what you don't know can hurt you
Showing 1 - 17 of 17 RSS Feed

Files Date: 2003-09-10

Posted Sep 10, 2003

Complete moron at Defcon 11 performing the Magnum look.

systems | unix
MD5 | 6365a1830b725fabdca8fd1dec491430
Posted Sep 10, 2003
Authored by ORK | Site orkspace.net

libShellCode is a library that can be included when writing linux/i386 exploits by providing functions that generate shellcode with user given parameters during runtime.

Changes: Added support for port-binding and connect-back ShellCodes and the possibility to execute commands with parameters.
tags | shellcode
systems | linux
MD5 | 899f7ac82cfcd14e5df56937646d6720
Posted Sep 10, 2003
Authored by B-r00t

White paper discussing OS X (Darwin) shellcode assembly on the PowerPC 32bit architecture. It covers design considerations, system calls, eliminating NULL bytes, self modifying shellcode, and more.

tags | shellcode
systems | apple, osx
MD5 | d3decf91003f389c72d2a3b95a807d63
Posted Sep 10, 2003
Authored by dsr, Angelo Rosiello, rosiello | Site rosiello.org

White paper discussing stack overflows, ways to exploit them, and SIMPLESEM.

tags | overflow
MD5 | fd00b1f993c5f76ae944c8e8832e0d99
Posted Sep 10, 2003
Authored by B-r00t | Site doris.scriptkiddie.net

An easy PowerPC shellcode generation program to extract the hex shellcode from an ASM program that has been assembled but not linked. Tested on programs assembled using the GAS (GNU Assembler) on OSX 10.2.6.

tags | shellcode
systems | apple
MD5 | 4290c15598dc2ac40d20926c0189dc92
Posted Sep 10, 2003
Authored by Gerald Combs | Site ethereal.com

Ethereal is a GTK+-based network protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Ethereal features that are missing from closed-source sniffers. Screenshot available here.

Changes: Improved support for searching capture files. Conversation List (aka "top talker") support has been added to Ethereal and Tethereal. Protocol statistics in general have been updated. An H.225 dissector has been added. It can automatically recognize RTP and RTCP conversations. A preference file has been added for disabled protocols. Color filters may now be imported and exported from within Ethereal. A new column type has been added for cumulative bytes.
tags | tool, sniffer, protocol
systems | unix
MD5 | 44b1fafae16c7235700d50fabf0b7079
Posted Sep 10, 2003
Site secunia.com

Secunia Research Advisory - Apache::Gallery module version 0.6 and below suffers from a privilege escalation vulnerability that exists due to shared libraries being created insecurely.

tags | advisory
MD5 | 536a16a96471458982f3ef249ee115ef
Posted Sep 10, 2003
Site secunia.com

Secunia Research Advisory - A vulnerability has been identified in Net-SNMP that is caused due to an unspecified error. This reportedly makes it is possible for a user or community to gain access to data in MIB objects that they explicitly have been restricted from accessing.

tags | advisory
MD5 | bb16bd6cfa2b9e6cabd8b1e9e1bcdb00
Posted Sep 10, 2003
Site secunia.com

Secunia Research Advisory - KokeshCMS 0.2 and below has a content editing vulnerability where the edit.php included with it does not force a remote user to be authenticated.

tags | advisory, remote, php
MD5 | aa4af4fd6f735a0a0cf9d3cb1db9ea17
Posted Sep 10, 2003
Site redhat.com

RedHat Security Advisory - New GtkHTML packages have been released that fix a vulnerability discovered by Alan Cox. The problem discovered allowed certain malformed messages to cause the Evolution mail component to crash due to a null pointer dereference in the GtkHTML library.

tags | advisory
systems | linux, redhat
advisories | CVE-2003-0541
MD5 | bb3af111dbe42bddeffd8e913e02f228
Posted Sep 10, 2003
Authored by Matt Zimmerman, Nicolas Boullis | Site debian.org

Debian Security Advisory DSA 378-1 - Two vulnerabilities have been found in the Mah-Jong server version 1.4 and below. One enables a remote attacker to gain privileges of the user running the server while the other leads to a denial of service.

tags | advisory, remote, denial of service, vulnerability
systems | linux, debian
advisories | CVE-2003-0705, CVE-2003-0706
MD5 | 66045611104a0bbf829c88a2662df3e4
Posted Sep 10, 2003
Site secunia.com

Secunia Security Advisory - b2evolution versions 0.8.2 and prior have been found vulnerable to cross site scripting and SQL injection attacks.

tags | advisory, xss, sql injection
MD5 | 733835528ae91f6e01ad586203463db8
Posted Sep 10, 2003
Site secunia.com

Secunia Research Advisory - OSSIM, or Open Source Security Information Management, version 0.x is vulnerable to multiple SQL injection attacks.

tags | advisory, sql injection
MD5 | 6135d19bd78b3014f68676e64e2ef54c
Posted Sep 10, 2003
Authored by Dr. Insane | Site members.lycos.co.uk

WebX 1.1 and WebX Lite 1.1 web servers are vulnerable to a directory traversal attack that allows a remote attacker to access any files outside of the web root.

tags | exploit, remote, web, root
MD5 | 156de465b5dc858d41dabb4a2546a5d6
Posted Sep 10, 2003
Authored by Badpack3t | Site security-protocols.com

Remote denial of service exploit for MyServer 0.4.3.

tags | exploit, remote, denial of service
MD5 | 26fe6f995a2b40b213a0a7f660d0d2b5
Posted Sep 10, 2003
Authored by Badpack3t | Site security-protocols.com

MyServer 0.4.3 is vulnerable to a denial of service attack when a malicious payload is sent to the web server.

tags | advisory, web, denial of service
MD5 | db0bc60cca9b2258ee30aaf6672ee5cb
Posted Sep 10, 2003
Authored by Luigi Auriemma | Site aluigi.altervista.org

Winamp 2.91 uses a default plugin called IN_MIDI.DLL used to play MIDI files. Version 3.01 and below for this plugin lets an attacker execute code by simply setting the "Track data size" value of a MIDI file to 0xffffffff.

tags | advisory
MD5 | 32d2c23cf4bfefe846c77f838efc31ec
Page 1 of 1

File Archive:

April 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    17 Files
  • 2
    Apr 2nd
    2 Files
  • 3
    Apr 3rd
    2 Files
  • 4
    Apr 4th
    0 Files
  • 5
    Apr 5th
    15 Files
  • 6
    Apr 6th
    15 Files
  • 7
    Apr 7th
    20 Files
  • 8
    Apr 8th
    16 Files
  • 9
    Apr 9th
    5 Files
  • 10
    Apr 10th
    0 Files
  • 11
    Apr 11th
    0 Files
  • 12
    Apr 12th
    4 Files
  • 13
    Apr 13th
    15 Files
  • 14
    Apr 14th
    27 Files
  • 15
    Apr 15th
    0 Files
  • 16
    Apr 16th
    0 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2020 Packet Storm. All rights reserved.

Security Services
Hosting By