what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files Date: 2003-07-04

screenapple.txt
Posted Jul 4, 2003
Authored by Delfim Machado | Site lab.xpto.org

The screen saver that comes with MacOSX crashes when an large amount of characters are entered and then the return key is pressed. At this point, access to the desktop is achieved.

tags | exploit
SHA-256 | 580c1aa4b027ccdd05e8525a8ed42272ff29b6f6fedab5539018ad21fadd994c
core.netmeeting.txt
Posted Jul 4, 2003
Authored by Hernan Ochoa, Gustavo Ajzenman, Javier Garcia Di Palma, Pablo Rubinstein | Site coresecurity.com

Core Security Technologies Advisory ID: CORE-2003-0305-04 - Windows NetMeeting is vulnerable to a directory traversal attack that allows remote arbitrary code execution. Vulnerable version: NetMeeting 3.01 (4.4.3385), possibly others. Fixed in Service Pack 4.

tags | exploit, remote, arbitrary, code execution
systems | windows
SHA-256 | 37573598836434eb829a0bd11e8ad4eae7fa6d4cbf8c3647e8d0168be675a1ea
kereval.phpgroup.txt
Posted Jul 4, 2003
Authored by Francois SORIN | Site kereval.com

Kereval Security Advisory KSA-003 - Cross Site Scripting vulnerabilities exist in Phpgroupware very 0.9.14.003.

tags | exploit, vulnerability, xss
SHA-256 | 115009ff8f21003689ec49c463c4c30c56eedbbdb2ef2b35c538dd0cec9fc89c
xbox001.txt
Posted Jul 4, 2003
Authored by Stefan Esser

A vulnerability within the XBOX Dashboard allows a complete compromise of the security features. The problem lies in the handling of font files when the dashboard loads and allows a person with local access the ability to do anything they want on an XBox without having to open, solder, or swap a hard drive.

tags | advisory, local
SHA-256 | 1ba78f7ab3b8b8fec30b9ed4589338a62969e572c52acd5bd24baf88365b6875
core.active.txt
Posted Jul 4, 2003
Authored by Eduardo Arias, Gabriel Becedillas, Ricardo Quesada, Damian Saura | Site coresecurity.com

Core Security Technologies Advisory ID: CORE-2003-0305-03 - The Microsoft Active Directory functionality is remotely and locally vulnerable to a stack overflow that allows an attacker to crash and force a reboot of any Windows 2000 server. Vulnerable package: Windows 2000 Server with Active Directory SP3. Fixed with Service Pack 4.

tags | exploit, overflow
systems | windows
SHA-256 | afedd8c7f809a694f9bb53497d9c62835d5aef2a503c9fd6108f9274b8cd15f5
essenexploit.c
Posted Jul 4, 2003
Authored by B-r00t

A buffer overflow exists in the Essentia Web Server for Linux due to bad boundary checking with long urls which are greater than 2000 bytes. Versions higher than 2.12 are vulnerable.

tags | exploit, web, overflow
systems | linux
SHA-256 | f55766bfff8269fac9c31113d14529568080f5e761e6c0b22990bb0daaf7d482
wilco.zip
Posted Jul 4, 2003
Authored by Luigi Auriemma | Site aluigi.altervista.org

This tool make uses of the recent vulnerabilities discussed here regarding a broadcast buffer overflow and server freeze denial of service discovered in Roger Wilco.

tags | exploit, denial of service, overflow, vulnerability
SHA-256 | 62f78f06b0794bd0e528ae135c68d893b70aae1ba695c071a7e8b7f5937a0cdf
rogerwilco.txt
Posted Jul 4, 2003
Authored by Luigi Auriemma | Site aluigi.altervista.org

Roger Wilco, the popular tool that lets gamers speak while playing online games, has two vulnerabilities. The first lies in a buffer overflow where a nickname that is longer than 516 bytes can be sent out in a broadcast message that will allow a remote attacker to take control of every client connected to the server. The second problem lies in a partially completely packet being sent to the server that will cause it to freeze.

tags | advisory, remote, overflow, vulnerability
SHA-256 | eb9ce2e3dad0a654a3c5aa35f45d02c0262452e17e4a8662f44ddb67bc164eab
bindcode.c
Posted Jul 4, 2003
Authored by silicon

116 byte bindcode hardcoded for Windows XP SP1 that binds to port 58821.

tags | shellcode
systems | windows
SHA-256 | abf4eec07676343f098cc1af8e0c484725497c40b865fc7fa135495b2a94954a
STG-Verity-K2.txt
Posted Jul 4, 2003
Authored by STG Security

STG Security Advisory SSA-20030701-02 - The Verity K2 Toolkit Query Builder suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 47b9a884062a2fa4a62f0c83e481dc34e665de880a67fb70500473063be7008d
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close