what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files Date: 2004-01-29 to 2004-01-30

ELF_RPATH.txt
Posted Jan 29, 2004
Authored by Matthias Andree

Some dynamically linked binary builds of the CVSup package contain untrusted paths in the ELF RPATH fields of the executables which may allow for local privilege escalation.

tags | advisory, local
SHA-256 | b8782bca72a905590f6df6d37502a533b73ad0fe9fb35cea32cce7475f90ab88
001.txt.asc
Posted Jan 29, 2004
Site ultramagnetic.sourceforge.net

Ultramagnetic, a utility based off of a fork of the GAIM IM software, is susceptible to the vulnerabilities found in GAIM versions 0.75 and below.

tags | advisory, vulnerability
advisories | CVE-2004-0005, CVE-2004-0006, CVE-2004-0007, CVE-2004-0008
SHA-256 | abf6c26a90679efd79e65b29519d28f7e599cb1e44ffde9b83afbc17c20ea2ae
ZH2004-02SA.txt
Posted Jan 29, 2004
Authored by ZetaLabs | Site zone-h.org

PJ CGI Neo review is vulnerable to a directory traversal attack that allows a remote attacker to access any file outside of the webroot.

tags | exploit, remote, cgi
SHA-256 | 992dd31568c4fcc4ccd00ecd6c0ceb0917e4d9075666f57504e17c887cb3ecde
open3sIDSonshowaudit.txt
Posted Jan 29, 2004
Authored by Juan Manuel Pascual Escriba | Site open3s.com

Any user with AAO privileges over the onshowaudit binary in IBM's Informix IDSv9.40 can read any system file.

tags | exploit
SHA-256 | 72ed995c0d9c55f14fcc3e3b6054b130f3018ce7a50d8030dfc3d03869c0a948
open3sIDSonedcu.txt
Posted Jan 29, 2004
Authored by Juan Manuel Pascual Escriba | Site open3s.com

A local vulnerability exists in the IBM Informix IDSv9.40 onedcu binary that allows local users to overwrite any root owned file.

tags | exploit, local, root
SHA-256 | db72f511fe4d56d0ece80a8d419ef2589c072cffdbf4185599095797b18a579e
Atstake Security Advisory 04-01-27.1
Posted Jan 29, 2004
Authored by David Goldsmith, Atstake | Site atstake.com

Atstake Security Advisory A012704-1 - The version of TruBlueEnvironment that is shipped with Mac OS X 10.3.x and 10.2.x takes the value of an environment variable and copies it into a buffer without performing any bounds checking. Since this buffer is stored on the stack, it is possible to overwrite the return stack frame and execute arbitrary code as root.

tags | advisory, arbitrary, root
systems | apple, osx
SHA-256 | 8ce54a8fef937890cb1f9d170aa0c3d29ca49c9cf3641d06a4d384befd8331e6
Page 1 of 1
Back1Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close