exploit the possibilities
Showing 1 - 25 of 56 RSS Feed

Files Date: 2004-11-20

phpbb.php.txt
Posted Nov 20, 2004
Authored by Pokleyzz, How Dark | Site howdark.com

Remote command execution exploit for phpBB 2.0.10 that makes use of a flaw in the viewtopic.php code.

tags | exploit, remote, php
MD5 | f921925d25c8aefc535037fe9d34cefd
Gentoo Linux Security Advisory 200411-29
Posted Nov 20, 2004
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200411-29 - unarj contains a buffer overflow and a directory traversal vulnerability. This could lead to overwriting of arbitrary files or the execution of arbitrary code.

tags | advisory, overflow, arbitrary
systems | linux, gentoo
MD5 | d64e8594bc3721d95c03e41c483c0370
20041119.IESP2Unpatched.html
Posted Nov 20, 2004
Authored by cyber flash | Site k-otik.com

Microsoft Internet Explorer (including IE for Windows XP SP2) is reported vulnerable to a file download security warning bypass. This unpatched flaw may be exploited to download a malicious executable file masqueraded as a HTML file. Full exploitation given. Original posted on k-otik.

tags | exploit
systems | windows, xp
MD5 | efd4da6639e3f50e0df00ddbd6efee64
2427surprise.txt
Posted Nov 20, 2004
Authored by Paul Starzetz | Site isec.pl

A subtle race condition in Linux kernels below 2.4.28 allow a non-root user to increment (up to 256 times) any arbitrary location(s) in kernel space. This flaw could be used to gain elevated privileges.

tags | advisory, arbitrary, kernel, root
systems | linux
MD5 | 42de458b8f020d22510cbfb0a1a95d9e
Corsaire Security Advisory 2004-07-20.1
Posted Nov 20, 2004
Authored by Stephen de Vries, Corsaire | Site penetration-testing.com

Corsaire Security Advisory - The aim of this document is to define a vulnerability in the Netopia Timbuktu 7.0.3 product for Mac OS X that suffers from a buffer overflow.

tags | advisory, overflow
systems | apple, osx
advisories | CVE-2004-0810
MD5 | 1444e99d41aca0d1fe6e55cfef2f2a69
Corsaire Security Advisory 2004-06-19.1
Posted Nov 20, 2004
Authored by Martin O'Neal, Corsaire | Site penetration-testing.com

Corsaire Security Advisory - The aim of this document is to clearly define several vulnerabilities in the Danware NetOp Host product that suffers from multiple information disclosure issues.

tags | advisory, vulnerability, info disclosure
advisories | CVE-2004-0950
MD5 | 62ac9ea687c7f3b8d3f743ef6881f1f0
opera754.txt
Posted Nov 20, 2004
Authored by Marc Schoenefeld | Site illegalaccess.org

Opera 7.54 is vulnerable to leakage of the java sandbox, allowing malicious applets to gain privileges. This allows for information gathering as well as denial of service effects.

tags | advisory, java, denial of service
MD5 | a67b11d7269a7f701fd1a3682d495e7b
aclient.txt
Posted Nov 20, 2004
Authored by Reed Arvin

Altiris Deployment Solution 5.6 SP1 (Hotfix E) suffers from a privilege escalation flaw that allows for SYSTEM level access. Step by step exploitation given.

tags | exploit
MD5 | 1be9fdc191a6ebdcdd6f90985f998910
zoneAdBlock.txt
Posted Nov 20, 2004
Site zonelabs.com

ZoneAlarm Security Suite and ZoneAlarm Pro have been updated to address a vulnerability in their ad-blocking functions.

tags | advisory
MD5 | 491b70c200644db74a75979fec666aef
mailtraq.txt
Posted Nov 20, 2004
Authored by Reed Arvin

A privilege escalation technique can be used to gain SYSTEM level access while using the Mailtraq administration console. Mailtraq Version 2.6.1.1677 is vulnerable.

tags | exploit
MD5 | 570f63e06a088944b32ac1db1e0bb12f
slmail5x.txt
Posted Nov 20, 2004
Authored by muts | Site whitehat.co.il

SLMail 5.x POP3 remote PASS buffer overflow exploit that binds a shell to port 4444. Tested on Windows 2000 SP4.

tags | exploit, remote, overflow, shell
systems | windows, 2k
advisories | CVE-2004-0942
MD5 | 2f39531126d87191b5ceaf073ca81878
dmsPOP3.txt
Posted Nov 20, 2004
Authored by Reed Arvin

A buffer overflow exists in DMS POP3 Server for Windows 2000/XP 1.5.3 build 37 and prior versions. Demonstration exploit included.

tags | exploit, overflow
systems | windows, 2k
MD5 | d0b5cdae27042d688d59e55c6e8046ac
appservVulns.txt
Posted Nov 20, 2004
Authored by Saudi Linux

AppServ versions 2.5.x and below use a blank root password allowing for compromise.

tags | advisory, root
MD5 | 9132dd67cf51cae3f712c0a9c9fe1495
758884.txt
Posted Nov 20, 2004

Unofficial addition to the NISCC DNS vulnerability advisory giving an additional list of vulnerable implementations.

tags | advisory
MD5 | d1daaf185fbd2a5d88c982e101bec10d
FreeBSD Security Advisory 2004.16
Posted Nov 20, 2004
Authored by The FreeBSD Project, Colin Percival | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-04:16.fetch - The fetch utility suffers from an integer overflow condition in the processing of HTTP headers that can result in a buffer overflow.

tags | advisory, web, overflow
systems | freebsd
MD5 | 71ad571056ba3fb095b9cbd680eb92a2
mp-invision.txt
Posted Nov 20, 2004
Site maxpatrol.com

An input validation vulnerability in Invision Power Board version 2.x allows a remote user the ability to conduct SQL injection attack.

tags | exploit, remote, sql injection
MD5 | 172eba93ee042464d0c8803a4e663fab
phpbbcashmod.txt
Posted Nov 20, 2004
Authored by Jerome Athias

Vulnerabilities that allow an attacker to inject malicious PHP code exist in the phpBB2 forum using the Cash_Mod module.

tags | advisory, php, vulnerability
MD5 | 0d061f49d0ad856b5b649edc26072364
bofra_overview.txt
Posted Nov 20, 2004
Authored by Bryan Burns

Brief analysis of the Bofra, aka MyDoom.AG/AH, worm that was first discovered circulating in the wild November 8th.

tags | paper, worm, virus
MD5 | 1ada5872347d870822aec9f3feb880b6
Gentoo Linux Security Advisory 200411-26
Posted Nov 20, 2004
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200411-26 - Improper file ownership allows user-owned files to be run with root privileges by init scripts. These vulnerabilities exist within GIMPS, SETI@home, and ChessBrain.

tags | advisory, root, vulnerability
systems | linux, gentoo
MD5 | 0212702ca6587e05a1c0a3aaa53fd0e2
advRX181104.txt
Posted Nov 20, 2004
Authored by Psirac

Cscope 15.5 and possibly earlier versions may suffer from a race condition that allows for local compromise. Proof of concept exploits included.

tags | exploit, local, proof of concept
MD5 | 4a0e0ab79fabe9230af9db9e474118cb
142004.txt
Posted Nov 20, 2004
Authored by Stefan Esser | Site security.e-matters.de

During an audit of the smb filesystem implementation within Linux several vulnerabilities were discovered ranging from out of bounds read accesses to kernel level buffer overflows. The 2.4 series up to 2.4.27 is affected and the 2.6 series up to 2.6.9 is affected.

tags | advisory, overflow, kernel, vulnerability
systems | linux
advisories | CVE-2004-0883, CVE-2004-0949
MD5 | 6dbd64513c8583c5c3583aa170d5180b
clickandbuild.txt
Posted Nov 20, 2004
Authored by Andrew Smith

The Click and Build online eCommerce platform suffers from cross site scripting flaws.

tags | advisory, xss
MD5 | 0a8d47c80a36accd70f6643000a3e78a
Secunia Security Advisory 13203
Posted Nov 20, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - cyber flash has discovered two vulnerabilities in Internet Explorer, which can be exploited by malicious people to bypass a security feature in Microsoft Windows XP SP2 and trick users into downloading malicious files.

tags | advisory, vulnerability
systems | windows, xp
MD5 | d98a97a6c778d608e547f07cefbda3d6
msboftools.txt
Posted Nov 20, 2004
Authored by Martin Eiszner

Microsoft tools ipconfig.exe, forcedos.exe, and mrinfo.exe suffer from buffer overflow and format string vulnerabilities.

tags | advisory, overflow, vulnerability
MD5 | 919154fd2dfec8c6135a1a5529455bf7
waraxe-2004-SA038.txt
Posted Nov 20, 2004
Authored by Janek Vind aka waraxe | Site waraxe.us

The Event Calendar module for PHP-Nuke suffers from cross site scripting, path disclosure, SQL injection, and script insertion attacks.

tags | exploit, php, xss, sql injection
MD5 | 39075f33edc60c02047b4706096f6897
Page 1 of 3
Back123Next

File Archive:

July 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    34 Files
  • 2
    Jul 2nd
    15 Files
  • 3
    Jul 3rd
    9 Files
  • 4
    Jul 4th
    8 Files
  • 5
    Jul 5th
    2 Files
  • 6
    Jul 6th
    3 Files
  • 7
    Jul 7th
    1 Files
  • 8
    Jul 8th
    15 Files
  • 9
    Jul 9th
    15 Files
  • 10
    Jul 10th
    20 Files
  • 11
    Jul 11th
    17 Files
  • 12
    Jul 12th
    15 Files
  • 13
    Jul 13th
    2 Files
  • 14
    Jul 14th
    1 Files
  • 15
    Jul 15th
    20 Files
  • 16
    Jul 16th
    27 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close