exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 22 of 22 RSS Feed

Files Date: 2005-08-12

kojoney-0.0.3.1.tar.gz
Posted Aug 12, 2005
Authored by Joxean Koret | Site kojoney.sourceforge.net

Kojoney is an easy of use, secure, robust, and powerful Honeypot for the SSH service. It includes other tools such as kip2country (IP to Country) and kojreport, a tool to generate reports from the log files.

Changes: Various corrections.
tags | tool, intrusion detection
systems | unix
SHA-256 | 6b1d9bedc27dd5c8d8d4633a436d52e8204bf8823bff29873c1485d25a42c5c0
evolutionFormat.txt
Posted Aug 12, 2005
Site sitic.se

Evolution suffers from several format string bugs when handling data from remote sources. These bugs lead to crashes or the execution of arbitrary assembly language code. Evolution versions 1.5 to 2.3.6.1 are affected.

tags | advisory, remote, arbitrary
SHA-256 | ba54e3eebf62720b6c3ebeb08515844ddb5b49958567983f4409c964728c4ba3
NotSoWyse.txt
Posted Aug 12, 2005
Authored by Josh Zlatin

It is possible to remotely crash the Wyse Winterm 1125SE terminal by sending a malformed packet with ip option len field set to zero.

tags | advisory
SHA-256 | 7d6ec73bfdc62a8d48538d2a967383d4583ec5314a62df994d904a95d68f5b4d
TheftOfLinkKey.txt
Posted Aug 12, 2005
Authored by Kevin Finisterre | Site digitalmunition.com

Paper entitled "Theft of Bluetooth Link Keys for Fun and Profit?"

tags | paper
SHA-256 | bab28a93e6d06017dbea2c25b0edf71991910355debb06e00d302cbb1a006e04
fudForum.txt
Posted Aug 12, 2005
Authored by Alexander Heidenreich

FUD Forum bulletin board software version 2.6.15 allows for unauthenticated access to messages.

tags | exploit
SHA-256 | 6f46411549bf33bf6f7bed0062473c2cc53c9b0b6db070ab308e184d5abdb4b8
verizonBill.txt
Posted Aug 12, 2005
Authored by Jonathan Zdziarski | Site nuclearelephant.com

A sanity check failed to exist in ebillpay's unbilled-usage modules to to correlate phone numbers with accounts. This could have been used by a malicious user to mine data through Verizon Wireless' website about other Verizon Wireless customers.

tags | advisory
SHA-256 | f353ab176a9e04fc59c8897a00b39596a2da68f7d47cbb92dfe69650f1cefb42
Ubuntu Security Notice 166-1
Posted Aug 12, 2005
Authored by Ubuntu | Site ubuntu.com

Ubuntu Security Notice USN-166-1 - Ulf Harnhammar disovered several format string vulnerabilities in Evolution. By tricking an user into viewing a specially crafted vCard attached to an email, specially crafted contact data from an LDAP server, specially crafted task lists from remote servers, or saving Calendar entries with this malicious task list data, it was possible for an attacker to execute arbitrary code with the privileges of the user running Evolution.

tags | advisory, remote, arbitrary, vulnerability
systems | linux, ubuntu
advisories | CVE-2005-0806
SHA-256 | adfe66c8078c6dbe77c997fba762f467536084c5390318202428571511bf8028
Ubuntu Security Notice 164-1
Posted Aug 12, 2005
Authored by Ubuntu | Site ubuntu.com

Ubuntu Security Notice USN-164-1 - Max Vozeler discovered that the the pstopnm conversion tool did not use the -dSAFER option when calling ghostscript. This option prohibits file operations and calling commands within PostScript code. This flaw could be exploited by an attacker to execute arbitrary code if he tricked an user (or an automatic server) into processing a specially crafted PostScript document with pstopnm.

tags | advisory, arbitrary
systems | linux, ubuntu
advisories | CVE-2005-2471
SHA-256 | e7bee8ebff81a32f1d1b893ba21274a04bb055f8c81980d772a51a23273a551d
backupexec_dump.pm.txt
Posted Aug 12, 2005

Veritas Backup Exec Agent remote file access exploit that makes use of a logic flaw. This exploit is part of the Metasploit framework and works against all current versions of this Agent.

tags | exploit, remote
SHA-256 | ce6635868c10007bb4b2fbdfee0b95f5aeb19d955c488884770156f4c69c0f4f
NAePolicy.txt
Posted Aug 12, 2005
Authored by Reed Arvin | Site reedarvin.thearvins.com

A privilege escalation flaw exists in Network Associates ePolicy Orchestrator Agent 3.5.0 (patch 3). Exploitation details provided.

tags | exploit
SHA-256 | 4a189c2e780a80f5f87fb463cff8a682acc537284c383163a446215361fa9bec
Debian Linux Security Advisory 773-1
Posted Aug 12, 2005
Authored by Debian | Site security.debian.org

Debian Security Advisory DSA 773-1 - This advisory adds security support for the stable amd64 distribution. It covers all security updates since the release of sarge, which were missing updated packages for the not yet official amd64 port. Future security advisories will include updates for this port as well.

tags | advisory
systems | linux, debian
SHA-256 | 28fec12bbb6708c83211cce4992e967545b7b8ee97d8695fc4cd36c6e3015003
ms05039.c
Posted Aug 12, 2005

Microsoft Windows 2000 Plug and Play universal remote exploit for the flaw discussed in MS05-039.

tags | exploit, remote
systems | windows
advisories | CVE-2005-1983
SHA-256 | 781399405050c0988fddc2a8b8e492927b774aa17316460c4c494ff7b5f37391
cpan.c
Posted Aug 12, 2005
Authored by PakBraiN

Remote code execution exploit for cPanel versions 9.x and below that binds a shell to port 1666.

tags | exploit, remote, shell, code execution
SHA-256 | aaf90668dff66a551d8b4f647e0e60c86fcce644a7ba3f2704c85d8761c9bf22
ms05038.c
Posted Aug 12, 2005
Authored by Zwell | Site donews.net

Microsoft Internet Explorer COM Object remote file down and execute exploit. Makes use of the vulnerability described in MS05-038.

tags | exploit, remote
advisories | CVE-2005-1990
SHA-256 | fb75508c17a1d01407c6df35ff810bd6880a37223ff16a1e6f1e8d024a2ae186
Secunia Security Advisory 16350
Posted Aug 12, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Zinho has discovered some vulnerabilities in PHPOpenChat, which can be exploited by malicious people to conduct script insertion attacks.

tags | advisory, vulnerability
SHA-256 | 70cd8e7fc21fa538fcca888c97d0cba66a7151256d5abb367ca3ec9bab513a8c
Secunia Security Advisory 16377
Posted Aug 12, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SmOk3 has discovered a vulnerability in MidiCart ASP, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection, asp
SHA-256 | 4a4052f48a77e1a0a3b949cb06d527ed0a9571a864c9b2b893acebbd8905a79e
Secunia Security Advisory 16389
Posted Aug 12, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in Gallery, which can be exploited by malicious users to bypass certain security restrictions.

tags | advisory
SHA-256 | 462469cf29a5a7005485016971549b96c99d964e3c20eb4837d7bcf2134b76fb
Secunia Security Advisory 16394
Posted Aug 12, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ulf Harnhammar has reported some vulnerabilities in Evolution, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
SHA-256 | ecc096d26115c9f59c55ea8d32bc98c9b20685a42f713f4bb21a06de6fb599cb
Secunia Security Advisory 16396
Posted Aug 12, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Reed Arvin has discovered a vulnerability in Linksys WLAN Monitor, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
SHA-256 | 2e66dfae6176af194a09091b9f8382fca793de0b3a46d5b915f3a5b3af3dd0aa
Secunia Security Advisory 16400
Posted Aug 12, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in gpdf, which can be exploited by malicious people to cause a DoS (Denial of Service) on a vulnerable system.

tags | advisory, denial of service
SHA-256 | a482ccacef46e1563c27d82a350652db75de3e3536f782bbb79bce220ffcdda5
Secunia Security Advisory 16401
Posted Aug 12, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - HP has acknowledged a vulnerability in HP Tru64 UNIX, which can be exploited by malicious people to disclose certain sensitive information.

tags | advisory
systems | unix
SHA-256 | dd97cbafc3ea1672020fe12f7ff7d947f0de99a2c0e3c8fe4be564481093de46
Secunia Security Advisory 16402
Posted Aug 12, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in HP ProLiant DL585 Server, which can be exploited by malicious people to gain unauthorised access to the server controls.

tags | advisory
SHA-256 | f8257d3fd55a3bce10d5a13b7e1211d102bde373430b0efd8e198f0ae7de0fde
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close