exploit the possibilities
Showing 1 - 17 of 17 RSS Feed

Files Date: 2005-01-28

exploits-winamp.tgz
Posted Jan 28, 2005
Authored by Rojodos

Two exploits for Winamp 5.05 and 5.08. They make use of the buffer overflow vulnerability discovered by NSFOCUS.

tags | exploit, overflow
advisories | CVE-2004-1150
SHA-256 | 3b29a4995e0aaccc260541dbb627b87fbe7fb0efadc0a8f4304d08d688585a97
authfail-1.1.1.tgz
Posted Jan 28, 2005
Authored by Bartek Krajnik | Site bmk.bz

authfail is a tool for adding IP addresses to an ACL when entities from those addresses attempt to log into a system, but cause authentication failures in auth.log. It reads data from auth.log in real time and adds the IP into netfilter with a DROP/REJECT policy.

Changes: Bug fix release.
tags | tool, firewall
systems | linux
SHA-256 | 1546758d05794a4a37d199eaef73b3963ef4c4aa0a65cfcc38c69e834caa9fae
shellcodes_crypter_PV.c
Posted Jan 28, 2005
Authored by Shen139

Shellcode Crypter is a shellcode encryption utility.

tags | shellcode
SHA-256 | 7036e758f501a16d557e1a68a5eec6b841a643a579614547a2c9f51501624c06
Secunia Security Advisory 14029
Posted Jan 28, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Victor Ashik has reported a vulnerability in less in Red Hat Enterprise Linux 3, which potentially can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | linux, redhat
SHA-256 | f094456e4d32799af64faf9d827b3a6e80912ab3d248970a16719ecdcf86f359
Secunia Security Advisory 14035
Posted Jan 28, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SmOk3 has reported some vulnerabilities in eCommerce, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | 254b72e5f5aa17e878bbd5b1667fc7937fa8afd093b034ed9d4b8a705108781c
magicwinmail40.txt
Posted Jan 28, 2005
Authored by Tan Chew Keong | Site security.org.sg

Multiple vulnerabilities were found in Magic Winmail's Webmail, IMAP, and FTP services. Arbitrary file upload/download, cross site scripting, and directory traversal flaws all exist, along with the ability to access other user's mail. It really IS magic.

tags | advisory, arbitrary, vulnerability, imap, xss, file upload
SHA-256 | 6cdd0f75b8a65fb62d8a4639fd3d414b32de01bbd3ab23bb7757fb4fa79da5d6
Secunia Security Advisory 13993
Posted Jan 28, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in ginp, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | 3ab1f6d3ca36d8d484f297215b97acd3eaf2a506466715db5d51cd406fc6417d
57728.html
Posted Jan 28, 2005
Site sunsolve.sun.com

Sun Security Advisory - A system panic may occur on systems that open and close several UDP end points.

tags | advisory, udp
SHA-256 | 10bf6ec41a8db82f32295a3a660842226a8d9b1a7c158bf82b13c735d6252d8c
dsa-661.txt
Posted Jan 28, 2005
Site debian.org

Debian Security Advisory 661-1 - The Debian Security Audit project discovered that f2c and fc, which are both part of the f2c package, a fortran 77 to C/C++ translator, open temporary files insecurely and are hence vulnerable to a symlink attack.

tags | advisory
systems | linux, debian
advisories | CVE-2005-0017, CVE-2005-0018
SHA-256 | c176048e4edf43fb9c44c5ce861ed0559b85a08070ccfed40adad603b717b990
uebimiau.txt
Posted Jan 28, 2005
Authored by Glaudson Ocampos, Intruders Tiger Team | Site intruders.com.br

Multiple vulnerabilities in Uebimiau WebMail versions 2.7.2 and below allow for the hijacking of session files and other information.

tags | advisory, vulnerability
SHA-256 | 834d17e463670f58d926bf262304f0e4f32dfaf0d2ef316c1799deb007620aec
Ingate413.txt
Posted Jan 28, 2005
Authored by Neil Watson

When a PPTP user is disabled in Ingate Firewall versions 4.1.3 and below, any tunnel created by them is not automatically disabled.

tags | advisory
SHA-256 | 80f85f9fb08f0a173f235a0fae31f290489018416571bc16f578dcc2ccd5f2bd
OutlookMuteX.txt
Posted Jan 28, 2005
Authored by Anand Khare

Exploit for Outlook that can press a button to verify it is okay to access protected contact data. Tested against Windows XP SP1. This functionality may be utilized in future worm creation.

tags | exploit, worm
systems | windows
SHA-256 | b7b894daaf5e749e2f7ec8cab19e398017e5a3a7694ac2d2bf74ebf782fb2f30
NSFOCUS Security Advisory 2005.1
Posted Jan 28, 2005
Authored by NSFOCUS, Yu Yang | Site nsfocus.com

NSFOCUS Security Advisory(SA2005-01) - NSFocus Security Team has found a buffer overflow vulnerability in the plug-in by which WinAMP plays CD. An attacker can construct a malicious playlist file that is embedded in a HTML page. If a user is persuaded to click it, then the attacker can gain complete control over the user's system. All versions below 5.08c are affected.

tags | advisory, overflow
advisories | CVE-2004-1150
SHA-256 | 2f4c6c5035b872fd5a2b5de1569a4facb605684f573d63de5e8c86235f56c895
antivir.txt
Posted Jan 28, 2005
Authored by Vladimir Kraljevic

An unnamed antivirus product can cause a denial of service on Microsoft Windows due to not closing open registry handles.

tags | exploit, denial of service, registry
systems | windows
SHA-256 | 10e74a2c526a065ee0572cf3e0b04c2ade62abdeccdc6aa8429bc8da242910db
DMA-2005-0127a.txt
Posted Jan 28, 2005
Authored by Kevin Finisterre

Apple's OS X batch family of commands make poor use of setuid capabilities allowing for privilege escalation.

tags | exploit
systems | apple, osx
advisories | CVE-2005-0125
SHA-256 | 4b7f8222d4d52c294fcfe9d3930da745c276ff2c756307556f0b7f809f135083
Secunia Security Advisory 14049
Posted Jan 28, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in JUNOS, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | bd7ae7cb6ff704e5dabca2abcceee84f052d0ae3ca70164a455461bc48a9cbcb
Secunia Security Advisory 14010
Posted Jan 28, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in Novell iChain, which potentially can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | a43a206d2e0759be7da880f6f1a67101b0d22d3bd6ac6a1b75038e36eb2554ab
Page 1 of 1
Back1Next

File Archive:

May 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    0 Files
  • 2
    May 2nd
    15 Files
  • 3
    May 3rd
    19 Files
  • 4
    May 4th
    24 Files
  • 5
    May 5th
    15 Files
  • 6
    May 6th
    14 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    13 Files
  • 10
    May 10th
    7 Files
  • 11
    May 11th
    99 Files
  • 12
    May 12th
    45 Files
  • 13
    May 13th
    7 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    16 Files
  • 17
    May 17th
    26 Files
  • 18
    May 18th
    4 Files
  • 19
    May 19th
    17 Files
  • 20
    May 20th
    2 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    6 Files
  • 24
    May 24th
    19 Files
  • 25
    May 25th
    5 Files
  • 26
    May 26th
    12 Files
  • 27
    May 27th
    12 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close