exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 86 RSS Feed

Files Date: 2005-02-26

57738.html
Posted Feb 26, 2005
Site classic.sunsolve.sun.com

Sun Security Advisory - A security vulnerability in the STSF Font Server Daemon (stfontserverd) may allow a local unprivileged user the ability to overwrite or remove any file on the system which could result in a Denial of Service (DoS).

tags | advisory, denial of service, local
SHA-256 | 2ee5885d2260af9302e5f2c7bb7dedfae64ea2e56c52ed7e0191861ab29d222d
Secunia Security Advisory 14394
Posted Feb 26, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in PunBB, which potentially can be exploited by malicious users to disclose sensitive information, and by malicious people to bypass certain security restrictions and conduct SQL injection attacks.

tags | advisory, vulnerability, sql injection
SHA-256 | 55bdc2b21f283254eddc16f297a57fd9c343d0f2b840bcffb722121b79b9cedb
Secunia Security Advisory 14399
Posted Feb 26, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - nst has reported a vulnerability in phpWebSite, which potentially can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 6d0a244cb9db7f79025aa7e4babcbdace5ad44693fa5bb880fded47728eb1fe7
sof2guidboom.zip
Posted Feb 26, 2005
Authored by Luigi Auriemma | Site aluigi.altervista.org

Proof of concept exploit for a denial of service flaw in Soldier of Fortune II versions 1.03 and below.

tags | exploit, denial of service, proof of concept
SHA-256 | c5e8573170e032f3f72a70f8901f7faed97c2e1fc56704d4f40e1c4de77b80e3
sof2guidboom.txt
Posted Feb 26, 2005
Authored by Luigi Auriemma | Site aluigi.altervista.org

Soldier of Fortune II versions 1.03 and below suffer from a remote denial of service flaw.

tags | advisory, remote, denial of service
SHA-256 | a70857bf750f173d882ed32cf5cd2c25d4ae2cb525fce0943073ab2470597ba4
phpMyAdmin261.txt
Posted Feb 26, 2005
Authored by Maksymilian Arciemowicz

phpMyAdmin versions 2.6.1 and below suffer from remote file inclusion and cross site scripting flaws. Detailed exploitation given.

tags | exploit, remote, xss, file inclusion
SHA-256 | 9f0143a5f3ebf05e88c5f0394ce572ec703356e04312c6052f687970cd284f6c
SSRT4694.txt
Posted Feb 26, 2005
Site hp.com

HP Security Bulletin - A potential vulnerability has been identified with HP-UX running ftpd where the vulnerability could be exploited to allow a remote authorized user unauthorized access to files.

tags | advisory, remote
systems | hpux
SHA-256 | 019efba716311fabbd9c25e564ad9f743b963cc88b64d530205e5b7f4ffcda36
cycladesReveal.txt
Posted Feb 26, 2005
Site cirt.net

The Cyclades AlterPath Manager (APM) Console Server has design flaws that expose restricted consoles to unauthorized APM users, allow any APM user to obtain administrative privileges, and provide detailed system information to unauthorized users.

tags | exploit
SHA-256 | cc0a5901c66788e7f89de06b9bfc9207dd869543df84240254df06245109d1bd
googleEvil.txt
Posted Feb 26, 2005
Authored by Cody Hatch

Google appears to be correlating searches on Google's site with Gmail accounts, potentially creating privacy concerns for Gmail users.

tags | advisory
SHA-256 | 4aecf53c7deac8ce922ae2fb3f70cc37ba25f0787c4b5dac13f401164f288252
coolservlets.txt
Posted Feb 26, 2005
Authored by Josh884

The open source guestbook script from CoolServlets.com is susceptible to input validation and logic flaws.

tags | advisory
SHA-256 | 2387b8d6ae974bbd8dd50740fa50a397babe8edbc825c771b0eb5c8cb5ac9d18
ircxckc17.rar
Posted Feb 26, 2005
Authored by Digital Blast | Site digitalblast.com.ar

Dictionary based channel key cracker for any IRCX server.

tags | cracker
SHA-256 | 085863ea08f9b0632a6bcbde3bf9b568761a9b12f203999e23531b5a1501f24d
msnc11.rar
Posted Feb 26, 2005
Authored by Digital Blast | Site digitalblast.com.ar

Dictionary based MSN account cracker.

tags | cracker
SHA-256 | 3ebd59c929c2f4cf08b2a2ce14cba44b131d2e3c0bc7acd205d1701eece8789b
siple11.rar
Posted Feb 26, 2005
Authored by Digital Blast | Site digitalblast.com.ar

Utility to extract all the proxies from www.stayinvisible.com and you can copy, ping, and whois an ip address.

tags | tool
systems | unix
SHA-256 | e17e8c17fb54b1520defb2b57542d1859144dace3f405160f10e9f4b99ec54fa
croomc12.rar
Posted Feb 26, 2005
Authored by Digital Blast | Site digitalblast.com.ar

This is a dictionary-based channel key and password key cracker only for Conference Room IRC servers.

tags | cracker
SHA-256 | 118922f4ef47ac4da4022a2788d15e8cd0bf5e2063d2d90e537f1a5982367c8c
Cisco Security Advisory 20050224-acnsdos
Posted Feb 26, 2005
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - Devices running Cisco Application and Content Networking System (ACNS) software may be vulnerable to Denial of Service (DoS) attacks and may contain a default password for the administrative account. Devices running ACNS software may be vulnerable to the DoS attacks while configured as a transparent proxy server, forward proxy server, or reverse proxy server.

tags | advisory, denial of service
systems | cisco
SHA-256 | 95495b1b85118a7709d8a7d3720457f69be1f512fea90a8ef51bc02408e111d8
iDEFENSE Security Advisory 2005-02-23.t
Posted Feb 26, 2005
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 02.23.05 - Local exploitation of a race condition in the Kodak Color Management System's kcms_configure script packaged with Sun Microsystems Inc. Solaris operating system can allow for the corruption of arbitrary files on the system.

tags | advisory, arbitrary, local
systems | solaris
advisories | CVE-2004-0481
SHA-256 | 28c7540504e861f0ff576e371e97faadadab0eca28f83fcf288b9fdf9885595f
Secunia Security Advisory 14397
Posted Feb 26, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in HP-UX, which can be exploited by malicious users to gain knowledge of potentially sensitive information.

tags | advisory
systems | hpux
SHA-256 | d0c319a2e7ead1b6dc8a140b7d4af5490a000a3d28b82b92573a838c5cab8f23
Secunia Security Advisory 14398
Posted Feb 26, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in mkbold-mkitalic, which potentially can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 49b0ba610b037437f67113ccc7ff94d4a2d65c7580163dd198756e7cc6d356d4
Secunia Security Advisory 14396
Posted Feb 26, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - ISS X-Force has reported a vulnerability in various Trend Micro products, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | c587b93535a82fc122630c08ff4895c33bc3fdf1ca48ea283c5d2b6e33e5e379
Secunia Security Advisory 14384
Posted Feb 26, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Florian Weimer has reported a vulnerability in the TWiki Image Gallery plugin, which can be exploited by malicious users to compromise a vulnerable system.

tags | advisory
SHA-256 | e5f784363c417a7ded149718fa72d438912c302897c0e03080ce645ec6ec957d
Secunia Security Advisory 14382
Posted Feb 26, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Maksymilian Arciemowicz has reported some vulnerabilities in phpMyAdmin, which can be exploited by malicious people to conduct cross-site scripting attacks and disclose sensitive information.

tags | advisory, vulnerability, xss
SHA-256 | b5b97b7d1171f387ced8c1194373dd0a8b7b2a168a5cf0b2c1bcfd776648feb7
Secunia Security Advisory 14385
Posted Feb 26, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Kozan has discovered a security issue in Chat Anywhere, which can be exploited by malicious, local users to gain knowledge of sensitive information.

tags | advisory, local
SHA-256 | c78e9f6d078415d37a2fec0846ee53e5c3ac2d01439da234fe8fc59f0bc5e311
Secunia Security Advisory 14378
Posted Feb 26, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - sullo has reported some vulnerabilities in AlterPath Manager, which can be exploited by malicious users to bypass certain security restrictions, and by malicious people to disclose some system information.

tags | advisory, vulnerability
SHA-256 | c2f3cd0f63dfc2b731957ab6417c681144ac2ca4de42169bcbd176a57fec2a99
WifiScanner-0.9.6.tar.gz
Posted Feb 26, 2005
Site wifiscanner.sourceforge.net

WifiScanner is an analyzer and detector of 802.11b stations and access points which can listen alternatively on all the 14 channels, write packet information in real time, search access points and associated client stations, and can generate a graphic of the architecture using GraphViz. All network traffic may be saved in the libpcap format for post analysis. It works under Linux with a PrismII card and with the linux-wlan driver.

Changes: Public Release.
tags | tool, wireless
systems | linux
SHA-256 | a27727a55c2b8441201fc1eef0c1764068a8ac2dff81379fa805ced81fea1c6b
rkhunter-1.2.1.tar.gz
Posted Feb 26, 2005
Authored by Michael Boelen | Site rootkit.nl

Rootkit Hunter scans files and systems for known and unknown rootkits, backdoors, and sniffers. The package contains one shell script, a few text-based databases, and optional Perl modules. It should run on almost every Unix variety except Solaris and NetBSD.

Changes: Added support for Mandrake 8.1 (i586, no hashes), FreeBSD 5.3 (i386, with hashes for release version), Slackware 10.1. Updated various hashes. Improved logging. Fixed typos.
tags | tool, shell, perl, integrity, rootkit
systems | netbsd, unix, solaris
SHA-256 | 0fbec3e733e1fc14dfcdf8a49ef16a0c61acc54ff3598cf387a4e86c3d7cc995
Page 1 of 4
Back1234Next

File Archive:

January 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    0 Files
  • 2
    Jan 2nd
    13 Files
  • 3
    Jan 3rd
    5 Files
  • 4
    Jan 4th
    5 Files
  • 5
    Jan 5th
    9 Files
  • 6
    Jan 6th
    5 Files
  • 7
    Jan 7th
    0 Files
  • 8
    Jan 8th
    0 Files
  • 9
    Jan 9th
    18 Files
  • 10
    Jan 10th
    31 Files
  • 11
    Jan 11th
    30 Files
  • 12
    Jan 12th
    33 Files
  • 13
    Jan 13th
    25 Files
  • 14
    Jan 14th
    0 Files
  • 15
    Jan 15th
    0 Files
  • 16
    Jan 16th
    7 Files
  • 17
    Jan 17th
    25 Files
  • 18
    Jan 18th
    38 Files
  • 19
    Jan 19th
    6 Files
  • 20
    Jan 20th
    21 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    24 Files
  • 24
    Jan 24th
    68 Files
  • 25
    Jan 25th
    22 Files
  • 26
    Jan 26th
    20 Files
  • 27
    Jan 27th
    17 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close