what you don't know can hurt you
Showing 1 - 21 of 21 RSS Feed

Files Date: 2005-01-15

vanisher.tgz
Posted Jan 15, 2005
Authored by Assaf Reshef | Site underwar.livedns.co.il

Proof of concept exploit for the Windows ANI File Parsing vulnerability along with a complete detailed paper describing the process of creating it.

tags | exploit, proof of concept
systems | windows
SHA-256 | ffba59f6dfec03389c5e1d961d4a05a3a53fc3cbbf541367bf3885c7b77566d2
waraxe-2005-SA039.txt
Posted Jan 15, 2005
Authored by Janek Vind aka waraxe | Site waraxe.us

SGallery version 1.01 suffers from path disclosure, file inclusion, and SQL injection bugs.

tags | exploit, sql injection, file inclusion
SHA-256 | 63e83634fdc1f28b76fb5d6c48aae1837f5ddd74bbe1b90923816331b5dbc867
Secunia Security Advisory 13753
Posted Jan 15, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Dylan Griffiths has reported a vulnerability in AirPort Express and Airport Extreme, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 30cf37a245e6f8e9475f7bf3a7140465dd2d32814c35484edecdda99b2639e4b
Secunia Security Advisory 13818
Posted Jan 15, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Michael Holzt has discovered a vulnerability in Opera, which can be exploited by malicious people to trick users into executing malicious files.

tags | advisory
SHA-256 | a4eb691d6fec927b376663260a7a45b16696f5132ddd699da0f404739fd0bcf5
aolPassword.txt
Posted Jan 15, 2005
Authored by Michael Yandrischovitz

A flaw in AOL Instant Messenger allows for old passwords to be used.

tags | advisory
SHA-256 | fe826e1884b71b57eedb7c5322fd834598aab600b7b6e2a666b8e5969ba0d44c
Secunia Security Advisory 13794
Posted Jan 15, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - bratax has reported a vulnerability in Dokeos, which can be exploited by malicious people to conduct script insertion attacks. Various input passed when creating a new course is not properly sanitised before being used. This can be exploited to inject arbitrary HTML and script code, which will be executed in a user's browser session in context of an affected site when the malicious course is viewed.

tags | advisory, arbitrary
SHA-256 | 2aee353a7c5693427aa5c09150e4729ee20431276336b0f81c352e15e8791f62
Secunia Security Advisory 13809
Posted Jan 15, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Netscape Directory Server, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system.

tags | advisory, denial of service
SHA-256 | 145bcad41c52e3b9faf9d5b381b8e6fa7720fe457d0170c3a022e82ede3649c8
arkeia.txt
Posted Jan 15, 2005
Authored by Maciej Bogucki

Arkeia versions 4.2.x, 5.2.x, and 5.3.x all have blank default root passwords and various other flaws.

tags | exploit, root
SHA-256 | 7d5be354b29fc5701ad583c134c26444425e523e05d233ff9ea5ff438ba0f3f2
john-1.6.37.mscash.3.diff.gz
Posted Jan 15, 2005

This patch is for john the ripper and adds the ability to crack MS Cached Credential hashes. To be used in conjunction with the Cachedump tool. This version uses a slower but portable md4 implementation.

tags | cracker
SHA-256 | 7fdd732996b4e3a473102028ee1d49679de02550673f88528c5a3c22ba52bd53
dsa-636.txt
Posted Jan 15, 2005
Site debian.org

Debian Security Advisory 636-1 - Several insecure uses of temporary files have been discovered in support scripts in the libc6 package which provides the c library for a GNU/Linux system. Trustix developers found that the catchsegv script uses temporary files insecurely. Openwall developers discovered insecure temporary files in the glibcbug script. These scripts are vulnerable to a symlink attack.

tags | advisory
systems | linux, debian
advisories | CVE-2004-0968
SHA-256 | ecf96ce0bebe95a4b7e9b26f4e8bebb7a28ac97d160e4fe84306169da911cc67
InternetExploiter3.2.zip
Posted Jan 15, 2005
Authored by SkyLined | Site edup.tudelft.nl

InternetExploiter 3, .ANI-file Animation header length stack based buffer overflow exploit for Internet Explorer. Uses Cascading Style Sheets to load a malicious animated cursor. Runs a bindshell on port 28876.

tags | exploit, overflow
SHA-256 | 2c241ffbbd01971af65ed38f537c9d5cc267d13e058013c5e7fd39635abbc94c
Secunia Security Advisory 13793
Posted Jan 15, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Peter Samuelson has reported a vulnerability in BMV, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges.

tags | advisory, local
SHA-256 | 21b0080890768d740229a471edbb8f913eb6c0c82ec75c33c9df60e2f720eba5
Secunia Security Advisory 13801
Posted Jan 15, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Hitachi Directory Server, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system.

tags | advisory, denial of service
SHA-256 | 94c6c46c84251612cccef4ffb078c32cb72cdc0e1f819c35c3d9ddd01785032e
stackgrow.c
Posted Jan 15, 2005
Authored by Christophe Devine

expand_stack SMP race proof of concept exploit that makes use of a locally exploitable flaw in the Linux page fault handler code.

tags | exploit, proof of concept
systems | linux
advisories | CVE-2005-0001
SHA-256 | d3d25f66960b33f304bf4382ad16d8f3fcd86d9c63cf0fd47c4257c388fa98d0
isec-0022-pagefault.txt
Posted Jan 15, 2005
Authored by Paul Starzetz | Site isec.pl

A locally exploitable flaw has been found in the Linux page fault handler code that allows users to gain root privileges if running on multiprocessor machine.

tags | advisory, root
systems | linux
advisories | CVE-2005-0001
SHA-256 | 214351de609f4dc4b72e3eef348a9ef9870d7de16823db0bf41a51b7d21295e6
Secunia Security Advisory 13781
Posted Jan 15, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability with an unknown impact has been reported in Winamp. The vulnerability is reportedly caused due to an error in in_cdda.dll and can be exploited to cause a buffer overflow.

tags | advisory, overflow
SHA-256 | 1d14b389a02ff35eea41f5f2dd24c642f0e3d7bf600bae6a7b6f7c4d093b623c
Secunia Security Advisory 13603
Posted Jan 15, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability and a weakness have been reported in Mailman, which can be exploited by malicious people to conduct cross-site scripting attacks and potentially brute force a user's password.

tags | advisory, xss
SHA-256 | ba809c0ebcda8850f9e18c5bc0dcaef2b2f99a184ce62d3d88f6d68bf2d45925
Secunia Security Advisory 13762
Posted Jan 15, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - MaDj0kEr has reported some vulnerabilities in Amphor@ GATE, which potentially can be exploited by malicious users to bypass certain security restrictions.

tags | advisory, vulnerability
SHA-256 | 98c01150519d693992e5b4c60d914a041857063e2b590aec1927c4611ba9a94b
Secunia Security Advisory 13795
Posted Jan 15, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SmOk3 has reported a vulnerability in Guestserver, which can be exploited by malicious people to conduct script insertion attacks.

tags | advisory
SHA-256 | 1c54fa654892b6a1c1c0ffdf98422c10990d2db86b3a6f5c3180adb1a3863f19
glsa-200412025-02.txt
Posted Jan 15, 2005
Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200412-25-2 - CUPS was vulnerable to multiple vulnerabilities and as a fix, Gentoo recommended upgrading to version 1.1.23_rc1. This version is affected by a remote Denial Of Service, so they now recommend upgrading to the final 1.1.23 release which does not have any known vulnerability.

tags | advisory, remote, denial of service, vulnerability
systems | linux, gentoo
SHA-256 | 69bb4c804fbbd34b625e230a3d262643a03f5dbcc8538e2443d14887dadf9fdd
ad20050108.txt
Posted Jan 15, 2005
Authored by Sowhat | Site secway.org

TFTPD32 is susceptible to a remote denial of service attack.

tags | advisory, remote, denial of service
SHA-256 | 08d63438b5eeee5c70a2de34a5848af21d0b764e94caf2d59984c64995ca09c9
Page 1 of 1
Back1Next

File Archive:

May 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    0 Files
  • 2
    May 2nd
    15 Files
  • 3
    May 3rd
    19 Files
  • 4
    May 4th
    24 Files
  • 5
    May 5th
    15 Files
  • 6
    May 6th
    14 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    13 Files
  • 10
    May 10th
    7 Files
  • 11
    May 11th
    99 Files
  • 12
    May 12th
    45 Files
  • 13
    May 13th
    7 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    16 Files
  • 17
    May 17th
    26 Files
  • 18
    May 18th
    4 Files
  • 19
    May 19th
    17 Files
  • 20
    May 20th
    2 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    6 Files
  • 24
    May 24th
    19 Files
  • 25
    May 25th
    5 Files
  • 26
    May 26th
    12 Files
  • 27
    May 27th
    12 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close