exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files Date: 2004-02-19

livejournalXSS.txt
Posted Feb 19, 2004
Authored by Joshua Miller

LiveJournal is vulnerable to a cross site scripting vulnerability.

tags | advisory, xss
SHA-256 | e2bd55f0a0a4e2972b6c8dfa544ca52dfb99d026d93895bb270c2dbe222537b3
eEye.Zonelabs.txt
Posted Feb 19, 2004
Authored by eEye Digital Security | Site eEye.com

eEye Security Advisory - Zonelabs Pro/Plus/Integrity versions 4.0 and above are susceptible to a stack based buffer overflow within vsmon.exe that can be exploited to execute code with the context of the SYSTEM account. The vulnerability exists within the component responsible for processing the RCPT TO command argument.

tags | advisory, overflow
SHA-256 | a0725e7ec08055483e5b54ac2703231057838074d0fb3f3ce1007b83e9fe049d
Cisco Security Advisory 20040219-ONS
Posted Feb 19, 2004
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory 20040219 - Multiple vulnerabilities exist in the Cisco ONS 15327 Edge Optical Transport Platform, the Cisco ONS 15454 Optical Transport Platform, the Cisco ONS 15454 SDH Multiplexer Platform, and the Cisco ONS 15600 Multiservice Switching Platform. With one vulnerability, the TFTP service on UDP port 69 is enabled by default to allow both GET and PUT commands to be executed without any authentication. Another allows for an ACK Denial of Service (DoS) attack on TCP port 1080. Another involves telnet, where access to the underlying VxWorks operating system, by default, is restricted to Superusers only. Due to this vulnerability, a superuser whose account is locked out, disabled, or suspended is still able to login into the VxWorks shell, using their previously configured password.

tags | advisory, denial of service, shell, udp, tcp, vulnerability
systems | cisco
SHA-256 | 32a2786afd8b1d4f23e63ddf0cf563f8acc92fe2ccb101ffa711694f296aa609
ldaped.c
Posted Feb 19, 2004
Authored by Kralor | Site coromputer.net

iMail 8.05 LDAP service remote exploit.

tags | exploit, remote
SHA-256 | 9308795e0e2b70dc27363fc26273fbb06ce2f88366c5c9995195e1f558830ebf
aimRCE.txt
Posted Feb 19, 2004
Authored by Michael Evanchik | Site MichaelEvanchik.com

AOL Instant Messenger (AIM) being used in conjunction with Internet Explorer on Windows XP allows for remote command execution.

tags | advisory, remote
systems | windows
SHA-256 | aaf2fe5ced94509c99511b2235bf3c36deb4069be23e451e4b50c8b79cb9d291
ZL04-008.txt
Posted Feb 19, 2004
Site zonelabs.com

A security vulnerability exists in specific versions of ZoneAlarm,ZoneAlarm Pro, ZoneAlarm Plus and the Zone Labs Integrity client. This vulnerability is caused by an unchecked buffer in Simple Mail Transfer Protocol (SMTP) processing which could lead to a buffer overflow. In order to exploit the vulnerability without user assistance, the target system must be operating as an SMTP server.

tags | advisory, overflow, protocol
SHA-256 | a51d268547556e424ab64f13858af48698b174a1963e715659d2179f18b08318
Secunia Security Advisory 2988
Posted Feb 19, 2004
Authored by Secunia

APC's hardware-based network management cards could be compromised by non-privileged users via Telnet or the local serial port using a static factory password.

tags | advisory, local
SHA-256 | 8721683bdfae530b9c7c52a5073b4f4cc91992965d5a0b9b9e962cbab3042af5
xploit_dbg.cpp.txt
Posted Feb 19, 2004
Authored by randnut

Exploit that tests for several vulnerabilities in one of Windows XP kernel's native API functions.

tags | exploit, kernel, vulnerability
systems | windows
SHA-256 | c8b58e5f68561dfb961a121c815bb7e3491dd98dec183140d1decc563346e63c
XPkern.txt
Posted Feb 19, 2004
Authored by randnut

There exist several vulnerabilities in one of Windows XP kernel's native API functions which allow any user with the SeDebugPrivilege privilege to execute arbitrary code in kernel mode, and read from and write to any memory address, including kernel memory. Tested against Windows XP Pro SP1.

tags | advisory, arbitrary, kernel, vulnerability
systems | windows
SHA-256 | 7c215bd6570aadab9e31d52d0278b4b39f64273e984aba6f43be2e44e5b56689
metamail.advisory-data.tar.gz
Posted Feb 19, 2004
Authored by Ulf Harnhammar

Patch and test scripts for two format string bugs and two buffer overflows that exist in Metamail versions 2.2 through 2.7.

tags | overflow
systems | unix
advisories | CVE-2004-0104, CVE-2004-0105
SHA-256 | 5c1618c98e6a139bd0f992f39d1dbffadbc0e420c206670fe34abf8a5179ab40
metamailBUGS.txt
Posted Feb 19, 2004
Authored by Ulf Harnhammar

Two format string bugs and two buffer overflows exist in Metamail versions 2.2 through 2.7. Patch and test scripts to test for these vulnerabilities are available here.

tags | advisory, overflow, vulnerability
advisories | CVE-2004-0104, CVE-2004-0105
SHA-256 | f87cacd3242fbcf612c56f4eaf1a98087ff149f8e0193954c91e2f2045ff1a8f
Page 1 of 1
Back1Next

File Archive:

December 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    2 Files
  • 2
    Dec 2nd
    12 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    14 Files
  • 6
    Dec 6th
    18 Files
  • 7
    Dec 7th
    11 Files
  • 8
    Dec 8th
    36 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close