exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 34 of 34 RSS Feed

Files Date: 2004-10-07 to 2004-10-08

REALSERVER_EXPLOIT_ANALYSIS.PDF
Posted Oct 7, 2004
Authored by thc, Michael H. Lastor | Site thc.org

Whitepaper analysis on how to use the THCREALBAD Realserver exploit and how it works. Additionally, a real life intrusion with this exploit is shown with what to do after root privileges are achieved.

tags | root
SHA-256 | da0ce1aec6a555e292af7cc15d69eeb7f3b112af9284d681898840ffcab80474
SSL_PCT_EXPLOITATION_ANALYSIS.PDF
Posted Oct 7, 2004
Authored by thc, David Schulhoff | Site thc.org

Whitepaper analysis of the THCIISLAME SSL/PCT bug. How the bug was exploited and how to use it. Included is a small introduction to generic exploit coding.

SHA-256 | 6041b8bf4090610abecd45ed25a734bc71a58fe91c21b968a5f3559261234e7e
parachat55.txt
Posted Oct 7, 2004
Authored by Donato Ferrante | Site autistici.org

ParaChat server version 5.5 is susceptible to a directory traversal attack.

tags | exploit
SHA-256 | dc2d73d8a10c1ee9e0c6d1f19a2dd02664444349c0c58c5ea495325c5a299b7a
iceexec.zip
Posted Oct 7, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Remote proof of concept exploit for Icecast versions 2.0.1 and below on win32.

tags | exploit, remote, proof of concept
systems | windows
SHA-256 | 23877162b10171c3069e5990b259e3871a135ea9958164a73449b55f471194e1
icecast201.txt
Posted Oct 7, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Icecast versions 2.0.1 and below on win32 suffer from an overflow that allows arbitrary code execution.

tags | advisory, overflow, arbitrary, code execution
systems | windows
SHA-256 | 5ae22150ad203ad64e10d7285af8ff3f7150890e9efd2127aaebc2688ddba1e9
sacred_jpg.c
Posted Oct 7, 2004
Authored by Crypto

GDI+ buffer overrun exploit that builds a malicious .JPG file.

tags | exploit, overflow
advisories | CVE-2004-0200
SHA-256 | 2120feeb6515aaa49b2db0fdada31774f9ac67c30e70927ba0892e23f6f7acc3
Atstake Security Advisory 04-09-28.1
Posted Oct 7, 2004
Authored by Atstake, Cory Scott | Site atstake.com

Atstake Security Advisory A092804-1 - In the default installation of Vignette portal software, the utility is not secured against anonymous and unauthenticated access. Since many portal deployments are on the Internet or exposed to untrusted networks, this results in an information disclosure vulnerability.

tags | advisory, info disclosure
advisories | CVE-2004-0917
SHA-256 | a8325ff2a0095531d4190a7c7f60437fa2c9dbffbca33fe8c429792d88f520fb
Secunia Security Advisory 12533
Posted Oct 7, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A format string vulnerability in QNX RTOS can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
SHA-256 | 97d0a394cd035f6ce9301e8fbea1f470ccdf0fb5ca1735b26d806e6cd263fa49
Secunia Security Advisory 12498
Posted Oct 7, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions. The vulnerability is caused due to an unspecified error within the ide-cd SG_IO functionality. This allows a user with read-only access to bypass these permissions and perform write and erase operations on media in a drive.

tags | advisory, kernel, local
systems | linux
SHA-256 | 26ad3d4f7c4119976b9845a0ac47432aff4175f42654af02fd6fe39288045f63
Page 2 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close