exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 18 of 18 RSS Feed

Files Date: 2005-08-13

Technical Cyber Security Alert 2005-224A
Posted Aug 13, 2005
Authored by US-CERT | Site cert.org

Technical Cyber Security Alert TA05-224A - VERITAS Backup Exec Remote Agent for Windows Servers uses hard-coded administrative authentication credentials. An attacker with knowledge of these credentials and access to the Remote Agent could retrieve arbitrary files from a vulnerable system.

tags | advisory, remote, arbitrary
systems | windows
SHA-256 | 9dde9e5a88a8e6cb42fe843651d1b723670fc7ee22cc88d40f41b27bdceea01f
IRCRv2.1.zip
Posted Aug 13, 2005
Authored by John McLeod | Site tools.phantombyte.com

The Incident Response Collection Report is a script to call a collection of tools that gathers and/or analyzes data on a Microsoft Windows system. You can think of this as a snapshot of the system in the past. Most of the tools are oriented towards data collection rather than analysis.

Changes: IRCR version 2 is a complete code change from Perl to DOS batch file. Anyone should be able to modify the batch file to suite their needs. Requires the HELIX (www.e-fense.com/helix) IR folder to run.
systems | windows
SHA-256 | 32be1c0278a380438592db2f097bfc25dc1bc1a3bfcb2bd7f4d5e0b167ec3b4c
HOD-ms05039-pnp-expl.c
Posted Aug 13, 2005
Authored by houseofdabus

Microsoft Windows Plug-and-Play remote overflow universal exploit that is related to MS05-039. Vulnerable systems include: Microsoft Windows Server 2003 SP1, Microsoft Windows XP SP1 and SP2, and Microsoft Windows 2000 SP4.

tags | exploit, remote, overflow
systems | windows
advisories | CVE-2005-1983
SHA-256 | d4d34022865fee0d2c172e8b76760414d4e039a1695053f89ac862f393a57700
kavLocalRoot.txt
Posted Aug 13, 2005
Authored by Dr. Peter Bieringer

Due to the logs directory being 777 by default, Kaspersky AntiVirus 5.5 is susceptible to a local root exploit via a symlink attack. Details are provided.

tags | exploit, local, root
SHA-256 | 4221d11c999895f3600e0c16961946b2c0424f23876f1d8b87d18a563fb9fbfa
grandstream-DoS.pl.txt
Posted Aug 13, 2005
Authored by Pierre Kroma

Denial of service exploit for the Grandstream Budge Tone 101/102 VOIP phone that sends UDP packets larger than 65534 bytes in size to port 5060.

tags | exploit, denial of service, udp
SHA-256 | c0ade1d951f810b48782c25899321731bff97b1a0de4e2f6dffa87086b7601a8
Grandstream.txt
Posted Aug 13, 2005
Authored by Pierre Kroma

It is possible to denial of service the Grandstream Budge Tone 101/102 VOIP phone by sending a UDP packet greater than 65534 bytes to port 5060.

tags | advisory, denial of service, udp
SHA-256 | 971cc3bd262ee40b619f72fff70b663892cee3f5753cc1d34ac499a8a70ac909
Debian Linux Security Advisory 774-1
Posted Aug 13, 2005
Authored by Debian | Site security.debian.org

Debian Security Advisory DSA 774-1 - Edward Shornock discovered a bug in the UIDL handling code of fetchmail, a common POP3, APOP and IMAP mail fetching utility. A malicious POP3 server could exploit this problem and inject arbitrary code that will be executed on the victim host. If fetchmail is running as root, this becomes a root exploit.

tags | advisory, arbitrary, root, imap
systems | linux, debian
advisories | CVE-2005-2335
SHA-256 | e30a4b05419887264e05a08c16a5de24bfb39591623bf714786afdb00b2b9703
MyBBRC4.txt
Posted Aug 13, 2005
Authored by phuket

Multiple SQL injection vulnerabilities exist in MyBB RC 4.

tags | exploit, vulnerability, sql injection
SHA-256 | 1f5543f0b97a845725b1a3264069d358965dd6a36adb9d7fe85584572fe722d9
clarolineTraverse.txt
Posted Aug 13, 2005
Authored by Robbe De Keyzer

Claroline 1.6.1 is vulnerable to multiple directory traversal attacks. Teacher access is needed for successful exploitation.

tags | exploit
SHA-256 | e9fd260847e06c5f1d63952a7a8de9fb08e7390eaf4354a23a12b802ed02846a
Secunia Security Advisory 16393
Posted Aug 13, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Peter Winter-Smith of NGSSoftware has reported a vulnerability in Novell eDirectory, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | dbb8ea818b850b46a002dde2a9afe2fd7ead8bec20bb77a72e88be877152e631
Secunia Security Advisory 16398
Posted Aug 13, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - rgod has discovered a weakness in PHP Designer 2005, which can be exploited by malicious people to hide the contents of certain source files.

tags | advisory, php
SHA-256 | 7351e5a32f5482526b0129a91df5be5bde58acdd6823760621ec30cec44a73b1
Secunia Security Advisory 16403
Posted Aug 13, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in VERITAS Backup Exec, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | bb39f1a969c73661c11b7f48a91848d1f7aa0097bef1b7e9d79ce35f20d168a5
Secunia Security Advisory 16406
Posted Aug 13, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Florian Weimer has reported a vulnerability in the Linux kernel, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

tags | advisory, denial of service, kernel
systems | linux
SHA-256 | c849e41fa2cd0a4dc5c036d9e18ed6a4cd0ea75dc7077bb2f6eb10c708f9ccf5
Secunia Security Advisory 16409
Posted Aug 13, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Josh Zlatin-Amishav has reported a vulnerability in Wyse Winterm, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 10d997704bf8a0848ae8e1eb226026072e1a06f830cfcc5e229d4290236e4340
Secunia Security Advisory 16411
Posted Aug 13, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sun Microsystems has acknowledged some vulnerabilities in the MySQL package bundled with Solaris, which can be exploited by malicious users to bypass certain security restrictions, cause a DoS (Denial of Service), or compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
systems | solaris
SHA-256 | d06cd5481bc8e99a5250c3cd262c2e6ccf1400dd5595e7adb9bc511205868e78
Secunia Security Advisory 16414
Posted Aug 13, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Alexander Heidenreich has discovered a vulnerability in FUDforum, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | d5c6708763f0af98464da86a1b6d6dcdfdb7e56695d47bee16f055db4fc36878
Secunia Security Advisory 16420
Posted Aug 13, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - rgod has discovered a weakness in Dev-PHP, which can be exploited by malicious people to hide the contents of certain source files.

tags | advisory, php
SHA-256 | 8d052c2bbf4a656588dd4330a089696b072cfc0943a0b69ed5219ad812e5b1e0
Secunia Security Advisory 16422
Posted Aug 13, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - rgod has discovered a weakness in Bloodshed Dev-Pascal, which can be exploited by malicious people to hide the contents of certain source files.

tags | advisory
SHA-256 | f43d367f90419ca4fa6ee1cd02ecc00fd1633db78e6965664cde2590aa3d8aed
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close