exploit the possibilities
Showing 26 - 50 of 92 RSS Feed

Files Date: 2004-10-13 to 2004-10-14

Secunia Security Advisory 12769
Posted Oct 13, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue with an unknown impact has been reported in Rippy the Aggregator.

tags | advisory
MD5 | bee13d6f724961bc94f27b123fe27869
Gentoo Linux Security Advisory 200410-6
Posted Oct 13, 2004
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200410-06 - CUPS leaks information about user names and passwords when using remote printing to SMB-shared printers which require authentication.

tags | advisory, remote
systems | linux, gentoo
advisories | CVE-2004-0923
MD5 | edc45efe5f9cedf96b84d882ed243002
intro_to_shellcoding.pdf
Posted Oct 13, 2004
Authored by Michel Blomgren | Site tigerteam.se

Introduction to Shellcode: How to exploit buffer overflows. A very thorough and well written paper on how it all works. A good read for anyone curious and even those who already think they know it all. It includes step by step examples from vulnerability discovery to a finished exploit. The paper focuses on x86 Intel syntax assembly under Linux.

tags | paper, overflow, x86, shellcode
systems | linux
MD5 | fa5e7f3987f29821f0c755d16133b1f4
lithsec.zip
Posted Oct 13, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Remote proof of concept exploit for old games developed by Monolith that are susceptible to a buffer overflow which occurs when an attacker sends a secure Gamespy query followed by at least 68 chars.

tags | exploit, remote, overflow, proof of concept
MD5 | a29ca3fcb7d4f6e8f9a85fa9d979f1a6
oldMonolith.txt
Posted Oct 13, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Some old games developed by Monolith, such as Alien versus Predator 2 versions 1.0.9.6 and below, Blood 2 versions 2.1 and below, No one lives forever 1.004 and below, etc, all suffer from a classical buffer-overflow which happens when an attacker sends a secure Gamespy query followed by at least 68 chars.

tags | advisory, overflow
MD5 | 5b420b5726ce75a01fb81218e7d38570
openaanval-1.52-stable.tar.gz
Posted Oct 13, 2004
Site aanval.com

OpenAanval is an open-source web based Snort intrusion detection console. Currently supporting Snort and syslog, OpenAanval provides dynamic monitoring, comprehensive reporting and powerful alerting capabilities. OpenAanval supports multiple sensors of multiple intrusion detection system types. OpenAanval's web-browser interface provides live auto-updating technology which provides real time event viewing from any Internet connected web-browser.

Changes: New 1.52 features include database auto-archiving, ICMP and port scanning module, RALPH (Remote Assessment Logically Programmed Humanoid), Community Module, many bug fixes and more.
tags | tool, web, sniffer
MD5 | 8865637e7c072e36ee76a36c289d2e42
cannonicalization.txt
Posted Oct 13, 2004

Microsoft is currently investigating a reported vulnerability in Microsoft ASP.NET. An attacker can send specially crafted requests to the server and view secured content without providing the proper credentials. This reported vulnerability exists in ASP.NET and does not affect ASP.

tags | advisory, asp
MD5 | 9a18dcdda0f1c08ba532d3ab35bc4c6f
flashmsg.zip
Posted Oct 13, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Remote proof of concept exploit that demonstrates a denial of service attack against Flash Messaging versions 5.2.0g and below.

tags | exploit, remote, denial of service, proof of concept
MD5 | c2afd2aa414330b3e82bae1e1872fc0a
flash520g.txt
Posted Oct 13, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Flash Messaging versions 5.2.0g and below suffer from a denial of service attack.

tags | advisory, denial of service
MD5 | b1ae4a74fda8952a53be248438a9bc6d
iDEFENSE Security Advisory 2004-10-07.t
Posted Oct 13, 2004
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 10.07.04 - Remote exploitation of a denial of service (DoS) vulnerability in RealNetworks, Inc.'s Helix Server could allow an attacker to restart and potentially disable the server.

tags | advisory, remote, denial of service
advisories | CVE-2004-0774
MD5 | 8a58c9e128ee2f4026ca041f5322070c
Gentoo Linux Security Advisory 200410-5
Posted Oct 13, 2004
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200410-05 - Cyrus-SASL contains two vulnerabilities that might allow an attacker to completely compromise the vulnerable system.

tags | advisory, vulnerability
systems | linux, gentoo
advisories | CVE-2004-0884
MD5 | acf0142f3ed0d9b045ef069c5cc93104
IEaperture.txt
Posted Oct 13, 2004
Authored by Georgi Guninski | Site guninski.com

Georgi Guninski security advisory #71 - By opening html in IE it is possible to read at least well formed xml from arbitrary servers. The info then may be transmitted.

tags | advisory, arbitrary
MD5 | 07a3e977e24d41f26534d346ec4cb3f7
MSwordExploitable.txt
Posted Oct 13, 2004
Authored by HexView | Site hexview.com

Microsoft Word is susceptible to having an exception triggered due to a lack of sufficient data validation when winword.exe parses a document file. Two types of exceptions can be triggered, with the second being possibly exploitable.

tags | advisory
MD5 | cbd11131090e3133d081b6ca58e80bcd
wordpress12split.txt
Posted Oct 13, 2004
Authored by Chaotic Evil

WordPress 1.2 is susceptible to HTTP Response splitting flaws.

tags | advisory, web
MD5 | 4bdddc7a077f00a5d3ffa96c634f94d3
gosecure-2004-10.txt
Posted Oct 13, 2004
Authored by Jian Hui Wang | Site gosecure.ca

When a valid user tries to authenticate via the Neoteris Instant Virtual Extranet VPN solution and the password is expired, the user will be asked to change their password and be directly forwarded to the changepassword.cgi without asking for any form of authentication.

tags | advisory, cgi
MD5 | 250625c5ada7141a5e993ab9cfd77b3d
tridcomm13.txt
Posted Oct 13, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Tridcomm versions 1.3 and below suffer from both upload and download directory traversal attacks. Exploitation provided.

tags | exploit
MD5 | 83aeadcfca11fcc4b9de8a470b52d26c
10.06.04a.txt
Posted Oct 13, 2004
Site idefense.com

iDEFENSE Security Advisory 10.06.04a - Remote exploitation of an input validation error in MySQL MaxDB could allow attackers to trigger a denial of service condition.

tags | advisory, remote, denial of service
advisories | CVE-2004-0931
MD5 | 90aa1795266744d2932d325d7ad513fa
cubecart201.txt
Posted Oct 13, 2004
Authored by cybercide

CubeCart 2.0.1 is susceptible to full path disclosure and SQL injection attacks.

tags | advisory, sql injection
MD5 | dcbf15b005fb06c0b879af267e238d9b
maxpatrolDCP.txt
Posted Oct 13, 2004
Site maxpatrol.com

Multiple vulnerabilities were found in DCP-Portal. A remote user can conduct cross-site scripting attacks and HTTP response splitting attacks.

tags | advisory, remote, web, vulnerability, xss
MD5 | 22f372064e7263b17e979264f59dc3d9
57600.html
Posted Oct 13, 2004
Site sunsolve.sun.com

Sun Security Advisory - If a local unprivileged user executes the gzip(1) command and specifies the -force or -f command line option, files which are hard linked to the target file(s) will have their permissions changed. This could allow other local unprivileged users the ability to read or modify files owned by the invoking user, or system files if gzip(1) is issued by a local privileged user.

tags | advisory, local
MD5 | eb866a50ffaee2a84f8a48095049a924
dsa-559.txt
Posted Oct 13, 2004
Site debian.org

Debian Security Advisory DSA 559-1 - Stefan Nordhausen has identified a local security hole in net-acct, a user-mode IP accounting daemon. Old and redundant code from some time way back in the past created a temporary file in an insecure fashion.

tags | advisory, local
systems | linux, debian
advisories | CVE-2004-0851
MD5 | 967fc681eff45d4be117c7d5f323cc64
Secunia Security Advisory 12733
Posted Oct 13, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in DB2 Universal Database, where some of the vulnerabilities can be exploited to compromise a vulnerable system.

tags | advisory, vulnerability
MD5 | b4459d2fa1c077f9bd063bdca2bc4adb
blackboard.txt
Posted Oct 13, 2004
Authored by Cracklove | Site ProxySky.com

BlackBoard version 1.5.1 is susceptible to full path disclosure and remote executable code inclusion.

tags | exploit, remote
MD5 | 65e781fc819bc6cf64300ef109e3b604
codecon40.txt
Posted Oct 13, 2004
Site codecon.org

Call for Papers for CodeCon 4.0 in San Francisco February 11-13, 2005. All presentations must include working demonstrations, ideally accompanied by source code. Presenters must be done by one of the active developers of the code in question. We emphasize that demonstrations be of working code.

tags | paper, conference
MD5 | bee93578a8042b5c6df309f66e297b02
Secunia Security Advisory 12736
Posted Oct 13, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gary Smith has reported a vulnerability in CUPS, which can be exploited by malicious, local users to gain knowledge of sensitive information. The problem is that user credentials are stored in the error_log log file when printing to a shared printer via Samba.

tags | advisory, local
MD5 | 9206586a652631128d497a2a565f4d93
Page 2 of 4
Back1234Next

File Archive:

September 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    20 Files
  • 2
    Sep 2nd
    15 Files
  • 3
    Sep 3rd
    15 Files
  • 4
    Sep 4th
    4 Files
  • 5
    Sep 5th
    1 Files
  • 6
    Sep 6th
    1 Files
  • 7
    Sep 7th
    15 Files
  • 8
    Sep 8th
    27 Files
  • 9
    Sep 9th
    7 Files
  • 10
    Sep 10th
    16 Files
  • 11
    Sep 11th
    9 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    25 Files
  • 15
    Sep 15th
    15 Files
  • 16
    Sep 16th
    15 Files
  • 17
    Sep 17th
    15 Files
  • 18
    Sep 18th
    12 Files
  • 19
    Sep 19th
    1 Files
  • 20
    Sep 20th
    1 Files
  • 21
    Sep 21st
    15 Files
  • 22
    Sep 22nd
    21 Files
  • 23
    Sep 23rd
    7 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close