what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files Date: 2004-02-09 to 2004-02-10

brinkster.txt
Posted Feb 9, 2004
Authored by Ferruh Mavituna | Site ferruh.mavituna.com

Brinkster, the web hosting company, is susceptible to multiple attacks allowing remote attacker to retrieve other user's ASP source code, access to database files, and bypass of code controls.

tags | advisory, remote, web, asp
SHA-256 | 20321697a1b31690cb24599aed57a01f74205775e8fa4851f50d9b0cbf5200ec
LoadLibrary.txt
Posted Feb 9, 2004
Authored by OS Security | Site ossecurity.ca

A LoadLibrary / LoadLibraryEx weakness makes SSL on Internet Explorer very vulnerable to a DLL proxy attack. If exploited, unencrypted data can be intercepted before Internet Explorer uses the SSL module to encrypt the data.

tags | advisory
SHA-256 | 603b345a2df31ce2b2a3c2928ac1cc29651e2a412f6171ef68b66484970e4e16
031003.txt
Posted Feb 9, 2004
Authored by Bruno Morisson | Site genhex.org

The Red-M RedAlert wireless 802.11b/Bluetooth probe version 2.75 has multiple security issues. Any unauthenticated user can reboot the appliance through the webserver. The administrator's access is bound by IP address, allowing anyone coming in via NAT from a shared network the same levels of control. The device also filters out specific characters in SSIDs representing them all as a single space character.

tags | advisory
SHA-256 | 71f2e6720e463278dc0da49ea24319c0a4bc4ce61c86960afea7ce164e6958ce
eTrust60.txt
Posted Feb 9, 2004
Authored by l0om

eTrust Virus Protection 6.0 InoculateIT for Linux is vulnerable to various symlink attacks and also creates multiple world writeable files and directories that can lead to system compromise.

tags | advisory, virus
systems | linux
SHA-256 | 8b163eb967dcd0f8561591434297e9b857a280d9af0cc48874c8eca5debb3f11
NokiaVuln.txt
Posted Feb 9, 2004
Authored by Tim Hurman | Site pentest.co.uk

Nokia 6310i cellular phones (and possibly others like it) could be subject of a denial of service attack when invalid OBEX messages are sent to the phones' protocol handler. This attack results in the phone resetting, terminating any current operations. No device pairing is required therefore anyone in range of the phone could initiate an attack.

tags | advisory, denial of service, protocol
SHA-256 | 9cfbea225d202aee5698f1855d4076fa4a3b72eedbf0d7613f683cf859f02257
eggdropShare.txt
Posted Feb 9, 2004
Authored by Luca De Roberto, Dania Stolfi, Guiseppe Caulo

Eggdrop IRC robots versions 1.6.x to 1.6.15 have a programming flaw that allow remote attackers to turn on share status, allowing for complete compromise.

tags | advisory, remote
SHA-256 | 0b1577d795dcba10443573e756575770ca4c02d6416e16106f8850386aa500c3
trackmania.c
Posted Feb 9, 2004
Authored by Arnaud Jacques | Site securiteinfo.com

The TrackMania game server that listens on TCP port 2350 can be crashed when garbage data is sent resulting in a denial of service.

tags | exploit, denial of service, tcp
SHA-256 | 679bdbc58dd5a64c64906445a5ca1bcb61f1c3b41fd72b74a16e4ead64037f83
kismet-feb.04.01.tar.gz
Posted Feb 9, 2004
Authored by Mike Kershaw | Site kismetwireless.net

Kismet is an 802.11 layer 2 wireless network sniffer. It can sniff 802.11b, 802.11a, and 802.11g traffic. It is capable of sniffing using almost any wireless card supported in Linux, which currently divide into cards handled by libpcap and the Linux-Wireless extensions (such as Cisco Aironet), and cards supported by the Wlan-NG project which use the Prism/2 chipset (such as Linksys, Dlink, and Zoom). Besides Linux, Kismet also supports FreeBSD, OpenBSD and Mac OS X systems. Features Multiple packet capture sources, Runtime network sorting by AP MAC address (bssid), IP block detection via ARP and DHCP packet dissection, Cisco product detection via CDP, Ethereal and tcpdump compatible file logging, Airsnort-compatible "interesting" (cryptographically weak) logging, Secure SUID behavior, GPS devices and wireless devices fingerprinting. Kismet also includes a tool called gpsmap that can be used to create maps from logged GPS data. Full changelog here.

Changes: Completely rewritten packet engine, various bug fixes and functionality enhancements.
tags | tool, wireless
systems | cisco, linux, freebsd, openbsd, apple, osx
SHA-256 | fd64352434e534c075de72e494d8b6445cfd5952bc831088c40ffe0762608f5f
waraxe-2004-SA003.txt
Posted Feb 9, 2004
Authored by Janek Vind aka waraxe

PHP-Nuke versions 6.x through 7.1.0 are susceptible to SQL injection attacks.

tags | advisory, php, sql injection
SHA-256 | 4962278b44fd6ae11b16d0e252e35a512ae43148f98b8d43daa77867c0f0b293
waraxe-2004-SA002.txt
Posted Feb 9, 2004
Authored by Janek Vind aka waraxe

A cross site scripting vulnerability exists in PHP-Nuke 7.1.0.

tags | advisory, php, xss
SHA-256 | 20ab7b5e841d9d4fb0e967215db2605948f0ef833bf39f0559bbbf06b316eec7
PalmOShttpd.txt
Posted Feb 9, 2004
Authored by Shaun Colley

A bug exists in the PalmOS httpd that causes a crash with a "Fatal Error". Full exploit included.

tags | exploit
systems | palmos
SHA-256 | 5b285308b063e2d59eb136e0072c9ab4a49538d664eb748f4491f7dabcadc37a
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close