what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 216 RSS Feed

Files Date: 2004-07-01 to 2004-07-31

Secunia Security Advisory 12103
Posted Jul 19, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - PlaySMS SMS Gateway 0.x is susceptible to SQL and Command Injection vulnerabilities due to a lack of input validation.

tags | advisory, vulnerability
SHA-256 | 1cc264e0e4b8a2944a006a41120b90825709572680c28c278ad9eba146e8bd73
57598.html
Posted Jul 19, 2004
Site sunsolve.sun.com

Sun Security Advisory - The Solaris Volume Manager (SVM) under Solaris 9 is susceptible to a local denial of service attack.

tags | advisory, denial of service, local
systems | solaris
SHA-256 | a8c6ebdaba6f938c0c8029a833bd13a7c8121c64368b4de0fc723ba27981be5a
phpbbxssSplit.txt
Posted Jul 19, 2004
Authored by Ory Segal | Site SanctumInc.com

PHPBB version 2.0.x is susceptible to an HTTP response splitting vulnerability and also a cross site scripting flaw.

tags | advisory, web, xss
SHA-256 | 9bd2d0b59a945ad92ce18125125d0ac88e7d1a7638e8a47859f05b04619bb36a
tinyca-0.6.4.tar.gz
Posted Jul 19, 2004
Authored by Stephan Martin | Site tinyca.sm-zone.net

TinyCA is a simple GUI written in Perl-Gtk to manage a small certification authority. It works as a frontend to OpenSSL. TinyCA lets you manage x509 certificates. It is possible to export data in PEM or DER format for use with servers, as PKCS#12 for use with clients, or as S/MIME certificates for use with email programs. It is also possible to import your own PKCS#10 requests and generate certificates from them. It also lets you create and manage SubCAs for more complex setups. The most important certificate extensions can be configured with the graphical frontend. English and German translations are included.

Changes: Bug fix release.
tags | perl, encryption
SHA-256 | 01abb155db1e0a3a7a2b3a3cb9678d54dd11f5399475445f0e61e18a0cdf1a19
gsasl-0.1.2.tar.gz
Posted Jul 19, 2004
Authored by Simon Josefsson

GNU SASL is an implementation of the Simple Authentication and Security Layer framework and a few common SASL mechanisms. SASL is used by network servers such as IMAP and SMTP to request authentication from clients, and in clients to authenticate against servers. The library includes support for the SASL framework (with authentication functions and application data privacy and integrity functions) and at least partial support for the CRAM-MD5, EXTERNAL, GSSAPI, ANONYMOUS, PLAIN, SECURID, DIGEST-MD5, LOGIN, NTLM, and KERBEROS_V5 mechanisms.

Changes: Updated various bits of code.
tags | imap, library
SHA-256 | a9be25513f4bdec9d3c5e27dc95c4794f1cf93cf312a44b60c8a39dba86c2538
Secunia Security Advisory 12092
Posted Jul 19, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Cengiz Aykanat has reported two vulnerabilities in eTrust Common Services, allowing malicious people to cause a Denial of Service.

tags | advisory, denial of service, vulnerability
SHA-256 | 2894708288caaaf6e3b2120fdc52945843409c7496057f455f34da77d567a6d7
waraxe-2004-SA036.txt
Posted Jul 18, 2004
Authored by Janek Vind aka waraxe | Site waraxe.us

The third advisory in a three part series discussing more flaws in PHP Nuke ranging from full patch disclosure and cross site scripting to SQL injection attacks.

tags | exploit, php, xss, sql injection
SHA-256 | 09c091f1f233ed1902d0aa74ac5da411fb080ada57495aec27ef66ae17793c0f
expnbrute.c
Posted Jul 18, 2004
Authored by CoKi | Site nosystem.com.ar

Utility that attempts to find whether or not users exist on an SMTP server using the EXPN command against a list of user names.

SHA-256 | 73346010d346ef624f1a57c55f0aaafd2fb9476ea1e7678b6e797981f5d167fb
log_clean.c
Posted Jul 18, 2004
Authored by CoKi | Site nosystem.com.ar

Tool for cleaning WTMP, UTMP, and lastlog under Linux.

tags | tool, rootkit
systems | linux, unix
SHA-256 | 59aa2101b05225dd0eb7e7b456eb26357540723e3c1d8a10deca83e9715a10fb
sharex.c
Posted Jul 18, 2004
Authored by Adam Simuntis aka n30n | Site n30n.byte-lab.com

Sharutils 4.2.1 local root exploit. Note: shar is NOT setuid by default, so this exploit is completely proof of concept if for some reason the binary was setuid.

tags | exploit, local, root, proof of concept
SHA-256 | edd1020fd999d8177e094173be570e3a68f63ad358f7757f48ef91abc923b842
advisory-11.txt
Posted Jul 18, 2004
Authored by DarkBicho | Site darkbicho.tk

CuteNews version 1.3.x suffers from an HTML injection flaw in the commentary section.

tags | advisory
SHA-256 | 1bed2be3a7e3553d352ea8e88aeacbb7a7dc51caa12eba604305e417a1450da1
advisory-09.txt
Posted Jul 18, 2004
Authored by DarkBicho

Outblaze email suffers from a cross site scripting flaw.

tags | advisory, xss
SHA-256 | 2e3fb75d7c154d7b6b50aaad88ab9ae8b9d1380f03794f14958361957ee8087c
pam_rootkit.tar.gz
Posted Jul 17, 2004
Authored by GML

This pam backdoor allows access to a machine using a backdoor password and arbitrary commands can also be executed without logging in. Logs normal users passwords to a log file. Configurable without recompilation.

tags | tool, arbitrary, rootkit
systems | unix
SHA-256 | 7f794ba5e8bc118b85ff262f027ec88781fe67d05316514d8796bbbf098b9f09
glFlow-0.0.3.tar.gz
Posted Jul 17, 2004
Authored by Vlad GALU | Site night.rdslink.ro

glFlow is a pcap-based traffic analysis tool intended for monitoring high speed links. The detection algorithm is based on realtime NetFlow traffic aggregation and analysis. The code is portable across platforms, it should work on every system with working md4/md5 and pcap implementations, with very little modifications.

Changes: Added support for fragmented flood detection, using a little hack.
systems | cisco
SHA-256 | 04f57658bd93580beb4d38f158a69fd06e543e8d2d095e6403fe5360cd7d6a12
mohaabof.zip
Posted Jul 17, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Remote test code that verifies buffer overflows in the Medal of Honor games including Allied Assault version 1.11v9 and below, Breakthrough version 2.40b and below, and Spearhead version 2.15 and below.

tags | exploit, remote, overflow
SHA-256 | d9dedeac1cdba39e43966b1bd9cafc503a11804078a6604f32a375fcd32513a2
mohBufferOverflow.txt
Posted Jul 17, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Medal of Honor games, such as Allied Assault version 1.11v9 and below, Breakthrough version 2.40b and below, and Spearhead version 2.15 and below, all suffer from buffer overflows server-side.

tags | advisory, overflow
SHA-256 | 26138defb44c5ccd5bca6847f51453afed6f2ae54af0f0e5fde0b3aba6ceaf32
utilmaned2.c
Posted Jul 17, 2004
Authored by Kralor

Local elevation of privileges exploit for the Microsoft Windows 2000 Utility Manager vulnerability. Updated version that can be executed via simple cmd.exe shells using a normal user account. Gives a shell with SYSTEM privileges.

tags | exploit, shell, local
systems | windows
advisories | CVE-2004-0213
SHA-256 | 075b9e7810c1d745ad80808bae307f18bd645d2e8f49f32f7a9315895c6f6671
utilmaned1.c
Posted Jul 17, 2004
Authored by Kralor

Local elevation of privileges exploit for the Microsoft Windows 2000 Utility Manager vulnerability. Gives a shell with SYSTEM privileges.

tags | exploit, shell, local
systems | windows
advisories | CVE-2004-0213
SHA-256 | 6b4c09c3bcb0f4713a12fc777f2245169344041b7020220a150fb035f8202c0f
webstoreExec.txt
Posted Jul 17, 2004
Authored by Zero-X | Site Lobnan.de

Web_Store.cgi allows for remote command execution due to a lack of variable sanitization.

tags | exploit, remote, cgi
SHA-256 | a77628094a6127c5e36615486c6060183b4949cad68e0d36d30f9e53dae43249
ollyDbg110.txt
Posted Jul 17, 2004
Authored by Ned | Site felinemenace.org

A format string bug exists in the code that handle the Debugger Messages for OllyDbg version 1.10.

tags | advisory
SHA-256 | ea3b234c64fa58685fccf9e73ab76034b66c1ae43da07c0540c4599cf53cbb37
methodCache.txt
Posted Jul 17, 2004
Authored by Paul From Greyhats | Site greyhats.cjb.net

Microsoft Internet Explorer gives too much trust to the location variant when it comes to method cache.

tags | advisory
SHA-256 | dfcc5befe5b4cbb0775285dc6081d07b23ee805c7630f7a4a7e2a864aef1038d
hsh-gen.tar.gz
Posted Jul 16, 2004
Authored by nummish | Site 0x90.org

hsh-gen is a script used to create shell wrappers to assist in exploitation of remote execution via directory traversal attacks on cgi scripts.

tags | remote, shell, cgi
systems | unix
SHA-256 | 90c94617f5e3747041709613c0f8ebf5b34dc46ec64896e221aa3e60980ce0f9
modsslFormat.txt
Posted Jul 16, 2004
Authored by virulent | Site virulent.siyahsapka.org

mod_ssl 2.8.18 for Apache 1.3.31 suffers from a format string vulnerability.

tags | advisory
SHA-256 | 6bc74708efb719f3dd166615a2295857ff80b86322f5e777eacbf97f0e3496e4
Tenshi Log Monitoring Program
Posted Jul 16, 2004
Authored by Andrea Barisani | Site dev.inversepath.com

Tenshi is a log monitoring program, designed to watch a log file for lines matching user defined regular expression and report on the matches. The regular expressions are assigned to queues which have an alert interval and a list of mail recipients. Queues can be set to send a notification as soon as there is a log line assigned to it, or to send periodic reports.

Changes: Changed name from wasabi due to trademark issues, added skip groups to speed parsing, added cron-style specs instead of time periods, added logprefix option for non-syslog logs, see the Changelog for full details.
tags | system logging
systems | unix
SHA-256 | bc7a7e134c35bd3aea3c6fe92c3d44b6cc0d62f964345f46925b5d30825f780a
waraxe-2004-SA035.txt
Posted Jul 16, 2004
Authored by Janek Vind aka waraxe | Site waraxe.us

PHP Nuke versions 6.x through 7.3 suffer from cross site scripting and SQL injection flaws.

tags | exploit, php, xss, sql injection
SHA-256 | 70f19d1381815ef51a0a74bdb7a4451ff7d7ed90c0e356680bec2079856ee621
Page 4 of 9
Back23456Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close