PhpNewsManager version 1.46 allows for arbitrary file reading due to being susceptible to a directory traversal attack.
340c2bf12eaf6e9a64fbb3a6e669b7646c444d064e1d432c3c336d3153659923
Small write-up discussing methodology for fingerprint the type of MySQL database being used when exploiting SQL injection vulnerabilities.
7b6c08f5a021bb61015822055f311d65f7fed8629c8880058789c73e4bb31bb8
nCipher Security Advisory No. 9 - On certain models and firmware combinations, an attacker who is able to issue commands to an HSM may be able to access secret data stored in the module, including critical application keys.
071a6375bd388973a762bfda42b19fa6b55931c003c9e7b6bbc847b7f457b7e1
ezBoard versions 7.3u and below are vulnerable to a cross site scripting attack.
d7714aa52da52294665bc90ddc567c7e8aa96717cf6a345c626fc5e63110407b
Lam3rZ Security Advisory #2/2004 - Load Sharing Facility, or LSF, versions 4.x through 6.x, has a remotely accessible vulnerability. The eauth binary can be exploited to send commands to LSF on behalf of a different user. In this way a user could submit and control jobs on behalf of other users.
9d66fa78163f5f238d88d57528f15373ea708f46a350fadeeb078178ee161498
Lam3rZ Security Advisory #1/2004 - Load Sharing Facility, or LSF, versions 4.x through 6.x, has a remotely accessible vulnerability. Specific input data strings can be constructed and can cause failure of the eauth binary, leading to the code execution under root privileges.
58257ee84cc0f3a4b4da905c95ef59378739eb3959c2f197c95472f65121bfe3
Avirt SOHO version 4.3 is susceptible to a remote buffer overflow via a large GET request passed on ports 1080 and 8080.
fa337ad84fab68b63c9aa4c38e16a4ec1e1a58db540216c7ba87a16e222016f1
Avirt Voice version 4.0 is susceptible to a remote buffer overflow via a large GET request passed on port 1080.
5243e3bc2e2a8e9bc2c784387ebbc2fe0735347130db3f4e932b123f0c378a19
GateKeeper Pro 4.7 on the win32 platform has a buffer overflow vulnerability when processing GET requests. Full remote exploit included. Tested against Microsoft Windows 2000 Pro and Microsoft Windows XP.
22417fdf4aa577d2e8c2e2119dcb08754e7078a4aad8cb318d882381d9f6dd0c
Access Point Utilities for Unix is a set of utilities that configure and monitor a Wireless Access Point under Unix. It is known to compile (with GCC and the IBM C compiler) and run under Linux, FreeBSD, OpenBSD, MacOS X, AIX, and QNX.
bc0e8606560421ac048a819458d51837d40ddf66dac82615455a6249ac91535a
SID is a Shell Intrusion Detection system. The kernel part plugs into a terminal-processing subsystem and logs hashed terminal lines. The user part reads log entries (hashes), consults a list of allowed entries, and takes appropriate action upon unexpected log entries. Currently supported are Solaris and Linux.
36f74d0bee9dcdfbebc2941393ecebf83e11a1b2ddcea7ecb5e037f17db42bde
Proof of concept DoS exploit for 3Com OfficeConnect DSL Routers. Successful exploitation of the vulnerability should cause the router to reboot.
254023ca8d4768c04c5c20cfa49d209a6bbc5b70b7a80ccd6bf8833bff56ebcb
Packet Storm new exploits for January, 2004.
866114f4d50d25516b545bc309392b0ea69c6f88f178f22a568c1d2faa5994d3