exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 14 of 14 RSS Feed

Files Date: 2005-01-07 to 2005-01-08

libvg-0.3.0.tar.gz
Posted Jan 7, 2005
Authored by Pluf | Site 7a69ezine.org

First public released of libvg, a runtime process manipulation library. Libvg was designed to provide a powerful and portable interface for writing non-complex programs that can get or change information of processes on the system.

tags | library
SHA-256 | 6cd35b18473ff6e881f833beb66fec0945da66f0b773f0b6ddbca106622065fb
mac_v01.zip
Posted Jan 7, 2005
Authored by Gogu Gigi

MAC address modification utility for Windows 2000 / XP / 2003 Server.

systems | windows
SHA-256 | 33f7901333edc14612ee42fc3eb035638e7eb59411438473257e8959204117cd
Secunia Security Advisory 13747
Posted Jan 7, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Santiago Cortes has reported a vulnerability in Sugar Sales, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 1db32c7f927e913852adcea84f09740e6d13a2eb4af84b5f706543d6a27d2f5b
isec-0021-uselib.txt
Posted Jan 7, 2005
Authored by Paul Starzetz | Site isec.pl

Locally exploitable flaws have been found in the Linux binary format loaders' uselib() functions that allow local users to gain root privileges. Linux kernel versions 2.4 up to and including 2.4.29-pre3, 2.6 up to and including 2.6.10 are affected. Exploit included.

tags | exploit, kernel, local, root
systems | linux
advisories | CVE-2004-1235
SHA-256 | dc8912477cabd4620eccb9621b77afc571d533b90b200dfc6fc0b9d16173ee04
amp2zero.zip
Posted Jan 7, 2005
Authored by Luigi Auriemma | Site aluigi.altervista.org

Proof of concept denial of service exploit for the Amp II 3D game engine that is susceptible to attack when receiving UDP datagrams of zero bytes.

tags | exploit, denial of service, udp, proof of concept
SHA-256 | 80d677ae8b10d22ddbe0c994296c32782336b61e029dcafac8acdd83a4c4290d
amp2zero.txt
Posted Jan 7, 2005
Authored by Luigi Auriemma | Site aluigi.altervista.org

The Amp II 3D game engine is susceptible to a denial of service attack when receiving UDP datagrams of zero bytes.

tags | advisory, denial of service, udp
SHA-256 | 48f45ec61d3cad1620022de97f403f68e46b8e9f946ff88c7d0f52349256fb6b
jakarta556_xss.txt
Posted Jan 7, 2005
Authored by Oliver Karow | Site oliverkarow.de

Apache Jakarta Tomcat version 5.5.6 is susceptible to cross site scripting attacks.

tags | exploit, xss
SHA-256 | 27105001fc27f96aa1eb4a7805155ca4e01d73ebea5c3512a754a06980fd505e
Secunia Security Advisory 13725
Posted Jan 7, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - LSS Security Team has reported a weakness in mod_dosevasive for Apache, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges.

tags | advisory, local
SHA-256 | cde707c1ec8034c5dee23d37d8c7db792e02d77e177c4c3bbdbd5eeb64275fb8
phpbb.ssh.D.txt
Posted Jan 7, 2005
Authored by priv8crew

New version of the phpBB worm with bot install that makes use of Altavista.

tags | exploit, worm
SHA-256 | c5803f6012ff7cfa1585917d923f94e611150553d2fb171052cdefe79a0f8b4f
winaceHKI.txt
Posted Jan 7, 2005
Authored by Rafel Ivgi | Site theinsider.deep-ice.com

WinAce WinHKI version 1.4d suffers from a directory traversal flaw that allows a compressed archive to overwrite files below the extraction directory.

tags | exploit
SHA-256 | 7acca77e689274d3cd982f9d900df6860a2925ef7a040d858a40a2163d48384e
Secunia Security Advisory 13713
Posted Jan 7, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Exim, which potentially can be exploited by malicious, local users to gain escalated privileges and by malicious people to compromise a vulnerable system.

tags | advisory, local, vulnerability
SHA-256 | 0126c14d80f535abb7d233cf47a538e44964560a4f376cb77e022e4f39ee01cb
Secunia Security Advisory 13732
Posted Jan 7, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ziv Kamir has discovered two vulnerabilities in Jeuce Personal Web Server, which can be exploited by malicious people to disclose sensitive information and cause a DoS (Denial of Service).

tags | advisory, web, denial of service, vulnerability
SHA-256 | d8e80259c936add710258705b3aaa2543a33818e0285a0fd79e80913d7a22bd7
Secunia Security Advisory 13718
Posted Jan 7, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - r0ut3r has reported a vulnerability in b2evolution, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | e68d038b9ba09b2335829760400071a3ffd0b6b1b0bd7eaaabebf90618521775
symantecBO.txt
Posted Jan 7, 2005
Authored by Rafel Ivgi | Site theinsider.deep-ice.com

A stack buffer overflow exists in all Symantec products in all versions until 2005.

tags | advisory, overflow
SHA-256 | 1547ccdc34d04f8a18cf75c06785fbcbed245d4632a1fa13b5ff3ead034b0424
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close