exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files Date: 2004-04-15

dsa-483.txt
Posted Apr 15, 2004
Authored by Debian | Site debian.org

Debian Security Advisory DSA 483-1 - The scripts mysqld_multi and mysqlbug in MySQL allow local users to overwrite arbitrary files via symlink attacks.

tags | advisory, arbitrary, local
systems | linux, debian
advisories | CVE-2004-0381, CVE-2004-0388
SHA-256 | bee19f598e2eea511dddfaacc16b600f1e9d73c78441f166dabd4562e60f75f4
SuSE-SA:2004:008.txt
Posted Apr 15, 2004
Authored by Sebastian Krahmer | Site suse.com

SuSE Security Advisory SuSE-SA:2004:008 - Two vulnerabilities have been discovered in CVS that can be exploited by malicious servers to compromise clients and by malicious users to retrieve arbitrary files from servers. Versions below 1.11.15 are affected.

tags | advisory, arbitrary, vulnerability
systems | linux, suse
SHA-256 | 634465bf9d0bf7d62e31bf17a6f6268ae520d0e80fc702c299ae1cadf2f0691f
dsa-485.txt
Posted Apr 15, 2004
Authored by Matt Zimmerman | Site debian.org

Debian Security Advisory DSA 485-1 - Max Vozeler discovered two format string vulnerabilities in ssmtp, a simple mail transport agent. Untrusted values in the functions die() and log_event() were passed to printf-like functions as format strings. These vulnerabilities could potentially be exploited by a remote mail relay to gain the privileges of the ssmtp process (including potentially root).

tags | advisory, remote, root, vulnerability
systems | linux, debian
advisories | CVE-2004-0156
SHA-256 | dbb0ababf09e05e0182a9e13cbee4381b08e05056c33cc77cc8e03612c4fa654
dsa-484.txt
Posted Apr 15, 2004
Authored by Matt Zimmerman | Site debian.org

Debian Security Advisory DSA 484-1 - Steve Kemp discovered a vulnerability in xonix, a game, where an external program was invoked while retaining setgid privileges. A local attacker could exploit this vulnerability to gain gid games.

tags | advisory, local
systems | linux, debian
advisories | CVE-2004-0157
SHA-256 | 95a2e6f0eb8456498067248b6ff0d47a81a32f4f950f5e93366646d58927a210
lilith-0.4c.tar.gz
Posted Apr 15, 2004
Authored by Michael Hendrickx | Site angelo.scanit.biz

LiLith is a tool written in Perl to audit web applications. This tool analyses webpages and looks for html form tags, which often refer to dynamic pages that might be subject to SQL injection or other flaws. It works much like an ordinary webspider.

tags | tool, web, scanner, perl, sql injection
systems | unix
SHA-256 | 9cb6986b797426175a1291e3b23e30adf1943f258f3fe82b539799c2a65398c9
ftgate.txt
Posted Apr 15, 2004
Authored by Dr. Insane | Site members.lycos.co.uk

FTGateOffice/FTGatePro version 1.2 suffers from path exposure, cross site scripting, and validation errors.

tags | advisory, xss
SHA-256 | eba70e4d82f4cdab0151b0d9a32d2ad8b4275d178450f866cc85fb930b059524
unmaintain.html
Posted Apr 15, 2004
Authored by Roedy Green

Hilarious write up on how to ensure a job for life. Entitled How To Write Unmaintainable Code.

systems | unix
SHA-256 | 072640834400115a882c5d33808600c3886403df3eac4bd1952275b7a1bd169b
waraxe-2004-SA016.txt
Posted Apr 15, 2004
Authored by Janek Vind aka waraxe

Cross site scripting bugs exist in PHP-Nuke versions 6.x through 7.2.

tags | advisory, php, xss
SHA-256 | 0da992c6bc892cac7f6b99a84635a87953f1c508e250c836c2ccfb9e521244ce
sslbomb.c
Posted Apr 15, 2004
Authored by David Barroso, Alfredo Andres Omella | Site s21sec.com

Remote denial of service exploit for IIS SSL vulnerability documented in MS04-011.

tags | exploit, remote, denial of service
SHA-256 | f960c76a400cb9cfcd8e6e70117716d00cd34051375ddc7429703a7e73802833
wz_ex.c
Posted Apr 15, 2004
Authored by snooq | Site angelfire.com

Proof of concept exploit for the WinZip32 MIME Parsing Overflow. Tested against WinZip 8.1 on Windows XP SP1 and Windows 2000 SP1. Instructions for use are included.

tags | exploit, overflow, proof of concept
systems | windows
SHA-256 | 8a7e5cb801e4ff9423fec6d0c994638590a6f7103e548f3888181d78cc1db3c2
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close