exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 14 of 14 RSS Feed

Files Date: 2003-10-06

JSHTMLinject.txt
Posted Oct 6, 2003
Authored by nimber

File-Sharing for NET v1.5 and Forums Web Server v1.5 both suffer from various Javascript and HTML code injection vulnerabilities.

tags | advisory, web, javascript, vulnerability
SHA-256 | 695984bacdaf8ea460a1c426fdfcb292c9cdd6c0fcf023c7e4d6190f6fd322d2
divineXSS.txt
Posted Oct 6, 2003
Authored by Valgasu

A vulnerability has been reported in Divine Content Server 5.x, which can be exploited by malicious people to conduct Cross-Site Scripting attacks against visitors.

tags | advisory, xss
SHA-256 | ab2bfd56158284ff18d428f04473a145bd1d06cbda895c15a1b08c567f50cbcc
susewm.txt
Posted Oct 6, 2003
Authored by Stefan Nordhausen

A vulnerability exists in the susewm package in SuSE Linux 8.2Pro where a symbolic link attack can escalate a user to root privileges. Workaround included.

tags | advisory, root
systems | linux, suse
SHA-256 | 0aa80f207e5b08ebc11c3b7e43d9ddc9e7d6a91abd06fb2afd67f194ee6f79f1
javarunt.txt
Posted Oct 6, 2003
Authored by Stefan Nordhausen

The javarunt package distributed with SuSE Linux 7.3Pro is vulnerable to a local symbolic link attack that can achieve root privileges. Workaround included.

tags | advisory, local, root
systems | linux, suse
SHA-256 | 48a51c859fafc06b87258f025b2ef34173b96836352430cbc98107ca9004c380
easyfile12.txt
Posted Oct 6, 2003
Authored by nimber | Site nimber.plux.ru

Easy File Sharing Web Server 1.2 allows for remote access to logs and options without any type of authentication.

tags | exploit, remote, web
SHA-256 | 1f238918cd90aa0dc5dd59a8410daa436e3f3811bccae026948c30e06e1ae6a1
57040.txt
Posted Oct 6, 2003
Site sun.com

Sun Alert ID: 57040 - The Sun Am7990 ("LANCE") Ethernet driver (le(7D)) may reuse old frame buffer data to pad packets resulting in an information leakage vulnerability that may allow a remote privileged user to harvest sensitive information from network traffic. Original advisory regarding this type of vulnerability originally issued by Atstake here.

tags | advisory, remote
SHA-256 | eff98374fe0c7cde07392e38a84cef7f82576c53ea790059ec2742d71ef2b2b0
conexant.txt
Posted Oct 6, 2003
Authored by Chris Norton

The Conexant Access Runner DSL Console has faulty authentication capabilities that allow an attacker to login as the administrator after one failed attempt.

tags | exploit
SHA-256 | 9ca461e85238f47a1609559d07b6f180830fdb3564d26d03d99cffae24b0061d
jboss.txt
Posted Oct 6, 2003
Authored by Marc Schoenefeld | Site illegalaccess.org

Illegalaccess.org Security Alert - JBoss 3.2.1, the Java server for running J2EE enterprise applications, is vulnerable to denial of service attacks, log manipulation, manipulation of process variables, and arbitrary command injection.

tags | advisory, java, denial of service, arbitrary
SHA-256 | 55f58d333af30e5d98fa812f5f028f618ac98fb90bf33ce53c06b5ffbb621018
I2S-LAB-25-09-2003.txt
Posted Oct 6, 2003
Authored by Fred Chaverot, Aurelien Boudoux | Site I2S-LaB.com

I2S LAB Security Advisory - The HTTP daemon for FirstClass build 133 (SP3) and below suffers from a heap overflow that allows a remote attacker to shutdown various services on the server.

tags | exploit, remote, web, overflow
SHA-256 | 4b4cb1c418dd9a284c326f4da4b54e1bd17564a3e611c57ea4f3c95584b47532
juggle.txt
Posted Oct 6, 2003
Authored by Michal Zalewski, Wojciech Purczynski | Site isec.pl

Juggling with packets: floating data storage - White paper discussing the use of network traffic as a storage medium for data and how this could be utilized to not leave an audit trail.

tags | paper
SHA-256 | 7729c506c6789c1f397e325fee04b369ccf9758ca045af5579673f7a9b1017c1
FreeBSD Security Advisory 2003.15
Posted Oct 6, 2003
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-03:15.openssh - New OpenSSH packages are available for FreeBSD that address the PAM challenge/authentication errors.

tags | advisory
systems | freebsd
SHA-256 | 6e4998cbae69170e2d399cbbba472e154c366f931d2f49ebf93c40f5655800fc
guppy24.txt
Posted Oct 6, 2003
Authored by Frog Man | Site phpsecure.info

GuppY versions 2.4p3 and below are susceptible to cross site scripting attacks and have a lack of authentication when various data submissions are performed.

tags | exploit, xss
SHA-256 | 638ddd4acfb1768d65554ad49dc68964fd98689e44a4646b73d7ba18355e680b
EMML.txt
Posted Oct 6, 2003
Authored by Frog Man | Site phpsecure.info

EMML version 1.32, or EternalMart Mailing List Manager, and EMGB version 1.1, or EternalMart Guestbook, are both vulnerable to cross site scripting attacks that allow for remote PHP code execution from another site.

tags | exploit, remote, php, code execution, xss
SHA-256 | 850e833f809c4877c234514fd44139518b0302cac84561137c81c6348bc08e0e
php67.txt
Posted Oct 6, 2003
Authored by Frog Man | Site phpsecure.info

PHP Nuke 6.7 is susceptible to allowing arbitrary file upload and execution via the file mailattach.php.

tags | exploit, arbitrary, php, file upload
SHA-256 | 685e128399a15d42c3ea8f47b608c882803d1bd7b26e13a3e5a915ccdbd4fabf
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close