exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 93 RSS Feed

Files Date: 2004-12-11 to 2004-12-12

base-1.0.tar.gz
Posted Dec 11, 2004
Authored by Kevin Johnson | Site sourceforge.net

BASE is the Basic Analysis and Security Engine. It is based on the code from the Analysis Console for Intrusion Databases (ACID) project. This application provides a Web frontend to query and analyze the alerts coming from a Snort IDS.

Changes: Various bug fixes.
tags | tool, web, sniffer
SHA-256 | d861520edf1e90488b1d049837fa31a1ff3c760e45b251e23ed9f54afb7e720f
atari800.txt
Posted Dec 11, 2004
Authored by Adam Zabrocki | Site pi3.int.pl

Exploit for the Atari800 atari emulator. Allows for local privilege escalation to root six different ways.

tags | exploit, local, root
SHA-256 | 760cd8cf8696f135ffda0b2089c0d717801c12d775ac0adf04bfd86a5a846d7a
ieloop.txt
Posted Dec 11, 2004
Authored by SkyLined | Site edup.tudelft.nl

Another MSIE flaw that allows for a nest sort loop to cause an exception.

tags | advisory
SHA-256 | f9e3153a835e256b97c1f3cb90599d1eddf85c9d3a051a20d07215e32baf0dfe
insiteprod.txt
Posted Dec 11, 2004
Authored by Carlos Ulver

Various insite products suffer from cross site scripting attacks.

tags | advisory, xss
SHA-256 | 76cc065c82a79805d65af12dc4c69c4fe67bd61a7beddcef561f43757a0f1a70
cmailserver52.txt
Posted Dec 11, 2004
Authored by Tan Chew Keong

Multiple vulnerabilities were found in CMailServer's Web Mail service including buffer overflow, SQL Injection and Cross-Site Scripting (XSS) flaws. CMailServer version 5.2 on English Win2K IIS 5.0 was tested.

tags | advisory, web, overflow, vulnerability, xss, sql injection
systems | windows
SHA-256 | 84acf4cfdf663c21738923ba8986aefd2a8b5f25680f5eee678407da36243638
beta.c
Posted Dec 11, 2004
Authored by SkyLined | Site edup.tudelft.nl

Tool that can encode shellcode in various ways. Released by the author of the InternetExploiter exploit. Documentation for this tool available here.

tags | shellcode
SHA-256 | 66588988e27151588f35c1d98e2e115206867e3150312b3abbf669ddfdcc4681
swbfp.zip
Posted Dec 11, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Remote test exploit for Star Wars Battlefront versions 1.11 and below that checks for buffer overflow and memory access flaws.

tags | exploit, remote, overflow
SHA-256 | 98ba6099180ba4bd950aa9286836fab845e0408239a0283b9977828da8575ced
swbfp.txt
Posted Dec 11, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Star Wars Battlefront versions 1.11 and below suffer from buffer overflow and arbitrary memory access flaws.

tags | advisory, overflow, arbitrary
SHA-256 | 0fbf70d892669a01d6f60b8cceecbb26c47cae659aa6c94955c70b1cec19ffe1
msScreen.txt
Posted Dec 11, 2004
Authored by Matthew Walker

Anything with the capabilities of changing a screen saver under Windows XP theoretically can execute with anything with SYSTEM privileges.

tags | advisory
systems | windows
SHA-256 | 3929a31b29a483ac37970f44e7cee88e8b662438ad1bf45c11ab5352809908b2
Secunia Security Advisory 13301
Posted Dec 11, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Cassiopeia has reported a security issue in RediCart and S-Mart Shopping Cart Script, allowing malicious people to view the configuration file.

tags | advisory
SHA-256 | b5a5bca50aba1f64eba5c97e91f0951d57a2a93056e21c63c123f76c73432c69
OpenDcHub-poc.zip
Posted Dec 11, 2004
Authored by Donato Ferrante | Site autistici.org

Proof of concept exploit for a buffer overflow vulnerability that exists in Open Dc Hub version 0.7.14.

tags | exploit, overflow, proof of concept
SHA-256 | 8258ae931f345dbb3993fba33e50fa99806a19f8996a9b591ba1f150a0fb65d9
opendchub0714.txt
Posted Dec 11, 2004
Authored by Donato Ferrante | Site autistici.org

A buffer overflow exists in the Open Dc Hub program that allows for arbitrary code execution. Version 0.7.14 is affected.

tags | advisory, overflow, arbitrary, code execution
SHA-256 | 5d7728d7a1361bced3f0c6e6bc6738ad15502e921eb3164f0124e62d24c94b98
Secunia Security Advisory 13259
Posted Dec 11, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Joey Hess has reported a vulnerability in wmFrog, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges.

tags | advisory, local
SHA-256 | 58c4f2471d1ffcfc28b853c966617d4a21863ff102ffcdf925b3060552fc2244
winampm3u.c
Posted Dec 11, 2004

Exploit for the Winamp vulnerability existing in versions 5.06 and below making use of the IN_CDDA.dll remote buffer overflow.

tags | exploit, remote, overflow
SHA-256 | 25fbcbea1f6cb52583688142fc6827f1aab748a864da9963e4213633a0d1f4bd
Secunia Security Advisory 13300
Posted Dec 11, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in PHPNews, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 1fde5eb063b0ab2d60c93249cb38fc823033b838f98a5858ec12af11c3b392e9
Gentoo Linux Security Advisory 200411-33
Posted Dec 11, 2004
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200411-33 - A bug in the TWiki search function allows an attacker to execute arbitrary commands with the permissions of the user running TWiki.

tags | advisory, arbitrary
systems | linux, gentoo
SHA-256 | a20264063d4371fb1c37003e5f0ee38741b0d5c5712d6caa182cbf15b5b2e86e
Gentoo Linux Security Advisory 200411-32
Posted Dec 11, 2004
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200411-32 - phpBB contains a vulnerability which allows a remote attacker to execute arbitrary commands with the rights of the web server user.

tags | advisory, remote, web, arbitrary
systems | linux, gentoo
SHA-256 | bdda845cd63dca557ca59044b643747acc8e5fc8f327c3b384c5b354162310f2
ADLAB-04002.txt
Posted Dec 11, 2004
Authored by ICBM

There is a remote buffer overflow in the C2S module of Jabberd 2.x which allows attackers to crash the Jabberd sever and possibly execute arbitrary code.

tags | advisory, remote, overflow, arbitrary
advisories | CVE-2004-0953
SHA-256 | 05b173b611cbd832f73a3b1665a217260fa88bd37a0284261b450f8f07c205ac
STG Security Advisory 2004-11-22.12
Posted Dec 11, 2004
Authored by STG Security | Site stgsecurity.com

STG Security Advisory: Due to an input validation flaw, Zwiki is vulnerable to cross site scripting attacks.

tags | exploit, xss
SHA-256 | 65b7e075dc354dda1b68af47357e8245716561c8adb622f8769142ea94fc9d0f
STG Security Advisory 2004-11-22.11
Posted Dec 11, 2004
Authored by STG Security | Site stgsecurity.com

STG Security Advisory: Due to an input validation flaw, JSPWiki is vulnerable to cross site scripting attacks.

tags | exploit, xss
SHA-256 | ecd38f592043061846aa7d65232f39d632ae3aa0e137fb49d4c2e1f914db517d
STG Security Advisory 2004-11-22.10
Posted Dec 11, 2004
Authored by STG Security | Site stgsecurity.com

STG Security Advisory: KorWeblog suffers from a directory traversal vulnerability that malicious attackers can get file lists of arbitrary directories.

tags | exploit, arbitrary
SHA-256 | 71700686df5b1678bd4503f868982180d543ec54e0c9d59cc2e37c275e95716e
STG Security Advisory 2004-11-22.9
Posted Dec 11, 2004
Authored by STG Security | Site stgsecurity.com

STG Security Advisory: cscope is vulnerable to symlink attacks, potentially allowing a local user to overwrite arbitrary files with the right of the user running them, which could be root.

tags | advisory, arbitrary, local, root
SHA-256 | 22aff0b7a3b9fece18550c0a926a047f9299775940d5a1168595ac6a867ae897
sof2boom.zip
Posted Dec 11, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Remote proof of concept exploit for Soldier of Fortune II versions 1.0.3 gold and below that suffer from a typical sprintf() overflow.

tags | exploit, remote, overflow, proof of concept
SHA-256 | 8c1f38ba19234cca1350bb97214735995b65a3407cba5859c48514f728863627
sof2boom.txt
Posted Dec 11, 2004
Authored by Luigi Auriemma | Site aluigi.altervista.org

Soldier of Fortune II versions 1.0.3 gold and below suffers from a typical sprintf() overflow that allows for remote code execution.

tags | advisory, remote, overflow, code execution
SHA-256 | d83f55dcd409bc26440cb9e929f2bd8973ce0e861117f3b1e57032b9795e006d
Gentoo Linux Security Advisory 200411-31
Posted Dec 11, 2004
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200411-31 - ProZilla contains several buffer overflow vulnerabilities that can be exploited by a malicious server to execute arbitrary code with the rights of the user running ProZilla.

tags | advisory, overflow, arbitrary, vulnerability
systems | linux, gentoo
SHA-256 | 6d361676085f0c3f1fa8acaa10a42be8b7c731c3173bf012d1b074d1b2abcc17
Page 3 of 4
Back1234Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close