exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files Date: 2004-04-15 to 2004-04-16

dsa-483.txt
Posted Apr 15, 2004
Authored by Debian | Site debian.org

Debian Security Advisory DSA 483-1 - The scripts mysqld_multi and mysqlbug in MySQL allow local users to overwrite arbitrary files via symlink attacks.

tags | advisory, arbitrary, local
systems | linux, debian
advisories | CVE-2004-0381, CVE-2004-0388
SHA-256 | bee19f598e2eea511dddfaacc16b600f1e9d73c78441f166dabd4562e60f75f4
SuSE-SA:2004:008.txt
Posted Apr 15, 2004
Authored by Sebastian Krahmer | Site suse.com

SuSE Security Advisory SuSE-SA:2004:008 - Two vulnerabilities have been discovered in CVS that can be exploited by malicious servers to compromise clients and by malicious users to retrieve arbitrary files from servers. Versions below 1.11.15 are affected.

tags | advisory, arbitrary, vulnerability
systems | linux, suse
SHA-256 | 634465bf9d0bf7d62e31bf17a6f6268ae520d0e80fc702c299ae1cadf2f0691f
dsa-485.txt
Posted Apr 15, 2004
Authored by Matt Zimmerman | Site debian.org

Debian Security Advisory DSA 485-1 - Max Vozeler discovered two format string vulnerabilities in ssmtp, a simple mail transport agent. Untrusted values in the functions die() and log_event() were passed to printf-like functions as format strings. These vulnerabilities could potentially be exploited by a remote mail relay to gain the privileges of the ssmtp process (including potentially root).

tags | advisory, remote, root, vulnerability
systems | linux, debian
advisories | CVE-2004-0156
SHA-256 | dbb0ababf09e05e0182a9e13cbee4381b08e05056c33cc77cc8e03612c4fa654
dsa-484.txt
Posted Apr 15, 2004
Authored by Matt Zimmerman | Site debian.org

Debian Security Advisory DSA 484-1 - Steve Kemp discovered a vulnerability in xonix, a game, where an external program was invoked while retaining setgid privileges. A local attacker could exploit this vulnerability to gain gid games.

tags | advisory, local
systems | linux, debian
advisories | CVE-2004-0157
SHA-256 | 95a2e6f0eb8456498067248b6ff0d47a81a32f4f950f5e93366646d58927a210
lilith-0.4c.tar.gz
Posted Apr 15, 2004
Authored by Michael Hendrickx | Site angelo.scanit.biz

LiLith is a tool written in Perl to audit web applications. This tool analyses webpages and looks for html form tags, which often refer to dynamic pages that might be subject to SQL injection or other flaws. It works much like an ordinary webspider.

tags | tool, web, scanner, perl, sql injection
systems | unix
SHA-256 | 9cb6986b797426175a1291e3b23e30adf1943f258f3fe82b539799c2a65398c9
ftgate.txt
Posted Apr 15, 2004
Authored by Dr. Insane | Site members.lycos.co.uk

FTGateOffice/FTGatePro version 1.2 suffers from path exposure, cross site scripting, and validation errors.

tags | advisory, xss
SHA-256 | eba70e4d82f4cdab0151b0d9a32d2ad8b4275d178450f866cc85fb930b059524
unmaintain.html
Posted Apr 15, 2004
Authored by Roedy Green

Hilarious write up on how to ensure a job for life. Entitled How To Write Unmaintainable Code.

systems | unix
SHA-256 | 072640834400115a882c5d33808600c3886403df3eac4bd1952275b7a1bd169b
waraxe-2004-SA016.txt
Posted Apr 15, 2004
Authored by Janek Vind aka waraxe

Cross site scripting bugs exist in PHP-Nuke versions 6.x through 7.2.

tags | advisory, php, xss
SHA-256 | 0da992c6bc892cac7f6b99a84635a87953f1c508e250c836c2ccfb9e521244ce
sslbomb.c
Posted Apr 15, 2004
Authored by David Barroso, Alfredo Andres Omella | Site s21sec.com

Remote denial of service exploit for IIS SSL vulnerability documented in MS04-011.

tags | exploit, remote, denial of service
SHA-256 | f960c76a400cb9cfcd8e6e70117716d00cd34051375ddc7429703a7e73802833
wz_ex.c
Posted Apr 15, 2004
Authored by snooq | Site angelfire.com

Proof of concept exploit for the WinZip32 MIME Parsing Overflow. Tested against WinZip 8.1 on Windows XP SP1 and Windows 2000 SP1. Instructions for use are included.

tags | exploit, overflow, proof of concept
systems | windows
SHA-256 | 8a7e5cb801e4ff9423fec6d0c994638590a6f7103e548f3888181d78cc1db3c2
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close