what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 63 of 63 RSS Feed

Files from Tan Chew Keong

Email addresschewkeong at security.org.sg
First Active2004-06-18
Last Active2008-12-05
desknow2512.txt
Posted Feb 3, 2005
Authored by Tan Chew Keong | Site security.org.sg

SIG^2 Vulnerability Research Advisory - The DeskNow Mail and Collaboration Server suffers from multiple directory traversal vulnerabilities that allow for upload and deletion of arbitrary files.

tags | advisory, arbitrary, vulnerability
SHA-256 | e5cc733880d83bc8359f3372d9f85d1aacc030a576bf6551baddfeb8bdadb9e5
magicwinmail40.txt
Posted Jan 28, 2005
Authored by Tan Chew Keong | Site security.org.sg

Multiple vulnerabilities were found in Magic Winmail's Webmail, IMAP, and FTP services. Arbitrary file upload/download, cross site scripting, and directory traversal flaws all exist, along with the ability to access other user's mail. It really IS magic.

tags | advisory, arbitrary, vulnerability, imap, xss, file upload
SHA-256 | 6cdd0f75b8a65fb62d8a4639fd3d414b32de01bbd3ab23bb7757fb4fa79da5d6
nodemgrPOC.cpp
Posted Jan 19, 2005
Authored by Tan Chew Keong

NodeManager Professional 2.00 buffer overflow exploit that binds a shell to port 2001.

tags | exploit, overflow, shell
SHA-256 | d2760218e3f15342798e63cffabc4d5d0a5db7643df4ce807004ab02371da3e8
nodemanager200.txt
Posted Jan 18, 2005
Authored by Tan Chew Keong

NodeManager Professional 2.00 has a stack overflow vulnerability that can be exploited by sending a specially crafted SNMPv1 trap.

tags | advisory, overflow
SHA-256 | 2f7c4455305f9277c5d6931bd82f3660f702734db4e9275b16d3c83827dfb989
singapore0910.txt
Posted Dec 30, 2004
Authored by Tan Chew Keong | Site security.org.sg

Multiple vulnerabilies have been found in the Singapore Image Gallery Web Application version 0.9.10 including arbitrary file download, directory deletion, and cross site scripting flaws.

tags | advisory, web, arbitrary, xss
SHA-256 | 22cccd84c8257bb8aec34a71801c52d8b3d7958998bb930ff8723bb8f663f436
cmailserver52.txt
Posted Dec 11, 2004
Authored by Tan Chew Keong

Multiple vulnerabilities were found in CMailServer's Web Mail service including buffer overflow, SQL Injection and Cross-Site Scripting (XSS) flaws. CMailServer version 5.2 on English Win2K IIS 5.0 was tested.

tags | advisory, web, overflow, vulnerability, xss, sql injection
systems | windows
SHA-256 | 84acf4cfdf663c21738923ba8986aefd2a8b5f25680f5eee678407da36243638
prevxhome.txt
Posted Dec 11, 2004
Authored by Tan Chew Keong | Site security.org.sg

Prevx Home's registry and buffer overflow protection features are implemented by hooking several native APIs in kernel-space by modifying entries within the SDT ServiceTable. This means that a malicious program with Administrator privilege can disable these features by restoring the running kernel's SDT ServiceTable with direct writes to \device\physicalmemory. Verified against Prevx Home Version 1.0 Build 2.1.0.0 on WinXP SP0, SP2.

tags | advisory, overflow, kernel, registry
systems | windows
SHA-256 | cdbe8aa011cc24d5f6c3a5f694ae3235e1744f064bd8ed4e13f8f9f7a62e832f
04WebServer.txt
Posted Nov 12, 2004
Authored by Tan Chew Keong | Site security.org.sg

Documentation on three vulnerabilities that were found in version 1.42 of 04WebServer. It includes a XSS vulnerability, lack of character filtering when writing to log file, and potential server restart problems after requesting a DOS device in the URL.

tags | exploit, vulnerability
SHA-256 | 9e30e3662081d2b140cfec3c5c3ba0d3fb33894ffdf8a8d49135d7fe6b9219ca
twinftp103r2.txt
Posted Sep 13, 2004
Authored by Tan Chew Keong | Site security.org.sg

A directory traversal vulnerability exists in several FTP commands of TwinFTP that may be exploited by a malicious user to access files outside the FTP directory. The problem lies with the incorrect filtering of directory name supplied to CWD, STOR and RETR commands. Versions tested: TwinFTP Server Standard 1.0.3 R2 (Win32) on English WinXP SP1, TwinFTP Server Enterprise 1.0.3 R2 (Win32) on English Win2K SP2.

tags | advisory
systems | windows
SHA-256 | d6f72bc7fab9132f3f56758b94be272eefba30b76a4c1dabb51e82a11d482c15
kerioPF4.txt
Posted Sep 9, 2004
Authored by Tan Chew Keong | Site security.org.sg

Kerio Personal Firewall's Application Launch Protection can be disabled by Direct Service Table Restoration. Tested against Kerio Personal Firewall 4.0.16 on Win2K SP4, WinXP SP1, SP2.

tags | advisory
systems | windows
SHA-256 | 67d4011d11c36f885399b20a133ddbac999ca016d4951bde14a9c135a00a1d66
gaucho140poc.cpp.txt
Posted Aug 26, 2004
Authored by Tan Chew Keong | Site security.org.sg

Exploit that simulates POP3 server which sends a specially crafted email to a vulnerable Gaucho email client, triggering an overflow and binding a shell on port 2001. Version 1.4 build 145 is susceptible.

tags | exploit, overflow, shell
SHA-256 | c8e97e6293220ffcd697f03cd1b7f766ea7557076534f67514f931b5f9a45e9f
gaucho140.html
Posted Aug 26, 2004
Authored by Tan Chew Keong | Site security.org.sg

Gaucho version 1.4 Build 145 is vulnerable to a buffer overflow when receiving malformed emails from a POP3 server. This vulnerability is triggered if Gaucho receives from the POP3 server, a specially crafted email that has an abnormally long string in the Content-Type field of the email header. This string will overwrite EIP via SEH, and can be exploited to execute arbitrary code.

tags | advisory, overflow, arbitrary
SHA-256 | bad2f2ceea309c37340f7b2126c6ee4bfceb4e9ad6e52b92245fda99089f03fc
spfp.html
Posted Jun 18, 2004
Authored by Tan Chew Keong | Site security.org.sg

Sygate Personal Firewall Pro version 5.x is susceptible to a denial of service attack by being crashed via unprivileged applications sending specially crafted messages to the ListView control in the GUI.

tags | advisory, denial of service
SHA-256 | c4b523beea4596ecf960bcae931886280975333d872f47098e91d7d4f0b32445
Page 3 of 3
Back123Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close