what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 59 of 59 RSS Feed

Files

caid-34870.txt
Posted Dec 14, 2006
Authored by Ken Williams | Site ca.com

Multiple instances of improper handling of NULL buffers in CA Anti-Virus allow local attackers to cause a denial of service condition. This issue affects only consumer CA Anti-Virus products.

tags | advisory, denial of service, local, virus
SHA-256 | 11819a7013b6e40a1cc760c94258674027e522f92b3b43914752ec599d4cbb9f

Related Files

CAID33581.txt
Posted Feb 2, 2006
Authored by Ken Williams | Site supportconnect.ca.com

The following two security vulnerability issues have been identified in the CA Message Queuing (CAM / CAFT) software: CAM is vulnerable to a Denial of Service (DoS) attack when a specially crafted message is received on TCP port 4105. CAM is vulnerable to a Denial of Service (DoS) through the spoofing of CAM control messages.

tags | advisory, denial of service, spoof, tcp
advisories | CVE-2006-0529, CVE-2006-0530
SHA-256 | fa9bcf5733c36e27029a5ff78f5ff979acef14def6f47abd1743b7b6362823eb
CAID33778.txt
Posted Jan 29, 2006
Authored by Ken Williams | Site supportconnect.ca.com

The CA iGateway common component, which is included with several CA products for UNIX/Linux/Windows platforms, contains a buffer overflow vulnerability that can allow arbitrary code to be executed remotely with SYSTEM privileges on Windows, and cause iGateway component failure on UNIX and Linux platforms.

tags | advisory, overflow, arbitrary
systems | linux, windows, unix
SHA-256 | 8409e14595803164e947c37dd2dfbb346cd4de292b503ce34d26b1d3bf7dc40d
CAID33756.txt
Posted Jan 25, 2006
Authored by Ken Williams | Site www3.ca.com

The following security vulnerability issues have been identified in the DM Primer part of the DM Deployment Common Component being distributed with some CA products.

tags | advisory
SHA-256 | 3bb77b73a739e829a3825d2e8abbaa2acbef94cd5a8a75f892c2a5e96d8e7d82
caid-33485.txt
Posted Oct 21, 2005
Authored by Ken Williams | Site ca.com

The Computer Associates iGateway common component, which is included with several CA products for UNIX/Linux/Windows platforms, contains a buffer overflow vulnerability that could allow remote attackers to execute arbitrary code on Windows platforms, or cause iGateway component failure (denial of service) on UNIX and Linux. The vulnerability is due to improper bounds checking on HTTP GET requests by the iGateway component when debug mode is enabled.

tags | advisory, remote, web, denial of service, overflow, arbitrary
systems | linux, windows, unix
SHA-256 | 74bd732e56cce6be5894ef060731af97fd2aa0bfc7f55e97f70154c829339733
phpSession.txt
Posted Sep 22, 2005
Authored by unknow, adam_i | Site uw-team.org

PHP Session versions 3.x and 4.x are susceptible to a user login bypass vulnerability due to sharing session id information in the same location for multiple instances.

tags | exploit, php, bypass
SHA-256 | 2a9e0f07429c4df5c6fcbef536321945931afbe922a19dbbf82e09b5391c2f74
CA Security Advisory 32919
Posted Aug 24, 2005
Authored by Ken Williams, Computer Associates | Site ca.com

During a recent internal audit, CA discovered several vulnerability issues in the CA Message Queuing (CAM / CAFT) software. CA has made patches available for all affected users. These vulnerabilities affect all versions of the CA Message Queuing software prior to v1.07 Build 220_13 and v1.11 Build 29_13 on the platforms specified below.

tags | advisory, vulnerability
SHA-256 | d5bbb6c6ef69369d57bffbc7b601ba4afb4ce1009bb13cdc9ffd06f706f43207
CA Security Advisory 33239
Posted Aug 5, 2005
Authored by Ken Williams, Computer Associates | Site ca.com

Computer Associates BrightStor ARCserve Backup and BrightStor Enterprise Backup Agents for Windows contain a stack-based buffer overflow vulnerability. The vulnerability may allow remote attackers to execute arbitrary code with SYSTEM privileges, or cause a denial of service condition. The buffer overflow is the result of improper bounds checking performed on data sent to port 6070.

tags | advisory, remote, denial of service, overflow, arbitrary
systems | windows
SHA-256 | d0b86151caf4b31b313680362872830cbd81e6f29d1e165ddf1aea180174a2ed
wc30b2.zip
Posted Aug 17, 1999
Authored by Daniel Flam

WebCracker 3.0 Beta 2 (wc30b2.zip) is a password cracker designed to brute force login/password combinations for web sites that use HTTP-based password authentication. [script kiddies read: get free pr0n site access!] Features: supports sessions so you can save and resume cracking from where you left off, automatically logs all valid accounts found, supports running multiple instances so you can crack multiple targets at once, support for proxy servers, allows customized User ID and Password dictionary attacks, automatically tries the user id as the first password - a common weakness on many systems, allows on-the-fly variable replacement so user ids can be incorporated into passwords, allows on-the-fly ID and/or password case changes for case sensitive servers, uses standard HTTP 1.0 calls for compatibility with just about any web site, minimum password length check so you don't send passwords shorter than the target system allows, easy to use interface and options, extremely fast, much more. New in this release: multi-threaded cracking for faster results, now supports CGI and other "non-standard" login scripts, new and much improved user interface, no limit to the size of password lists which can be used, extended logging capabilities, much better progress indicators, statistics screen that provides details about the speed and efficiency of your cracking sessions. Freeware.

tags | web, cgi, cracker
SHA-256 | 2b8b165a51ff2923112d24966e9fc8d97d8c04025ed458b14a3d838ab8ee4b37
Page 3 of 3
Back123Next

File Archive:

December 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    11 Files
  • 2
    Dec 2nd
    0 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close