exploit the possibilities
Showing 1 - 22 of 22 RSS Feed

Files Date: 2003-09-13

Posted Sep 13, 2003
Authored by Eduardo Ruiz Duarte | Site lea.research.kelsisiler.com

LEA is a simple algorithm for file encryption that uses some boolean algebra and modular arithmetic. It can test the stream and generates numbers with a logical order. Using bytes as increments and decrements you can choose between a normal encryption without pseudo-random data generator or steganography with/without random data emulating binary executables. By default it includes a VMS Alpha Executable and a Linux IA32 ELF you can add to the binaries on a standard header included in the distribution and editing the steganographic routine, the fake binary included works on all the Linux distributions over IA32. Tested on HP-UX IA64, FreeBSD IA-32, Linux IA64 and Linux IA32.

tags | tool
systems | linux, unix, freebsd, hpux
MD5 | ecc5569c443ba6e20bf426e4f1ae039c
Posted Sep 13, 2003
Site secunia.com

Secunia Research Advisory - A vulnerability has been identified in OpenBSD allowing a malicious root user to escalate privileges. The problem is that the root user may set the semaphore limit to a high value, which causes an integer overflow. This could be exploited to bypass the security level access control (securelevel) specified at boot time.

tags | advisory, overflow, root
systems | openbsd
MD5 | 62118824fea03a09d2b6cc1c0266b28b
Posted Sep 13, 2003
Authored by WebCohort Research | Site secunia.com

Secunia Research Advisory - A vulnerability has been reported in ASP.NET, which can be exploited by malicious people to bypass the "Request Validation" security mechanism. The "Request Validation" mechanism designed to protect against Cross-Site Scripting and SQL injection allows restricted tags when they include a NULL byte. However, this is a problem since some browsers, like Internet Explorer, ignore NULL bytes when parsing input, which may cause them to execute the content in the tags anyway.

tags | advisory, xss, sql injection, asp
MD5 | dbeed33fcccf52089981183428f81bd4
Posted Sep 13, 2003
Authored by Phuong Nguyen | Site secunia.com

Secunia Research Advisory - Two vulnerabilities have been identified in FTGatePro mail server version 1.x that allow malicious users to access sensitive information. One lies in the file ftgatedump.fts allowing an attacker to see the system configuration while another lies in exportmbx.fts that holds all the usernames and passwords for the system.

tags | exploit, vulnerability
MD5 | 92c1ea9ed17988649d4fcb386b69df54
Posted Sep 13, 2003
Authored by Phuong Nguyen | Site secunia.com

Secunia Research Advisory - Two vulnerabilities have been identified in Gordano, which allows malicious people to consume large amounts of CPU power and see information about other users.

tags | advisory, vulnerability
MD5 | 5e7b090b3b2e4c82d7edc31e781b80b2
Posted Sep 13, 2003
Authored by sw | Site oc192.us

Program for testing weak binaries for basic overflows. It can test command line overflows, ENV and basic format string vulnerabilities as well. Utilizes ptrace() to analyze the stack during testing and report any overwritten stack addresses and other important data. Very useful for testing items that are precompiled.

tags | tool, overflow, vulnerability
systems | unix
MD5 | 6356c0d54bbe21cd93ffacf49f8e3293
Posted Sep 13, 2003
Authored by Kevin Finisterre

Secure Network Operations, Inc. Advisory SRT2003-09-11-1200 - In the man-1.5x code, some checks may not be present upon compile time that keep man from not being vulnerable. RedHat 9 is one such installation that ships man setgid and vulnerable to attack if the vendor supplied binary is utilized. http://www.secnetops.com.

tags | advisory, web
systems | linux, redhat
MD5 | 80ba327fce376e89475995556633c822
Posted Sep 13, 2003
Authored by David Litchfield | Site ngssoftware.com

Thorough paper discussing how to defeat the stack based buffer overflow prevention mechanism in Microsoft Windows 2003 Server.

tags | paper, overflow
systems | windows
MD5 | f09f810282da026ea8ed89185fd641d9
Posted Sep 13, 2003
Authored by Nasser.M.Sh

Bandsite portal system version 1.5 lacks authentication validation in its admin.php code when an administrator is added, thus allowing a remote attacker to gain administrative privileges.

tags | exploit, remote, php
MD5 | f7c0dc27a28dfa690190754c5b69973c
Posted Sep 13, 2003
Authored by Ramon de C Valle | Site risesecurity.org

Code that executes /bin/sh.

tags | shellcode
MD5 | 09ca8554189e398cd233066a12895d8c
Posted Sep 13, 2003
Authored by Ramon de C Valle | Site risesecurity.org

Code that attempts to restore root privileges.

tags | root, shellcode
MD5 | ef537511fd224aa6b8ecc0d1d33c335c
Posted Sep 13, 2003
Authored by Ramon de C Valle | Site risesecurity.org

Network server code that creates a listening TCP socket on port 65535 and executes /bin/sh.

tags | tcp, shellcode
MD5 | e48352b79c2f4c657379c300f2eb79c0
Posted Sep 13, 2003
Authored by Ramon de C Valle | Site risesecurity.org

Network server code that creates a listening TCP socket on port 65535.

tags | tcp, shellcode
MD5 | b7cdd2048b9450de3c4bd4032ed30252
Posted Sep 13, 2003
Authored by Mark Osborne

WIDZ version 1.8 is an IDS system for 802.11 that guards access points and monitors local frequencies for potentially malevolent activity. It detects scans, association floods, and bogus or rogue APs. It can easily be integrated with SNORT or RealSecure.

Changes: Improved scanning, more signatures for many common attacks including WLANJack and FATAJACK, custom scripting facility added, and various bug fixes.
tags | tool, local, wireless
MD5 | 2dc3467d00cba82448195cb710170b0c
Atstake Security Advisory 03-09-11.1
Posted Sep 13, 2003
Authored by Atstake, Ollie Whitehouse | Site atstake.com

Atstake Security Advisory A091103-1 - The Asterisk software PBX is vulnerable to a SQL injection attack if a user is able to supply malformed CallerID data.

tags | advisory, sql injection
advisories | CVE-2003-0779
MD5 | a2417515aa626b86776f829019430129
Posted Sep 13, 2003
Authored by B-r00t | Site doris.scriptkiddie.net

4D WebSTAR FTP server suite version 5.3.1 remote exploit that binds a shell to port 6969 as the uid running the server. This exploit makes use of the pre-authentication buffer overflow that exists in the login mechanism of the WebSTAR FTP service.

tags | exploit, remote, overflow, shell
MD5 | 7456e23cbadbcbea96645ab9eee368c0
Posted Sep 13, 2003
Authored by Liu Die Yu | Site secunia.com

Secunia Research Advisory - Multiple remotely exploitable vulnerabilities have been discovered in Microsoft Internet Explorer, including cross site scripting problems, exposure of sensitive information, and system access. Vulnerable versions are 5.01, 5.5, and 6.

tags | advisory, vulnerability, xss
MD5 | e6d7515d6a4938897b8c6e414eb9f361
Posted Sep 13, 2003
Authored by Debian, Alexander Hvostov, Julien Blache, Aurelien Jarno | Site debian.org

Debian Security Advisory DSA 379-1 - Several security related problems have been discovered in the sane-backends package that allows a remote attacker to cause a denial of service.

tags | advisory, remote, denial of service
systems | linux, debian
advisories | CVE-2003-0773, CVE-2003-0774
MD5 | e5b111f727f2542f666e3a3f5eeffa65
Posted Sep 13, 2003
Authored by Frank Denis | Site secunia.com

Secunia Research Advisory - A vulnerability in MySQL version 4.0.14 and below, due to a boundary error when checking passwords before hashing and storing them in the User table, can be exploited by malicious users to escalate their privileges via supplying a value longer than 16 characters using set password.

tags | advisory
MD5 | e7f100b3982c843c5892e2563a9acfe2
Posted Sep 13, 2003
Authored by Mayhem | Site elfsh.devhell.org

Elf Shell v0.51b3-portable is an automated reverse engineering tool with read/write capability for the ELF format. Sophisticated output with cross references using .got, .ctors, .dtors, .symtab, .dynsym, .dynamic, .rel.* and many other with an integrated hexdump. Designed for Linux. All calls encapsulated in libelfsh.a, so the elfsh API is really reusable.

Changes: It works on Linux, NetBSD, FreeBSD, and Solaris for the INTEL and SPARC architectures. It provides ET_REL injection into ET_EXEC for both arch, and INTEL control flow graphs, as well as a lot of new improvements, as featured lastly in The Cerberus ELF interface article in phrack #61.
tags | shell
systems | linux
MD5 | e8073d475e82dc911a7ebfa6f2567719
Posted Sep 13, 2003
Authored by Frog Man | Site phpsecure.info

myPHPNuke version 1.8.8_7 performs improper variable sanitizing that will inadvertently allow a remote attacker to upload files from another site to the current site.

tags | exploit, remote
MD5 | 82ce1f957a210e93e078256ee2002d53
Posted Sep 13, 2003
Authored by NSFOCUS | Site nsfocus.com

NSFOCUS Security Advisory SA2003-06 - The NSFOCUS Security Team has found a remotely exploitable buffer overflow vulnerability in the RPC DCOM interface of Microsoft Windows. Exploiting the vulnerability remote attackers could gain local system privileges.

tags | advisory, remote, overflow, local
systems | windows
MD5 | c2bd1051a3ca1f7d19e7f6225e9fedac
Page 1 of 1

File Archive:

November 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    19 Files
  • 2
    Nov 2nd
    25 Files
  • 3
    Nov 3rd
    8 Files
  • 4
    Nov 4th
    7 Files
  • 5
    Nov 5th
    24 Files
  • 6
    Nov 6th
    0 Files
  • 7
    Nov 7th
    0 Files
  • 8
    Nov 8th
    18 Files
  • 9
    Nov 9th
    9 Files
  • 10
    Nov 10th
    106 Files
  • 11
    Nov 11th
    19 Files
  • 12
    Nov 12th
    13 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    18 Files
  • 16
    Nov 16th
    12 Files
  • 17
    Nov 17th
    15 Files
  • 18
    Nov 18th
    12 Files
  • 19
    Nov 19th
    4 Files
  • 20
    Nov 20th
    2 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    22 Files
  • 23
    Nov 23rd
    14 Files
  • 24
    Nov 24th
    19 Files
  • 25
    Nov 25th
    4 Files
  • 26
    Nov 26th
    1 Files
  • 27
    Nov 27th
    4 Files
  • 28
    Nov 28th
    1 Files
  • 29
    Nov 29th
    11 Files
  • 30
    Nov 30th
    7 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2020 Packet Storm. All rights reserved.

Security Services
Hosting By