exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 19 of 19 RSS Feed

Files Date: 2004-04-22

iDEFENSE Security Advisory 2004-04-15.t
Posted Apr 22, 2004
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 04.15.04: Remote exploitation of a denial of service (DoS) vulnerability in RealNetworks, Inc.'s Helix Universal Server could allow an attacker to restart and potentially disable the server.

tags | advisory, remote, denial of service
advisories | CVE-2004-0389
SHA-256 | d9720ba97e1371a9d1b64d17280617faeb9cbdb6482942a346d2b79a8c358328
SCSA028.txt
Posted Apr 22, 2004
Authored by frog-man | Site phpsecure.info

Security Corporation Security Advisory [SCSA-028]: Nuked-KlaN versions b1.4 and b1.5 allows for directory traversal attacks and global variable overwriting.

tags | exploit
SHA-256 | 61a637daf1513ba208db6fc8145428152db635c02705b2f1d85a0fcd7bb18c37
THCIISSLame.c
Posted Apr 22, 2004
Authored by thc, Johnny Cyberpunk | Site thc.org

THCIISSLame version 0.2 IIS 5 SSL remote root exploit. Uses a connect back shell.

tags | exploit, remote, shell, root
SHA-256 | 5ad43a71b7b21cf163e484398cd12888807b5ff949adbd1a23b2639a8c2f060f
umodpoc.zip
Posted Apr 22, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Proof of concept exploit for the Unreal engine developed by EpicGames which has a flaw with UMOD where it handles information from files without properly filtering for dangerous characters.

tags | exploit, proof of concept
SHA-256 | acf47cd35c604868941f36761ff485936586e453b380f23a94c790cf4a995f84
unrealEngine2.txt
Posted Apr 22, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

The Unreal engine developed by EpicGames has a flaw with UMOD where it handles information from files without properly filtering for dangerous characters. Using a standard directory traversal attack, an attacker is able to go outside of the game's directory to overwrite any file in the partition on which the game is installed.

tags | advisory
SHA-256 | b7c2785d4faefd54426965a43736ed37eceabddb772050c4cd01af7d52910f68
waraxe-2004-SA022.txt
Posted Apr 22, 2004
Authored by Janek Vind aka waraxe | Site waraxe.us

PostNuke 0.726 Phoenix is susceptible to multiple path disclosure and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 2421cfda93e82828c31ba0e759ac8a875641a6177c67906a0428a997b7c95c75
eEye.yahoo.txt
Posted Apr 22, 2004
Authored by Drew Copley | Site eeye.com

eEye Security Advisory - eEye Digital Security has discovered a security hole in Yahoo! Mail which allows a remote attacker to take over an account remotely by sending a specially crafted email.

tags | advisory, remote
SHA-256 | ebcdad08b6b5b55406cc6abe44da9de0baab72d3294fc53e632ae9a3567d1e68
waraxe-2004-SA021.txt
Posted Apr 22, 2004
Authored by Janek Vind aka waraxe | Site waraxe.us

The phprofession 2.5 module for PostNuke is susceptible to path disclose, cross site scripting, and possible SQL injection attacks.

tags | exploit, xss, sql injection
SHA-256 | f1afb06444f45b473086acaefc01e5542aee6857caf546dc7aeb916bde1b06e2
advguest.txt
Posted Apr 22, 2004
Authored by JQ

Advanced Guestbook web application version 2.2 is susceptible to a SQL injection attack.

tags | advisory, web, sql injection
SHA-256 | 7a3fb78927cf75c8430152863d12821dcc4b50c274835342578b8d7e3568556e
Cisco Security Advisory 20040420-tcp-ios
Posted Apr 22, 2004
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory: Multiple IOS based Cisco products are susceptible to the TCP vulnerability that allows an attacker easier exploitation of reseting an established connection. All Cisco products which contain a TCP stack are susceptible to this vulnerability. Huge list included.

tags | advisory, tcp
systems | cisco
advisories | CVE-2004-0230
SHA-256 | 513dcad61402067ff6f1ce77e2333e1108e77dfc05e313aed735a6bc1cc3b0d1
Cisco Security Advisory 20040420-tcp-nonios
Posted Apr 22, 2004
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory: Multiple non-IOS based Cisco products are susceptible to the TCP vulnerability that allows an attacker easier exploitation of reseting an established connection. All Cisco products which contain a TCP stack are susceptible to this vulnerability. Huge list included.

tags | advisory, tcp
systems | cisco
advisories | CVE-2004-0230
SHA-256 | 1da90ca3d68fef3adfb34db4d985c7e1973f4cc86524368143e427e344a95bc7
ncFTP317.txt
Posted Apr 22, 2004
Authored by Konstantin V. Gavrilenko | Site arhont.com

ncftp versions 3.1.6/120 and 3.1.7/120 do not hash passwords under certain conditions allowing for their leakage via simple utilities like ps.

tags | advisory
SHA-256 | 1f6d5158b3b2f6cbffbb524101d23ac947bad8924aad86c9097b29cb9a97583f
FLoP-1.2.1.tar.gz
Posted Apr 22, 2004
Authored by DG | Site geschke-online.de

FLoP is utility designed to gather alerts with a payload from distributed Snort sensors at a central server, and to store them in a database. Both PostgreSQL and MySQL are currently supported. High priority alerts may be sent out via e-mail.

tags | tool, sniffer
SHA-256 | 04994cfedd9e83f32136db04988decc0e80f2c11ced7ef66a846e4c138e85dc6
radmind-1.3.0.tgz
Posted Apr 22, 2004
Site rsug.itd.umich.edu

radmind is a suite of Unix command-line tools and a server designed to remotely administer the file systems of multiple Unix machines. Radmind operates as a tripwire which is able to detect changes to any managed filesystem object, e.g. files, directories, links, etc. However, radmind goes further than just integrity checking: once a change is detected, radmind can optionally reverse the change.

Changes: Various feature enhancements and bug fixes.
tags | tool, intrusion detection
systems | unix
SHA-256 | f202fe183b2c5a42955ee993c7ed88cff4f52529593fc81cd5a3efa2390f5b26
eaea.class.php.txt
Posted Apr 22, 2004
Authored by Yo_Soy | Site raza-mexicana.org

Mambo OS versions 4.5 and 4.6 exploit written in PHP that insets an administrator user into the database.

tags | exploit, php
SHA-256 | a2fc44f4482fa74b878d0564d7eb95973e10a36108e84d5af22116e7d3d80daa
reset.zip
Posted Apr 22, 2004
Authored by Aphex | Site iamaphex.cjb.net

This program will reset a TCP connection by guessing a valid sequence number.

tags | exploit, tcp
advisories | CVE-2004-0230
SHA-256 | ee4592a7693f13a974fc60191dc03c2bacb52cac2c5e420b304e87f7d2855c73
246929.html
Posted Apr 22, 2004
Site uniras.gov.uk

NISCC Vulnerability Advisory 236929 - Vulnerability Issues in TCP. The vulnerability described in this advisory affects implementations of the Transmission Control Protocol (TCP) that comply with the Internet Engineering Task Force's

tags | advisory, denial of service, tcp, protocol
advisories | CVE-2004-0230
SHA-256 | df3df0b689c29353e8bb99088ce42074ae415df606a7e58c98c4815661db4b6b
thc_ssh_crack.c
Posted Apr 22, 2004
Authored by thc | Site thc.org

THC SSH Cracker is a simple utility that attempts to crack SSH private keys via brute force.

SHA-256 | a0ff99a6a4f85e878a138316507d66933b2b5769f4579fa1576aa605bf13d1e2
lnx_reboot.c
Posted Apr 22, 2004
Authored by c0ntex

lnx_reboot version 2 - 59 Byte reboot Opcode array.

tags | shellcode
SHA-256 | e5dcf87114d61374126ac5f7b69c85049853adfc074046fc7cc91babdf726e56
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close