exploit the possibilities
Showing 1 - 12 of 12 RSS Feed

Files Date: 2004-06-03

Posted Jun 3, 2004
Authored by Oliver Karow | Site oliverkarow.de

Sambar Server version 6.x has been found susceptible to directory traversal, direct file access, and cross site scripting attacks

tags | exploit, xss
MD5 | 6574f9f30fe358ae4cb1db893e3bb9f9
Posted Jun 3, 2004
Authored by priestmaster | Site priestmaster.org

If any ucd-snmp version, 4.2.6 and below, is installed setuid root, a local attacker can overwrite any file using the -P and -l parameters.

tags | advisory, local, root
MD5 | ecac51c8f2f51cfe49cc336b840c05a9
Posted Jun 3, 2004
Site eff.org

Amusing flash movie from the Electronic Frontier Foundation that illustrates how silly the RIAA is being in their war against filesharing.

tags | tool, peer2peer
MD5 | 39ae5d1976e1b40265d36ce09eda8727
Posted Jun 3, 2004
Authored by Jose Nazario | Site monkey.org

vthrottle is an implementation of an SMTP throttling engine for Sendmail servers, based upon M. Williamson's mechanisms, as described in his 2003 Usenix Security paper. It allows the administrator to control how much email users and hosts may send, hindering the rapid spread of viruses, worms, and spam. Exceptions can be made using a whitelist mechanism, which can be generated manually or with the included tool vmeasure.

tags | worm
systems | unix
MD5 | 810f597b5c380d6dc4e6bdb13e4705ad
Posted Jun 3, 2004
Authored by Simon Josefsson | Site josefsson.org

DNSSEC Walker is a tool to recover DNS zonefiles using the DNS protocol. The server does not have to support zone transfers, but the zone must contain DNSSEC NXT or NSEC records. Optionally, it can also verify DNSSEC signatures on the RRsets within the zone.

tags | tool, scanner, protocol
systems | unix
MD5 | 5578fff53fda58233954e18e2cbf69ec
Posted Jun 3, 2004
Authored by Solar Designer | Site openwall.com

Scanlogd is a TCP port scan detection tool originally designed to illustrate various attacks an IDS developer has to deal with, for a here.

tags | tcp
systems | unix
MD5 | 69b8e9051f5119439bfdddc13abd8315
Posted Jun 3, 2004
Authored by Martin Roesch | Site snort.org

Snort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more. Includes real time alerting, incorporating alerting mechanisms for syslog, a user specified file, a UNIX socket, or WinPopup messages via smbclient.

Changes: Bug fixes.
tags | tool, overflow, cgi, sniffer, protocol
systems | unix
MD5 | 76a538d27c23d51dbed43b04c06114e1
Posted Jun 3, 2004
Site security.greymagic.com

GreyMagic Security Advisory GM#007-OP - It is possible to use a shortcut icon in Opera to fool users into believing that they are in a domain they trust. Tested versions which are affected: Opera 7.23 and 7.50.

tags | advisory
MD5 | eae62b844a0fb6f3ca84f8958e9c9757
Posted Jun 3, 2004
Site greymagic.com

GreyMagic Security Advisory GM#006-MC - GreyMagic discovered that by sending a maliciously formed email to a Yahoo user it is possible to circumvent the filter and execute script in the context of a logged-in Yahoo! user due to a cross site scripting flaw.

tags | advisory, xss
MD5 | aff7ba82f97cc8e4a914623dc9a8a271
Posted Jun 3, 2004
Authored by b0f | Site b0f.net

Multiple denial of service attacks exist against various Linksys routers, causing them to need a factory reset in order to function again. Version affected: Linksys BEFSR41, BEFSR41 v3, BEFSRU31, BEFSR11, BEFSX41, BEFSR81 v2/v3, BEFW11S4 v3, BEFW11S4 v4.

tags | exploit, denial of service
MD5 | 0be46427267a6b41f9e15a64458137df
Posted Jun 3, 2004
Authored by Tim Newsham

A vulnerability in the mkdir system utility can allow an unprivileged user to gain root privileges in UNIX 7th Edition systems. Exploit for /bin/mkdir Unix V7 PDP-11 included.

tags | exploit, root
systems | unix
MD5 | aa7a376a389ca2ae20714b4961d0ce46
Posted Jun 3, 2004
Authored by Paul Herman

Tripwire commercial versions equal to and below 2.4 and Tripwire open source versions equal to and below 2.3.1 are susceptible to a format string vulnerability an email report is generated. This vulnerability allows an attacker to execute arbitrary code with the rights of the user running the file check, which is typically root.

tags | advisory, arbitrary, root
MD5 | 29c0b4d25bca6aa6b518267348ca8c84
Page 1 of 1

File Archive:

December 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    18 Files
  • 2
    Dec 2nd
    11 Files
  • 3
    Dec 3rd
    23 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    13 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2020 Packet Storm. All rights reserved.

Security Services
Hosting By