what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 266 RSS Feed

Files Date: 2004-09-01 to 2004-09-30

pinnacleShow151.txt
Posted Sep 21, 2004
Authored by Marc Ruef | Site computec.ch

Pinnacle ShowCenter 1.51 is susceptible to a denial of service attack when sent a GET request that points to a non-existent skin.

tags | advisory, denial of service
SHA-256 | 6a080d6eece24294fe3cc7308971c400eef6bd1eda302eb234157353029917b3
getmailroot.txt
Posted Sep 21, 2004
Authored by David Watson

getmail versions 3.2.5 and version 4 releases prior to 4.2.0 suffer from a symbolic link vulnerability that allows for privilege escalation.

tags | advisory
SHA-256 | 1ede5e8f95847bac68ac6e0bcf37788047f31e767417bebac5e0d47ac997e9d2
lotr3boom.zip
Posted Sep 21, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Remote denial of service exploit for Lords of the Realm III versions 1.01 and below that will crash the server.

tags | exploit, remote, denial of service
SHA-256 | aafd15c0fa22fa3995ac2f2f79ca9462b0147632305366fc1435344c6da002bc
lotr3boom-adv.txt
Posted Sep 21, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Lords of the Realm III versions 1.01 and below suffer from a denial of service attack when an overly long string is supplied as the user's nickname.

tags | advisory, denial of service
SHA-256 | be5e72d76f5affa99a38903610f3e2010c8305664ad5ec80ae808d6916a9e220
Secunia Security Advisory 12593
Posted Sep 21, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - GulfTech Security has discovered two vulnerabilities in YaBB, which can be exploited by malicious people to conduct cross-site scripting attacks and bypass certain security restrictions.

tags | advisory, vulnerability, xss
SHA-256 | 21c35aaf5e83952cbbf93d64407b511e627fd7eba72729464a1401d3d43f0f2e
postnukePath.txt
Posted Sep 21, 2004
Site mantralab.org

Postnuke 0.750 Phoenix is susceptible to multiple full path disclosure flaws.

tags | advisory
SHA-256 | 5de940cb2eb4befc2477653c74b806a79648a9acdc55290c066c338d344ba3f0
57643.html
Posted Sep 21, 2004
Site sunsolve.sun.com

Sun Security Advisory - A buffer overflow vulnerability exists in the Netscape Network Security Services (NSS) library suite that is a security component used by most of the Sun Java Enterprise System (JES) components such as Web Server, App Server and Portal Server. This vulnerability may allow a remote unprivileged user to execute arbitrary code on vulnerable systems during SSLv2 connection negotiation.

tags | advisory, java, remote, web, overflow, arbitrary
SHA-256 | a9f963b9c6343d5bbca49c391be294459d91ead6eb5f1780f867ac46130e35cc
Secunia Security Advisory 12602
Posted Sep 21, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in xine-lib, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 75b98f70d4269127ed3bf1766ee6a39c21723a449ef498d1fc7e8951c8c66f33
ONCommandCCM.txt
Posted Sep 21, 2004
Authored by Jonas Olsson

Four default username/password pairs are present in the Sybase database backend used by ON Command CCM 5.x servers. One of the username/password pairs is publicly available in a knowledgebase article at ON Technology's web site. The database accounts can be used to read and modify all data in the CCM database.

tags | advisory, web
SHA-256 | dfc05a01176771202a8e0449359f5636358366e9a762b44fdb67cb186174f15a
Gentoo Linux Security Advisory 200409-24
Posted Sep 21, 2004
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200409-24 - The foomatic-rip filter in foomatic-filters contains a vulnerability which may allow arbitrary command execution on the print server. Packages below and equal to 3.0.1 are susceptible.

tags | advisory, arbitrary
systems | linux, gentoo
SHA-256 | 55040b913532cf5112f4f0af8c33c868135f54a11521c320ab6406dc899a6184
mambo45.jose.txt
Posted Sep 21, 2004
Authored by Joxean Koret

Mambo versions 4.5 and below are susceptible to cross site scripting and remote command execution flaws.

tags | exploit, remote, xss
SHA-256 | f1adb6277c56b90345f1a0481e0f3f0ec78fce087033de3e0c2aa3b0ec129889
tutos11.txt
Posted Sep 21, 2004
Authored by Joxean Koret

TUTOS 1.1 is susceptible to SQL injection and cross site scripting attacks.

tags | advisory, xss, sql injection
SHA-256 | f129e4fcfb3dcf070e7d8891ee5347a3f9ad30e61a026d6d217fe73f40a01787
GODvsBUSH.gif
Posted Sep 21, 2004

Visual proof that God has possibly deliberately pushed the recent hurricanes in Florida through territories that voted for Bush.

systems | unix
SHA-256 | fa58e9baf908c99700dfb53f74995250ef83df4a37919409d8c4594b5bee6c8d
Secunia Security Advisory 12570
Posted Sep 21, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple unspecified vulnerabilities have been reported in FreeRADIUS, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
SHA-256 | e72f4359f49f5a8ba1bc026952276e8d406f2f44f6f0b75e4fa12b5282a3a176
Clam AntiVirus Toolkit 0.80-rc
Posted Sep 21, 2004
Authored by Tomasz Kojm | Site clamav.net

Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a commandline scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.

Changes: Various fixes and updates.
tags | virus
systems | unix
SHA-256 | 75ab919e6b0624a04b8db5c5ee1895e8db0cccbc43c794d7aa2b2476a1094b4d
fakebust.tgz
Posted Sep 21, 2004
Authored by Michal Zalewski

Fakebust is a simple, open-source, user-friendly, intuitive and very rapid malicious code analyzer that can partly replace and in certain aspects outperform an expensive, strictly controlled sandbox setup.

systems | unix
SHA-256 | 819c715400d0031c57cdcd4ca690905959ddce6857b8c4b80a6dfe213f3e387f
sid-0.3.10.tar.gz
Posted Sep 21, 2004
Authored by belpo | Site sid.sourceforge.net

SID is a Shell Intrusion Detection system. The kernel part plugs into a terminal-processing subsystem and logs hashed terminal lines. The user part reads log entries (hashes), consults a list of allowed entries, and takes appropriate action upon unexpected log entries. Currently supported are Solaris and Linux.

Changes: Various updates.
tags | tool, shell, kernel, intrusion detection
systems | linux, unix, solaris
SHA-256 | 48285b5e0edae31b820b995a90abdf17758a4946dac7060fdb8d9c3e4a2679aa
advisory-05-glFTPd.txt
Posted Sep 21, 2004
Authored by CoKi | Site nosystem.com.ar

The dupescan binary from glFTPd versions 2.00RC3 and below suffers from a stack overflow that can be exploited locally. Full exploit included.

tags | exploit, overflow
SHA-256 | 160289b0841eaee7d277dbda03e49e1139d4b00c48d005bd5958349f4609a988
debian.telnetd.txt
Posted Sep 21, 2004
Authored by Michal Zalewski

The Netkit telnetd implementation shipped with Debian Linux appears to be lacking the AYT vulnerability patch. This exposes the platform to a remote root problem discovered by scut of TESO back in 2001.

tags | advisory, remote, root
systems | linux, debian
advisories | CVE-2001-0554
SHA-256 | b774351baca900b321dda13082fb9c199c217207f04f1f3942bfc7692e1b6978
tcpreplay-2.3.0.tar.gz
Posted Sep 21, 2004
Site sourceforge.net

tcpreplay is a BSD-style licensed tool to replay saved tcpdump files at arbitrary speeds. It provides a variety of features for replaying traffic for both passive sniffer devices as well as inline devices such as routers, firewalls, and the new class of inline IDS's. Many NIDSs fare poorly when looking for attacks on heavily-loaded networks. tcpreplay allows you to recreate real network traffic from a real network for use in testing.

Changes: Now includes Cisco HDLC support and better reporting of DLT types. A fix for an issue in tcpprep files that broke cache file compatibility between big and little-endian systems was also implemented.
tags | tool, arbitrary, intrusion detection
systems | unix, bsd
SHA-256 | 050dd6a8f0eaa2ee9f14437a20270c67a742c313435bda82190fcd7bde932931
sudoedit.txt
Posted Sep 21, 2004
Authored by Angelo Rosiello | Site rosiello.org

Local exploit for sudo version 1.6.8p1 that makes use of a flaw in sudoedit.

tags | exploit, local
SHA-256 | ab1bfd7ddab1b1c6b89d7c8e3bdb7bc786b3bad054180fc0cc417bc68c3ca04f
MySQLguest.txt
Posted Sep 21, 2004
Authored by BliZZard

MySQLguest from AllWebscripts is vulnerable to an HTML injection flaw that is exposed via the entry submitting form due to a lack of proper sanitization.

tags | advisory
SHA-256 | adff55a9298359f4f057edc112d12bbf74c373c97e76c2d43184798b9bc21eec
dns4me.txt
Posted Sep 21, 2004
Site gulftech.org

GulfTech Security Research - DNS4Me version 3.0.0.4 is susceptible to cross site scripting and denial of service vulnerabilities.

tags | advisory, denial of service, vulnerability, xss
SHA-256 | 4d1fd96ce8b157a8c343db0d58f22a30793e5d9cc04af8a7764712643086bfd5
mambo451.txt
Posted Sep 21, 2004
Authored by khoai | Site xfrog.org

Mambo versions 4.5.1 and below are susceptible to a SQL injection vulnerability.

tags | exploit, sql injection
SHA-256 | 4d025889e22337402a892e1c2a8fc928680f8c29a942f1164367af073911141a
airscanner.txt
Posted Sep 21, 2004
Site airscanner.com

Airscanner Mobile Security Advisory - Airscanner Corp. has been able to reverse engineer and post a fix for the CE.Dust virus.

tags | advisory, virus
SHA-256 | dfc04361209fb2f42302f257250840672dab84f49ad9f7075e8b4132dc448d24
Page 3 of 11
Back12345Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close