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

June 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    14 Files
  • 2
    Jun 2nd
    1 Files
  • 3
    Jun 3rd
    3 Files
  • 4
    Jun 4th
    18 Files
  • 5
    Jun 5th
    21 Files
  • 6
    Jun 6th
    10 Files
  • 7
    Jun 7th
    16 Files
  • 8
    Jun 8th
    18 Files
  • 9
    Jun 9th
    5 Files
  • 10
    Jun 10th
    2 Files
  • 11
    Jun 11th
    21 Files
  • 12
    Jun 12th
    34 Files
  • 13
    Jun 13th
    15 Files
  • 14
    Jun 14th
    16 Files
  • 15
    Jun 15th
    4 Files
  • 16
    Jun 16th
    1 Files
  • 17
    Jun 17th
    2 Files
  • 18
    Jun 18th
    14 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close