exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 20 of 20 RSS Feed

Files Date: 2004-02-03

JSinject.txt
Posted Feb 3, 2004
Authored by Andreas Sandblad

There lies a way to inject a javascript url in the history list of Microsoft Internet Explorer causing a cross site/zone scripting attack when the user presses the backbutton. An attacker may use this to read arbitrary cookies/local files and execute programs leading to total system compromise if IE is run as administrator.

tags | exploit, arbitrary, local, javascript
SHA-256 | e01b9463a639085838e90199fac938b440e307d2558b62b00d81aa347385b6ed
chasercrash.zip
Posted Feb 3, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Test exploit for the server of Chaser versions 1.50 and below.

tags | exploit
SHA-256 | 5db8a2952d0d3502c0d77bedd136b57adbcd6b86f01c70c113c3ededd395d65b
chaser-client.zip
Posted Feb 3, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Test exploit for the client of Chaser versions 1.50 and below.

tags | exploit
SHA-256 | 94f8a2af34c9faacbd305b4a981f59d043e979b2eac32d0782cae09ca7532000
chaser-adv.txt
Posted Feb 3, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Chaser versions 1.50 and below have a memory allocation error in both the client and server parts of the game. Related test exploit for the server is here.

tags | advisory
SHA-256 | d9e7ca1f0f196f9e6a58f269fa77f64764ea5dd31266d1a7a403dbf23aa38445
webxdos.txt
Posted Feb 3, 2004
Authored by Peter Winter-Smith | Site elitehaven.net

Web Crossing versions 4.x and 5.x have a denial of service vulnerability. When an HTTP POST request is made to the built-in server, if the 'Content-Length' header supplied with the request is an extremely large or negative number, the server will encounter a set of instructions which lead to an integer-divide-by-zero problem, immediately crashing the server and denying any further service.

tags | exploit, web, denial of service
SHA-256 | a4cb26465dde1aa7db4e37e9bae87f085ad4ccdeb6c14a77fa125516a33bbbd6
decompression-bomb-vulnerability.html
Posted Feb 3, 2004
Authored by Dr. Peter Bieringer | Site aerasec.de

Research on the various reactions of anti-virus software against decompression bombs. Has a thorough comparison chart and is definately a good read.

tags | paper, virus
SHA-256 | 960bc488f2320ff76aabcaee668318043ab11705ecc667a76e5cb089b8ab5799
Cisco Security Advisory 20040203-cat6k
Posted Feb 3, 2004
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory 20040203 - A layer 2 frame that is encapsulating a layer 3 packet (IP, IPX, etc.) may cause Cisco 6000/6500/7600 series systems with Multilayer Switch Feature Card 2 (MSFC2) that have a FlexWAN or Optical Services Module (OSM) or that run 12.1(8b)E14 to freeze or reset, if the actual length of this frame is inconsistent with the length of the encapsulated layer 3 packet. This vulnerability may be exploited repeatedly causing a denial of service.

tags | advisory, denial of service
systems | cisco
SHA-256 | f53f930c27c6b8f7ff702062ca0e62275d1e976e6a83095f154fada2e7e521d4
phpscripts.txt
Posted Feb 3, 2004
Site security-challenge.com

PHPscripts suffer from a file include vulnerability.

tags | exploit
SHA-256 | f7531beaf196d3efafda379976dbdb9162fcf36480cb7dff573a5603c34728e7
phpMyAdmin255pl1.txt
Posted Feb 3, 2004
Authored by Cedric Cochin | Site netvigilance.com

phpMyAdmin versions 2.5.5-pl1 and below do not properly sanitize variables resulting in them being susceptible to a directory traversal attack.

tags | exploit
SHA-256 | 81168b522d27c42876217622e1f8214fcf0c77dfd436e34b4b0aedbe9e03a637
xcart343.txt
Posted Feb 3, 2004
Authored by Philip

X-Cart version 3.4.3 fails to sanitize various input variables leaving itself open to directory traversal and remote command execution attacks.

tags | exploit, remote
SHA-256 | 310f9a8cac8979d8671622dad1d75561c158e182b0a88454b82adc760eb65407
Technical Cyber Security Alert 2004-33A
Posted Feb 3, 2004
Authored by US-CERT | Site cert.org

CERT Advisory TA04-033A - Microsoft Internet Explorer (IE) contains multiple vulnerabilities, the most serious of which could allow a remote attacker to execute arbitrary code with the privileges of the user running IE. Versions affected: 5.01, 5.50, and 6.

tags | advisory, remote, arbitrary, vulnerability
advisories | CVE-2003-01026, CVE-2003-01027, CVE-2003-01025
SHA-256 | 3ab9362b8f0419320633d4fd73355c39832bf2aadb7cca04de4014fb1d89bd30
waraxe-2004-SA001.txt
Posted Feb 3, 2004
Authored by Janek Vind aka waraxe

GBook for Php-Nuke version 1.0 fails to sanity check user input allowing for script injection and cookie theft.

tags | advisory, php
SHA-256 | fce5e2fce952d0a6c5a421f4ab449466affb0e648acbc0c10809ce06d64d243b
smbmountDoS.txt
Posted Feb 3, 2004
Authored by Steve Ladjabi, Daniel Kabs

smbmount can cause a denial of service attack on Microsoft Windows. The attack induces a memory shortage on the Windows system by creating directories in a special way.

tags | exploit, denial of service
systems | windows
SHA-256 | 8ccb97f425f4922eeaaacb2ffe330c9f9fa5c7bdf43159239648210620c8916a
uniqueid-0.5.0.tar.gz
Posted Feb 3, 2004
Authored by Alan De Smet | Site highprogrammer.com

Unique ID is a Perl CGI that calculates and reverse engineers driver's license numbers. Given your name, birthday and gender, it will tell you your license number. Given the number it will tell you your birthday, gender, and take educated guesses at your name. It currently supports Florida, Illinois, Maryland, Michigan, Minnesota, New Hampshire, Washington, and Wisconsin. It's likely that similar systems are used in other states.

Changes: Added encoder and decoder for Machine Readable Zone on Machine Readable Passports. Added encoder for New York State (Pre September 1992 only). Refined radio options, they can now have labels. Long radio options are now implemented as drop lists.
tags | cgi, perl
SHA-256 | 7f0cd9881734d0c362a66865179a6c3cdc62c650b649fdf4747da591e15ad243
motion-3.0.7-1.tar.gz
Posted Feb 3, 2004
Authored by Jeroen Vreeken | Site motion.technolust.cx

Motion uses a video4linux device for detecting movement. It makes snapshots of the movement which later will be converted to MPEG movies, making it useful as an observation or security system. It can send out email and SMS messages when detecting motion and includes a web interface.

Changes: Bugfix release.
tags | web
systems | linux
SHA-256 | 2e199d5576e1cfe05afd4c9f51fb9da4d3e42a2aa36b03c4d0a8b4c0dfd7c9d6
ADMsmb_0.3.tar.gz
Posted Feb 3, 2004
Authored by ADM, bofn | Site void.irq.org

ADMsmb is a security scanner for Samba based on the source of smbclient. It will get the netbios name, share list, workgroup, domain, and OS. It will then try to access any exported shares, perform a session brute force, and perform brute force on a directory specified.

SHA-256 | 86f223b81fdd242286cc0abfd686b6acc71e36313afadd7b29b516e0fbfff89b
tcpick-0.1.20.tar.gz
Posted Feb 3, 2004
Authored by DuskDruid | Site tcpick.sourceforge.net

tcpick is a textmode sniffer that can track TCP streams and saves the data captured in files or displays them in the terminal. It is useful for picking files in a passive way. It can store all connections in different files, or it can display all the stream on the terminal with colors.

tags | tool, sniffer, tcp
SHA-256 | 5a1326718ce9d0dfc8499d030af94e3538d02e9b4c03089e68e14d638191b547
hatchet-0.6.1.tar.gz
Posted Feb 3, 2004
Authored by fuzzyping | Site dixongroup.net

Hatchet is a log parsing and viewing utility for OpenBSD's PF firewall software. It presents HTML output of logged events and utilization graphs using pfstat.

tags | tool, firewall
systems | unix, openbsd
SHA-256 | 47a9786bbd90a9d57996afe7cfada41529e3132232c7f0e8b8bb4a6e5413c0be
ZH2004-03SA.txt
Posted Feb 3, 2004
Authored by G00db0y | Site zone-h.org

Photopost PHP Pro versions 4.6 and below suffer from a SQL injection vulnerability due to a lack of variable sanitization with the photo variable.

tags | exploit, php, sql injection
SHA-256 | c068cb7f6a36484ab9999061ed91dd07ccfb77ea867b7a814ae664e44f706fb1
webforums16.txt
Posted Feb 3, 2004
Authored by nimber

Web Forums Server versions 1.6 and below suffer from CSS/XSS vulnerability.

tags | advisory, web
SHA-256 | 56f2f5528222ced0594f6a36993aec2713bd9641f2c251911e66755c303079f6
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close