what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 62 of 62 RSS Feed

Files

anubisexp.c
Posted Mar 11, 2004
Authored by CMN

Remote root exploit for GNU Anubis 3.6.2.

tags | exploit, remote, root
SHA-256 | 3706cc19a90101297f16f0d876bb10fb413ee57eb509b253379de3d1b73e99e6
PWebServer033.txt
Posted Mar 9, 2004
Authored by Donato Ferrante | Site autistici.org

PWebServer version 0.3.3 suffers from a directory traversal attack that allows a remote attacker to access any file outside of the webroot.

tags | exploit, remote
SHA-256 | ea3ca487389324ffa7305aa2021d36ed14251e5d30dd90ae1340b73839d76f18
hgmcrash.zip
Posted Mar 5, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Haegemonia version 1.07 and below denial of service exploit. Updated to support the other games from Desert Rats that are not even released yet but hold the same vulnerability.

tags | exploit, denial of service
SHA-256 | e6a331c593c7fe0a0312e639ccf14bdb041134985719b0f7680d0a645160c8ec
invision13.txt
Posted Mar 5, 2004
Authored by Rafel Ivgi | Site theinsider.deep-ice.com

Invision Power Board versions 1.3 Final is susceptible to a cross site scripting attack.

tags | exploit, xss
SHA-256 | 93d8939b30b06bd6edcf59474442458101779057deb1b80413667302d3c4d1bf
virtuanews103.txt
Posted Mar 5, 2004
Authored by Rafel Ivgi | Site theinsider.deep-ice.com

VirtuaNews Admin Panel version 1.0.3 Pro is vulnerable to a cross site scripting attack.

tags | exploit, xss
SHA-256 | 205786c68330b41eb6b26b19658148764eb7d43fc3a1175dc049219bdcbb8f1b
rfcbof.zip
Posted Mar 5, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Exploit for Red Faction versions 1.20 and below that have a client-side buffer overflow.

tags | exploit, overflow
SHA-256 | 01c7b9282fc2aa240cbc56fcdaaa2305670964794ae290b72a06e4e3f1e60a0c
anubis-crasher.pl
Posted Mar 5, 2004
Authored by Ulf Harnhammar

Remote exploit that makes use of a buffer overflow in GNU Anubis. Vulnerable versions: 3.6.2, 3.9.93, 3.9.92, 3.6.0, 3.6.1, possibly others.

tags | exploit, remote, overflow
SHA-256 | 6f547b7717fcf62439171559f0223a0358e15ef1457120541045bf8af97228f1
oseen_shoutcast.c
Posted Mar 4, 2004
Authored by jsk | Site oseen.org

SHOUTcast version 1.9.2 remote exploit with connect back code. Written for Slackware 8.1, 9.0, 9.1, and RedHat 7.2.

tags | exploit, remote
systems | linux, redhat, slackware
SHA-256 | 4871cfddef91c577c554b14dfdaf2472474b595033fe12ccb112b6a54d289e32
gwebTraversal.txt
Posted Mar 3, 2004
Authored by Donato Ferrante | Site autistici.org

GWeb HTTP server version 0.6 is susceptible to a directory traversal bug that allows remote attackers to access files outside of the webroot.

tags | exploit, remote, web
SHA-256 | c20a48105f58c207217782b131ab51bde54557edd4d00995be8d9650ff678743
wftpd.c
Posted Mar 3, 2004
Authored by security team 0seen

Remote exploit for WFTPD server. Tested against WFTPD Pro server version 3.21.1.1 on Windows 2000 CN SP4.

tags | exploit, remote
systems | windows
SHA-256 | 36efa8521fe6d42fba082e0c14015fe3be98a3a0ad14ca3a9df03000a85bc69b
motorolaT720.txt
Posted Mar 2, 2004
Authored by Shaun Colley | Site nettwerked.co.uk

Motorola T720 Cellular phones have a vulnerability that cause a denial of service when the phone receives an abnormal amount of IP traffic. Upon receiving the traffic, the phone powers-off when the user attempts to access the network.

tags | exploit, denial of service
SHA-256 | 3c3012ee943ab155015cb94a94a705b5b7f6384e9067ab8966ff66d07ec2c944
isec-0014-mremap-unmap.v2.txt
Posted Mar 2, 2004
Authored by Paul Starzetz | Site isec.pl

A critical security vulnerability has been found in the Linux kernel memory management code inside the mremap(2) system call due to missing function return value check. This bug is completely unrelated to the mremap bug disclosed on 05-01-2004 except concerning the same internal kernel function code. Versions affected: 2.2 up to 2.2.25, 2.4 up to 2.4.24, 2.6 up to 2.6.2.

tags | exploit, kernel
systems | linux
advisories | CVE-2004-0077
SHA-256 | 483ed3b485fe72175ca9d4f6e07e3c8cc8998ed7ee2f98e6a72a1016b9373ac3
Page 3 of 3
Back123Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close