exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 67 RSS Feed

Files

0401-exploits.tgz
Posted Feb 23, 2004
Authored by Todd J. | Site packetstormsecurity.com

Packet Storm new exploits for January, 2004.

tags | exploit
SHA-256 | 866114f4d50d25516b545bc309392b0ea69c6f88f178f22a568c1d2faa5994d3
apache2047.txt
Posted Jan 31, 2004
Authored by Trung - caothuvolam | Site security.com.vn

In the Apache httpd server version 2.0.47, a user can bypass a Deny directive by setting the ErrorDocument directive in their .htaccess file to access a php script which can then access the data they should be denied.

tags | exploit, php
SHA-256 | d2263f39b7545054db660f7e8f771995d42e67cdd3702d21ae045cec018945c0
serv-ME.c
Posted Jan 31, 2004
Authored by SkyLined

Remote exploit that makes use of a buffer overrun in the Serv-U FTP server versions 4.2 and below that binds a shell to port 28876.

tags | exploit, remote, overflow, shell
SHA-256 | ea506acc9b54478ebcde1305c05e03a4d7a82d57254fcf230248bb00ffe76634
PHPportal.txt
Posted Jan 31, 2004
Authored by Zero-X | Site lobnan.de

PHP Portal is vulnerable to a directory traversal attack.

tags | exploit, php
SHA-256 | b9306c40d7fa1f3aad54667ffae18f59edda7f6b1c213708a6e6e29d981d4f47
phototool.txt
Posted Jan 31, 2004
Authored by KingSerb

thePHOTOtool is susceptible to SQL injection attacks.

tags | exploit, sql injection
SHA-256 | 21333df98d914b67f6369a92fd0b1af172ab28cbea7d3d8c24177dadfe654305
servu3.c
Posted Jan 30, 2004
Authored by mandragore, kkqq

Remote exploit that makes use of a buffer overrun in the Serv-U FTP server versions 4.2 and below.

tags | exploit, remote, overflow
SHA-256 | c4174e145fda328216ce0c52e5bf305b7a9f9a1cea90df103ee512f28f76a97d
winblast.sh
Posted Jan 30, 2004
Authored by Steve Ladjabi

Windows XP/2003 Samba file sharing resource exhaustion exploit that commits a denial of service.

tags | exploit, denial of service
systems | windows
SHA-256 | a91d653658d8a311303aac3232b3fab4ebcb1b7feb4f843ca68bdc4c5a2a202a
sslexp.c
Posted Jan 30, 2004
Authored by Bram Matthys

Brute forcer for OpenSSL ASN.1 parsing bugs that affects versions 0.9.6j and below and 0.9.7b and below.

tags | exploit
advisories | CVE-2003-0545, CVE-2003-0543, CVE-2003-0544
SHA-256 | 8bbbf5ff84c17067f0cd384d9a2c32db1f752553417de9a7493aa5111f6897b7
lftp.c
Posted Jan 30, 2004
Authored by Li0n7

Remote exploit that makes use of the try_netscape_proxy() overflow in versions 2.3 to 2.6.9 of lftp.

tags | exploit, remote, overflow
SHA-256 | 816d755b95467dc00ab06edb3f6891bcfd9a118f8f8af795a90ab0f3b444ba8a
phpGedView_v2.txt
Posted Jan 30, 2004
Authored by Cedric Cochin

phpGedView versions 2.65.1 and below suffer from multiple PHP Code Injection vulnerabilities that enable a malicious user to access arbitrary files or execute commands on the server.

tags | exploit, arbitrary, php, vulnerability
SHA-256 | be5e66ffc5826f681bd480cabfd994a4d7dc5f7649cca38b0bc6ec5ea2815885
webBlog11.txt
Posted Jan 30, 2004
Authored by n3rd

Web Blog 1.1 allows for remote command execution due to an unsanitized file variable.

tags | exploit, remote, web
SHA-256 | e0af8c56d3430aa463075d8e02f7ec239fa8e7490a1451b1eb83f2d3a80af5a9
ZH2004-02SA.txt
Posted Jan 29, 2004
Authored by ZetaLabs | Site zone-h.org

PJ CGI Neo review is vulnerable to a directory traversal attack that allows a remote attacker to access any file outside of the webroot.

tags | exploit, remote, cgi
SHA-256 | 992dd31568c4fcc4ccd00ecd6c0ceb0917e4d9075666f57504e17c887cb3ecde
open3sIDSonshowaudit.txt
Posted Jan 29, 2004
Authored by Juan Manuel Pascual Escriba | Site open3s.com

Any user with AAO privileges over the onshowaudit binary in IBM's Informix IDSv9.40 can read any system file.

tags | exploit
SHA-256 | 72ed995c0d9c55f14fcc3e3b6054b130f3018ce7a50d8030dfc3d03869c0a948
open3sIDSonedcu.txt
Posted Jan 29, 2004
Authored by Juan Manuel Pascual Escriba | Site open3s.com

A local vulnerability exists in the IBM Informix IDSv9.40 onedcu binary that allows local users to overwrite any root owned file.

tags | exploit, local, root
SHA-256 | db72f511fe4d56d0ece80a8d419ef2589c072cffdbf4185599095797b18a579e
BRSwebweaverXSS.txt
Posted Jan 28, 2004
Site oliverkarow.de

BRE WebWeaver version 1.07 is vulnerable a cross site scripting attack.

tags | exploit, xss
SHA-256 | 72434b112da0910a837e767cf44c6ee6954e146ec34f69d6d828044685dfa900
ZH2004-01SA.txt
Posted Jan 28, 2004
Authored by ZetaLabs

Web Blog 1.1 allows for remote file retrieval outside of the web root via a directory traversal attack.

tags | exploit, remote, web, root
SHA-256 | 8ffba7542b46b6728704b40c87466c1fd319e96b82e24f45e7ff600b1fb8abcc
servu2.c
Posted Jan 27, 2004
Authored by Lion, kkqq

Remote exploit that makes use of a buffer overrun in the Serv-U FTP server versions 4.2 and below.

tags | exploit, remote, overflow
SHA-256 | 284a2e89d944215f5b46bd4e96161625f632ef248662810dc10285b64cba0205
malwareSpoof.txt
Posted Jan 27, 2004
Authored by http-equiv | Site malware.com

Trivial way to do file spoofing in Internet Explorer versions 6.0.2800.1106 and below.

tags | exploit, spoof
SHA-256 | 77b83565d337b035d648444f5bce0a768b8022a42f296c2f964bd12f78475766
proxyNow2x.txt
Posted Jan 27, 2004
Authored by Peter Winter-Smith | Site elitehaven.net

ProxyNow! versions 2.75 and below are susceptible to both heap memory corruption and stack-based buffer overflows. Exploitation of these vulnerabilities can lead to a denial of service and/or code execution with SYSTEM privileges. Detailed analysis and exploit included.

tags | exploit, denial of service, overflow, vulnerability, code execution
SHA-256 | befbd5bf13e3b6d7dc791bb61f8d8476b36082b54e5da32d7a8aa177d07afba7
oracleXSS.txt
Posted Jan 26, 2004
Authored by Rafel Ivgi | Site theinsider.deep-ice.com

Oracle HTTP Server powered by Apache is susceptible to a cross site scripting attack in its isqlplus script.

tags | exploit, web, xss
SHA-256 | 748ac7cca1f921761e927eaa455cbf3fdf10094a39aecbc81e13aa6dc48834ec
BremsServer124.txt
Posted Jan 26, 2004
Authored by Donato Ferrante | Site autistici.org

BremsServer version 1.2.4 is vulnerable to directory traversal and cross site scripting attacks.

tags | exploit, xss
SHA-256 | 45ec16ae54b25850adf177d878a6be55addb1dfb712964e4d6ca473de6d221c4
servu.c
Posted Jan 26, 2004
Authored by mslug, kkqq

Remote exploit that makes use of a buffer overrun in the Serv-U FTP server versions 4.2 and below.

tags | exploit, remote, overflow
SHA-256 | 6de0ca83361dce52c08b5b33a10843f9f30d275a37f278cc1b412a7f0b524d08
nextplace.txt
Posted Jan 26, 2004
Authored by Rafel Ivgi | Site theinsider.deep-ice.com

NextPlace.com E-Commerce ASP engine is susceptible to a cross site scripting vulnerability.

tags | exploit, xss, asp
SHA-256 | 2f8af53e9dfea6fe76abccd8960b5ec38f7d3444654525851e6ed78612f36c2e
inrtra.txt
Posted Jan 26, 2004
Authored by Rafel Ivgi | Site theinsider.deep-ice.com

Inrtra Forum is susceptible to a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | ca0e46d20d49830a841e047a4df9766b3d3bd389d20c6872a8d8aeb7d6bf63c8
BWStraversal.txt
Posted Jan 26, 2004
Authored by Rafel Ivgi | Site theinsider.deep-ice.com

BWS or Borland Web Server, which is used as the Corel Paradox relational database interface, lacks input validation and is subject to directory traversal attacks. Versions 1.0b3 and below are affected.

tags | exploit, web
SHA-256 | 8aa1c69b7c9c73d721abc38cc5f94f0d8119336e8aaff6c08fbd7a4b4880b3b7
Page 1 of 3
Back123Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close