exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files Date: 2002-08-09

mozillaftp.txt
Posted Aug 9, 2002
Authored by Eiji Yoshida | Site geocities.co.jp

Mozilla FTP View Cross-Site Scripting Vulnerability - Mozilla allows the running Malicious Scripts due to a bug in 'FTP view' feature. If you click on a malicious link, the script embedded in URL will run. This problem is in 'FTP view' feature. The 'URL' is not escaped. Fixed in Mozilla 1.0.1.

tags | exploit, xss
SHA-256 | 0c46a0bf30f0f31bf2f056f0da0c0c250611bfd73ec5f19f137c39328c6d0189
cgivti.pl
Posted Aug 9, 2002
Authored by Lawrence Lavigne | Site neoerudition.net

This scanner searches for vulnerable web servers for Common Gateway Interface and Vermeer Technology Incorporated services.

tags | web, cgi
systems | unix
SHA-256 | 3178e91d7d1afb673055f6147eac68be504e83bb41b722d15eb3a98d6d9a3647
operaftp.txt
Posted Aug 9, 2002
Authored by Eiji Yoshida | Site geocities.co.jp

Opera FTP View Cross-Site Scripting Vulnerability - Opera allows running Malicious Scripts due to a bug in 'FTP view' feature. If you click on a malicious link, the script embedded in URL will run. This problem is in 'FTP view' feature. The 'URL' is not escaped. Vulnerable: Windows2000 SP2 Opera 6.03 and Windows2000 SP2 Opera 6.04

tags | exploit, xss
SHA-256 | 029e61a6f99887883599a606e4f90ec32fa6a841cb0ae72c171bc511fda8b805
lsrtunnel-0.2.tar.gz
Posted Aug 9, 2002
Authored by Todd MacDermid | Site synacklabs.net

lsrtunnel spoofs connections to a remote host by pretending to be the middle host in a source routed path. The remote host must return source routed connections for this spoofing to work.

tags | remote, spoof
systems | unix
SHA-256 | f93e7c951f6c48c76504b0e670c181ace1f06b89a1ec655e200edfae795a5a3b
lsrscan-0.2.tar.gz
Posted Aug 9, 2002
Authored by Todd MacDermid | Site synacklabs.net

lsrscan is a scanner to determine whether remote hosts will return source routed connections, or forward source routed packets to a remote host.

tags | remote
systems | unix
SHA-256 | 0cb60ffa7d1adf18ad526999957b9cfc557cbba3f64b1911e181a2ee86baac7f
eeye.iplanet.txt
Posted Aug 9, 2002
Authored by Riley Hassell | Site eEye.com

Eeye Security Advisory - iPlanet Web Server 4.1 and 6.0 contains a remotely exploitable heap overflow in the transfer chunking which allows remote code execution as SYSTEM/root on all platforms.

tags | remote, web, overflow, root, code execution
SHA-256 | d2375ece94681f4833e85dbe34daf64ab6bdd23cbce71013a58fa28a9d8b5fae
eeye.flash.txt
Posted Aug 9, 2002
Authored by Marc Maiffret | Site eEye.com

Eeye Advisory - All versions of Macromedia Shockwave Flash for Windows and Unix contains remotely exploitable overflows in the handling of SWF files. Since this is a browser based bug, it makes it trivial to bypass firewalls and attack the user at his desktop. Also, application browser bugs allow you to target users based on the websites they visit, the newsgroups they read, or the mailing lists they frequent.

tags | overflow
systems | windows, unix
SHA-256 | ef61f5c7bb22a7f1570c610ede3c3d279065fdc8c0930aa34c2231c4cd2e2ea9
ssh0wn.diff
Posted Aug 9, 2002
Authored by Enz00 | Site sec.angrypacket.com

Patch for openssh-3.4p1 that will grant login access to any user with the "secret" pass and that user will not be logged. It will also capture usernames and passwords on outbound and inbound ssh connections.

tags | tool, rootkit
systems | unix
SHA-256 | c9ae52869807471e721f01773272d2845cb9f63b6146b9535b6125164f2ab444
Atstake Security Advisory 02-08-08.1
Posted Aug 9, 2002
Authored by Atstake, Andreas Junestam | Site atstake.com

Atstake Security Advisory A080802-1 - WS_FTP server v3.1.1 for Windows NT/2000/XP contains a buffer overflow that allows remote users to execute code when they change their password. Since the WS_FTP Server is running as a service, an attackers code will be executing as SYSTEM.

tags | remote, overflow
systems | windows
SHA-256 | 217640519642343dd537e34149f73960fd350a4359bf54a02275a74e046990c7
egScanner.tar.gz
Posted Aug 9, 2002
Authored by Jad | Site Saklawi.info

egScanner is an ip scanner which scans ip lists for specific ports. egScanner is multi threaded and on my computer can scan more than 50 hosts/sec if using 30 threads and scanning for one port. egScanner is written in java and source code is included.

tags | tool, java, scanner
systems | unix
SHA-256 | c33c6a43f26ecae9a9633a76faf60882c3ac97d2085ccfe4b6a81a3456940fe7
idefense.iSCSI.txt
Posted Aug 9, 2002
Authored by David Endler | Site idefense.com

iDEFENSE Security Advisory 08.08.2002 - Linux-iSCSI, an implementation of the iSCSI protocol, uses a config file that is world writable by default.

tags | protocol
systems | linux
SHA-256 | eadb00d67bce05eb26517a6aaeb26e36052d4a3bad13947038d571f9b0e8edb9
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close