exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 12 of 12 RSS Feed

Files Date: 2003-07-11

Some_people_walk_in_the_rain.GIF
Posted Jul 11, 2003
Authored by erfmufn

Another submission of a t-shirt graphic for Packet Storm.

SHA-256 | 794a4b796619be7e502818e0873d5237f7795ce41886683121a1e66ccefd49a9
DSR-mirc-url-spoofing.txt
Posted Jul 11, 2003
Authored by dsr, Knud Erik Hojgaard | Site dtors.net

mIRC 6.03 and below allows an attacker to misleading supply a URL that poses as one URL but leads to another by setting the color of the secondary URL to the default background color.

SHA-256 | 6b69a01535a0c67322cb56b25faa8fc7dba090f0825a3a04ed026b05cdd0462d
DSR-mirc-dcc-server.txt
Posted Jul 11, 2003
Authored by dsr, Knud Erik Hojgaard | Site dtors.net

mIRC 6.03 and below allow the ability for a remote attacker to spoof a dcc chat request in a targets client.

tags | remote, spoof
SHA-256 | e563523994f9fa8795dd89183f1920def4ff07f15d1392c758656569e82a5204
DSR-mnogo.pl
Posted Jul 11, 2003
Authored by dsr, inv | Site dtors.net

Proof of concept exploit for mnoGoSearch 3.1.20 (and possibly works on 3.2.10) that binds a shell to port 10000. Tested against FreeBSD.

tags | exploit, shell, proof of concept
systems | freebsd
SHA-256 | 3b52260178c6331557b9865a060541ff07d5cdeeedbe2e926b3952bdeac4b23d
Shatter_Redux.pdf
Posted Jul 11, 2003
Authored by Oliver Lavery | Site idefense.com

An iDEFENSE released security paper reflecting on the Shatter Attacks found against the Windows operating system in 2002. It clarifies what the flaws in the Windows event model are, describes a related vulnerability that continues to exist in many popular software products and suggests ways in which these unfixable flaws might be addressed.

tags | paper
systems | windows
SHA-256 | fb0fa8745192613a9bdb181c4d941509343bd2f72a05a7a56786349fd4ee1876
TurboFTP.txt
Posted Jul 11, 2003
Authored by Peter Winter-Smith

The TurboFTP client version 3.85 Build 304 is vulnerable to a buffer overflow attack from a malicious FTP server that can result in a denial of service and possibly remote command execution.

tags | advisory, remote, denial of service, overflow
SHA-256 | f666e3f6258f9bbb643fec3e3b0a1981eba0a2e3fab1c7aec152a14da0621a2d
SCSA019.txt
Posted Jul 11, 2003
Authored by Gregory Le Bras | Site Security-Corp.org

Security Corporation Security Advisory [SCSA-019]: Gattaca Server 2003 version 1.0.8.1 and below is vulnerable to displaying of directory contents and files, a denial a service, a directory traversal attack, and cross site scripting.

tags | exploit, xss
SHA-256 | 567072b06c844be28273933bafad463f99bca30b3c52eca5e292bebfabe4576e
MABRYdtv.txt
Posted Jul 11, 2003
Authored by Dr. Insane

The Mabry HTTP server version 1.00.047 suffers from multiple directory traversal attacks that allow an attacker to view the content of files outside of the web root.

tags | exploit, web, root
SHA-256 | 43cbd6585f19a0ab1503f294f841079b535fa4c9fde705680474e47079f77515
MABRYadv.txt
Posted Jul 11, 2003
Authored by Dr. Insane

MABRY ftpd is vulnerable to buffer overflows that result in a denial of service via the CWD, STAT, MKD, LIST, and RMD commands when an excess of 3200 bytes are sent.

tags | advisory, denial of service, overflow
SHA-256 | 2bd66cc50e84bb2b6524a75df67d487708d102ac22c134345b076c0ea1a49942
0x333shadow.tar.gz
Posted Jul 11, 2003
Authored by 0x333, nsn | Site 0x333.org

Log cleaner, for Linux, Freebsd, Irix and SunOS. While in the midst of cleaning, various system checks are performed to monitor presence of detection.

tags | tool, rootkit
systems | linux, unix, solaris, freebsd, irix
SHA-256 | ac7c25f0290ba5ef2ac9356d2eeaeb7e0973c568e4f1a337da703005cae7353a
ciscoCatOS.txt
Posted Jul 11, 2003
Authored by Cisco Systems PSIRT | Site cisco.com

Cisco Security Advisory: After receiving eight TCP connection attempts using a non-standard TCP flags combination, a Catalyst switch will stop responding to further TCP connections to that particular service. In order to re-establish functionality of that service, the switch must be rebooted. CatOS for the following models is affected: 4000 Series including models 2948G and 2980G/2980G-A, 5000 Series including models 2901, 2902 and 2926, and the 6000.

tags | advisory, tcp
systems | cisco
SHA-256 | 43e0117dba1a5cf8c123455025e2ce7fb4995a48d74dcb66f65cba5b74ca7a5f
a070803-1-2.txt
Posted Jul 11, 2003
Authored by Andreas Junestam | Site atstake.com

Addition to Atstake Security Advisory A070803-1 clarifying that the named pipe vulnerability discussed lies within the Windows NT/XP/2000 platform and that SQL Server 7.0 can be used as an attack vector along with potentially many other applications.

tags | advisory
systems | windows
SHA-256 | 26389446575344782062c92749190328e8a6e10abf5b4d0f5b30a7cea7e76538
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close