exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 12 of 12 RSS Feed

Files Date: 2004-01-26

oracleXSS.txt
Posted Jan 26, 2004
Authored by Rafel Ivgi | Site theinsider.deep-ice.com

Oracle HTTP Server powered by Apache is susceptible to a cross site scripting attack in its isqlplus script.

tags | exploit, web, xss
SHA-256 | 748ac7cca1f921761e927eaa455cbf3fdf10094a39aecbc81e13aa6dc48834ec
BremsServer124.txt
Posted Jan 26, 2004
Authored by Donato Ferrante | Site autistici.org

BremsServer version 1.2.4 is vulnerable to directory traversal and cross site scripting attacks.

tags | exploit, xss
SHA-256 | 45ec16ae54b25850adf177d878a6be55addb1dfb712964e4d6ca473de6d221c4
012004.gaim.txt
Posted Jan 26, 2004
Authored by Stefan Esser | Site security.e-matters.de

GAIM versions 0.75 and below are vulnerable to twelve overflows that allow for remote compromise.

tags | advisory, remote, overflow
advisories | CVE-2004-0005, CVE-2004-0006, CVE-2004-0007, CVE-2004-0008
SHA-256 | 69198b878df83c96f86ad50feb5e689f19d7e2d127dade49757b71dc6062227c
Beltane Web-Based Management For Samhain
Posted Jan 26, 2004
Site la-samhna.de

Beltane is a web-based central management console for the Samhain file integrity / intrusion detection system. It enables the administrator to browse client messages, acknowledge them, and update centrally stored file signature databases. Beltane requires a Samhain (version 1.6.0 or higher) client/server installation, with file signature databases stored on the central server, and logging to a SQL database enabled.

Changes: Various bug fixes.
tags | tool, web, intrusion detection
systems | unix
SHA-256 | 20540173a5520bc1553ddd8caea1575a4f9692b2f89f940be0c01977f4d0d8b3
servu.c
Posted Jan 26, 2004
Authored by mslug, kkqq

Remote exploit that makes use of a buffer overrun in the Serv-U FTP server versions 4.2 and below.

tags | exploit, remote, overflow
SHA-256 | 6de0ca83361dce52c08b5b33a10843f9f30d275a37f278cc1b412a7f0b524d08
nextplace.txt
Posted Jan 26, 2004
Authored by Rafel Ivgi | Site theinsider.deep-ice.com

NextPlace.com E-Commerce ASP engine is susceptible to a cross site scripting vulnerability.

tags | exploit, xss, asp
SHA-256 | 2f8af53e9dfea6fe76abccd8960b5ec38f7d3444654525851e6ed78612f36c2e
inrtra.txt
Posted Jan 26, 2004
Authored by Rafel Ivgi | Site theinsider.deep-ice.com

Inrtra Forum is susceptible to a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | ca0e46d20d49830a841e047a4df9766b3d3bd389d20c6872a8d8aeb7d6bf63c8
BWStraversal.txt
Posted Jan 26, 2004
Authored by Rafel Ivgi | Site theinsider.deep-ice.com

BWS or Borland Web Server, which is used as the Corel Paradox relational database interface, lacks input validation and is subject to directory traversal attacks. Versions 1.0b3 and below are affected.

tags | exploit, web
SHA-256 | 8aa1c69b7c9c73d721abc38cc5f94f0d8119336e8aaff6c08fbd7a4b4880b3b7
reptile.txt
Posted Jan 26, 2004
Authored by Donato Ferrante | Site autistici.org

Reptile, the web server written completely in Python, has a flaw that allows for completely CPU resource consumption which results in a denial of service.

tags | advisory, web, denial of service, python
SHA-256 | a93f3311cb6315dce56853e60c9cb0e50ed262ea0e036374fa50343fe062f00a
tinyServer1.1.txt
Posted Jan 26, 2004
Authored by Donato Ferrante | Site autistici.org

Tiny HTTP Server versions 1.1 and 1.0.5 are vulnerable to directory traversal, denial of service, and cross site scripting bugs. Examples provided.

tags | exploit, web, denial of service, xss
SHA-256 | 94d202695ed7e71eeb74c905557c9600d4fab98f445abaea4f073aba55c6bc8a
servu.txt
Posted Jan 26, 2004
Authored by kkqq | Site 0x557.org

Serv-U FTP server versions 4.2 and below have an internal memory buffer that may be overrun while handling the site chmod command with a filename containing excessive data.

tags | advisory, overflow
SHA-256 | 84037bdd2e889eb4c304d27f52b7dc0aa43b1fdf201d847e3046010337287090
Samhain File Integrity Checker
Posted Jan 26, 2004
Authored by Rainer Wichmann | Site samhain.sourceforge.net

Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.

Changes: See documentation.
tags | tool, tcp, intrusion detection
systems | linux, unix, solaris, aix, hpux, unixware
SHA-256 | 68345407cba1f09274d48ec3d1f9b56fb49df168927a103018da433acb4f756f
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close