exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 15 of 15 RSS Feed

Files Date: 2004-07-24

floodworldRE2.zip
Posted Jul 24, 2004
Authored by BoSSaLiNiE

FloodWorld, the IRC tool, is susceptible to a denial of service attack due to a mishandling of special characters.

tags | exploit, denial of service
SHA-256 | 23dd67e0372cde726e8461ace20d585dcdaff729688e872facf617f98973c2fb
helpboxSQL.txt
Posted Jul 24, 2004
Authored by Noam Rathaus | Site securiteam.com

HelpBox version 3.0.1 is susceptible to multiple SQL injection attacks, including ones that do not require the attack to be logged in.

tags | advisory, sql injection
SHA-256 | 87e8a6e2016aa8666af63bb99a95022d6d845f836d4c59fa675d2a2e1c2496bd
webcenterSQL.txt
Posted Jul 24, 2004
Authored by Noam Rathaus | Site securiteam.com

Internet Software Sciences's Web+Center version 4.0.1 suffers from a lack of sanity checking when parsing Cookie data and due to this is susceptible to a SQL injection attack. Full exploit provided.

tags | exploit, web, sql injection
SHA-256 | e6fd7850e36b99da49d2e48ed56430740774adcc0722a02517238528e4f9634f
polarHelp.txt
Posted Jul 24, 2004
Authored by Noam Rathaus | Site securiteam.com

Polar HelpDesk version 3.0 does not adequately verify whether the user logged onto the system has proper administrative access when performing administrative duties.

tags | exploit
SHA-256 | 369c74af2bef236f285af211302fea6a714d58aababbfc74cde8cf5225e29562
httpdDoS.pl
Posted Jul 24, 2004
Authored by Bkbll

Denial of service test exploit for the flaw in Apache httpd 2.0.49.

tags | exploit, denial of service
SHA-256 | 982b22c0f47e2033d7ce6076df0a8b543ac44ff9ed3989f154408b09a37f4144
57586.html
Posted Jul 24, 2004
Site sunsolve.sun.com

Sun Security Advisory - A security vulnerability in Sun Java System Portal Server Software 6.2 may allow a user to gain Calendar Server administrator credentials if the user changes the display options to select a non-default view. With these credentials, a user's session has unrestricted access to the calendar data and hence manipulation of that data. Such manipulation could include, but is not limited to: the deletion, creation, and modification of users, user information, calendar entries, and historical data.

tags | advisory, java
SHA-256 | d287e2606d23f723574ed699487302e05dc90940a4abe6588681bab388ac9856
serenaTeam.txt
Posted Jul 24, 2004
Authored by Noam Rathaus | Site securiteam.com

Serena Software's TeamTrack version 6.1.1 is susceptible to a sensitive content disclosure vulnerability that can be exploited without having valid login credentials. Full exploit provided.

tags | exploit
SHA-256 | 4191339b894cafd37ff68e0c11cad6e7bb1acf9ff0f9dd3451335ff761ce077b
netsupportDNA.txt
Posted Jul 24, 2004
Authored by Noam Rathaus | Site securiteam.com

NetSupport DNA Helpdesk 1.x is susceptible to a SQL injection vulnerability. Full exploit provided.

tags | exploit, sql injection
SHA-256 | a38e02e674a7c12a4b1a0261fe4698c50758836182a131d2a0e1148be2617f39
LBEhelpdesk.txt
Posted Jul 24, 2004
Authored by Noam Rathaus | Site securiteam.com

Leigh Business Enterprises's (LBE) Web HelpDesk versions 4.0.80 and below suffer from a SQL injection attack vulnerability. Full exploit included.

tags | exploit, web, sql injection
SHA-256 | bd45f9f6fbfdd6f65136f34c999c7e00d14f2bed97b355a02acac0c7104f7e0a
lyceum-2.46.tar.gz
Posted Jul 24, 2004
Authored by phish

Lyceum is an advance stealthed client/server backdoor that uses encrypted spoofed UDP packets to administer the server and the two built-in ICMP backdoors. Each ICMP backdoor exploits a different feature of the protocol, the first creating a bi-directionally spoofed ICMP tunnel and the second uses passive nodes as zombies to relay ICMP backdoor traffic.

tags | tool, udp, spoof, protocol, rootkit
systems | unix
SHA-256 | 860ca6295d4f0a55057e5b9280edffa1b18da5925a54817cf734ab2fb853bf9a
Secunia Security Advisory 12127
Posted Jul 24, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Cyrille Barthelemy has reported a vulnerability in Nessus, potentially allowing malicious users to escalate their privileges. The problem is caused by a race condition in nessus-adduser if the user has not specified the environment variable TMPDIR. This has been reported to affect version 2.0.11. Prior versions may also be affected.

tags | advisory
SHA-256 | 2da900c4d0c2542195ad87610199687b4c2599227bcecee7b1c7224405afa3bd
apc.PowerChute.txt
Posted Jul 24, 2004
Site nam-en.apc.com

APC PowerChute Business Editions 6.x and 7.x are susceptible to a denial of service attack.

tags | advisory, denial of service
SHA-256 | dfa32798aed9323747ae0eff79d93f8b7a2b1f78cb6d6ec77827d162e91f280a
Vpop3.txt
Posted Jul 24, 2004
Authored by Dr. Insane, papabfs | Site members.lycos.co.uk

VPOP3 2.0.0k is susceptible to a denial of service attack due to a buffer overflow.

tags | advisory, denial of service, overflow
SHA-256 | 6c22d9fddd0a36e540923cff600266688d963a50990b53967f54aac1f8833548
afick-2.3-1.tgz
Posted Jul 24, 2004
Authored by Eric Gerbier | Site afick.sourceforge.net

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.

Changes: A couple minor bug fixes.
tags | tool, integrity
systems | windows, unix
SHA-256 | 8ff9574970b3fa4cfef4e40c21a953879f2735583a6281a5e5145e2a23e19fa0
popa3d-0.6.4.1.tar.gz
Posted Jul 24, 2004
Authored by Solar Designer | Site openwall.com

popa3d is a POP3 daemon which attempts to be extremely secure, reliable, RFC compliant, and fast (in that order).

Changes: Bug fix to actually zeroize the context structure in MD5_Final().
systems | unix
SHA-256 | 37cbee03214d305d03f63d81be39a538b5254ee16b17a0a907ec01f1a6a837bb
Page 1 of 1
Back1Next

File Archive:

June 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    19 Files
  • 2
    Jun 2nd
    16 Files
  • 3
    Jun 3rd
    28 Files
  • 4
    Jun 4th
    0 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    19 Files
  • 7
    Jun 7th
    23 Files
  • 8
    Jun 8th
    11 Files
  • 9
    Jun 9th
    10 Files
  • 10
    Jun 10th
    4 Files
  • 11
    Jun 11th
    0 Files
  • 12
    Jun 12th
    0 Files
  • 13
    Jun 13th
    0 Files
  • 14
    Jun 14th
    0 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    27 Files
  • 20
    Jun 20th
    65 Files
  • 21
    Jun 21st
    10 Files
  • 22
    Jun 22nd
    8 Files
  • 23
    Jun 23rd
    6 Files
  • 24
    Jun 24th
    6 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    15 Files
  • 28
    Jun 28th
    14 Files
  • 29
    Jun 29th
    11 Files
  • 30
    Jun 30th
    7 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close