exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files Date: 2004-03-23

cpanelXSS910.txt
Posted Mar 23, 2004
Authored by Fable

Cpanel version 9.1.0-STABLE 93 is susceptible to cross site scripting attacks.

tags | advisory, xss
SHA-256 | 20c3bdf8e4b2a726db63def0c72d5806799896bda6eb6b6f619e27b3a22a4d22
gm005-mc.txt
Posted Mar 23, 2004
Site security.greymagic.com

GreyMagic Security Advisory GM#005-MC - Both Yahoo and Hotmail are susceptible to cross site scripting attacks.

tags | advisory, xss
SHA-256 | e4ee9aa186ad94384d63d64398e181264a2f7be0a28d2b43868db54160ea73cf
wsftp402eval4.txt
Posted Mar 23, 2004
Authored by Hugh Mann

Ipswitch WS_FTP server version 4.0.2.EVAL has a flaw that allows a remote attacker that ability to read any memory address. With the right address, the user can cause a buffer overflow and execute arbitrary code as SYSTEM.

tags | advisory, remote, overflow, arbitrary
SHA-256 | 3cb9ce74977358040d15ba38c7f849fd531dd829829d647e0922398a87feb947
wsftp402eval3.txt
Posted Mar 23, 2004
Authored by Hugh Mann

Ipswitch WS_FTP server version 4.0.2.EVAL allows for a local attacker with program execution privileges to run anything with SYSTEM privileges. Full step-by-step exploitation given.

tags | exploit, local
SHA-256 | 09db33767583c0197cf2fc533a27f68d312a5b5a994ac463fa779980c06c0d47
wsftp402eval2.txt
Posted Mar 23, 2004
Authored by Hugh Mann

Ipswitch WS_FTP server version 4.0.2.EVAL allows a remote attacker to fill up the hard disk of the server via the REST command, resulting in a denial of service.

tags | advisory, remote, denial of service
SHA-256 | 77b6d6329d32b02f40d9fcdb072ee8f5b668c3da6d3aec7a892a5c89f8a6b227
xp_ws_ftp_server.zip
Posted Mar 23, 2004
Authored by Hugh Mann

Remote exploit for Ipswitch WS_FTP server version 4.0.2.EVAL that makes use of a buffer overflow in the STAT command.

tags | exploit, remote, overflow
SHA-256 | e993fa25947b8629ad5a12de268189a00ea40196ac545b8061e970e085a73b11
wsftp402eval.txt
Posted Mar 23, 2004
Authored by Hugh Mann

Ipswitch WS_FTP server version 4.0.2.EVAL allows for a remote user with write access to a directory the ability to execute arbitrary code due to a buffer overflow in WS_FTP Server's STAT command when downloading a file the user created.

tags | advisory, remote, overflow, arbitrary
SHA-256 | b865a821c9ab141926df964d0139b73948e886598becc6fb68a6d21a43c17b94
newsmanlite25.txt
Posted Mar 23, 2004
Authored by Manuel Lopez

News Manager Lite 2.5 and News Manager Lite administration suffer from cross site scripting, SQL injection, and cookie hijacking vulnerabilities.

tags | exploit, vulnerability, xss, sql injection
SHA-256 | c6b957877bb54eb34a118dda9d6a1ea76f8fd56c3ed84f5494f8e2553fe802e9
memmansys21.txt
Posted Mar 23, 2004
Authored by Manuel Lopez

Input validation holes in Member Management System version 2.1 allow for SQL injection and cross site scripting attacks.

tags | exploit, xss, sql injection
SHA-256 | 8843ba631656a0d022b943d1f9ed88a01141aac6cffc9a70563c08e061916c03
waraxe-2004-SA008.txt
Posted Mar 23, 2004
Authored by Janek Vind aka waraxe

PHP-Nuke versions 6.x through 7.1.0 allow for link inclusions that can force an administrator to unknowingly add a superuser.

tags | advisory, php
SHA-256 | 31cc6559f4c7a91a97c76521c220fd991009d04a5c2dbeddbe787fadbdf0b497
waraxe-2004-SA011.txt
Posted Mar 23, 2004
Authored by Janek Vind aka waraxe

MS Analysis module version 2.0 for PHP-Nuke has full path disclosure, cross site scripting, and SQL injection vulnerabilities.

tags | advisory, php, vulnerability, xss, sql injection
SHA-256 | c0010912fa273ff4a30d55b15d18fc5fd19b2b54ca1007ad349039d5a371a812
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close