exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 14 of 14 RSS Feed

Files Date: 2003-07-24

ZH2003-12SA.txt
Posted Jul 24, 2003
Authored by Trash-80 | Site zone-h.org

PHP-G

tags | exploit, remote, php, info disclosure
SHA-256 | 078015488d26f1dd993259eac78f9ecdbd1e53a886fe906982d804667e0be8e6
bios.zalewski.txt
Posted Jul 24, 2003
Authored by Michal Zalewski | Site lcamtuf.coredump.cx

Various configurations of CPU/BIOS/OS can lead to a denial of service on a server by a local user due to certain BIOSes not zeroing out MSRs on reboot. Patch included.

tags | advisory, denial of service, local
SHA-256 | ca31052b05fc2352ad297512130b304003132d25354bf262fd89aa8fc1a9205a
dcomx.pl
Posted Jul 24, 2003
Authored by Knight420

Remote denial of service exploit making use of the vulnerability found in DCOM under Windows.

tags | exploit, remote, denial of service
systems | windows
SHA-256 | d713c961d2e4c5c929651f387787d375feb82aa68cc35f126fa794fd0d189fdf
integrigy.oracle2.txt
Posted Jul 24, 2003
Authored by Stephen Kost | Site integrigy.com

Integrigy Security Alert - The Oracle Applications AOL/J Setup Test Suite, used to trouble-shoot the Self-Service framework, can be exploited to remotely retrieve sensitive configuration and host information without application authentication. The AOL/J Setup Test Suite is installed by default for all 11i implementations. A mandatory patch from Oracle is required to solve this security issue. Affected versions: 11.5.1 - 11.5.8.

tags | advisory
SHA-256 | 854e86c2ad0a68b842923e90cca894c381a953aeda7c67d317b9cdd7deb2aefc
integrigy.oracle.txt
Posted Jul 24, 2003
Authored by Stephen Kost | Site integrigy.com

Integrigy Security Alert - The Oracle Applications FNDWRR CGI program, used to retrieve report output from the Concurrent Manager server via a web browser, has a remotely exploitable buffer overflow. A mandatory patch from Oracle is required to solve this security issue. Affected versions: 11.0 and 11.5.1 - 11.5.8.

tags | advisory, web, overflow, cgi
SHA-256 | 35163210430282df91a1cb019208a07bf7a0cc546bf99ea364752eb19abc2a02
ethereal-user-guide.pdf
Posted Jul 24, 2003
Authored by Richard Sharpe, Ed Warnicke | Site my.lulu.com

Ethereal is one of those packages that many network managers would love to be able to use, but they are often prevented from getting what they would like from Ethereal because of the lack of documentation. This document is part of an effort on the part of the Ethereal team to improve the accessibility of Ethereal.

tags | tool, sniffer
SHA-256 | 618a41b9e6642eaa7c78e75a9ba30c173ace317aaeadbc6c608977bbdff33552
msqlex.c
Posted Jul 24, 2003
Authored by The Itch, netric, lucipher | Site netric.org

Remote exploit for miniSQL version 1.3 and below that achieves privilege escalation root gid.

tags | exploit, remote, root
SHA-256 | e3637acdc0aea734e04f3ed1cd756e1015ef7c75c0c7bf4b03ee10155c796dc7
NetScare.c
Posted Jul 24, 2003
Authored by Knight420

Remote buffer overflow denial of service exploit for the Netware Enterprise CGI2PERL.NLM.

tags | exploit, remote, denial of service, overflow
SHA-256 | 33d051b502f0487617368e88328921009574f44a7495c5805d2770bd46b2cdd0
Atstake Security Advisory 03-07-23.3
Posted Jul 24, 2003
Authored by Atstake, Andreas Junestam | Site atstake.com

Atstake Security Advisory A072303-3 - By sending a specially crafted message to the local LPC port for Microsoft SQL Server, it is possible to overwrite information stored on the stack. This would allow an attacker to execute code under SQL Server's credentials thereby escalating privileges. This would then allow the user to read and write access to the database files. If the SQL Server is running under the Administrator or Local System account this would enable system compromise.

tags | advisory, local
advisories | CVE-2003-0232
SHA-256 | 117cbb53e11b5d137ca26262d9725ad4c4f1bef3dd4ac8e5e18f9278df670308
Atstake Security Advisory 03-07-23.2
Posted Jul 24, 2003
Authored by Atstake, Andreas Junestam | Site atstake.com

Atstake Security Advisory A072303-2 - By sending a large request to a named pipe used by the Microsoft SQL Server, an attacker can render the service unresponsive. Under some circumstances, the host has to be restarted to recover from this situation.

tags | advisory
advisories | CVE-2003-0231
SHA-256 | 4da882968c57e3021287c2926f476d383da49f08fd6b93c99584ab7e7a62fd5e
Atstake Security Advisory 03-07-23.1
Posted Jul 24, 2003
Authored by Jeremy Rauch, Atstake, Matthew Miller | Site atstake.com

Atstake Security Advisory A072303-1 - A flaw exists in the Windows NT 4.0 file name processing. The flaw can cause heap corruption to occur when a long string is passed to the file name functions. This results in the program calling the NT 4.0 file name processing functions to crash. One attack vector identified is through a Java servlet running on the IBM JVM.

tags | advisory, java
systems | windows
advisories | CVE-2003-0525
SHA-256 | 0e3ea90058d665a67768d87daa55ed99b0140ecb0adefcc560fee055b21f3437
malware.txt
Posted Jul 24, 2003
Site malware.com

Post discussing vulnerabilities in deployment of dangerous files onto a target machine utilizing the Windows Media Player.

tags | advisory, vulnerability
systems | windows
SHA-256 | 8f316501a1dad19f5066131347357a6b5fef2a66474c18543f7935f8ac377235
snort-2.0.1.tar.gz
Posted Jul 24, 2003
Authored by Martin Roesch | Site snort.org

Snort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more. Includes real time alerting, incorporating alerting mechanisms for syslog, a user specified file, a UNIX socket, or WinPopup messages via smbclient.

Changes: Fixed host endianness problem in UDP decoder, VLAN decoding fixes from Michael Pomraning, add edtcp state checking to httpflow, added window detection plugin documentation to manual, lots of new rules and tons of new rule documentation, and more documented in the changelog.
tags | tool, overflow, cgi, sniffer, protocol
systems | unix
SHA-256 | b788871c0f91201b1a31c1f00aaa9c66675d601621475bdce6d1b47247ca04f4
bannascanna-v0.2.3.c
Posted Jul 24, 2003
Authored by Intrusive

Threaded banner scanner that is rather versatile and lightweight.

tags | tool, scanner
systems | unix
SHA-256 | 8265bf561570b0b737107a03fe3943d365b3ba56e5ee0416bf40453166ab473d
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close