what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 18 of 18 RSS Feed

Files Date: 2004-05-18 to 2004-05-19

advisory_private_key_compromise.html
Posted May 18, 2004
Site bluecoat.com

Blue Coat Security Gateway OS (SGOS) 3.x releases suffer from a private key disclosure vulnerability where the key and passphrase are stored in clear text when being imported via the web-based management console.

tags | advisory, web
SHA-256 | 618fc697e20741645614005f71356499b25ff5da2c4770eaab63019f287b71c3
outlooksilent.txt
Posted May 18, 2004
Authored by http-equiv

Microsoft Outlook 2003 allows for a security zone bypass when an embedded OLE object with a reference to a Windows media file in a Rich Text Format (RTF) message is received.

tags | advisory
systems | windows
SHA-256 | 5bf5bc65e12021c3781270decf58bd776d636f05498f59327d50d8ef47731e58
Secunia Security Advisory 11632
Posted May 18, 2004
Authored by Secunia

Secure Computing has reported multiple denial of service vulnerabilities in their Sidewinder G2 firewall.

tags | advisory, denial of service, vulnerability
SHA-256 | 174e7ee25f3feb9fddbfa8a1396ac9d3eb41c7891c1870711074ce1e244ed73f
HexView Security Advisory 2004-05-03.01
Posted May 18, 2004
Authored by HexView | Site sgi.com

SGI Security Advisory 20040503-01-P - Under certain conditions, rpc.mountd goes into an infinite loop while processing some RPC requests, causing a denial of service. Affected releases: SGI IRIX 6.5.x.

tags | advisory, denial of service
systems | irix
SHA-256 | 60b6fab3dcc07e154a22aa2c18072a5e408070846522782d959a9681d25da497
ActivePerlSystemBOF.txt
Posted May 18, 2004
Authored by Oliver

ActiveState's ActivePerl version 5.8.0 and 5.8.3 on the Win32 platform seems to have a buffer overflow that allows for the crashing of Perl.exe.

tags | advisory, overflow, perl
systems | windows
SHA-256 | cb74262362d1bc8c25961c0aed2a211fdd10c5d0201a54eb37c69c18a3cff6b0
waraxe-2004-SA029.txt
Posted May 18, 2004
Authored by Janek Vind aka waraxe | Site waraxe.us

PHP-Nuke versions 6.x to 7.3 allow for possible file inclusion.

tags | advisory, php, file inclusion
SHA-256 | 4d43d506de22ba54c5b3d72da244b7c2d217bc83ffb12200388c179db7006a74
ieImageMap.txt
Posted May 18, 2004
Authored by Paul Kurczaba | Site kurczaba.com

A vulnerability has been found in Microsoft Internet Explorer that allows an attacker to use a specially coded ImageMap to spoof the URL displayed in the lower, left hand corner of the browser.

tags | advisory, spoof
SHA-256 | 8c3fdeaa071f14ee81765c1b6df9a48ff1f40f432e665e83159d54309433249d
safari12.txt
Posted May 18, 2004
Authored by kang

Safari versions 1.2 and below suffer from a vulnerability that can lead to remote arbitrary code execution via the runscript aspect of the HTML rendering functionality.

tags | advisory, remote, arbitrary, code execution
SHA-256 | 9e44db693ef039ea12ac05b37053e283a17b3e84e0532483b7f21b85bf1753f8
webctxss.txt
Posted May 18, 2004
Authored by spiffomatic64

WebCT is susceptible to cross site scripting vulnerabilities.

tags | advisory, vulnerability, xss
SHA-256 | 773b3e54431153fe94a1a32d6773c83940f16f7a00f8f405d5b7c3f5865313e0
tttc.txt
Posted May 18, 2004
Authored by Kaloyan Olegov Georgiev

TTT-C is susceptible to multiple cross site scripting attacks due to the fact that it does not sanitize variables.

tags | advisory, xss
SHA-256 | c91bdc0933621f5763fcee66756f8fc9671ef644afef3cba1e18de848a62e167
netchat73.txt
Posted May 18, 2004
Authored by Marius Huse Jacobsen

NetChat, an application intended to allow users on the same subnet to chat with one another, is susceptible to a stack-based buffer overflow. Versions 7.3 and below are affected. The overflow allows for arbitrary code execution under the user running the application.

tags | advisory, overflow, arbitrary, code execution
SHA-256 | 0b23d03452960631df48fd8aceeddd1515e1df9580a7a65525607ba2e60e0f00
wgetuhoh.txt
Posted May 18, 2004
Authored by Hugo Vazquez

Wget versions 1.9 and 1.9.1 are susceptible to a symlink attack during a phase where it downloads the file to a temporary filename but does not actually lock the file.

tags | exploit
SHA-256 | 3e19a9e65f1b07c2febfde7d6bffc9cc7a814a75db5421d998b8a9cb89dcc8c5
802.11vuln.txt
Posted May 18, 2004
Site auscert.org.au

AUSCERT Advisory - A vulnerability exists in hardware implementations of the IEEE 802.11 wireless protocol that allows for a trivial but effective attack against the availability of wireless local area network (WLAN) devices.

tags | advisory, local, protocol
SHA-256 | a46c2a37097c474213beefb0ef777f388574dfbff75a232f91c1838edbf91fe4
lhasilly.txt
Posted May 18, 2004
Authored by Lukasz Wojtow

LHA has some additional buffer overflows in the extract_one function.

tags | advisory, overflow
SHA-256 | 5a53496931d36f0f0629ce52c2693ceccacf6032e71a671af6253290e91d1570
mailbomb.pl
Posted May 18, 2004
Authored by Mike Jackson

Mailbomb is a Perl script used to aid system administrators in locking down spam filters.

tags | denial of service, perl
SHA-256 | bd9b327974cf2fc56b8afff647d595772d8002fdff6715b18a99617f665b8b65
kernsh-0.2b-p1.tgz
Posted May 18, 2004
Authored by Kernsh Project | Site kernsh.org

This utility was written to allow for easy access to the kernelspace for testing insertion of modules, accessing miscellaneous kernel information, and allows for an easy test environment.

Changes: Various enhancements and bug fixes.
tags | tool, kernel
systems | unix
SHA-256 | 14b2a36a62e422787d27a7c092ba4f5173809ea1b33331a8a949a7e234f67f46
Aire-1.0-en.zip
Posted May 18, 2004
Authored by Oscar Gallego Sendin | Site robota.net

AIRE is an 802.11 network discovery utility for Microsoft Windows XP. Upon finding a wireless access point, it displays pertinent information (timestamp, ESSID, channel, mode, etc) and has various useful features like a power meter display and other APs within range.

tags | tool, wireless
systems | windows
SHA-256 | 3cda61bb9f2d7d08af278454ecb10065fe45d20e4c2f20c68b87c0fdbd223293
oinkmaster-1.0.tar.gz
Posted May 18, 2004
Authored by Andreas Oestling | Site nitzer.dhs.org

Oinkmaster is simple Perl script released under the BSD license to help update and manage Snort 2.0+ rules and to comment out the unwanted ones after each update. It will report what has changed since the last update, offering good change control.

Changes: Feature enhancements, bug fixes, and many other improvements.
tags | tool, perl, sniffer
systems | bsd
SHA-256 | acd85eeb4b35eecc6aace83f16e870501f129c00ce925eb81da5576ff45a6827
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close