exploit the possibilities
Showing 76 - 92 of 92 RSS Feed

Files Date: 2004-10-13 to 2004-10-14

dsa-557.txt
Posted Oct 13, 2004
Authored by Max Vozeler | Site debian.org

Debian Security Advisory DSA 557-1 - When the program pppoe is running setuid root, an attacker could overwrite any file on the file system.

tags | advisory, root
systems | linux, debian
advisories | CVE-2004-0564
MD5 | 393d93db5bde42acf337aa135df5c2b1
NotmuchG.pl.txt
Posted Oct 13, 2004
Authored by Efrain Torres

Perl exploit for IPSwitch WhatsUp Gold version 8.03 that is susceptible to a remote buffer overflow. Tested on Win2k SP4. Successful exploitation binds a shell on port 28876.

tags | exploit, remote, overflow, shell, perl
systems | windows
MD5 | 0c39361862f209e73e6107bf06e50093
Nkxtox Advisory 3
Posted Oct 13, 2004
Authored by Nikyt0x Argentina

PHP Links suffers from a full path disclosure flaw.

tags | advisory, php
MD5 | 76288bd7cad0b73e7fc2e18bcf7d24ba
spider11.txt
Posted Oct 13, 2004
Site emuadmin.com

A vulnerability has been discovered in the game spider version 1.1, an application contained in the Debian GNU/Linux distribution. The vulnerability allows a local attacker to gain elevated privileges by overflowing the -s parameter. Successful exploitation yields games group privileges.

tags | advisory, overflow, local
systems | linux, debian
MD5 | e2f4720c4e853c91801f473322cbc6b9
dsa-556.txt
Posted Oct 13, 2004
Authored by Michal Zalewski | Site debian.org

Debian Security Advisory DSA 556-1 - Due to a bug in the netkit-telnet server (telnetd), an a remote attacker could cause the telnetd process to free an invalid pointer. This causes the telnet server process to crash, leading to a straightforward denial of service (inetd will disable the service if telnetd is crashed repeatedly), or possibly the execution of arbitrary code with the privileges of the telnetd process (by default, the 'telnetd' user).

tags | advisory, remote, denial of service, arbitrary
systems | linux, debian
advisories | CVE-2004-0911
MD5 | 381e124a65605035c51fddc3c31e3dfe
judgedredd.txt
Posted Oct 13, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Judge Dredd: Dredd vs. Death versions 1.01 and below suffer from a format string vulnerability.

tags | advisory
MD5 | a0ec22e03ff5f5e36f7ea45beb2676f1
xercesAmit.txt
Posted Oct 13, 2004
Authored by Amit Klein

Xerces-C++ versions below 2.6.0 allow an attacker to craft a malicious XML document using XML attributes in a way that inflicts a denial of service condition on the target machine.

tags | advisory, denial of service
MD5 | cc1cf7946f46578c9b750ee4474e0a29
remoteActivate.txt
Posted Oct 13, 2004
Authored by Fixer

Information on how to manipulate registry keys once a command shell is obtained to invoke the Remote Desktop functionality of XP.

tags | advisory, remote, shell, registry
MD5 | 61b95dc3c5cbbb1b5a0934cdb0cf8e24
windowsWhoops.txt
Posted Oct 13, 2004
Authored by Bipin Gautam | Site geocities.com

A fluke in NTFS permission handling allows files to be locked even from an administrator, disallowing virus scanners to access it, etc.

tags | advisory, virus
MD5 | b15f05dd8e4488ce4f99f44a44cb28d2
PolymorphicEvasion.txt
Posted Oct 13, 2004
Authored by Phantasmal Phantasmagoria

White paper discussing ways to evade detection of polymorphic shellcode.

tags | paper, shellcode
MD5 | 798854f1dbbd63d23ab7f71eed64c0db
vymesbof.zip
Posted Oct 13, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Proof of concept exploit for Vypress Messenger versions 3.5.1 and below.

tags | exploit, proof of concept
MD5 | 5b58640a7a4fd1136da8102b46cbd4e6
vypressmesg.txt
Posted Oct 13, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

The visualization function in Vypress Messenger versions 3.5.1 and below suffers from a buffer overflow bug.

tags | advisory, overflow
MD5 | 8f8ad59bde08aa0f48653b8d83758829
eEye.realplayer.txt
Posted Oct 13, 2004
Authored by Karl Lynn | Site eeye.com

eEye Security Advisory - eEye Digital Security has discovered a critical vulnerability in RealPlayer. The vulnerability allows a remote attacker to reliably overwrite heap memory with arbitrary data and execute arbitrary code in the context of the user who executed the player.

tags | advisory, remote, arbitrary
MD5 | 071fd4d275ab487e4588e42fdde219ee
Secunia Security Advisory 12692
Posted Oct 13, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in MediaWiki, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | 37b6a8efbcd0b473be5d9bc248eb74fe
Gentoo Linux Security Advisory 200410-1
Posted Oct 13, 2004
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200410-01 - sharutils contains two buffer overflow vulnerabilities that could lead to arbitrary code execution.

tags | advisory, overflow, arbitrary, vulnerability, code execution
systems | linux, gentoo
MD5 | 13eb93f46a4fa12d3cc8ada0a6de5585
Secunia Security Advisory 12702
Posted Oct 13, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - An unspecified security issue with an unknown impact has been reported in Kerio MailServer.

tags | advisory
MD5 | c0c2e581ae3f634665d84b9215e558df
Secunia Security Advisory 12685
Posted Oct 13, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in proxytunnel, which can be exploited by malicious, local users to gain knowledge of sensitive information.

tags | advisory, local
MD5 | 270cea0acc78612dfcb92d9c6917ba9f
Page 4 of 4
Back1234Next

File Archive:

September 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    20 Files
  • 2
    Sep 2nd
    15 Files
  • 3
    Sep 3rd
    15 Files
  • 4
    Sep 4th
    4 Files
  • 5
    Sep 5th
    1 Files
  • 6
    Sep 6th
    1 Files
  • 7
    Sep 7th
    15 Files
  • 8
    Sep 8th
    27 Files
  • 9
    Sep 9th
    7 Files
  • 10
    Sep 10th
    16 Files
  • 11
    Sep 11th
    9 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    25 Files
  • 15
    Sep 15th
    15 Files
  • 16
    Sep 16th
    15 Files
  • 17
    Sep 17th
    15 Files
  • 18
    Sep 18th
    12 Files
  • 19
    Sep 19th
    1 Files
  • 20
    Sep 20th
    1 Files
  • 21
    Sep 21st
    15 Files
  • 22
    Sep 22nd
    21 Files
  • 23
    Sep 23rd
    8 Files
  • 24
    Sep 24th
    15 Files
  • 25
    Sep 25th
    4 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close