exploit the possibilities
Showing 26 - 50 of 51 RSS Feed

Files Date: 2005-01-16 to 2005-01-17

ss11012005.txt
Posted Jan 16, 2005
Authored by SmOk3

MPM Guestbook Pro 1.05 is susceptible to file inclusion and directory traversal attacks.

tags | exploit, file inclusion
MD5 | ad15ccd53989598e026abe7b2a496c88
iDEFENSE Security Advisory 2005-01-13.3
Posted Jan 16, 2005
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 01.13.05-3 - Local exploitation of a design error vulnerability in the inpview command included in multiple versions of Silicon Graphics Inc.'s IRIX could allow for arbitrary code execution as the root user. iDEFENSE has confirmed the existence of this vulnerability in SGI IRIX version 6.5.9 (feature) and 6.5.22 (maintenance).

tags | advisory, arbitrary, local, root, code execution
systems | irix
MD5 | cbe1d361d60f08214500dcd1d88bc0d1
iDEFENSE Security Advisory 2005-01-13.2
Posted Jan 16, 2005
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 01.13.05-2 - Remote exploitation of a stack based buffer overflow vulnerability in MySQL MaxDB version 7.5.00 could allow attackers to execute arbitrary code.

tags | advisory, remote, overflow, arbitrary
MD5 | 8dfb737488625092489324dc0a4b3228
iDEFENSE Security Advisory 2005-01-13.t
Posted Jan 16, 2005
Authored by iDefense Labs, Sean de Regge | Site idefense.com

iDEFENSE Security Advisory 01.13.05 - Remote exploitation of a buffer overflow vulnerability in Apple Computer Inc.'s iTunes music player allows attackers to execute arbitrary code. The problem specifically exists when parsing playlist files that contain long URL file entries.

tags | advisory, remote, overflow, arbitrary
systems | apple
MD5 | 056983d844f8d9a2a2c7c49945c05ae2
breedzero.zip
Posted Jan 16, 2005
Authored by Luigi Auriemma | Site aluigi.altervista.org

Remote denial of service proof of concept exploit for the Breed game server that crashes upon accepting an empty UDP packet.

tags | exploit, remote, denial of service, udp, proof of concept
MD5 | c0dd92ea735fe111ca2981664912df71
breedzero.txt
Posted Jan 16, 2005
Authored by Luigi Auriemma | Site aluigi.altervista.org

The Breed game server is susceptible to a remote denial of service attack when sent an empty UDP packet.

tags | advisory, remote, denial of service, udp
MD5 | 3ad28c39a99b54e6aa29fe25dd5c2d38
r57ita.pl.txt
Posted Jan 16, 2005
Authored by 1dt.w0lf | Site rst.void.ru

ITA Forum 1.49 SQL injection exploit with one character bruteforce.

tags | exploit, sql injection
MD5 | 3ab14d20f51df4e0eadc1c0611e59d23
Secunia Security Advisory 13827
Posted Jan 16, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Darren Bounds has reported a weakness in ISS Proventia, which allows malware to bypass detection.

tags | advisory
MD5 | 96f179da6c4ac57cfe50b08958438883
Secunia Security Advisory 13833
Posted Jan 16, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Darren Bounds has reported a weakness in TrendMicro InterScan, which allows malware to bypass detection.

tags | advisory
MD5 | a41c651196f257709c8be1ad29bdebdb
Secunia Security Advisory 13792
Posted Jan 16, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in Check Point Firewall-1 NG with SmartDefense, which allows malware to bypass detection.

tags | advisory
MD5 | 7e0d7ad591a1d1d6578a085979d89b92
cirt-28-advisory.pdf
Posted Jan 16, 2005
Site cirt.dk

CIRT Security Advisory - The web application for the Trend Micro Control Manager Enterprise Edition 3.0 is susceptible to a replay attack. The username and password are encrypted but there is not any form of timestamp mechanism to make this more advanced and secure.

tags | advisory, web
MD5 | 1a2a1f5dad1565e971e0ee3c53f42229
Secunia Security Advisory 13837
Posted Jan 16, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Darren Bounds has reported a weakness in McAfee Webshield 3000, which allows malware to bypass detection.

tags | advisory
MD5 | e41158c00623142d2274ba6c619e7b15
Secunia Security Advisory 13848
Posted Jan 16, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Darren Bounds has reported a weakness in IronPort AsyncOS, which allows malware to bypass detection.

tags | advisory
MD5 | 92aefda020fad6c804b0398c90ac00f4
Secunia Security Advisory 13846
Posted Jan 16, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Darren Bounds has reported a weakness in TippingPoint UnityOne Intrusion Prevention Systems, which allows malware to bypass detection.

tags | advisory
MD5 | d3494907565891f8f2f0810023b203a6
dsa-638.txt
Posted Jan 16, 2005
Site debian.org

Debian Security Advisory 638-1 - jaguar has discovered two security relevant problems in gopherd, the Gopher server in Debian which is part of the gopher package.

tags | advisory
systems | linux, debian
advisories | CVE-2004-0560, CVE-2004-0561
MD5 | 23f2f12c5ddb18fa9a53cf9dcc58b264
googleIntercept.html
Posted Jan 16, 2005
Site dump.hbx.us

Google's GMail system suffered from a massive flaw where random GMail users may have had some of their mail passed to other users that it was not intended for.

tags | advisory
MD5 | e5996e8f3e48c87fab6aa8bbf69820bb
Secunia Security Advisory 13841
Posted Jan 16, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - vim 6.x is susceptible to an insecure file creation vulnerability.

tags | advisory
MD5 | c75bb316cf03fdb3f84fa960627f4587
ieBarBypass.txt
Posted Jan 16, 2005
Authored by Rafel Ivgi | Site theinsider.deep-ice.com

Microsoft Internet Explorer 6 is susceptible to a flaw that allows for malicious file download via manipulation of the File Download Information bar functionality.

tags | exploit
MD5 | c11f180df66f4b95df52ac55789a90f1
fuzzer-1.1.tar.gz
Posted Jan 16, 2005
Authored by Sergio Alvarez

Fuzzer version 1.1 is a multi protocol fuzzing tool written in Python. It can be used to find new SQL injection, format string, buffer overflow, directory traversal, and other vulnerabilities. Written with portability in mind.

tags | overflow, vulnerability, protocol, sql injection, python, fuzzer
systems | unix
MD5 | 26ae8feb5961513554dbaffb9bcdac58
Secunia Security Advisory 13819
Posted Jan 16, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in OpenBSD, which can be exploited by malicious, local users to cause a DoS (Denial of Service). The vulnerability is caused due to an error in the TCP stack when calculating TCP retransmission timeouts. This can be exploited to crash the system by sending some specially crafted packets with specific values in the TCP timestamp option.

tags | advisory, denial of service, local, tcp
systems | openbsd
MD5 | ce71bedd774d59b7c568eb61aa417aca
forumKIT.txt
Posted Jan 16, 2005
Authored by ne0

forumKIT 1.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 071b23c75779e0cb3a1f58618583b544
dsa-637.txt
Posted Jan 16, 2005
Site debian.org

Debian Security Advisory 637-1 - Philip Hazel announced a buffer overflow in the host_aton function in exim-tls, the SSL-enabled version of the default mail-tranport-agent in Debian, which can lead to the execution of arbitrary code via an illegal IPv6 address.

tags | advisory, overflow, arbitrary
systems | linux, debian
advisories | CVE-2005-0021
MD5 | deef0c7c78c87a7c9f4c8d7c668845b4
STG Security Advisory 2005-01-13.25
Posted Jan 16, 2005
Authored by STG Security | Site stgsecurity.com

STG Security Advisory: An input validation flaw in ZeroBoard can allow malicious attackers the ability to run arbitrary commands with the privilege of the HTTPD process, which is typically run as the nobody user.

tags | exploit, arbitrary
MD5 | 60037566ae608048fb38bbba03815d95
H2005-01.txt
Posted Jan 16, 2005
Authored by Robert Fly | Site hyperdose.com

Horde 3.0 contains two XSS attacks that can be exploited through GET requests. Once exploited, these requests could be used to execute any javascript commands in the context of that user, potentially including but not limited to reading and deleting email, and stealing authentication tokens.

tags | exploit, javascript
MD5 | 5c88d3c50f6a156434891b0d602d4bf0
Technical Cyber Security Alert 2005-12B
Posted Jan 16, 2005
Authored by US-CERT | Site us-cert.gov

Technical Cyber Security Alert TA05-012B - The Microsoft Windows HTML Help Activex control contains a cross-domain vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary commands or code with the privileges of the user running the control. The HTML Help control can be instantiated by an HTML document loaded in Internet Explorer or any other program that uses MSHTML.

tags | advisory, remote, arbitrary, activex
systems | windows
advisories | CVE-2004-1043
MD5 | 0acfaddeaf77ea7eac78d6eb579b5424
Page 2 of 2
Back12Next

File Archive:

March 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    15 Files
  • 2
    Mar 2nd
    5 Files
  • 3
    Mar 3rd
    3 Files
  • 4
    Mar 4th
    25 Files
  • 5
    Mar 5th
    20 Files
  • 6
    Mar 6th
    16 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    12 Files
  • 9
    Mar 9th
    3 Files
  • 10
    Mar 10th
    4 Files
  • 11
    Mar 11th
    23 Files
  • 12
    Mar 12th
    12 Files
  • 13
    Mar 13th
    12 Files
  • 14
    Mar 14th
    19 Files
  • 15
    Mar 15th
    12 Files
  • 16
    Mar 16th
    3 Files
  • 17
    Mar 17th
    1 Files
  • 18
    Mar 18th
    15 Files
  • 19
    Mar 19th
    22 Files
  • 20
    Mar 20th
    14 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    15 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close