exploit the possibilities
Showing 1 - 25 of 44 RSS Feed

Files Date: 2005-01-02

2004-advisories.tgz
Posted Jan 2, 2005

Packet Storm new advisories for all of 2004.

tags | advisory
MD5 | e5b5fbcdd00c3bec0a70b4ae7fd8ea33
2004-exploits.tgz
Posted Jan 2, 2005
Authored by Todd J.

Packet Storm new exploits for all of 2004.

tags | exploit
MD5 | 1025b520ced0e64f9b8cc4a1cf11cb6f
0411-exploits.tgz
Posted Jan 2, 2005
Authored by Todd J.

Packet Storm new exploits for November, 2004.

tags | exploit
MD5 | 3fb9ef413eed6565c35700d6937a1ff3
0404-exploits.tgz
Posted Jan 2, 2005
Authored by Todd J.

Packet Storm new exploits for April, 2004.

tags | exploit
MD5 | 85f526a8ef74aa7fab235cec0a12d54a
Kalimba.zip
Posted Jan 2, 2005
Authored by Byron Copeland | Site home.comcast.net

Win32 based wardialer called Kalimba. Included Blue Box capabilities, such as 0 - 9 dialing, quarter, dime, nickel tones, Operator tones, conference capabilities. Source included.

tags | tool, wardialer
systems | windows
MD5 | e200cf710842d0a906ac8f00fa5e7cf4
viewcvs.txt
Posted Jan 2, 2005
Authored by Joxean Koret

ViewCVS 0.9.2 is susceptible to cross site scripting and HTTP-response splitting flaws.

tags | exploit, web, xss
MD5 | 5a6ee9d029cb6f76d95245fb11eb032c
sugarCRM.txt
Posted Jan 2, 2005
Authored by Joxean Koret

Cross site scripting and possible code execution vulnerabilities exists in SugarCRM versions 1.x.

tags | exploit, vulnerability, code execution, xss
MD5 | 4165b81336419e069b3cef37301cc62e
OWL-Intranet.txt
Posted Jan 2, 2005
Authored by Joxean Koret

OWL versions 0.7 and 0.8 suffer from cross site scripting and SQL injection vulnerabilities.

tags | exploit, vulnerability, xss, sql injection
MD5 | ccfd6b1bbecbce6fd29bd93463b5a4ff
xanga.txt
Posted Jan 2, 2005
Site gnaa.us

A vulnerability in Xanga allows for malicious theft of cookies.

tags | advisory
MD5 | 3f917a75d4ec6fbf9bc051bcc58011de
aolpwreset_advisory.txt
Posted Jan 2, 2005
Authored by Steven

AOL's Online Password Reset feature does not fully validate user information.

tags | advisory
MD5 | 5952e45ffcdbda8bcf7ecf0283747381
jackformail.txt
Posted Jan 2, 2005
Authored by Hack Hawk

Jacks FormMail.php script can be manipulated into sending arbitrary files from the server. Version 5.0 is affected.

tags | advisory, arbitrary, php
MD5 | 22270187b18f9066be356c1b18f11108
wins.c
Posted Jan 2, 2005
Authored by zuc

Remote Microsoft Windows 2000 WINS exploit that has connectback shellcode. Works on SP3/SP4.

tags | exploit, remote, shellcode
systems | windows, 2k
advisories | CVE-2004-1080
MD5 | bca4ce46995ede27531c85fe556c98c2
IbProfArcade.txt
Posted Jan 2, 2005
Authored by Mike Bailey

A flaw exists in the high scores module of IbProArcade which allows for malicious SQL injection.

tags | advisory, sql injection
MD5 | 61df6b5f7531a438ed03d6ac7e19a18f
argosoft_advisory.txt
Posted Jan 2, 2005
Authored by Steven | Site lovebug.org

Versions prior to 1.4.2.1 of the ArGoSoft FTP server will disclose whether or not a supplied username is valid or not. A login name supplied with the USER command will not be accepted unless it is valid.

tags | advisory
MD5 | de8f3d772594d1e69c4b985eedc6f2b2
HOD-ms04031-netdde-expl.c
Posted Jan 2, 2005
Authored by houseofdabus

Remote proof of concept exploit for the NetDDE buffer overflow vulnerability as described in MS04-031. Tested on: Windows XP Professional SP0, Windows XP Professional SP1, Windows 2000 Professional SP2, Windows 2000 Professional SP3, Windows 2000 Professional SP4, Windows 2000 Advanced Server SP4.

tags | exploit, remote, overflow, proof of concept
systems | windows, 2k, xp
MD5 | d8d4090c728f4295d8bb51908e941671
KorWeblog.txt
Posted Jan 2, 2005
Authored by Mins

KorWeblog suffers from a directory traversal vulnerability that enables malicious attackers to access files and include malicious php files. Versions 1.6.2-cvs and below are susceptible.

tags | exploit, php
MD5 | aef213cbdc2bb62aa2b5f0700792a633
Gentoo Linux Security Advisory 200412-27
Posted Jan 2, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200412-27 - cYon discovered that the authform.inc.php script allows a remote user to define the global variable path_pre.

tags | advisory, remote, php
systems | linux, gentoo
MD5 | 5c78c8821c527d78708884dba7ffab40
Gentoo Linux Security Advisory 200412-24
Posted Jan 2, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200412-24 - New integer overflows were discovered in Xpdf, potentially resulting in the execution of arbitrary code. GPdf includes Xpdf code and therefore is vulnerable to the same issues.

tags | advisory, overflow, arbitrary
systems | linux, gentoo
MD5 | 1d3121a5369875b3b2f17b0844cdf0cb
ftpd-iexpl.c
Posted Jan 2, 2005
Authored by Albert Puigsech Galicia

Proof of concept exploit for Internet Explorer version 6.0.3790.0 that demonstrates an FTP download path disclosure flaw.

tags | exploit, proof of concept
MD5 | c396765c5b95db527753b59b0cb4cfcb
7a69-17.txt
Posted Jan 2, 2005
Authored by Albert Puigsech Galicia

7a69ezine Advisories #17 - Internet Explorer version 6.0.3790.0 suffers from an FTP download path disclosure flaw.

tags | advisory
MD5 | c90e32830006de416786d6541fff9884
Secunia Security Advisory 13696
Posted Jan 2, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - The vendor has acknowledged a vulnerability in kio_ftp, which can be exploited by malicious people to conduct FTP command injection attacks.

tags | advisory
MD5 | 06ad05dd7b12d5c2f9d555081a20d6b0
Secunia Security Advisory 13677
Posted Jan 2, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - sullo has reported multiple vulnerabilities in Eventum, which can be exploited by malicious people to conduct cross-site scripting and script insertion attacks and potentially bypass certain security restrictions.

tags | advisory, vulnerability, xss
MD5 | dcd60e2bb73e26378e1ab958b111aadc
Secunia Security Advisory 13671
Posted Jan 2, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Symantec has acknowledged three vulnerabilities in the Nexland Firewall Appliances, which can be exploited by malicious people to cause a DoS (Denial of Service), identify active services, and manipulate the firewall configuration.

tags | advisory, denial of service, vulnerability
MD5 | 110f14a17c20e3cf0838dad233a1ff87
isec-0020-mozilla.txt
Posted Jan 2, 2005
Authored by Maurycy Prodeus | Site isec.pl

A heap overflow in Mozilla browser versions 1.7.3 and below in the NNTP code may allow for arbitrary code execution.

tags | exploit, overflow, arbitrary, code execution
MD5 | 28f2d5a8e2e4029a4b83de4ea3ca607e
phpcalendar.txt
Posted Jan 2, 2005
Authored by James Bercegay | Site gulftech.org

PHP-Calendar suffers from a file inclusion vulnerability. All versions are affected.

tags | exploit, php, file inclusion
MD5 | f3d2a2da12855b70374d273e68526a83
Page 1 of 2
Back12Next

File Archive:

July 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    34 Files
  • 2
    Jul 2nd
    15 Files
  • 3
    Jul 3rd
    9 Files
  • 4
    Jul 4th
    8 Files
  • 5
    Jul 5th
    2 Files
  • 6
    Jul 6th
    3 Files
  • 7
    Jul 7th
    1 Files
  • 8
    Jul 8th
    15 Files
  • 9
    Jul 9th
    15 Files
  • 10
    Jul 10th
    20 Files
  • 11
    Jul 11th
    17 Files
  • 12
    Jul 12th
    15 Files
  • 13
    Jul 13th
    2 Files
  • 14
    Jul 14th
    1 Files
  • 15
    Jul 15th
    20 Files
  • 16
    Jul 16th
    27 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close