Exploit the possiblities
Showing 1 - 25 of 162 RSS Feed

Files Date: 2004-01-01 to 2004-01-31

servu3.c
Posted Jan 30, 2004
Authored by mandragore, kkqq

Remote exploit that makes use of a buffer overrun in the Serv-U FTP server versions 4.2 and below.

tags | exploit, remote, overflow
MD5 | 196d47c57e8dd07092d004eaac160800
winblast.sh
Posted Jan 30, 2004
Authored by Steve Ladjabi

Windows XP/2003 Samba file sharing resource exhaustion exploit that commits a denial of service.

tags | exploit, denial of service
systems | windows, xp
MD5 | 1f187919aeadfc08e3f6a4eb4ebd472d
sslexp.c
Posted Jan 30, 2004
Authored by Bram Matthys

Brute forcer for OpenSSL ASN.1 parsing bugs that affects versions 0.9.6j and below and 0.9.7b and below.

tags | exploit
advisories | CVE-2003-0545, CVE-2003-0543, CVE-2003-0544
MD5 | c1c971d5bc02630efc56c819b2b2d5b1
lftp.c
Posted Jan 30, 2004
Authored by Li0n7

Remote exploit that makes use of the try_netscape_proxy() overflow in versions 2.3 to 2.6.9 of lftp.

tags | exploit, remote, overflow
MD5 | aa27e2f0a9caa7e80db62d9cd472b247
libtool152.txt
Posted Jan 30, 2004
Authored by Stefan Nordhausen

Versions below 1.5.2 of GNU's libtool have a symlink vulnerability that creates a temporary directory when a package using libtool is being compiled.

tags | advisory
MD5 | d766b2d1a4e7de15f711c5c120268916
phpGedView_v2.txt
Posted Jan 30, 2004
Authored by Cedric Cochin

phpGedView versions 2.65.1 and below suffer from multiple PHP Code Injection vulnerabilities that enable a malicious user to access arbitrary files or execute commands on the server.

tags | exploit, arbitrary, php, vulnerability
MD5 | e9584f2836462dad732d60e5cccaec8d
Cisco Security Advisory 20040129-ms03-049
Posted Jan 30, 2004
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory 20040129 - Cisco has released an advisory dictating that their products that make use of the Microsoft Workstation service may be susceptible to attack.

tags | advisory
systems | cisco
MD5 | 4ec43b01c38f4a077c94274af5b4e085
webBlog11.txt
Posted Jan 30, 2004
Authored by n3rd

Web Blog 1.1 allows for remote command execution due to an unsanitized file variable.

tags | exploit, remote, web
MD5 | 27881ec769823c8bfb94bc4deef2d730
ELF_RPATH.txt
Posted Jan 29, 2004
Authored by Matthias Andree

Some dynamically linked binary builds of the CVSup package contain untrusted paths in the ELF RPATH fields of the executables which may allow for local privilege escalation.

tags | advisory, local
MD5 | 2e3a61279ceabffb4e20428e2e64c582
001.txt.asc
Posted Jan 29, 2004
Site ultramagnetic.sourceforge.net

Ultramagnetic, a utility based off of a fork of the GAIM IM software, is susceptible to the vulnerabilities found in GAIM versions 0.75 and below.

tags | advisory, vulnerability
advisories | CVE-2004-0005, CVE-2004-0006, CVE-2004-0007, CVE-2004-0008
MD5 | 40979778b61b51ef629d5a557c36b1dd
ZH2004-02SA.txt
Posted Jan 29, 2004
Authored by ZetaLabs | Site zone-h.org

PJ CGI Neo review is vulnerable to a directory traversal attack that allows a remote attacker to access any file outside of the webroot.

tags | exploit, remote, cgi
MD5 | f8400a39bd6c8be8aa4b3e6d64609c32
open3sIDSonshowaudit.txt
Posted Jan 29, 2004
Authored by Juan Manuel Pascual Escriba | Site open3s.com

Any user with AAO privileges over the onshowaudit binary in IBM's Informix IDSv9.40 can read any system file.

tags | exploit
MD5 | 7b448d8860aaafd3ade38a2b65910bbb
open3sIDSonedcu.txt
Posted Jan 29, 2004
Authored by Juan Manuel Pascual Escriba | Site open3s.com

A local vulnerability exists in the IBM Informix IDSv9.40 onedcu binary that allows local users to overwrite any root owned file.

tags | exploit, local, root
MD5 | 12bb227bc4ae476a696d8ce008eb5441
Atstake Security Advisory 04-01-27.1
Posted Jan 29, 2004
Authored by David Goldsmith, Atstake | Site atstake.com

Atstake Security Advisory A012704-1 - The version of TruBlueEnvironment that is shipped with Mac OS X 10.3.x and 10.2.x takes the value of an environment variable and copies it into a buffer without performing any bounds checking. Since this buffer is stored on the stack, it is possible to overwrite the return stack frame and execute arbitrary code as root.

tags | advisory, arbitrary, root
systems | apple, osx
MD5 | ef3249d227b311b24f7d6ae925005c3a
SurfNOW.txt
Posted Jan 28, 2004
Authored by Donato Ferrante | Site autistici.org

SurfNOW HTTP Proxy version 2.2 suffers from a denial of service vulnerability.

tags | web, denial of service
MD5 | f92f79389ac3e7d1f12664e259ec11d8
BRSwebweaverXSS.txt
Posted Jan 28, 2004
Site oliverkarow.de

BRE WebWeaver version 1.07 is vulnerable a cross site scripting attack.

tags | exploit, xss
MD5 | a51162aec7d678367d96d90ca56ecd80
open3sIDSontape.txt
Posted Jan 28, 2004
Authored by Juan Manuel Pascual Escriba | Site open3s.com

A stack-based buffer overflow exists in the ONCONFIG environment variable read process when it is bigger than 495 bytes and read in by the IBM Informix IDSv9.40 ontape binary.

tags | advisory, overflow
MD5 | 17aba62d43551a5f45a47720c8ff8fa7
ZH2004-01SA.txt
Posted Jan 28, 2004
Authored by ZetaLabs

Web Blog 1.1 allows for remote file retrieval outside of the web root via a directory traversal attack.

tags | exploit, remote, web, root
MD5 | e365b5f00e124d7ee17a4838cd679cc3
SRT2004-01-17-0227.txt
Posted Jan 28, 2004
Authored by Kevin Finisterre | Site secnetops.com

Secure Network Operations Advisory SRT2004-01-17-0227 - The BlackICE PC Protection firewall/IDS versions 3.6.cbz and below allows local users to gain SYSTEM privileges.

tags | advisory, local
MD5 | 3022d657274181d378344e8cf2e4f6d8
CA-2004-02.mail.txt
Posted Jan 27, 2004
Site cert.org

CERT Advisory CA-2004-02 - Recent weeks have shown a spike in mass-mailing viruses released on the Internet. Advisory released to keep the general public aware.

tags | advisory
MD5 | 282ba5c647da09ebc8c8cc8b4fe8612b
servu2.c
Posted Jan 27, 2004
Authored by Lion, kkqq

Remote exploit that makes use of a buffer overrun in the Serv-U FTP server versions 4.2 and below.

tags | exploit, remote, overflow
MD5 | 471231a0f4338ed849231470c392dea8
malwareSpoof.txt
Posted Jan 27, 2004
Authored by http-equiv | Site malware.com

Trivial way to do file spoofing in Internet Explorer versions 6.0.2800.1106 and below.

tags | exploit, spoof
MD5 | 494805d0fdbf547e8ba0186e823e4ff2
proxyNow2x.txt
Posted Jan 27, 2004
Authored by Peter Winter-Smith | Site elitehaven.net

ProxyNow! versions 2.75 and below are susceptible to both heap memory corruption and stack-based buffer overflows. Exploitation of these vulnerabilities can lead to a denial of service and/or code execution with SYSTEM privileges. Detailed analysis and exploit included.

tags | exploit, denial of service, overflow, vulnerability, code execution
MD5 | 56a50454322d1252538d57d7ca7db26e
oracleXSS.txt
Posted Jan 26, 2004
Authored by Rafel Ivgi | Site theinsider.deep-ice.com

Oracle HTTP Server powered by Apache is susceptible to a cross site scripting attack in its isqlplus script.

tags | exploit, web, xss
MD5 | 908544f617dbc1828099f53c7133c330
BremsServer124.txt
Posted Jan 26, 2004
Authored by Donato Ferrante | Site autistici.org

BremsServer version 1.2.4 is vulnerable to directory traversal and cross site scripting attacks.

tags | exploit, xss
MD5 | 973777ad7fa56b40037a75a4241400b2
Page 1 of 7
Back12345Next

File Archive:

December 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    15 Files
  • 2
    Dec 2nd
    2 Files
  • 3
    Dec 3rd
    1 Files
  • 4
    Dec 4th
    15 Files
  • 5
    Dec 5th
    15 Files
  • 6
    Dec 6th
    18 Files
  • 7
    Dec 7th
    17 Files
  • 8
    Dec 8th
    15 Files
  • 9
    Dec 9th
    13 Files
  • 10
    Dec 10th
    4 Files
  • 11
    Dec 11th
    41 Files
  • 12
    Dec 12th
    44 Files
  • 13
    Dec 13th
    25 Files
  • 14
    Dec 14th
    10 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close