exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 162 RSS Feed

Files Date: 2004-01-01 to 2004-01-31

servu3.c
Posted Jan 30, 2004
Authored by mandragore, kkqq

Remote exploit that makes use of a buffer overrun in the Serv-U FTP server versions 4.2 and below.

tags | exploit, remote, overflow
SHA-256 | c4174e145fda328216ce0c52e5bf305b7a9f9a1cea90df103ee512f28f76a97d
winblast.sh
Posted Jan 30, 2004
Authored by Steve Ladjabi

Windows XP/2003 Samba file sharing resource exhaustion exploit that commits a denial of service.

tags | exploit, denial of service
systems | windows
SHA-256 | a91d653658d8a311303aac3232b3fab4ebcb1b7feb4f843ca68bdc4c5a2a202a
sslexp.c
Posted Jan 30, 2004
Authored by Bram Matthys

Brute forcer for OpenSSL ASN.1 parsing bugs that affects versions 0.9.6j and below and 0.9.7b and below.

tags | exploit
advisories | CVE-2003-0545, CVE-2003-0543, CVE-2003-0544
SHA-256 | 8bbbf5ff84c17067f0cd384d9a2c32db1f752553417de9a7493aa5111f6897b7
lftp.c
Posted Jan 30, 2004
Authored by Li0n7

Remote exploit that makes use of the try_netscape_proxy() overflow in versions 2.3 to 2.6.9 of lftp.

tags | exploit, remote, overflow
SHA-256 | 816d755b95467dc00ab06edb3f6891bcfd9a118f8f8af795a90ab0f3b444ba8a
libtool152.txt
Posted Jan 30, 2004
Authored by Stefan Nordhausen

Versions below 1.5.2 of GNU's libtool have a symlink vulnerability that creates a temporary directory when a package using libtool is being compiled.

tags | advisory
SHA-256 | ea8da7ea3d3c709ad14bfe61958c89e3adae4bd96c61857b2ef91789c1a5d545
phpGedView_v2.txt
Posted Jan 30, 2004
Authored by Cedric Cochin

phpGedView versions 2.65.1 and below suffer from multiple PHP Code Injection vulnerabilities that enable a malicious user to access arbitrary files or execute commands on the server.

tags | exploit, arbitrary, php, vulnerability
SHA-256 | be5e66ffc5826f681bd480cabfd994a4d7dc5f7649cca38b0bc6ec5ea2815885
Cisco Security Advisory 20040129-ms03-049
Posted Jan 30, 2004
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory 20040129 - Cisco has released an advisory dictating that their products that make use of the Microsoft Workstation service may be susceptible to attack.

tags | advisory
systems | cisco
SHA-256 | 1d2acb3a56c3682bd561de21733830314524b20731877ce37bc33bbca42fa6ff
webBlog11.txt
Posted Jan 30, 2004
Authored by n3rd

Web Blog 1.1 allows for remote command execution due to an unsanitized file variable.

tags | exploit, remote, web
SHA-256 | e0af8c56d3430aa463075d8e02f7ec239fa8e7490a1451b1eb83f2d3a80af5a9
ELF_RPATH.txt
Posted Jan 29, 2004
Authored by Matthias Andree

Some dynamically linked binary builds of the CVSup package contain untrusted paths in the ELF RPATH fields of the executables which may allow for local privilege escalation.

tags | advisory, local
SHA-256 | b8782bca72a905590f6df6d37502a533b73ad0fe9fb35cea32cce7475f90ab88
001.txt.asc
Posted Jan 29, 2004
Site ultramagnetic.sourceforge.net

Ultramagnetic, a utility based off of a fork of the GAIM IM software, is susceptible to the vulnerabilities found in GAIM versions 0.75 and below.

tags | advisory, vulnerability
advisories | CVE-2004-0005, CVE-2004-0006, CVE-2004-0007, CVE-2004-0008
SHA-256 | abf6c26a90679efd79e65b29519d28f7e599cb1e44ffde9b83afbc17c20ea2ae
ZH2004-02SA.txt
Posted Jan 29, 2004
Authored by ZetaLabs | Site zone-h.org

PJ CGI Neo review is vulnerable to a directory traversal attack that allows a remote attacker to access any file outside of the webroot.

tags | exploit, remote, cgi
SHA-256 | 992dd31568c4fcc4ccd00ecd6c0ceb0917e4d9075666f57504e17c887cb3ecde
open3sIDSonshowaudit.txt
Posted Jan 29, 2004
Authored by Juan Manuel Pascual Escriba | Site open3s.com

Any user with AAO privileges over the onshowaudit binary in IBM's Informix IDSv9.40 can read any system file.

tags | exploit
SHA-256 | 72ed995c0d9c55f14fcc3e3b6054b130f3018ce7a50d8030dfc3d03869c0a948
open3sIDSonedcu.txt
Posted Jan 29, 2004
Authored by Juan Manuel Pascual Escriba | Site open3s.com

A local vulnerability exists in the IBM Informix IDSv9.40 onedcu binary that allows local users to overwrite any root owned file.

tags | exploit, local, root
SHA-256 | db72f511fe4d56d0ece80a8d419ef2589c072cffdbf4185599095797b18a579e
Atstake Security Advisory 04-01-27.1
Posted Jan 29, 2004
Authored by David Goldsmith, Atstake | Site atstake.com

Atstake Security Advisory A012704-1 - The version of TruBlueEnvironment that is shipped with Mac OS X 10.3.x and 10.2.x takes the value of an environment variable and copies it into a buffer without performing any bounds checking. Since this buffer is stored on the stack, it is possible to overwrite the return stack frame and execute arbitrary code as root.

tags | advisory, arbitrary, root
systems | apple, osx
SHA-256 | 8ce54a8fef937890cb1f9d170aa0c3d29ca49c9cf3641d06a4d384befd8331e6
SurfNOW.txt
Posted Jan 28, 2004
Authored by Donato Ferrante | Site autistici.org

SurfNOW HTTP Proxy version 2.2 suffers from a denial of service vulnerability.

tags | web, denial of service
SHA-256 | b1c765b5daf99c7ab72393c966b6f1e31f841593fb5519962a01b138658c8241
BRSwebweaverXSS.txt
Posted Jan 28, 2004
Site oliverkarow.de

BRE WebWeaver version 1.07 is vulnerable a cross site scripting attack.

tags | exploit, xss
SHA-256 | 72434b112da0910a837e767cf44c6ee6954e146ec34f69d6d828044685dfa900
open3sIDSontape.txt
Posted Jan 28, 2004
Authored by Juan Manuel Pascual Escriba | Site open3s.com

A stack-based buffer overflow exists in the ONCONFIG environment variable read process when it is bigger than 495 bytes and read in by the IBM Informix IDSv9.40 ontape binary.

tags | advisory, overflow
SHA-256 | 237129932a9575d521e132d6ce68b9b05c5f0b848a26bc2b6672c672bcf3702a
ZH2004-01SA.txt
Posted Jan 28, 2004
Authored by ZetaLabs

Web Blog 1.1 allows for remote file retrieval outside of the web root via a directory traversal attack.

tags | exploit, remote, web, root
SHA-256 | 8ffba7542b46b6728704b40c87466c1fd319e96b82e24f45e7ff600b1fb8abcc
SRT2004-01-17-0227.txt
Posted Jan 28, 2004
Authored by Kevin Finisterre | Site secnetops.com

Secure Network Operations Advisory SRT2004-01-17-0227 - The BlackICE PC Protection firewall/IDS versions 3.6.cbz and below allows local users to gain SYSTEM privileges.

tags | advisory, local
SHA-256 | e11291b6fe63deb9260c5e4794ff9f5c78a8c4a27a5ad66e8a0b594f3485a735
CA-2004-02.mail.txt
Posted Jan 27, 2004
Site cert.org

CERT Advisory CA-2004-02 - Recent weeks have shown a spike in mass-mailing viruses released on the Internet. Advisory released to keep the general public aware.

tags | advisory
SHA-256 | cdfebb5a5dffec4d1edc9bb5ae5bc74b9728b9ec32eac930bc8dac28eb6b3206
servu2.c
Posted Jan 27, 2004
Authored by Lion, kkqq

Remote exploit that makes use of a buffer overrun in the Serv-U FTP server versions 4.2 and below.

tags | exploit, remote, overflow
SHA-256 | 284a2e89d944215f5b46bd4e96161625f632ef248662810dc10285b64cba0205
malwareSpoof.txt
Posted Jan 27, 2004
Authored by http-equiv | Site malware.com

Trivial way to do file spoofing in Internet Explorer versions 6.0.2800.1106 and below.

tags | exploit, spoof
SHA-256 | 77b83565d337b035d648444f5bce0a768b8022a42f296c2f964bd12f78475766
proxyNow2x.txt
Posted Jan 27, 2004
Authored by Peter Winter-Smith | Site elitehaven.net

ProxyNow! versions 2.75 and below are susceptible to both heap memory corruption and stack-based buffer overflows. Exploitation of these vulnerabilities can lead to a denial of service and/or code execution with SYSTEM privileges. Detailed analysis and exploit included.

tags | exploit, denial of service, overflow, vulnerability, code execution
SHA-256 | befbd5bf13e3b6d7dc791bb61f8d8476b36082b54e5da32d7a8aa177d07afba7
oracleXSS.txt
Posted Jan 26, 2004
Authored by Rafel Ivgi | Site theinsider.deep-ice.com

Oracle HTTP Server powered by Apache is susceptible to a cross site scripting attack in its isqlplus script.

tags | exploit, web, xss
SHA-256 | 748ac7cca1f921761e927eaa455cbf3fdf10094a39aecbc81e13aa6dc48834ec
BremsServer124.txt
Posted Jan 26, 2004
Authored by Donato Ferrante | Site autistici.org

BremsServer version 1.2.4 is vulnerable to directory traversal and cross site scripting attacks.

tags | exploit, xss
SHA-256 | 45ec16ae54b25850adf177d878a6be55addb1dfb712964e4d6ca473de6d221c4
Page 1 of 7
Back12345Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close