exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 194 RSS Feed

Files Date: 2004-02-01 to 2004-02-29

haegemonia.txt
Posted Feb 24, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Haegemonia versions 1.07 and below have a remote vulnerability where the reading of unallocated memory causes a crash.

tags | advisory, remote
SHA-256 | 71612dcd0b3195ee5a2b49861682273a773a9112ce0ccfbaecb6d6f49e189790
trillian.txt
Posted Feb 24, 2004
Authored by Stefan Esser | Site security.e-matters.de

Trillian versions 0.71 through 0.74 and Pro versions 1.0 through 2.01 have two vulnerabilities that allow for remote compromise.

tags | advisory, remote, vulnerability
SHA-256 | 644a67bf065bdd9369181f79afb3191465a69dcc5c87f7d823e73f8dfeee5add
badblue24.txt
Posted Feb 24, 2004
Authored by Rafel Ivgi | Site theinsider.deep-ice.com

BadBlue web server version 2.4 has a local path disclosure vulnerability in phptest.php.

tags | advisory, web, local, php
SHA-256 | 61526ad7e90d57897a735b25cd5b3a4fed70406fc831efc5ad1c0098950b1c52
Flexwatch22.txt
Posted Feb 24, 2004
Authored by Rafel Ivgi | Site theinsider.deep-ice.com

FlexWATCH-Webs versions 2.2 (NTSC) and below suffer from an authorization bypass via double slashes and also a cross site scripting attack.

tags | exploit, web, xss
SHA-256 | 30f2d7d384b06c83532dccf7d1af6e57c41375c5a13abfadfe0e4861c59106a0
gigabytebb.txt
Posted Feb 24, 2004
Authored by Rafel Ivgi | Site theinsider.deep-ice.com

Gigabyte Broadband Router version Gn-B46B with firmware version 1.003.00 is vulnerable to a remote authorization bypass.

tags | advisory, remote
SHA-256 | e3149a74a9c9b81c93c795bacc90d54e97eece5c31f0f9a3dd7a8c272d3b6b3f
chntpw-source-040116.zip
Posted Feb 24, 2004
Authored by Petter Nordahl-Hagen | Site home.eunet.no

chntpw is a Linux utility to (re)set the password of any user that has a valid (local) account on your WinNT or Win2000 system, by modifying the crypted password in the registry's SAM file. You do not need to know the old password to set a new one. It works offline (i.e., you have to shutdown your computer and boot off a linux floppy disk). The bootdisk includes stuff to access NTFS partitions and scripts to glue the whole thing together. This utility works with SYSKEY and includes the option to turn it off. A bootdisk image is provided.

tags | local, registry
systems | linux, windows
SHA-256 | 65dbbeafff881919c106decc466b7752d52cc68632baebbbb704a3dd7016433a
defender.tgz
Posted Feb 24, 2004
Authored by Brain | Site sourceforge.net

IRC Defender is a Perl program for protecting your IRC network against virus drones, general troublemakers, ban evasion, and attacks. It is fully modular, able to unload and load modules on the fly, and comes with several modules to ban anatoly/fyle virus drones, block unauthorised cgi:irc sites, conduct ctcp version surveys, maintain ctcp version blacklists, and (most importantly) set regexp-based akills.

tags | cgi, perl, virus
SHA-256 | 952f2ea50ff04b95e6292c122538c184fbaba0c22bbfa3b7d19bd3c737cc5dc9
netspoc-2.1.tar.gz
Posted Feb 24, 2004
Site netspoc.berlios.de

Network Security Policy Compiler (NetSPoC) is a tool for security management of large networks with different security domains. It generates configuration files for packet filters controlling the borders of security domains. It provides its own language for describing security policy and the topology of a network. The security policy is a set of rules that state which packets are allowed to pass the network and which are not. NetSPoC is topology aware - a rule for traffic from A to B is automatically applied to all managed packet filters on the path from A to B.

Changes: Routing protocol EIGRP is supported. Trailing comma is allowed at end of lists now.
systems | unix
SHA-256 | 54d61d636c96d5d398a4b34945bc256c442d6d1f232877f25f75a52a1bee7523
iDEFENSE Security Advisory 2004-02-23.t
Posted Feb 24, 2004
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 02.23.04: Exploitation of a flaw in Apple Computer Inc's Darwin Streaming Server allows unauthenticated remote attackers to prevent legitimate usage.

tags | advisory, remote
systems | apple
SHA-256 | f372c7d4abe5c81061d94571dca2e30e3fbfca98b98ff04b3ccdf60adc28c1e9
Atstake Security Advisory 04-02-23.1
Posted Feb 24, 2004
Authored by David Goldsmith, Atstake | Site atstake.com

Atstake Security Advisory A022304-1 - The ppp daemon that comes installed by default in Mac OS X is vulnerable to a format string vulnerability. It is possible to read arbitrary data out of pppd's process. Under certain circumstances, it is also possible to 'steal' PAP/CHAP authentication credentials.

tags | advisory, arbitrary
systems | apple, osx
advisories | CVE-2004-0165
SHA-256 | ac39259d91e80a21a84083dd2d5ed03a1ab274c26fa3d74162b3afe90c544152
TYPSoftFTP.txt
Posted Feb 24, 2004
Authored by intuit | Site rootshells.tk

TYPSoft FTP Server version 1.10 is susceptible to denial of service attacks via most standard FTP commands.

tags | advisory, denial of service
SHA-256 | 9896cd1b5ce2e75750ee8ad25c0668ceb68ffb05d3a115a758fc7e382ab93b2e
Lam3rZ-032004.txt
Posted Feb 24, 2004
Authored by Mariusz Woloszyn

Lam3rZ Security Advisory #3/2004 - Confirm versions 0.62 and below allow for forged email headers to execute arbitrary code as the uid the script runs under for procmail.

tags | advisory, arbitrary
SHA-256 | 634b2b6e2e473082e8c96998040c28f72299b5f0b7d63fbea545f69d86f36438
teamfactor.txt
Posted Feb 24, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Team Factor versions 1.25 and below are susceptible to a remote server crash. Both the Windows and Linux platforms are affected.

tags | advisory, remote
systems | linux, windows
SHA-256 | ecf6ae877cd6f230a6ca6cfcb248d330cfbe231379638e55923f3b71bcf037f3
waraxe-2004-SA004.txt
Posted Feb 24, 2004
Authored by Janek Vind aka waraxe

Extreme Messageboard aka XMB version 1.8 Partagium Final SP2 is vulnerable to multiple SQL injection and cross site scripting attacks.

tags | exploit, xss, sql injection
SHA-256 | 94202bebf3a32f786fd685a5f8e27fde71d3af5d8268b3550c55c6d9a2fd6d7f
ZH2004-09SA.txt
Posted Feb 23, 2004
Authored by G00db0y | Site zone-h.org

PhpNewsManager version 1.46 allows for arbitrary file reading due to being susceptible to a directory traversal attack.

tags | exploit, arbitrary
SHA-256 | 340c2bf12eaf6e9a64fbb3a6e669b7646c444d064e1d432c3c336d3153659923
MySQL.fingerprint.txt
Posted Feb 23, 2004
Authored by Tonu Samuel

Small write-up discussing methodology for fingerprint the type of MySQL database being used when exploiting SQL injection vulnerabilities.

tags | paper, vulnerability, sql injection
SHA-256 | 7b6c08f5a021bb61015822055f311d65f7fed8629c8880058789c73e4bb31bb8
nCipher-09.txt
Posted Feb 23, 2004
Site ncipher.com

nCipher Security Advisory No. 9 - On certain models and firmware combinations, an attacker who is able to issue commands to an HSM may be able to access secret data stored in the module, including critical application keys.

tags | advisory
SHA-256 | 071a6375bd388973a762bfda42b19fa6b55931c003c9e7b6bbc847b7f457b7e1
ezboardXSS.txt
Posted Feb 23, 2004
Authored by Cheng Peng Su

ezBoard versions 7.3u and below are vulnerable to a cross site scripting attack.

tags | advisory, xss
SHA-256 | d7714aa52da52294665bc90ddc567c7e8aa96717cf6a345c626fc5e63110407b
Lam3rZ-022004.txt
Posted Feb 23, 2004
Authored by Tomasz Grabowski

Lam3rZ Security Advisory #2/2004 - Load Sharing Facility, or LSF, versions 4.x through 6.x, has a remotely accessible vulnerability. The eauth binary can be exploited to send commands to LSF on behalf of a different user. In this way a user could submit and control jobs on behalf of other users.

tags | advisory
SHA-256 | 9d66fa78163f5f238d88d57528f15373ea708f46a350fadeeb078178ee161498
Lam3rZ-012004.txt
Posted Feb 23, 2004
Authored by Tomasz Grabowski

Lam3rZ Security Advisory #1/2004 - Load Sharing Facility, or LSF, versions 4.x through 6.x, has a remotely accessible vulnerability. Specific input data strings can be constructed and can cause failure of the eauth binary, leading to the code execution under root privileges.

tags | advisory, root, code execution
SHA-256 | 58257ee84cc0f3a4b4da905c95ef59378739eb3959c2f197c95472f65121bfe3
AvirtSoho43.txt
Posted Feb 23, 2004
Authored by Donato Ferrante | Site autistici.org

Avirt SOHO version 4.3 is susceptible to a remote buffer overflow via a large GET request passed on ports 1080 and 8080.

tags | advisory, remote, overflow
SHA-256 | fa337ad84fab68b63c9aa4c38e16a4ec1e1a58db540216c7ba87a16e222016f1
Avirt40.txt
Posted Feb 23, 2004
Authored by Donato Ferrante | Site autistici.org

Avirt Voice version 4.0 is susceptible to a remote buffer overflow via a large GET request passed on port 1080.

tags | advisory, remote, overflow
SHA-256 | 5243e3bc2e2a8e9bc2c784387ebbc2fe0735347130db3f4e932b123f0c378a19
GateKeeper.c
Posted Feb 23, 2004
Authored by Kralor | Site coromputer.net

GateKeeper Pro 4.7 on the win32 platform has a buffer overflow vulnerability when processing GET requests. Full remote exploit included. Tested against Microsoft Windows 2000 Pro and Microsoft Windows XP.

tags | exploit, remote, overflow
systems | windows
SHA-256 | 22417fdf4aa577d2e8c2e2119dcb08754e7078a4aad8cb318d882381d9f6dd0c
ap-utils-1.4.tar.bz2
Posted Feb 23, 2004
Authored by roma | Site ap-utils.polesye.net

Access Point Utilities for Unix is a set of utilities that configure and monitor a Wireless Access Point under Unix. It is known to compile (with GCC and the IBM C compiler) and run under Linux, FreeBSD, OpenBSD, MacOS X, AIX, and QNX.

Changes: Various bug fixes, feature enhancements, and better documentation.
tags | tool, wireless
systems | linux, unix, freebsd, openbsd, aix, osx
SHA-256 | bc0e8606560421ac048a819458d51837d40ddf66dac82615455a6249ac91535a
sid-0.3.tar.gz
Posted Feb 23, 2004
Authored by belpo | Site sid.sourceforge.net

SID is a Shell Intrusion Detection system. The kernel part plugs into a terminal-processing subsystem and logs hashed terminal lines. The user part reads log entries (hashes), consults a list of allowed entries, and takes appropriate action upon unexpected log entries. Currently supported are Solaris and Linux.

tags | tool, shell, kernel, intrusion detection
systems | linux, unix, solaris
SHA-256 | 36f74d0bee9dcdfbebc2941393ecebf83e11a1b2ddcea7ecb5e037f17db42bde
Page 2 of 8
Back12345Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close