what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 404 RSS Feed

Files Date: 2004-10-01 to 2004-10-31

ability-ftpd-exploit.tar.bz2
Posted Oct 29, 2004
Authored by David Jungerson

Remote root exploit for the STOR buffer overflow vulnerability in Code-Crafters Ability FTPd version 2.34. The EIP address only works on Windows 2000 SP4. Two shellcodes are included. One binds a shell and another streams a file and executes.

tags | exploit, remote, overflow, shell, root, shellcode
systems | windows
SHA-256 | f402160d538f63e97458e75baaad6d4dc5288a0430435e6567a0c76362822792
Secunia Security Advisory 13012
Posted Oct 29, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in TortoiseCVS, which potentially can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | abeb478d83817f707e6e7da7e31dcd3f420db10ecbd36d7eb01529f4e414dec7
Secunia Security Advisory 13021
Posted Oct 29, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Colin Phipps has reported a vulnerability in catdoc, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges.

tags | advisory, local
SHA-256 | da205ab7f335e2cc51639d366d79aeae3bde8fc48eed6264bc8fa295258d9b1d
Gentoo Linux Security Advisory 200410-31
Posted Oct 29, 2004
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200410-31 - Email virus scanning software relying on Archive::Zip can be fooled into thinking a ZIP attachment is empty while it contains a virus, allowing detection evasion.

tags | advisory, virus
systems | linux, gentoo
SHA-256 | 2623e61baab34edd9c702613e81159a5c563b62dbda3c1bd21ed88cb2cc55649
mimedefang-2.47.tar.gz
Posted Oct 29, 2004
Authored by Dianne Skoll | Site mimedefang.org

MIMEDefang is a flexible MIME email scanner designed to protect Windows clients from viruses. Includes the ability to do many other kinds of mail processing, such as replacing parts of messages with URLs. It can alter or delete various parts of a MIME message according to a very flexible configuration file. It can also bounce messages with unacceptable attachments. MIMEDefang works with Sendmail 8.11/8.12's new "Milter" API, which makes it more flexible and efficient than procmail-based approaches.

Changes: Fixed vulnerabilities related to insufficient validation.
systems | windows, unix
SHA-256 | be17a9547c7ed9e7002c6d1be1ef16fc099a433e95f3cbdbcc98b54c7bcb098c
Secunia Security Advisory 13024
Posted Oct 29, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ziv Kamir has discovered a vulnerability in Cyber Web Filter, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory, web
SHA-256 | fa973fc63c033d4ea61bccaf3053ac6b62dab0dc60213975b3565109b245acc4
1333htpasswd.txt
Posted Oct 29, 2004
Authored by Larry W. Cashdollar | Site vapid.ath.cx

It appears that the new Apache release 1.3.33 still is susceptible to a local buffer overflow discovered in htpasswd under release 1.3.31.

tags | advisory, overflow, local
SHA-256 | e6a9149037f4b1d66672b62767ea68f40b7ee59f1984ddb9aa2e324192efe4ef
apache_1.3.33.tar.gz
Posted Oct 29, 2004
Site apache.org

Apache is the most popular webserver on the Internet, quite possibly the best in terms of security, functionality, efficiency, and speed.

Changes: This release addresses security issues related to mod_include and mod_proxy.
systems | unix
advisories | CVE-2004-0492, CVE-2004-0940
SHA-256 | c7327891a6dba926e97d701463f9877fa164757189d192aac8d52100bf2a2484
hydra-4.4-src.tar.gz
Posted Oct 29, 2004
Authored by van Hauser, thc | Site thc.org

THC-Hydra is a high quality parallelized login hacker for Samba, Smbnt, Cisco AAA, FTP, POP3, IMAP, Telnet, HTTP Auth, LDAP, NNTP, MySQL, VNC, ICQ, Socks5, PCNFS, Cisco and more. Includes SSL support, parallel scans, and is part of Nessus.

Changes: Fixed another floating point exception, fixed -C colon mode, and added EHLO support for the smtp-auth module, required for some smtpd variants.
tags | web, cracker, imap
systems | cisco
SHA-256 | 382ff75f66fc7c7ec429c4c2513c61dcb8322927a6b51542914cc7a08717caef
mimedefang-2.46.tar.gz
Posted Oct 29, 2004
Authored by Dianne Skoll | Site mimedefang.org

MIMEDefang is a flexible MIME email scanner designed to protect Windows clients from viruses. Includes the ability to do many other kinds of mail processing, such as replacing parts of messages with URLs. It can alter or delete various parts of a MIME message according to a very flexible configuration file. It can also bounce messages with unacceptable attachments. MIMEDefang works with Sendmail 8.11/8.12's new "Milter" API, which makes it more flexible and efficient than procmail-based approaches.

Changes: Better interpretation of Trend Micro virus-scanner return code, much better algorithm for reconstructing messages that avoids creating useless multipart/mixed containers with only one sub-part, a few small security fixes, and more.
systems | windows, unix
SHA-256 | 80904dbeacbb7a2964918402fcaba6f179e044558567d7cd3cdee85e739c8b16
msieLink.txt
Posted Oct 29, 2004
Authored by Benjamin Tobias Franz

Microsoft Internet Explorer 6.0.2800.1106 and possibly earlier versions fail to properly handle links embedded within links, allowing for spoofing of target addresses.

tags | advisory, spoof
SHA-256 | 7da3421a41e8b0ac88ad9c7662f72ec0ea3556d9a28bc76b6d137f677fd27af2
os-sim-0.9.7.tar.gz
Posted Oct 28, 2004
Authored by Dominique Karg, David Gil, Fabio Ospitia Trujillo, Julio Casal, Jesus D. Munoz | Site sourceforge.net

Os-sim attempts to unify network monitoring, security, correlation, and qualification in one single tool. It combines Snort, Acid, MRTG, NTOP, OpenNMS, nmap, nessus, and rrdtool to provide the user with full control over every aspect of networking or security. Supported platform is Linux.

Changes: Various bug fixes and feature enhancements.
tags | system logging
systems | linux, unix
SHA-256 | a9e4efded4cd6c297b87696904dc6e2478801da4bda93861dd8e1b201712476b
bypassArticle.txt
Posted Oct 28, 2004
Authored by 3APA3A, offtopic | Site security.nnov.ru

Presentation: Bypassing client application protection techniques with notepad.

tags | paper
SHA-256 | e4f987378606cf9b7a1349994610bfb96d53d4405cc8e13e837a7a2766319313
Secunia Security Advisory 11711
Posted Oct 28, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Andrew Nakhla has discovered a vulnerability in Apple Remote Desktop, which can be exploited by malicious users to gain root access on a vulnerable system.

tags | advisory, remote, root
systems | apple
SHA-256 | 85d9f76ff37293d5d50d230cfe7e4cfa2a63d003085dd41515fdd278773dbf18
php4curl.txt
Posted Oct 28, 2004
Authored by FraMe | Site kernelpanik.org

PHP4 cURL functions bypass open_basedir protection allowing users to navigate through the filesystem.

tags | advisory
SHA-256 | 765016dae640f3bcadcb4d07c7fffcebbe55bd3c65241833d9335fe8ef0f2813
Gentoo Linux Security Advisory 200410-30
Posted Oct 28, 2004
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200410-30 - GPdf, KPDF and KOffice all include vulnerable xpdf code to handle PDF files, making them vulnerable to execution of arbitrary code upon viewing a malicious PDF file.

tags | advisory, arbitrary
systems | linux, gentoo
SHA-256 | 37d8a0de090ab75590e1883bb797ba812c0a2555a6b6148fd608d9234f590512
dsa-574.txt
Posted Oct 28, 2004
Site debian.org

Debian Security Advisory 574-1 - The upstream developers discovered a problem in cabextract, a tool to extract cabinet files. The program was able to overwrite files in upper directories. This could lead an attacker to overwrite arbitrary files.

tags | advisory, arbitrary
systems | linux, debian
advisories | CVE-2004-0916
SHA-256 | fc4ac9837b143b972a1bcb9bb0d89273b2f8d3094c0a081df8b97ffeebd1a240
quicktime.txt
Posted Oct 28, 2004
Authored by John Heasman

A high risk vulnerability exists in Quicktime for Windows versions 6.5.2 and earlier.

tags | advisory
systems | windows
SHA-256 | e225e65e339978dc3071b9a5afce13c6687b3bd18967e4ff3e7c14bb2d873daa
eEye.realplayerZIP.txt
Posted Oct 28, 2004
Authored by Yuji Ukai | Site eeye.com

eEye Security Advisory - eEye Digital Security has discovered a vulnerability in RealPlayer that allows a remote attacker to reliably overwrite the stack with arbitrary data and execute arbitrary code in the context of the user under which the player is running.

tags | advisory, remote, arbitrary
SHA-256 | 4228c29ddc8f4a770989a7a4523551435648a017959562fee57351d9d722789c
moo3boom.zip
Posted Oct 28, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Proof of concept exploit for Master of Orion III versions 1.2.5 and below which suffer from buffer overflow and allocation errors.

tags | exploit, overflow, proof of concept
SHA-256 | 505124f0a29c72a428518e910334f4f7712741c1b20597a13ebbca8945f628c9
masterOrionIII.txt
Posted Oct 28, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Master of Orion III versions 1.2.5 and below suffer from buffer overflow and allocation errors.

tags | advisory, overflow
SHA-256 | ff876d3954314db21a25e6da1cb8f530c0962204597ce6e7808b8f0024d379cc
Secunia Security Advisory 12995
Posted Oct 28, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in ImageMagick, which potentially can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error within the EXIF parsing routine. This can be exploited to cause a buffer overflow via a malicious image file containing specially crafted EXIF information.

tags | advisory, overflow
SHA-256 | 8715d7138e0a1afcb50b5318b61c96c373ce0df7259541e75860413034a6a339
iDEFENSE Security Advisory 2004-10-27.t
Posted Oct 28, 2004
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 10.27.04 - Remote exploitation of a buffer overflow vulnerability in Simon Tatham's PuTTY can allow attackers to execute arbitrary code. The vulnerability specifically exists due to insufficient bounds checking on SSH2_MSG_DEBUG packets.

tags | advisory, remote, overflow, arbitrary
SHA-256 | df688daac18818d72fcb49c9a410285b34da156af4509acd4f488baaf7beac1c
konqueror3221.txt
Posted Oct 28, 2004
Authored by Yanosz

KDE Konqueror 3.2.2-1 is susceptible to cross site scripting flaws.

tags | advisory, xss
SHA-256 | e5b76811b57ff0415f7cefe4c0eba39cbed052df6432eb4dcac363b86a7d4310
Secunia Security Advisory 12992
Posted Oct 28, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Horde Application Framework, which potentially can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 21a8f64c43421710b104df637692afa1e23a8074c429ae36c2635b09edb21934
Page 1 of 17
Back12345Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close