what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 93 RSS Feed

Files Date: 2004-12-11

57675.html
Posted Dec 11, 2004
Site sunsolve.sun.com

Sun Security Advisory - There is a potential buffer overflow in ping which could result in a local unprivileged user gaining elevated privileges.

tags | advisory, overflow, local
SHA-256 | b9cb02f78c261c989a2fdeb80789457ef8c83270746f25f804814473fe5e0475
ipcop141.txt
Posted Dec 11, 2004
Authored by Paul Kurczaba

IPCop suffers from a cross site scripting vulnerability in proxylog.dat. Version 1.4.1 is affected. Older versions have not been tested.

tags | advisory, xss
SHA-256 | d59eb12e5bbe5ceef338184b82b1fac9c3a6e988d1838bdfd2258a2389d111e7
ipbBypass.txt
Posted Dec 11, 2004
Authored by Keyboard Criminal

It seems that the IPB forums has a password reset feature that allows a disabled account to regain access.

tags | advisory
SHA-256 | 6655bba54cb396d63f885489dbd4592e3de24761f6dc899981b76935d1dd95f4
symbian.txt
Posted Dec 11, 2004
Authored by Geza

Brief analysis on the Symb/Cabir-B worm that was written specifically for the Nokia Series 60 mobile phones running the Symbian operating system.

tags | paper, worm
SHA-256 | d88a99b49aac9da3d26fb558eb119b553a9571fe97443460ff28b76b9d69d758
janados.zip
Posted Dec 11, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Remote denial of service exploit for Jana server 2 versions 2.4.4 and below.

tags | exploit, remote, denial of service
SHA-256 | a53eb7696fdc2332399b894e113d5bfe7a6f8f00ef949e0c5bdba3fc6cffd92f
janados.txt
Posted Dec 11, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Jana server 2 versions 2.4.4 and below are susceptible to denial of service attacks that result in 100% CPU utilization and endless loops.

tags | advisory, denial of service
SHA-256 | 9ef7c4be53f9b2ccbb5a95ae377c996b29578cde7c5e2c34b38a910a9b7938bb
Secunia Security Advisory 13331
Posted Dec 11, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in FreeImage, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system.

tags | advisory, denial of service
SHA-256 | 6b98f6f0137614044828b08bae004abbe4f9c2796e4773e7cfb0bc2ff20b6a5f
ex_MERCURY.c
Posted Dec 11, 2004
Authored by John H.

Universal remote exploit for the buffer overflow vulnerability in Mercury Mail 4.01 (Pegasus) IMAP server.

tags | exploit, remote, overflow, imap
SHA-256 | 1992e2ec6ee91bec2e209f5d8942e15e93e225cd81bc0a56fc5540e11094d323
mercury.c
Posted Dec 11, 2004
Authored by Mati Aharoni | Site whitehat.co.il

Mercury Mail 4.01 (Pegasus) IMAP remote buffer overflow exploit.

tags | exploit, remote, overflow, imap
SHA-256 | 63374e92c80843538c8627f6b67f409bd9fb8bb850b2462fd9da4c9129f882a2
cuteftp60.txt
Posted Dec 11, 2004
Authored by Felix Zhou

CuteFTP Professional version 6.0 suffers from a client side overflow.

tags | advisory, overflow
SHA-256 | 3d1365f98ceefb195b9e65563d96258df09207d3b47bda6994de142a33159201
payflow.txt
Posted Dec 11, 2004
Site shirkdog.us

An attacker can change hidden fields to any dollar amount and misrepresent purchases for businesses providing products or services using the PayFlow Link system.

tags | advisory
SHA-256 | 6a59ea388b7c1e8fbdee656f2a3eb197dcb0fc5b6c06ff22eafd48908224ecfb
orbzbof.zip
Posted Dec 11, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Remote proof of concept exploit for Orbz versions 2.10 and below which suffer from a buffer overflow in the password field of the join packet.

tags | exploit, remote, overflow, proof of concept
SHA-256 | b7866a8811b382a054ae7fb62572e6e373eb33af3e44cfec542ed5f71f5dca85
orbzbof.txt
Posted Dec 11, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Orbz versions 2.10 and below suffer from a buffer overflow in the password field of the join packet.

tags | advisory, overflow
SHA-256 | 605ee016d735f2c5fda4cfdac9fb1f4a8b1e1063b3e131c04441e54a78312a10
IPSWSFTP-exploit.c
Posted Dec 11, 2004
Authored by NoPh0BiA

Remote exploit for IPSwitch WS_FTP version 5.03 that binds a shell to port 4444.

tags | exploit, remote, shell
SHA-256 | 0e9f16d2eb219cb6649d8a93058aceadd447cca259e088bba13b7e2bcf6a5f46
wsftp503.txt
Posted Dec 11, 2004
Authored by Reed Arvin

Multiple buffer overflows exist in WS_FTP Server Version 5.03, 2004.10.14. There are four vulnerable commands that can be used to cause these buffer overflows. Three of the vulnerable commands can be used to stop the WS_FTP Server service resulting in a denial of service. The vulnerable commands are SITE, XMKD, MKD, and RNFR.

tags | advisory, denial of service, overflow
SHA-256 | 9489824c23ea54bc66e29683258b34ac29edea9addcf9e869e14e6f8c196a65c
dsa-602.txt
Posted Dec 11, 2004
Site debian.org

Debian Security Advisory 602-1 - Wait.. No.. what is this? Even more potential integer overflows have been found in the GD graphics library which were not covered by security advisory DSA 589 and DSA 601. They could be exploited by a specially crafted graphic and could lead to the execution of arbitrary code on the victim's machine.

tags | advisory, overflow, arbitrary
systems | linux, debian
advisories | CVE-2004-0941, CVE-2004-0990
SHA-256 | 5aa52586a3e7c7fca87c947b2bcf703e4fec57e6bd5e72e8b8687fc94417c86f
mdaemon72.txt
Posted Dec 11, 2004
Authored by Reed Arvin

A local privilege escalation vulnerability exists with MDaemon 7.2 that allows a user to gain SYSTEM level access.

tags | exploit, local
SHA-256 | 0bf2ceef32fcac791004f42845f98912b0a3b6b0da97801fcebb9b6068efaee7
Secunia Security Advisory 13330
Posted Dec 11, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in IberAgents, which can be exploited by malicious, local users to gain knowledge of sensitive information.

tags | advisory, local
SHA-256 | 4e75086888710dcbf32f71f1e0754079f31eb192ee1d70743d2096698357be80
dsa-601.txt
Posted Dec 11, 2004
Site debian.org

Debian Security Advisory 601-1 - More potential integer overflows have been found in the GD graphics library which were not covered by security advisory DSA 589. They could be exploited by a specially crafted graphic and could lead to the execution of arbitrary code on the victim's machine.

tags | advisory, overflow, arbitrary
systems | linux, debian
advisories | CVE-2004-0941, CVE-2004-0990
SHA-256 | a912cac2bab61d164be2f9ed1beea7664368eec5f3e72a7cea359b3236f48371
Secunia Security Advisory 13321
Posted Dec 11, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Groupmax World Wide Web and Groupmax World Wide Web Desktop, which can be exploited to conduct cross-site scripting attacks or access arbitrary HTML files.

tags | advisory, web, arbitrary, vulnerability, xss
SHA-256 | 6977c2be14bf30686c9ae680f71239ac4db6aa3d19bd446400ae8c608f878816
nwclient.txt
Posted Dec 11, 2004
Authored by Karol Wiesek

Buffer overflows have been discovered in ncplogin and ncpmap in ncpfs.

tags | advisory, overflow
SHA-256 | c294b3360b3ddff9fac26764f6fdbeaf48fbc3a3c0cf6921df14103682138576
Secunia Security Advisory 13329
Posted Dec 11, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - XioNoX has reported a vulnerability in Nuked-Klan, which can be exploited by malicious people to conduct script insertion attacks.

tags | advisory
SHA-256 | 5fdbc01ef4b95bd500e5be4bc5beca398d0683f404a221c9799bb0c6698c0bb1
kdeSMB.txt
Posted Dec 11, 2004
Authored by Daniel Fabian

The KDE program Konquerer allows for browsing SMB shares comfortably through the GUI. By placing a shortcut to an SMB share on KDE's desktop, an attacker can disclose his victim's password in plaintext.

tags | advisory
SHA-256 | d82ec6638f5d0580ca26f1a42305b4b27eb5326e45e9c6fec5e0cf1b63ceed39
doubleByte.txt
Posted Dec 11, 2004
Authored by Liu Die Yu | Site umbrella.name

On Double Byte Character Set Locale systems, such as Chinese, Japanese, etc, there exists a spoofing vulnerability within Microsoft Internet Explorer that enables attackers to fake the Address field.

tags | advisory, spoof
SHA-256 | 3a77f862571fc252998d7700222e875fc627c98ac39e82150f4091acce5c76cd
ssfakep.zip
Posted Dec 11, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Remote denial of service exploit for games using the Serious engine. Generates UDP packets that have fake players enter a room. The system fails to limit the amount of users that can enter.

tags | exploit, remote, denial of service, udp
SHA-256 | 73f4dcb9226f5e9726827b4fbf00a53e50c64b329583482853dbd42a63d49d11
Page 1 of 4
Back1234Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close