exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 13 of 13 RSS Feed

Files Date: 2004-02-23

ZH2004-09SA.txt
Posted Feb 23, 2004
Authored by G00db0y | Site zone-h.org

PhpNewsManager version 1.46 allows for arbitrary file reading due to being susceptible to a directory traversal attack.

tags | exploit, arbitrary
SHA-256 | 340c2bf12eaf6e9a64fbb3a6e669b7646c444d064e1d432c3c336d3153659923
MySQL.fingerprint.txt
Posted Feb 23, 2004
Authored by Tonu Samuel

Small write-up discussing methodology for fingerprint the type of MySQL database being used when exploiting SQL injection vulnerabilities.

tags | paper, vulnerability, sql injection
SHA-256 | 7b6c08f5a021bb61015822055f311d65f7fed8629c8880058789c73e4bb31bb8
nCipher-09.txt
Posted Feb 23, 2004
Site ncipher.com

nCipher Security Advisory No. 9 - On certain models and firmware combinations, an attacker who is able to issue commands to an HSM may be able to access secret data stored in the module, including critical application keys.

tags | advisory
SHA-256 | 071a6375bd388973a762bfda42b19fa6b55931c003c9e7b6bbc847b7f457b7e1
ezboardXSS.txt
Posted Feb 23, 2004
Authored by Cheng Peng Su

ezBoard versions 7.3u and below are vulnerable to a cross site scripting attack.

tags | advisory, xss
SHA-256 | d7714aa52da52294665bc90ddc567c7e8aa96717cf6a345c626fc5e63110407b
Lam3rZ-022004.txt
Posted Feb 23, 2004
Authored by Tomasz Grabowski

Lam3rZ Security Advisory #2/2004 - Load Sharing Facility, or LSF, versions 4.x through 6.x, has a remotely accessible vulnerability. The eauth binary can be exploited to send commands to LSF on behalf of a different user. In this way a user could submit and control jobs on behalf of other users.

tags | advisory
SHA-256 | 9d66fa78163f5f238d88d57528f15373ea708f46a350fadeeb078178ee161498
Lam3rZ-012004.txt
Posted Feb 23, 2004
Authored by Tomasz Grabowski

Lam3rZ Security Advisory #1/2004 - Load Sharing Facility, or LSF, versions 4.x through 6.x, has a remotely accessible vulnerability. Specific input data strings can be constructed and can cause failure of the eauth binary, leading to the code execution under root privileges.

tags | advisory, root, code execution
SHA-256 | 58257ee84cc0f3a4b4da905c95ef59378739eb3959c2f197c95472f65121bfe3
AvirtSoho43.txt
Posted Feb 23, 2004
Authored by Donato Ferrante | Site autistici.org

Avirt SOHO version 4.3 is susceptible to a remote buffer overflow via a large GET request passed on ports 1080 and 8080.

tags | advisory, remote, overflow
SHA-256 | fa337ad84fab68b63c9aa4c38e16a4ec1e1a58db540216c7ba87a16e222016f1
Avirt40.txt
Posted Feb 23, 2004
Authored by Donato Ferrante | Site autistici.org

Avirt Voice version 4.0 is susceptible to a remote buffer overflow via a large GET request passed on port 1080.

tags | advisory, remote, overflow
SHA-256 | 5243e3bc2e2a8e9bc2c784387ebbc2fe0735347130db3f4e932b123f0c378a19
GateKeeper.c
Posted Feb 23, 2004
Authored by Kralor | Site coromputer.net

GateKeeper Pro 4.7 on the win32 platform has a buffer overflow vulnerability when processing GET requests. Full remote exploit included. Tested against Microsoft Windows 2000 Pro and Microsoft Windows XP.

tags | exploit, remote, overflow
systems | windows
SHA-256 | 22417fdf4aa577d2e8c2e2119dcb08754e7078a4aad8cb318d882381d9f6dd0c
ap-utils-1.4.tar.bz2
Posted Feb 23, 2004
Authored by roma | Site ap-utils.polesye.net

Access Point Utilities for Unix is a set of utilities that configure and monitor a Wireless Access Point under Unix. It is known to compile (with GCC and the IBM C compiler) and run under Linux, FreeBSD, OpenBSD, MacOS X, AIX, and QNX.

Changes: Various bug fixes, feature enhancements, and better documentation.
tags | tool, wireless
systems | linux, unix, freebsd, openbsd, aix, osx
SHA-256 | bc0e8606560421ac048a819458d51837d40ddf66dac82615455a6249ac91535a
sid-0.3.tar.gz
Posted Feb 23, 2004
Authored by belpo | Site sid.sourceforge.net

SID is a Shell Intrusion Detection system. The kernel part plugs into a terminal-processing subsystem and logs hashed terminal lines. The user part reads log entries (hashes), consults a list of allowed entries, and takes appropriate action upon unexpected log entries. Currently supported are Solaris and Linux.

tags | tool, shell, kernel, intrusion detection
systems | linux, unix, solaris
SHA-256 | 36f74d0bee9dcdfbebc2941393ecebf83e11a1b2ddcea7ecb5e037f17db42bde
3com-DoS.c
Posted Feb 23, 2004
Authored by Shaun Colley aka shaun2k2

Proof of concept DoS exploit for 3Com OfficeConnect DSL Routers. Successful exploitation of the vulnerability should cause the router to reboot.

tags | exploit, denial of service, proof of concept
SHA-256 | 254023ca8d4768c04c5c20cfa49d209a6bbc5b70b7a80ccd6bf8833bff56ebcb
0401-exploits.tgz
Posted Feb 23, 2004
Authored by Todd J. | Site packetstormsecurity.com

Packet Storm new exploits for January, 2004.

tags | exploit
SHA-256 | 866114f4d50d25516b545bc309392b0ea69c6f88f178f22a568c1d2faa5994d3
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close