exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files Date: 2002-08-09

mozillaftp.txt
Posted Aug 9, 2002
Authored by Eiji Yoshida | Site geocities.co.jp

Mozilla FTP View Cross-Site Scripting Vulnerability - Mozilla allows the running Malicious Scripts due to a bug in 'FTP view' feature. If you click on a malicious link, the script embedded in URL will run. This problem is in 'FTP view' feature. The 'URL' is not escaped. Fixed in Mozilla 1.0.1.

tags | exploit, xss
SHA-256 | 0c46a0bf30f0f31bf2f056f0da0c0c250611bfd73ec5f19f137c39328c6d0189
cgivti.pl
Posted Aug 9, 2002
Authored by Lawrence Lavigne | Site neoerudition.net

This scanner searches for vulnerable web servers for Common Gateway Interface and Vermeer Technology Incorporated services.

tags | web, cgi
systems | unix
SHA-256 | 3178e91d7d1afb673055f6147eac68be504e83bb41b722d15eb3a98d6d9a3647
operaftp.txt
Posted Aug 9, 2002
Authored by Eiji Yoshida | Site geocities.co.jp

Opera FTP View Cross-Site Scripting Vulnerability - Opera allows running Malicious Scripts due to a bug in 'FTP view' feature. If you click on a malicious link, the script embedded in URL will run. This problem is in 'FTP view' feature. The 'URL' is not escaped. Vulnerable: Windows2000 SP2 Opera 6.03 and Windows2000 SP2 Opera 6.04

tags | exploit, xss
SHA-256 | 029e61a6f99887883599a606e4f90ec32fa6a841cb0ae72c171bc511fda8b805
lsrtunnel-0.2.tar.gz
Posted Aug 9, 2002
Authored by Todd MacDermid | Site synacklabs.net

lsrtunnel spoofs connections to a remote host by pretending to be the middle host in a source routed path. The remote host must return source routed connections for this spoofing to work.

tags | remote, spoof
systems | unix
SHA-256 | f93e7c951f6c48c76504b0e670c181ace1f06b89a1ec655e200edfae795a5a3b
lsrscan-0.2.tar.gz
Posted Aug 9, 2002
Authored by Todd MacDermid | Site synacklabs.net

lsrscan is a scanner to determine whether remote hosts will return source routed connections, or forward source routed packets to a remote host.

tags | remote
systems | unix
SHA-256 | 0cb60ffa7d1adf18ad526999957b9cfc557cbba3f64b1911e181a2ee86baac7f
eeye.iplanet.txt
Posted Aug 9, 2002
Authored by Riley Hassell | Site eEye.com

Eeye Security Advisory - iPlanet Web Server 4.1 and 6.0 contains a remotely exploitable heap overflow in the transfer chunking which allows remote code execution as SYSTEM/root on all platforms.

tags | remote, web, overflow, root, code execution
SHA-256 | d2375ece94681f4833e85dbe34daf64ab6bdd23cbce71013a58fa28a9d8b5fae
eeye.flash.txt
Posted Aug 9, 2002
Authored by Marc Maiffret | Site eEye.com

Eeye Advisory - All versions of Macromedia Shockwave Flash for Windows and Unix contains remotely exploitable overflows in the handling of SWF files. Since this is a browser based bug, it makes it trivial to bypass firewalls and attack the user at his desktop. Also, application browser bugs allow you to target users based on the websites they visit, the newsgroups they read, or the mailing lists they frequent.

tags | overflow
systems | windows, unix
SHA-256 | ef61f5c7bb22a7f1570c610ede3c3d279065fdc8c0930aa34c2231c4cd2e2ea9
ssh0wn.diff
Posted Aug 9, 2002
Authored by Enz00 | Site sec.angrypacket.com

Patch for openssh-3.4p1 that will grant login access to any user with the "secret" pass and that user will not be logged. It will also capture usernames and passwords on outbound and inbound ssh connections.

tags | tool, rootkit
systems | unix
SHA-256 | c9ae52869807471e721f01773272d2845cb9f63b6146b9535b6125164f2ab444
Atstake Security Advisory 02-08-08.1
Posted Aug 9, 2002
Authored by Atstake, Andreas Junestam | Site atstake.com

Atstake Security Advisory A080802-1 - WS_FTP server v3.1.1 for Windows NT/2000/XP contains a buffer overflow that allows remote users to execute code when they change their password. Since the WS_FTP Server is running as a service, an attackers code will be executing as SYSTEM.

tags | remote, overflow
systems | windows
SHA-256 | 217640519642343dd537e34149f73960fd350a4359bf54a02275a74e046990c7
egScanner.tar.gz
Posted Aug 9, 2002
Authored by Jad | Site Saklawi.info

egScanner is an ip scanner which scans ip lists for specific ports. egScanner is multi threaded and on my computer can scan more than 50 hosts/sec if using 30 threads and scanning for one port. egScanner is written in java and source code is included.

tags | tool, java, scanner
systems | unix
SHA-256 | c33c6a43f26ecae9a9633a76faf60882c3ac97d2085ccfe4b6a81a3456940fe7
idefense.iSCSI.txt
Posted Aug 9, 2002
Authored by David Endler | Site idefense.com

iDEFENSE Security Advisory 08.08.2002 - Linux-iSCSI, an implementation of the iSCSI protocol, uses a config file that is world writable by default.

tags | protocol
systems | linux
SHA-256 | eadb00d67bce05eb26517a6aaeb26e36052d4a3bad13947038d571f9b0e8edb9
Page 1 of 1
Back1Next

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close