what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files Date: 2003-07-04

screenapple.txt
Posted Jul 4, 2003
Authored by Delfim Machado | Site lab.xpto.org

The screen saver that comes with MacOSX crashes when an large amount of characters are entered and then the return key is pressed. At this point, access to the desktop is achieved.

tags | exploit
SHA-256 | 580c1aa4b027ccdd05e8525a8ed42272ff29b6f6fedab5539018ad21fadd994c
core.netmeeting.txt
Posted Jul 4, 2003
Authored by Hernan Ochoa, Gustavo Ajzenman, Javier Garcia Di Palma, Pablo Rubinstein | Site coresecurity.com

Core Security Technologies Advisory ID: CORE-2003-0305-04 - Windows NetMeeting is vulnerable to a directory traversal attack that allows remote arbitrary code execution. Vulnerable version: NetMeeting 3.01 (4.4.3385), possibly others. Fixed in Service Pack 4.

tags | exploit, remote, arbitrary, code execution
systems | windows
SHA-256 | 37573598836434eb829a0bd11e8ad4eae7fa6d4cbf8c3647e8d0168be675a1ea
kereval.phpgroup.txt
Posted Jul 4, 2003
Authored by Francois SORIN | Site kereval.com

Kereval Security Advisory KSA-003 - Cross Site Scripting vulnerabilities exist in Phpgroupware very 0.9.14.003.

tags | exploit, vulnerability, xss
SHA-256 | 115009ff8f21003689ec49c463c4c30c56eedbbdb2ef2b35c538dd0cec9fc89c
xbox001.txt
Posted Jul 4, 2003
Authored by Stefan Esser

A vulnerability within the XBOX Dashboard allows a complete compromise of the security features. The problem lies in the handling of font files when the dashboard loads and allows a person with local access the ability to do anything they want on an XBox without having to open, solder, or swap a hard drive.

tags | advisory, local
SHA-256 | 1ba78f7ab3b8b8fec30b9ed4589338a62969e572c52acd5bd24baf88365b6875
core.active.txt
Posted Jul 4, 2003
Authored by Eduardo Arias, Gabriel Becedillas, Ricardo Quesada, Damian Saura | Site coresecurity.com

Core Security Technologies Advisory ID: CORE-2003-0305-03 - The Microsoft Active Directory functionality is remotely and locally vulnerable to a stack overflow that allows an attacker to crash and force a reboot of any Windows 2000 server. Vulnerable package: Windows 2000 Server with Active Directory SP3. Fixed with Service Pack 4.

tags | exploit, overflow
systems | windows
SHA-256 | afedd8c7f809a694f9bb53497d9c62835d5aef2a503c9fd6108f9274b8cd15f5
essenexploit.c
Posted Jul 4, 2003
Authored by B-r00t

A buffer overflow exists in the Essentia Web Server for Linux due to bad boundary checking with long urls which are greater than 2000 bytes. Versions higher than 2.12 are vulnerable.

tags | exploit, web, overflow
systems | linux
SHA-256 | f55766bfff8269fac9c31113d14529568080f5e761e6c0b22990bb0daaf7d482
wilco.zip
Posted Jul 4, 2003
Authored by Luigi Auriemma | Site aluigi.altervista.org

This tool make uses of the recent vulnerabilities discussed here regarding a broadcast buffer overflow and server freeze denial of service discovered in Roger Wilco.

tags | exploit, denial of service, overflow, vulnerability
SHA-256 | 62f78f06b0794bd0e528ae135c68d893b70aae1ba695c071a7e8b7f5937a0cdf
rogerwilco.txt
Posted Jul 4, 2003
Authored by Luigi Auriemma | Site aluigi.altervista.org

Roger Wilco, the popular tool that lets gamers speak while playing online games, has two vulnerabilities. The first lies in a buffer overflow where a nickname that is longer than 516 bytes can be sent out in a broadcast message that will allow a remote attacker to take control of every client connected to the server. The second problem lies in a partially completely packet being sent to the server that will cause it to freeze.

tags | advisory, remote, overflow, vulnerability
SHA-256 | eb9ce2e3dad0a654a3c5aa35f45d02c0262452e17e4a8662f44ddb67bc164eab
bindcode.c
Posted Jul 4, 2003
Authored by silicon

116 byte bindcode hardcoded for Windows XP SP1 that binds to port 58821.

tags | shellcode
systems | windows
SHA-256 | abf4eec07676343f098cc1af8e0c484725497c40b865fc7fa135495b2a94954a
STG-Verity-K2.txt
Posted Jul 4, 2003
Authored by STG Security

STG Security Advisory SSA-20030701-02 - The Verity K2 Toolkit Query Builder suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 47b9a884062a2fa4a62f0c83e481dc34e665de880a67fb70500473063be7008d
Page 1 of 1
Back1Next

File Archive:

October 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    10 Files
  • 2
    Oct 2nd
    0 Files
  • 3
    Oct 3rd
    0 Files
  • 4
    Oct 4th
    0 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    0 Files
  • 8
    Oct 8th
    0 Files
  • 9
    Oct 9th
    0 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    0 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close