exploit the possibilities
Showing 26 - 50 of 92 RSS Feed

Files Date: 2004-10-13 to 2004-10-14

Secunia Security Advisory 12769
Posted Oct 13, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue with an unknown impact has been reported in Rippy the Aggregator.

tags | advisory
SHA-256 | a431b38a5975c21c1852e2c23c96d44259e4fd28b495b909d9fca551447efc8e
Gentoo Linux Security Advisory 200410-6
Posted Oct 13, 2004
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200410-06 - CUPS leaks information about user names and passwords when using remote printing to SMB-shared printers which require authentication.

tags | advisory, remote
systems | linux, gentoo
advisories | CVE-2004-0923
SHA-256 | 51d680d5f4ffa9f890d9be25b843c0fa3bc78813567885a9feec526bb203fe6b
intro_to_shellcoding.pdf
Posted Oct 13, 2004
Authored by Michel Blomgren | Site tigerteam.se

Introduction to Shellcode: How to exploit buffer overflows. A very thorough and well written paper on how it all works. A good read for anyone curious and even those who already think they know it all. It includes step by step examples from vulnerability discovery to a finished exploit. The paper focuses on x86 Intel syntax assembly under Linux.

tags | paper, overflow, x86, shellcode
systems | linux
SHA-256 | 1929d512b64ef4d90495bb2026a18ce18306161bf9fb0cda06032dfadf958381
lithsec.zip
Posted Oct 13, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Remote proof of concept exploit for old games developed by Monolith that are susceptible to a buffer overflow which occurs when an attacker sends a secure Gamespy query followed by at least 68 chars.

tags | exploit, remote, overflow, proof of concept
SHA-256 | 1564b9fcc32a8411d7e8d4aabe4cf7f7d1e6b8381aae6436c4d3f2ca1ae02b3f
oldMonolith.txt
Posted Oct 13, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Some old games developed by Monolith, such as Alien versus Predator 2 versions 1.0.9.6 and below, Blood 2 versions 2.1 and below, No one lives forever 1.004 and below, etc, all suffer from a classical buffer-overflow which happens when an attacker sends a secure Gamespy query followed by at least 68 chars.

tags | advisory, overflow
SHA-256 | a54a0157d5ee61372713cee3b2bb568e919a7cf059e8b38d062c52781c169736
openaanval-1.52-stable.tar.gz
Posted Oct 13, 2004
Site aanval.com

OpenAanval is an open-source web based Snort intrusion detection console. Currently supporting Snort and syslog, OpenAanval provides dynamic monitoring, comprehensive reporting and powerful alerting capabilities. OpenAanval supports multiple sensors of multiple intrusion detection system types. OpenAanval's web-browser interface provides live auto-updating technology which provides real time event viewing from any Internet connected web-browser.

Changes: New 1.52 features include database auto-archiving, ICMP and port scanning module, RALPH (Remote Assessment Logically Programmed Humanoid), Community Module, many bug fixes and more.
tags | tool, web, sniffer
SHA-256 | f4b7fec0c8497ee77587eb5499c23917d90a41b5e63e37a2cfc6f69da6af68c1
cannonicalization.txt
Posted Oct 13, 2004

Microsoft is currently investigating a reported vulnerability in Microsoft ASP.NET. An attacker can send specially crafted requests to the server and view secured content without providing the proper credentials. This reported vulnerability exists in ASP.NET and does not affect ASP.

tags | advisory, asp
SHA-256 | 5edfd7fddd7a4296dc93cf59e7345dc1f4840e6d75e19ee989f98acdea216cda
flashmsg.zip
Posted Oct 13, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Remote proof of concept exploit that demonstrates a denial of service attack against Flash Messaging versions 5.2.0g and below.

tags | exploit, remote, denial of service, proof of concept
SHA-256 | deac1c5c870894470d0a9b00b2b28a976adcd9fdb07a17000f9fefee88fc18aa
flash520g.txt
Posted Oct 13, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Flash Messaging versions 5.2.0g and below suffer from a denial of service attack.

tags | advisory, denial of service
SHA-256 | 0eb6ef79cfb1dee376a503cca7cd8ed98130da6ff32cd7f07e3e1834f9463276
iDEFENSE Security Advisory 2004-10-07.t
Posted Oct 13, 2004
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 10.07.04 - Remote exploitation of a denial of service (DoS) vulnerability in RealNetworks, Inc.'s Helix Server could allow an attacker to restart and potentially disable the server.

tags | advisory, remote, denial of service
advisories | CVE-2004-0774
SHA-256 | d8f3f5f63100ad4fd01415feef4496eba6ccb4ed1c572261d51c038c3e3cfba6
Gentoo Linux Security Advisory 200410-5
Posted Oct 13, 2004
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200410-05 - Cyrus-SASL contains two vulnerabilities that might allow an attacker to completely compromise the vulnerable system.

tags | advisory, vulnerability
systems | linux, gentoo
advisories | CVE-2004-0884
SHA-256 | 5ba337b1e28e743843f56389236966ffc54ed2ace62f30a576b2a31086385623
IEaperture.txt
Posted Oct 13, 2004
Authored by Georgi Guninski | Site guninski.com

Georgi Guninski security advisory #71 - By opening html in IE it is possible to read at least well formed xml from arbitrary servers. The info then may be transmitted.

tags | advisory, arbitrary
SHA-256 | e156bc37f51fe57421af3618c35923d4d1555d62766229c4eb0d0edca13f7471
MSwordExploitable.txt
Posted Oct 13, 2004
Authored by HexView | Site hexview.com

Microsoft Word is susceptible to having an exception triggered due to a lack of sufficient data validation when winword.exe parses a document file. Two types of exceptions can be triggered, with the second being possibly exploitable.

tags | advisory
SHA-256 | cdc21ddeff9714cf7e828e939a3991db70d3d59f034e5e36ca4d6c5e9788b886
wordpress12split.txt
Posted Oct 13, 2004
Authored by Chaotic Evil

WordPress 1.2 is susceptible to HTTP Response splitting flaws.

tags | advisory, web
SHA-256 | 740f60574af27e0015c01b1575dadd587cfa403b1a55afaad48978111d3b93a2
gosecure-2004-10.txt
Posted Oct 13, 2004
Authored by Jian Hui Wang | Site gosecure.ca

When a valid user tries to authenticate via the Neoteris Instant Virtual Extranet VPN solution and the password is expired, the user will be asked to change their password and be directly forwarded to the changepassword.cgi without asking for any form of authentication.

tags | advisory, cgi
SHA-256 | 9d6bd69e3a83d7032a8b00df8ff0d7a16f105485d603eaa8ed60656a80d2cdba
tridcomm13.txt
Posted Oct 13, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Tridcomm versions 1.3 and below suffer from both upload and download directory traversal attacks. Exploitation provided.

tags | exploit
SHA-256 | d6075947f6d2f00eada4015d79b88b40e7a9cfc943c169bd23a5272cecb42300
10.06.04a.txt
Posted Oct 13, 2004
Site idefense.com

iDEFENSE Security Advisory 10.06.04a - Remote exploitation of an input validation error in MySQL MaxDB could allow attackers to trigger a denial of service condition.

tags | advisory, remote, denial of service
advisories | CVE-2004-0931
SHA-256 | e093a929abe48ffdab17ce0899480e9b2a5b4c8494e66e1160e332e98c053d99
cubecart201.txt
Posted Oct 13, 2004
Authored by cybercide

CubeCart 2.0.1 is susceptible to full path disclosure and SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 2268fe5444cf26b20e7ea207085748d11b383bae256e973d5232fd8aac0dee85
maxpatrolDCP.txt
Posted Oct 13, 2004
Site maxpatrol.com

Multiple vulnerabilities were found in DCP-Portal. A remote user can conduct cross-site scripting attacks and HTTP response splitting attacks.

tags | advisory, remote, web, vulnerability, xss
SHA-256 | 22aa26ae2d5dc444cc281d90d2f0be162337b0d1d9ec8595e1a27797ef74b881
57600.html
Posted Oct 13, 2004
Site sunsolve.sun.com

Sun Security Advisory - If a local unprivileged user executes the gzip(1) command and specifies the -force or -f command line option, files which are hard linked to the target file(s) will have their permissions changed. This could allow other local unprivileged users the ability to read or modify files owned by the invoking user, or system files if gzip(1) is issued by a local privileged user.

tags | advisory, local
SHA-256 | f93306f2b1ee952a74a168404ecc378a434200e0ce91c50075aa6536e06cb3fb
dsa-559.txt
Posted Oct 13, 2004
Site debian.org

Debian Security Advisory DSA 559-1 - Stefan Nordhausen has identified a local security hole in net-acct, a user-mode IP accounting daemon. Old and redundant code from some time way back in the past created a temporary file in an insecure fashion.

tags | advisory, local
systems | linux, debian
advisories | CVE-2004-0851
SHA-256 | 6243c91755b84325516ad488639d2e6f35b4d32a7136b6b4cce4c4d53d73ec7f
Secunia Security Advisory 12733
Posted Oct 13, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in DB2 Universal Database, where some of the vulnerabilities can be exploited to compromise a vulnerable system.

tags | advisory, vulnerability
SHA-256 | 35e3e1488ca51b5ebe53a3538faab377172278ce268a071bbe77ca5b8404d192
blackboard.txt
Posted Oct 13, 2004
Authored by Cracklove | Site ProxySky.com

BlackBoard version 1.5.1 is susceptible to full path disclosure and remote executable code inclusion.

tags | exploit, remote
SHA-256 | c72ea7662d46ad0335a5869c71c8b2882af16a0a76cb83d531d4f60b91ab113d
codecon40.txt
Posted Oct 13, 2004
Site codecon.org

Call for Papers for CodeCon 4.0 in San Francisco February 11-13, 2005. All presentations must include working demonstrations, ideally accompanied by source code. Presenters must be done by one of the active developers of the code in question. We emphasize that demonstrations be of working code.

tags | paper, conference
SHA-256 | bf24f79c715cd877535d409965f16a88fe534e5a8ac4368a54d545d0c2778a86
Secunia Security Advisory 12736
Posted Oct 13, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gary Smith has reported a vulnerability in CUPS, which can be exploited by malicious, local users to gain knowledge of sensitive information. The problem is that user credentials are stored in the error_log log file when printing to a shared printer via Samba.

tags | advisory, local
SHA-256 | dc86fc59df6ecd5275b9ce12b615dc48ca89a7358afddedea28926e9ebbb7182
Page 2 of 4
Back1234Next

File Archive:

May 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    0 Files
  • 2
    May 2nd
    15 Files
  • 3
    May 3rd
    19 Files
  • 4
    May 4th
    24 Files
  • 5
    May 5th
    15 Files
  • 6
    May 6th
    14 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    13 Files
  • 10
    May 10th
    7 Files
  • 11
    May 11th
    99 Files
  • 12
    May 12th
    45 Files
  • 13
    May 13th
    7 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    16 Files
  • 17
    May 17th
    26 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close