exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 194 RSS Feed

Files Date: 2004-02-01 to 2004-02-29

isec-0014-mremap-unmap.txt
Posted Feb 18, 2004
Authored by Paul Starzetz | Site isec.pl

A critical security vulnerability has been found in the Linux kernel memory management code inside the mremap(2) system call due to missing function return value check. This bug is completely unrelated to the mremap bug disclosed on 05-01-2004 except concerning the same internal kernel function code. Versions affected: 2.2 up to 2.2.25, 2.4 up to 2.4.24, 2.6 up to 2.6.2.

tags | advisory, kernel
systems | linux
advisories | CVE-2004-0077
SHA-256 | 15e57e93f04e6f6e219e6d6e4da2f41a33f772b68029df65fa0dcaf3e0bde0a7
ZH2004-08SA.txt
Posted Feb 18, 2004
Authored by G00db0y | Site zone-h.org

OWLS version 1.0 allows for remote file retrieval via directory traversal attacks.

tags | exploit, remote
SHA-256 | 13843490796feb811f362b4296313ee648e9ac12354d4bc7831e144c1b2970a5
Adv-20040216.txt
Posted Feb 18, 2004
Authored by Nick Gudov | Site s-quadra.com

S-Quadra Advisory #2004-02-16 - EarlyImpact ProductCart shopping cart software incorrectly makes use of cryptography, is susceptible to a cross site scripting attack, and allows for SQL injection attacks as well.

tags | exploit, xss, sql injection
SHA-256 | 3330d8b93aad8afb29f6c2680fb973686c8aec2837cc6efd89d60eb6b3d896ca
ZH2004-07SA.txt
Posted Feb 18, 2004
Authored by G00db0y | Site zone-h.org

In the Online Store Kit 3.0 Products, problems exist where user-supplied data is not properly sanitized, allowing for a remote attacker to influence SQL queries and gain sensitive information.

tags | exploit, remote
SHA-256 | 91655534097ed426223b3cbc07ebef79a74c042776ee4f6fd5ddc69f2150cfa5
smallFTPd.txt
Posted Feb 18, 2004
Authored by intuit | Site rootshells.tk

Smallftpd version 1.0.3 crashes when an attempted directory traversal occurs.

tags | advisory
SHA-256 | 8b1b388ec05b9893cdb5d7f90a34b8907effe5a85849dd156f134277faecfab8
cesarFTP099.txt
Posted Feb 18, 2004
Authored by intuit | Site rootshells.tk

CesarFTP version 0.99e has a bug that can cause the system to employ 100 percent of its resources.

tags | advisory
SHA-256 | 4b04ba38e82870ad4792db56db6b431739ed950e806c67c5781759b3db7a7eac
linksysSNMP.txt
Posted Feb 18, 2004
Authored by NN Poster

The Linksys WAP55AG does not properly secure SNMP community strings.

tags | advisory
SHA-256 | eed2646ff388cc27ab5bf280bec121467db92fd7e214aff558d444761f0aeb7e
vizer191.txt
Posted Feb 18, 2004
Authored by Donato Ferrante | Site autistici.org

Vizer webserver version 1.9.1 is susceptible to a denial of service attack due to mismanaging input strings for HTTP requests.

tags | advisory, web, denial of service
SHA-256 | 534c5ea7ecea03af87dd45347a8ba886262115cbd03e67aabb72552920180ebc
iDEFENSE Security Advisory 2004-02-17.t
Posted Feb 18, 2004
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 02.17.04: Ipswitch IMail server has a remote buffer overflow vulnerability in its LDAP daemon.

tags | advisory, remote, overflow
SHA-256 | 3cae4adb7fac1829d2ebdcc934459c7a422d022d2b936559ef07eef31176444b
brokerFTP.txt
Posted Feb 18, 2004
Authored by Aviram Jenik | Site securiteam.com

Two security vulnerabilities in Broker FTP server version 6.1.0.0 cause the server to crash and utilize 100 percent of the systems CPU cycles.

tags | exploit, vulnerability
SHA-256 | 468c4ebd2f2d3bba08b987b1bfbe71803d631e237f34b3603b7a4170a7b0d3ac
yabb.infoleak.txt
Posted Feb 17, 2004
Authored by David Cantrell

YaBB version 1, SP 1.3.1, leaks whether or not a username is valid when an invalid password is given.

tags | advisory
SHA-256 | 0d70bafba0a639f6722836028ca2dd30287e6dee65c61d566fe251cf6a21f9ef
ZH2004-06SA.txt
Posted Feb 17, 2004
Authored by G00db0y | Site zone-h.org

ShopCartCGI version 2.3 has multiple directory traversal vulnerabilities that allow for remote attackers to gain access to files outside of the webroot.

tags | exploit, remote, vulnerability
SHA-256 | 3eeebaf9d2b5e316af46dacc9f5e43e3514a13a208d6dd32174dafe0c219bc6d
rsync_local.c
Posted Feb 17, 2004
Authored by abhisek

Local exploit for rsync 2.5.7 and below. Note: This exploit only escalates privileges if rsync is setuid, which it is not by default.

tags | exploit, local
SHA-256 | 270bdea5748826ce67adcc4b529f6cd1b686e05b8b2e8c44d1da806d67bad852
sp-advisory-x10.txt
Posted Feb 17, 2004
Authored by Badpack3t | Site security-protocols.com

A specifically crafted HTTP GET request which contains over 4096 bytes of data will cause the KarjaSoft Sami HTTP server to crash. Versions affected: 1.0.4, possibly earlier versions as well.

tags | exploit, web
SHA-256 | dc2928c9421bbb30e94ea02193251f37fba7827280f552f237e486db9b59936f
yabbSE2.txt
Posted Feb 17, 2004
Authored by BaCkSpAcE

YaBB SE versions 1.54 and 1.55 are susceptible to a SQL injection vulnerability that allows a remote attacker to execute malicious SQL statements on the database remotely.

tags | advisory, remote, sql injection
SHA-256 | 0cb034ef99caa617751564217c86b7aa293f12c1a2e323fbaed9a9eb14a1dc80
symantecAV.txt
Posted Feb 16, 2004
Authored by Dr. Peter Bieringer

The Symantec AntiVirus Scan Engine for Linux has a possible race condition via a symlink attack in /tmp.

tags | advisory
systems | linux
SHA-256 | 7603b97a86063ada3a6bbaacd9422e0f4212735f47d6515ab0e95f25df4ccb24
purge.txt
Posted Feb 16, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Purge versions 1.4.7 and below and Purge Jihad versions 2.0.1 and below have buffer overflows affecting the clients of this game.

tags | advisory, overflow
SHA-256 | 15e5bb82dec8ce18853366f6292961f01558fc059766481005b37354d2bce4c1
apc_9606_backdoor.txt
Posted Feb 16, 2004
Authored by Dave Tarbatt | Site null.sniffing.net

APC SmartSwitch and UPS products use an HTTP/SNMP management card that have backdoor passwords in them. Tested vulnerable: SmartUPS 3000RM with AP9606 AOS v3.2.1 and SmartUPS App v3.2.6, MasterSwitch AP9212 with AP9606 AOS v3.0.3 and MasterSwitch App v2.2.0.

tags | exploit, web
SHA-256 | 0989efe070b1c7429abb7289c478d608124cb94c6c330d1264d2dceb29eed5c1
symantec200.txt
Posted Feb 16, 2004
Authored by Davide Del Vecchio

Symantec FireWall/VPN Appliance model 200 displays its administrator password in clear text over a non-encrypted HTTP connection.

tags | advisory, web
SHA-256 | b60c9e590eaa9d4ec34b544ec3abe50cb8ee3a2396f0de5957d82e91035594c6
bypassEPA.pdf
Posted Feb 16, 2004
Authored by Edgar Barbosa

Article discussing how to bypass the Execution Path Analysis used by the PatchFinder utility, avoiding Windows 2k/XP rootkit detection.

tags | paper
systems | windows
SHA-256 | 14e0edbdd6c06f755e37931cb678585ac4cd55bdded8a3390268cbcfab74c574
LynX-adv4_SignatureDB.txt
Posted Feb 16, 2004
Authored by LyNx

SignatureDB is vulnerable to a denial of service attack due to a buffer overflow in a sprintf statement.

tags | advisory, denial of service, overflow
SHA-256 | 63a06ca66a5273103422bc7ed4658d21d246ba1116ba9a6e1d2549646f4199ca
mnoGoSearch0215.txt
Posted Feb 16, 2004
Authored by Frank Denis

mnoGoSearch versions 3.2.13-15 are vulnerable to a buffer overflow attack when a large document is indexed.

tags | advisory, overflow
SHA-256 | b81572f8e5896c50b3258ba30d2a396e68c049ce518ef8b86832bea9d0ef61b5
robotFTP.txt
Posted Feb 16, 2004
Authored by gsicht

Robot FTP server versions 1.0 and 2.0 beta 1 have a buffer overflow vulnerability when taking in a username.

tags | exploit, overflow
SHA-256 | 9a44aad3f8e6c0db56451fda95fc12fc8be929e688de14d3ff9a4383aea86d72
nast-0.2.0.tgz
Posted Feb 16, 2004
Authored by embyte | Site nast.berlios.de

Nast is a packet sniffer and a LAN analyzer based on Libnet and Libpcap. It can sniff the packets on a network interface in normal mode or in promiscuous mode. It dumps the headers of packets and the payload in ASCII or ASCII-hex format. Various packet filters can be applied. The data sniffed can be saved in a separate file. As an analysis tool, it can check for other NICs on the network which are set in promiscuous mode, build a list of all hosts on a LAN, find a gateway, perform port scanning on a multiple hosts, catch daemon banners, follow the TCP data stream, reset a connection, and determine whether a link type is a hub or switch.

tags | tool, sniffer, tcp
SHA-256 | 1048095464c0f77f6432331c0e4787957c52a7ce02085b02992f15bd05b363c6
promisc20030313.tar.gz
Posted Feb 14, 2004
Authored by binary man | Site psycho-hazard.net

Promisc is a sniffer based on the AF_PACKET domain socket. It parses the IP, TCP, UDP, ICMP, and ARP protocols. A GTK graphical user interface has been written in order to simplify its use.

Changes: Various updates.
tags | tool, udp, sniffer, tcp, protocol
SHA-256 | ed79dc60cea7250553b77c1ec7879dad9430b521def130b6e9815e8631d1c1b6
Page 4 of 8
Back23456Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close