what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 162 RSS Feed

Files Date: 2004-01-01 to 2004-01-31

webtrends.txt
Posted Jan 21, 2004
Authored by Oliver Karow | Site oliverkarow.de

WebTrends Reporting Center is administrated via a web interface that has a flaw which would allow a remote attacker to disclose the physical path to the application.

tags | advisory, remote, web
SHA-256 | ceeeb73740ef5d6595ffe3b3bcfebbaa1bd0e01644d2b67237781bafd0e4eec4
2WireGateway.txt
Posted Jan 21, 2004
Authored by Rafel Ivgi | Site theinsider.deep-ice.com

2Wire-Gateway is a router that has a webserver for maintenance. The CGI interface lacks input validation when returning an error with its return variable allowing for a directory traversal attack.

tags | exploit, cgi
SHA-256 | 7d327c33155ca85a9c8ffbe857abf59b58c2dd8d41a1f071dd99da63cc51605a
OwnServer10.txt
Posted Jan 21, 2004
Authored by Rafel Ivgi | Site theinsider.deep-ice.com

OwnServer, a web server used for watching security cameras remotely, is susceptible to a directory traversal bug that allows a remote attacker to gain access to files outside of the webroot.

tags | exploit, remote, web
SHA-256 | b32b6045df134cd7484a3ae7c2e8bfa669777d8d1b0a5b081d9961a173b87d02
IEmultiples.txt
Posted Jan 21, 2004
Authored by Rafel Ivgi | Site theinsider.deep-ice.com

When using the SNEWS protocol, Internet Explorer lacks its filtering engine and can trigger Outlook Express to be hit by a buffer overrun resulting in possible code execution.

tags | advisory, overflow, code execution, protocol
SHA-256 | b1c8758f7ae810befb59be9d3679bb31b88d48ffc8d5d5c14e2ef342f8769de7
vBulletinBBS.txt
Posted Jan 21, 2004
Authored by Darkwell | Site gcf.de

vBulletin Bulletin Board derivatives contain a security bug that may lead to disclosure of private information via cross site scripting attacks. This vulnerability may also enable an attacker to transmit sensitive information such as encrypted passwords, user identification numbers, or forum passwords to another server.

tags | advisory, xss
SHA-256 | 648da248485971d719402b2948f41a186eff85e43a7ac497adcf75b8977cbf58
NETCam.txt
Posted Jan 21, 2004
Authored by Rafel Ivgi | Site theinsider.deep-ice.com

NETCam webserver running NETCam Viewers 1.0.0.28 and below have a directory traversal bug that allows remote attackers to gain access to files outside of the webroot.

tags | exploit, remote
SHA-256 | 3033ef31ebe260b918d9f1e9177da16b936b0caa1f3b1065986e5ccaa17a5f85
suse90symlinks.txt
Posted Jan 20, 2004
Authored by l0om

Various init related script in SuSE 9.0 are susceptible to symlink attacks.

tags | advisory
systems | linux, suse
SHA-256 | 558fe9c77b84013499f18e08a176fcedcda8445c9e6304fead1629d649ed6cc9
getware.txt
Posted Jan 20, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

WebCam Live and Photohost are 2 shareware programs used to share webcam streams and photo albums through the web. WebCam Live versions 2.01 and below and Photohost versions 4.0 and below are all susceptible to a denial of service attack when the Content-Length parameter is set to a negative number during a transaction.

tags | advisory, web, denial of service
SHA-256 | f1e754c06a56a62a8a54d2c97ef2aec69f3c5c8cb9126843431d8d1bf463efca
goahead2.txt
Posted Jan 20, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

The Goahead webserver, version 2.1.8 and below, is an embedded webserver used by many products. The server has an internal problem where it will accept improper HTTP requests that allow a remote attacker to view source for CGI related files.

tags | exploit, remote, web, cgi
SHA-256 | 86b6965a79475e6b076b8955dfe03320b7908780179972962671b165a32736ba
goahead.txt
Posted Jan 20, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

The Goahead webserver, version 2.1.8 and below, is an embedded webserver used by many products. A flaw exists where an attacker can get the webserver to consume all of the server's resources by using the POST method with a specific number set for the Content-Length parameter.

tags | exploit
SHA-256 | 750d26c05ba6a4c19bb67be0988c544aa47ff4b7bd00c46f35b28f0378c6877a
yabbSE.txt
Posted Jan 20, 2004
Authored by BaCkSpAcE

YaBB SE versions 1.54 and 1.53 have the functions welcome and recentTopics which are vulnerable to SQL injection because the parameter ID_MEMBER is not checked against malicious input.

tags | exploit, sql injection
SHA-256 | 95e89384d3a5e60f55043d680923bf50f3a2d727d428ca8993e211fcbfc77dda
networker60.txt
Posted Jan 19, 2004
Authored by l0om

A plausible symlink attack exists in networker version 6.0 in the shutdown script.

tags | advisory
SHA-256 | f71446ef6211d128c354e2004097b4569b81064c3ae7c06613e3f72160b90019
j2ee.pointbase.txt
Posted Jan 19, 2004
Authored by Marc Schoenefeld | Site illegalaccess.org

Attached is an exploit that crashes the Pointbase 4.6 database server that comes with the J2EE reference implementation. It is caused by fact that the Pointbase installation coming with j2ee/ri 1.4. is not equipped with an appropriate security manager, thus giving all jars implicitly all permissions. These unlimited permissions can be exploited by an attacker using jdbc to crash the jvm running the pointbase server. Further exploitations possible are information disclosure and remote command injection.

tags | exploit, remote, info disclosure
SHA-256 | dce14b7ba6ef63416061596683c967a3e51ca10f2c1f0204a348921ccdd803ca
qmailcrash.html
Posted Jan 19, 2004
Authored by Georgi Guninski | Site guninski.com

Georgi Guninski security advisory #65, 2004 - Qmail version 1.03 is susceptible to a couple attacks. A crash in qmail-smtpd occurs with a long SMTP session. The crash is not global, it affects only the current SMTP session. It is also possible to trigger a segmentation violation (SEGV) from the network.

tags | advisory
SHA-256 | 10dae39fc506d25c870163518f0077627ecaf939966caa0aad04678186ced065
pablo-ftp.txt
Posted Jan 19, 2004
Authored by Arnaud Jacques | Site securiteinfo.co

Pablo FTP server version 1.77 allows for information disclosure by detecting whether or not a file exists outside of the FTP root directory, allow a remote attack to peruse the system at will.

tags | advisory, remote, root, info disclosure
SHA-256 | 30472f2da0279acae8a308c9b219bd017b1c9a745f39a30ef1595f0e3ec6872e
mambo.txt
Posted Jan 19, 2004
Authored by FraMe | Site kernelpanik.org

The Mambo Open Source web content management system allows for remote command execution as the webserver user id due to a lack of input validation.

tags | advisory, remote, web
SHA-256 | da6f8e308f6903ca98dc9383805abc68a8004be17d4c4787d292645cd9e1a4cb
SRT2004-01-17-0628.txt
Posted Jan 17, 2004
Authored by Kevin Finisterre | Site secnetops.com

Secure Network Operations Advisory SRT2004-01-17-0628 - Outpost Firewall versions 1.0 and 2.0 run with SYSTEM access, allowing a local user to escalate privileges.

tags | advisory, local
SHA-256 | e49c627bab85454145a426c7095bea20f3c2fa3995513f89ae6b5529a37a335b
elfpgp-0.1.5.tar.gz
Posted Jan 16, 2004
Authored by Bart Trojanowski | Site jukie.net

elfpgp signs an ELF binary by using standard PGP/GnuPG keys. It also allows for verification of said signatures. The signature is stored in the binary in an ELF record.

tags | encryption
SHA-256 | c72305a22e7ace63cfd05154d33e383e750ba58c7cec03ad65c3754c61d2550d
silc-server-0.9.16.tar.gz
Posted Jan 16, 2004
Authored by priikone | Site silcnet.org

SILC (Secure Internet Live Conferencing) is a protocol which provides secure conferencing services in the Internet. It can be used to send any kind of messages, in addition to normal text messages. This includes multimedia messages like images, video, and audio stream. All messages in the SILC network are encrypted and authenticated, and messages can also be digitally signed. SILC protocol supports AES, SHA-1, PKCS#1, PKCS#3, X.509, OpenPGP, and is being developed in the IETF. This tarball holds all server related files.

Changes: Various bug fixes.
tags | protocol
SHA-256 | d419aab79ceec1e55a50e7ae6b0e4ada556fd8172af713cf6c32b95f4c04f953
wipe-2.2.0.tar.bz2
Posted Jan 16, 2004
Site wipe.sourceforge.net

ya-wipe is a tool that effectively degausses the surface of a hard disk, making it virtually impossible to retrieve the data that was stored on it. This tool is designed to make sure that sensitive data is completely erased from magnetic media.

Changes: Updated autoconf scripts, wipe will now build on s/390, fixed block dev support, fixed percent reporting.
systems | unix
SHA-256 | ea8956c31538b43f04ec3c4999a567a61f34fff0faf6ea02090c860b7f391be6
promisc220103.tgz
Posted Jan 16, 2004
Authored by binary man | Site gerald.colangelo.free.fr

Promisc is a sniffer based on the AF_PACKET domain socket. It parses the IP, TCP, UDP, ICMP, and ARP protocols. A GTK graphical user interface has been written in order to simplify its use.

tags | tool, udp, sniffer, tcp, protocol
SHA-256 | 1b1b29e9e6227c46126f3b1948eaf0a26ab77c7ce834c3c93e5f63a30ce41221
phpshopProject.txt
Posted Jan 16, 2004
Authored by James Bercegay | Site gulftech.org

phpShop Project versions 0.6.1-b and earlier are prone to SQL injection attacks, script injection, cross site scripting, and user information disclosure vulnerabilities.

tags | exploit, vulnerability, xss, sql injection, info disclosure
SHA-256 | adc0386ff64991975f3cef1848e988a682f780a5a19f78fb561e980f819177e2
metadot.txt
Posted Jan 16, 2004
Authored by James Bercegay | Site gulftech.org

MetaDot Portal versions 5.6.5.4b5 and below are susceptible to SQL injection vulnerabilities, Cross Site Scripting, and information disclosure attacks.

tags | advisory, vulnerability, xss, sql injection, info disclosure
SHA-256 | 2f18758617babfb1684f97c043b085cc1427dc8ed63c02c6f2033bd498c2ebce
TA-150104.txt
Posted Jan 16, 2004
Authored by posidron, rushjo | Site tripbit.org

Xtreme ASP Photo Gallery Version 2.0 is prone to a common SQL injection vulnerability. The problem occurs when handling user-supplied username and password data supplied to authentication procedures.

tags | exploit, sql injection, asp
SHA-256 | 18196c49e782ab6139923566eb59889974ae0a3c962a2c04583975e95eea74fa
isec-0013v2-mremap.txt
Posted Jan 15, 2004
Authored by Wojciech Purczynski, Paul Starzetz | Site isec.pl

The mremap system call in the Linux kernel memory management code has a critical security vulnerability due to incorrect bounds checking. Proper exploitation of this vulnerability may lead to local privilege escalation including execution of arbitrary code with kernel level access. Updated version of the original release of this document.

tags | advisory, arbitrary, kernel, local
systems | linux
advisories | CVE-2003-0985
SHA-256 | 0a4e3c81dc818181f880893f3f4e1c339b5517ada7d7b0d09c8ac1ddf34cbe95
Page 3 of 7
Back12345Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close