exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files Date: 2004-04-17 to 2004-04-18

gemitelv3.txt
Posted Apr 17, 2004
Authored by jaguar | Site wulab.com

Gemitel versions 3.5 and below allow for malicious file inclusion in its affich.php script. This vulnerability allows an attacker to forcibly execute arbitrary scripts from remote resources on the server.

tags | exploit, remote, arbitrary, php, file inclusion
SHA-256 | 483f0f3f00299f5b8710d0ee6366376e76b18b0d54ae99b5df2b8b47f8dac39d
navNest.txt
Posted Apr 17, 2004
Authored by Bipin Gautam

Norton Antivirus is susceptible to a nested file manual scan bypass attack.

tags | advisory
SHA-256 | ca93438b7c9ea3dc6ec50a2867da283a445c246f3149cf5a65d2c644ba088113
Secunia Security Advisory 11394
Posted Apr 17, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory SA11394 - A vulnerability in WIKINDX allows remote attackers the ability to read the configuration file.

tags | advisory, remote
SHA-256 | ee342545e2df7fd12434bdc4d699fb5898e616061e3500f5199f9bdce38ebf41
Secunia Security Advisory 11367
Posted Apr 17, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory SA11367 - Subversion versions 0.x to 1.x are reportedly affected by some vulnerabilities, which potentially can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
SHA-256 | b54ff37cbaf0637ed2490a2f37b5ef05279d4058f159713993eb18cb5a926975
mac.txt
Posted Apr 17, 2004
Authored by Bugghy | Site vaida.bogdan.googlepages.com

Mandatory Access Control tutorial to correctly and safely install, configure, and use MAC policies. Written for FreeBSD users. Full step by step details given with explanations.

tags | paper
systems | unix, freebsd
SHA-256 | 207406b5776a26ca845f149070406f74a77aefe86a8bb83717528be689f9754b
ettercap-NG-0.7.0_pre1.tar.gz
Posted Apr 17, 2004
Authored by Alberto Ornaghi, Marco Valleri | Site ettercap.sourceforge.net

Ettercap NG is a network sniffer/interceptor/logger for switched LANs. It uses ARP poisoning and the man-in-the-middle technique to sniff all the connections between two hosts. Features character injection in an established connection - you can inject characters to server (emulating commands) or to client (emulating replies) while maintaining an established TCP connection! Integrated into a easy-to-use and powerful ncurses interface.

tags | tool, sniffer, tcp
SHA-256 | c3a67ffc8c13d8c873c38c35c2e29748767230fd3664584f907e4da2e43a5079
billybastard.c
Posted Apr 17, 2004
Authored by Hi_Tech_Assassin

Local exploit that makes use of the flaw in lsass.exe. Binds a shell to port 31337.

tags | exploit, shell, local
SHA-256 | 5ab651d859d8f895fdbb8b2254456e49cb8e5b76f76710c0e0c66777d172abb3
Secunia Security Advisory 11396
Posted Apr 17, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory SA11396 - The SCT Campus Pipeline attachment script has a vulnerability that allows for a cross site scripting attack.

tags | advisory, xss
SHA-256 | a04a37084472dc5e42132b2098cf642069be0c7055f61266e861f2c2a0693dcb
cfdos.txt
Posted Apr 17, 2004
Authored by K. K. Mookhey | Site nii.co.in

ColdFusion MX versions 6.0 and below suffer from a denial of service vulnerability when memory usage gets saturated due to an oversized string being returned as part of an error message.

tags | advisory, denial of service
SHA-256 | 619d02fdd2afd7d22cc8e5417214549294b00a682f1dafc88add6159e988ecf4
chpasswd.txt
Posted Apr 17, 2004
Authored by Matias Neiff

The chpasswd binary plugin version 3.x that comes with SquirrelMail is susceptible to a buffer overflow.

tags | advisory, overflow
SHA-256 | 51bed8c4cf3edfac90f26c1ed8d63cd3bf848fa26f97b3022a5c47a95bfe5974
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close