exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 88 of 88 RSS Feed

Files Date: 2005-12-28 to 2005-12-29

ACSSEC-2005-11-27-2.txt
Posted Dec 28, 2005
Authored by Tim Shelton

Eudora Qualcomm WorldMail 3.0 IMAPd Service 6.1.19.0 is vulnerable to a buffer overflow via a specially crafted IMAP requests. A remote attacker could issue the vulnerable command followed by malicious code to execute arbitrary code or lead to a denial of service.

tags | advisory, remote, denial of service, overflow, arbitrary, imap
SHA-256 | badbb644a68c91d11ddebdea94182dc435fcdb323c53e5e4efbf62318cffef7d
ACSSEC-2005-11-27.txt
Posted Dec 28, 2005
Authored by Tim Shelton

Multiple vulnerabilities has been identified in MailEnable, which may be exploited by remote attackers to cause a denial of service, or could lead to remote execution of code. This issue is due to an error in the IMAP service that does not properly handle specially crafted requests. MailEnable Enterprise Edition version 1.1 and MailEnable Professional version 1.7 are affected.

tags | advisory, remote, denial of service, vulnerability, imap
SHA-256 | 481ca76c4215db7557b60a4a2e982228271b39ec4c72acf01ed9973fc07a5a9e
metadotPortal.txt
Posted Dec 28, 2005
Authored by Gerry Chng, Claudean Zheng

Metadot versions 6.4.4 and below suffer from a stale variable issue that allows users to gain administrative privileges.

tags | advisory
SHA-256 | cf7d121b03dc61261a92e45cbee18b0167a6a6a3889d56781bd37a0e30fea7fa
livejournal.txt
Posted Dec 28, 2005
Authored by Andrew Farmer

LiveJournal is susceptible to a javascript inclusion flaw.

tags | advisory, javascript
SHA-256 | 5ee1244723c6ee9a9237b7fe5f35b4e70c7c5c050a72fc882ab9c53b4cac9ddf
HP Security Bulletin 2005-10.26
Posted Dec 28, 2005
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin - A potential vulnerability has been identified with HP-UX systems running WBEM Services. The vulnerability could be exploited remotely to create a Denial of Service (DoS).

tags | advisory, denial of service
systems | hpux
SHA-256 | 65f0da92def2193320fac8708f6e31a614f0787fd037cad938a4be6bf8c78e23
muts_mailenable_imap_examine.pm.txt
Posted Dec 28, 2005
Authored by Mati Aharoni

Metasploit exploit for a remote buffer overflow that exists in the MailEnable Enterprise 1.1 IMAP EXAMINE command. This vulnerability affects MailEnable Enterprise 1.1 without the ME-10009.EXE patch.

tags | exploit, remote, overflow, imap
SHA-256 | 32ff7a89101f26206751b513c937584a52058c2d9de29807a446083ec6427bd4
mailenable-imap-examine.py.txt
Posted Dec 28, 2005
Authored by Mati Aharoni

Python exploit for a remote buffer overflow that exists in the MailEnable Enterprise 1.1 IMAP EXAMINE command. This vulnerability affects MailEnable Enterprise 1.1 without the ME-10009.EXE patch.

tags | exploit, remote, overflow, imap, python
SHA-256 | 2aa22f6b90d94adeab514c49934be2084dd51651d81239a49cd2c99a68e85f55
mailenable11.txt
Posted Dec 28, 2005
Authored by Mati Aharoni

A remote buffer overflow exists in the MailEnable Enterprise 1.1 IMAP EXAMINE command, which allows for post authentication code execution. This vulnerability affects MailEnable Enterprise 1.1 without the ME-10009.EXE patch.

tags | advisory, remote, overflow, imap, code execution
SHA-256 | 5d7e90c97562012dbbe25f0619abebad7142aa518eb5388cad9554f74af3d76c
pvlanBi.txt
Posted Dec 28, 2005
Site arhont.com

Further research has been done regarding jumping attacks in regards to VLAN and PVLAN implementations.

tags | advisory
SHA-256 | 5eacd74b20fa29cd8523bbbc4c935badc261d6cbbf5fa11ca8dfc4c91dde2a7b
eigrp12-2.txt
Posted Dec 28, 2005
Site arhont.com

EIGRP version 1.2 suffers from a replay condition due to a failure of verifying the MAC.

tags | advisory
SHA-256 | c48f28c562e3d9f1f585948e20f1f77f59a7f04005ba898f4684782ffa1000f5
eigrp12.txt
Posted Dec 28, 2005
Site arhont.com

EIGRP version 1.2 suffers from a denial of service condition when employing the Goodbye Message.

tags | advisory, denial of service
SHA-256 | 056dc577bcdaf53d607fc102dffe98805b23c3257a999f40f2d9f76070b3da74
excelBugs.tgz
Posted Dec 28, 2005
Authored by ad

Two Microsoft Excel xls files that demonstrate null pointer bugs.

tags | exploit
SHA-256 | 96050cef577d9f575ebe890633d9a49e6d24350ee07343b4a30ed72e6c205d94
ethereal-0.10.14.tar.gz
Posted Dec 28, 2005
Authored by Gerald Combs | Site ethereal.com

Ethereal is a GTK+-based network protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Ethereal features that are missing from closed-source sniffers. Screenshot available here.

Changes: Fixed remote root buffer overflow vulnerabilities. All users are strongly urged to upgrade.
tags | tool, sniffer, protocol
systems | unix
SHA-256 | 323e62471d224cf33bbcfa7877ed3586a4fc510a4e23843b1d52e28eb98f8bfc
Page 4 of 4
Back1234Next

File Archive:

September 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    23 Files
  • 2
    Sep 2nd
    12 Files
  • 3
    Sep 3rd
    0 Files
  • 4
    Sep 4th
    0 Files
  • 5
    Sep 5th
    10 Files
  • 6
    Sep 6th
    8 Files
  • 7
    Sep 7th
    30 Files
  • 8
    Sep 8th
    14 Files
  • 9
    Sep 9th
    26 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    0 Files
  • 12
    Sep 12th
    5 Files
  • 13
    Sep 13th
    28 Files
  • 14
    Sep 14th
    15 Files
  • 15
    Sep 15th
    17 Files
  • 16
    Sep 16th
    9 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    12 Files
  • 20
    Sep 20th
    15 Files
  • 21
    Sep 21st
    20 Files
  • 22
    Sep 22nd
    13 Files
  • 23
    Sep 23rd
    12 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    30 Files
  • 27
    Sep 27th
    27 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close