exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files Date: 2005-02-05

lanchat1666c.txt
Posted Feb 5, 2005
Authored by Donato Ferrante | Site autistici.org

LANChat Pro Revival 1.666c suffers from a denial of service flaw due to a mishandling of malformed UDP packets.

tags | advisory, denial of service, udp
SHA-256 | 76f66f7589c9c61cc5603217be57359f569333d4150f25b8af167f515dde5784
Secunia Security Advisory 14123
Posted Feb 5, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Albert Puigsech Galicia has discovered a vulnerability in ZipGenius, which potentially can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 5280602e0f38a487b6b7df4b06ff1dbfe27f08acef4fccd8f0f38a63058bcc7e
PSF-2005-001.txt
Posted Feb 5, 2005
Site python.org

Python Security Advisory PSF-2005-001 - The Python development team has discovered a flaw in the SimpleXMLRPCServer library module which can give remote attackers access to internals of the registered object or its module or possibly other modules. Versions affected: 2.2 all versions, 2.3 prior to 2.3.5, 2.4.

tags | advisory, remote, python
advisories | CVE-2005-0089
SHA-256 | 43bd027db911c38f6953ba201bce2e992e97d449243f8722839573151a9cb9ee
Secunia Security Advisory 14188
Posted Feb 5, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SmOk3 has reported a vulnerability in SunShop Shopping Cart, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 11a2ec2594dec8b24f5aaf0820aa2e44809d546110c8090cafafa2d6cd55e70e
newspost.c
Posted Feb 5, 2005
Authored by cybertronic

Newspost socket_getline() remote buffer overflow exploit.

tags | exploit, remote, overflow
SHA-256 | a6081f4aa3eed364766ff408136678d080d915d86e1294344825ed9ec87208cc
Secunia Security Advisory 14119
Posted Feb 5, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Daniel Reed has reported a vulnerability in D-BUS, which can be exploited by malicious, local users to hijack a session bus.

tags | advisory, local
SHA-256 | dfa316baf7332eb6296634ecac0eb273bb0f946e76dc3be77479e7319055671f
Secunia Security Advisory 14124
Posted Feb 5, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Mambo, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | 5580be10da037b216c32e548991822d0580bd082be9c4535a0303807fe240e7e
hydra-4.6-src.tar.gz
Posted Feb 5, 2005
Authored by van Hauser, thc | Site thc.org

THC-Hydra is a high quality parallelized login hacker for Samba, Smbnt, Cisco AAA, FTP, POP3, IMAP, Telnet, HTTP Auth, LDAP, NNTP, MySQL, VNC, ICQ, Socks5, PCNFS, Cisco and more. Includes SSL support, parallel scans, and is part of Nessus.

Changes: New teamspeak module, upgrades ldap support to v4 and has several bug fixes. Enhancements and bug fixes for modules.
tags | web, cracker, imap
systems | cisco
SHA-256 | 8138561a146c3ddd0cfa503a60d6e5a9099bcb177fa6c62623f1c280e46fdd53
amap-4.8.tar.gz
Posted Feb 5, 2005
Authored by van Hauser, thc, DJ Revmoon | Site thc.org

Application Mapper is a next-generation scanning tool that allows you to identify the applications that are running on a specific port. It does this by connecting to the port(s) and sending trigger packets. These trigger packets will typically be an application protocol handshake (i.e. SSL). Amap then looks up the response in a list and prints out any match it finds. Adding new response identifications can be done just by adding them to an easy-to-read text file. With amap, you will be able to identify that SSL server running on port 3445 and some oracle listener on port 233!

Changes: Online web update of fingerprints is available. New identifications have been added. A windows binary is included, and more.
tags | tool, protocol
SHA-256 | 85b6426bf6c67517d6298207ce6fdde14f9ec6ac8cbca7d43ab1c171722a0490
Mandriva Linux Security Advisory 2005.029
Posted Feb 5, 2005
Authored by Mandriva | Site mandrakesoft.com

Mandrake Linux Security Update Advisory - Javier Fernandez-Sanguino Pena discovered two vulnerabilities in scripts included with the vim editor. The two scripts, tcltags and vimspell.sh created temporary files in an insecure manner which could allow a malicious user to execute a symbolic link attack or to create, or overwrite, arbitrary files with the privileges of the user invoking the scripts.

tags | advisory, arbitrary, vulnerability
systems | linux, mandrake
advisories | CVE-2005-0069
SHA-256 | 7d9c2bfe6a4ee99a747572aa6fb968bad0aa4e7638fd1885eac13fa60c81fe34
Page 1 of 1
Back1Next

File Archive:

February 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    11 Files
  • 2
    Feb 2nd
    9 Files
  • 3
    Feb 3rd
    5 Files
  • 4
    Feb 4th
    0 Files
  • 5
    Feb 5th
    0 Files
  • 6
    Feb 6th
    9 Files
  • 7
    Feb 7th
    32 Files
  • 8
    Feb 8th
    0 Files
  • 9
    Feb 9th
    0 Files
  • 10
    Feb 10th
    0 Files
  • 11
    Feb 11th
    0 Files
  • 12
    Feb 12th
    0 Files
  • 13
    Feb 13th
    0 Files
  • 14
    Feb 14th
    0 Files
  • 15
    Feb 15th
    0 Files
  • 16
    Feb 16th
    0 Files
  • 17
    Feb 17th
    0 Files
  • 18
    Feb 18th
    0 Files
  • 19
    Feb 19th
    0 Files
  • 20
    Feb 20th
    0 Files
  • 21
    Feb 21st
    0 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close