the original cloud security
Showing 1 - 17 of 17 RSS Feed

Files Date: 2003-09-10

Posted Sep 10, 2003

Complete moron at Defcon 11 performing the Magnum look.

systems | unix
MD5 | 6365a1830b725fabdca8fd1dec491430
Posted Sep 10, 2003
Authored by ORK | Site

libShellCode is a library that can be included when writing linux/i386 exploits by providing functions that generate shellcode with user given parameters during runtime.

Changes: Added support for port-binding and connect-back ShellCodes and the possibility to execute commands with parameters.
tags | shellcode
systems | linux
MD5 | 899f7ac82cfcd14e5df56937646d6720
Posted Sep 10, 2003
Authored by B-r00t

White paper discussing OS X (Darwin) shellcode assembly on the PowerPC 32bit architecture. It covers design considerations, system calls, eliminating NULL bytes, self modifying shellcode, and more.

tags | shellcode
systems | apple, osx
MD5 | d3decf91003f389c72d2a3b95a807d63
Posted Sep 10, 2003
Authored by dsr, Angelo Rosiello, rosiello | Site

White paper discussing stack overflows, ways to exploit them, and SIMPLESEM.

tags | overflow
MD5 | fd00b1f993c5f76ae944c8e8832e0d99
Posted Sep 10, 2003
Authored by B-r00t | Site

An easy PowerPC shellcode generation program to extract the hex shellcode from an ASM program that has been assembled but not linked. Tested on programs assembled using the GAS (GNU Assembler) on OSX 10.2.6.

tags | shellcode
systems | apple
MD5 | 4290c15598dc2ac40d20926c0189dc92
Posted Sep 10, 2003
Authored by Gerald Combs | Site

Ethereal is a GTK+-based network protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Ethereal features that are missing from closed-source sniffers. Screenshot available here.

Changes: Improved support for searching capture files. Conversation List (aka "top talker") support has been added to Ethereal and Tethereal. Protocol statistics in general have been updated. An H.225 dissector has been added. It can automatically recognize RTP and RTCP conversations. A preference file has been added for disabled protocols. Color filters may now be imported and exported from within Ethereal. A new column type has been added for cumulative bytes.
tags | tool, sniffer, protocol
systems | unix
MD5 | 44b1fafae16c7235700d50fabf0b7079
Posted Sep 10, 2003

Secunia Research Advisory - Apache::Gallery module version 0.6 and below suffers from a privilege escalation vulnerability that exists due to shared libraries being created insecurely.

tags | advisory
MD5 | 536a16a96471458982f3ef249ee115ef
Posted Sep 10, 2003

Secunia Research Advisory - A vulnerability has been identified in Net-SNMP that is caused due to an unspecified error. This reportedly makes it is possible for a user or community to gain access to data in MIB objects that they explicitly have been restricted from accessing.

tags | advisory
MD5 | bb16bd6cfa2b9e6cabd8b1e9e1bcdb00
Posted Sep 10, 2003

Secunia Research Advisory - KokeshCMS 0.2 and below has a content editing vulnerability where the edit.php included with it does not force a remote user to be authenticated.

tags | advisory, remote, php
MD5 | aa4af4fd6f735a0a0cf9d3cb1db9ea17
Posted Sep 10, 2003

RedHat Security Advisory - New GtkHTML packages have been released that fix a vulnerability discovered by Alan Cox. The problem discovered allowed certain malformed messages to cause the Evolution mail component to crash due to a null pointer dereference in the GtkHTML library.

tags | advisory
systems | linux, redhat
advisories | CVE-2003-0541
MD5 | bb3af111dbe42bddeffd8e913e02f228
Posted Sep 10, 2003
Authored by Matt Zimmerman, Nicolas Boullis | Site

Debian Security Advisory DSA 378-1 - Two vulnerabilities have been found in the Mah-Jong server version 1.4 and below. One enables a remote attacker to gain privileges of the user running the server while the other leads to a denial of service.

tags | advisory, remote, denial of service, vulnerability
systems | linux, debian
advisories | CVE-2003-0705, CVE-2003-0706
MD5 | 66045611104a0bbf829c88a2662df3e4
Posted Sep 10, 2003

Secunia Security Advisory - b2evolution versions 0.8.2 and prior have been found vulnerable to cross site scripting and SQL injection attacks.

tags | advisory, xss, sql injection
MD5 | 733835528ae91f6e01ad586203463db8
Posted Sep 10, 2003

Secunia Research Advisory - OSSIM, or Open Source Security Information Management, version 0.x is vulnerable to multiple SQL injection attacks.

tags | advisory, sql injection
MD5 | 6135d19bd78b3014f68676e64e2ef54c
Posted Sep 10, 2003
Authored by Dr. Insane | Site

WebX 1.1 and WebX Lite 1.1 web servers are vulnerable to a directory traversal attack that allows a remote attacker to access any files outside of the web root.

tags | exploit, remote, web, root
MD5 | 156de465b5dc858d41dabb4a2546a5d6
Posted Sep 10, 2003
Authored by Badpack3t | Site

Remote denial of service exploit for MyServer 0.4.3.

tags | exploit, remote, denial of service
MD5 | 26fe6f995a2b40b213a0a7f660d0d2b5
Posted Sep 10, 2003
Authored by Badpack3t | Site

MyServer 0.4.3 is vulnerable to a denial of service attack when a malicious payload is sent to the web server.

tags | advisory, web, denial of service
MD5 | db0bc60cca9b2258ee30aaf6672ee5cb
Posted Sep 10, 2003
Authored by Luigi Auriemma | Site

Winamp 2.91 uses a default plugin called IN_MIDI.DLL used to play MIDI files. Version 3.01 and below for this plugin lets an attacker execute code by simply setting the "Track data size" value of a MIDI file to 0xffffffff.

tags | advisory
MD5 | 32d2c23cf4bfefe846c77f838efc31ec
Page 1 of 1

File Archive:

October 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    15 Files
  • 2
    Oct 2nd
    16 Files
  • 3
    Oct 3rd
    15 Files
  • 4
    Oct 4th
    15 Files
  • 5
    Oct 5th
    11 Files
  • 6
    Oct 6th
    6 Files
  • 7
    Oct 7th
    2 Files
  • 8
    Oct 8th
    1 Files
  • 9
    Oct 9th
    13 Files
  • 10
    Oct 10th
    16 Files
  • 11
    Oct 11th
    15 Files
  • 12
    Oct 12th
    23 Files
  • 13
    Oct 13th
    13 Files
  • 14
    Oct 14th
    12 Files
  • 15
    Oct 15th
    2 Files
  • 16
    Oct 16th
    16 Files
  • 17
    Oct 17th
    16 Files
  • 18
    Oct 18th
    15 Files
  • 19
    Oct 19th
    10 Files
  • 20
    Oct 20th
    7 Files
  • 21
    Oct 21st
    4 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2016 Packet Storm. All rights reserved.

Security Services
Hosting By