exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files Date: 2002-03-13

DLA-02-03-2002.txt
Posted Mar 13, 2002
Authored by Wouter ter Maat | Site digit-labs.org

Some areas of the Cobalt XTR UI are not .htaccess protected, allowing remote users to exploit the MultiFileUpload.php remote root vulnerability. Requires shell access to exploit. Includes a perl script to base64 encode the time for filename guessing.

tags | remote, shell, root, perl, php
SHA-256 | 0335dc5f5c37c8c68507a7da7f1bc5e9845dec9c23e2c1867d5f13a90ff49b69
FreeBSD Security Advisory 2002.17
Posted Mar 13, 2002
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-02:17 - The mod_frontpage port prior to version mod_portname-1.6.1 contains several remotely exploitable buffer overflows in the fpexec wrapper, which is installed setuid root.

tags | overflow, root
systems | freebsd
SHA-256 | 6baaa26e93cb19abe4d52eaea219513b94a7b57aba7a390dac5d9e0085650a3b
FreeBSD Security Advisory 2002.16
Posted Mar 13, 2002
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-02:16 - Versions 4.76 and earlier of the Netscape browser will execute JavaScript contained in gif and jpeg comment blocks, allowing a hostile web server to see what is in your cache.

tags | web, javascript
systems | freebsd
SHA-256 | 01e68c967241355e54d0dbda9dfd7c8b5b192f70e3f4324fc7e3b5072fa315c0
FreeBSD Security Advisory 2002.15
Posted Mar 13, 2002
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-02:15 - The port of the cyrus-sasl library prior to v1.5.24_8 contains a format string overflow in the syslog() call. Applications linked to that library could be affected.

tags | overflow
systems | freebsd
SHA-256 | ca1331948c84e83bcb66af1dcea4f17326b3ce7aa470a48f16bd1f4ffb9e66d8
FreeBSD Security Advisory 2002.14
Posted Mar 13, 2002
Authored by The FreeBSD Project | Site freebsd.org

FreeBSD Security Advisory FreeBSD-SA-02:14.pam-pgsql - The pam-pgsql port prior to v0.5.2 contains a vulnerability which allows remote users to cause arbitrary SQL code to be executed because the username and password given are inserted into a SQL statement with no safety checks.

tags | remote, arbitrary
systems | freebsd
SHA-256 | 6e3b0e22ccea6f55953d641696c316bff3e1aa4a2c38403ddae911b7abdcd9c8
CA-2002-07.zlib
Posted Mar 13, 2002
Site cert.org

CERT Advisory CA-2002-07 - A bug in the zlib compression library prior to v1.1.4 manifests itself as a vulnerability in any of the many programs that are linked with zlib, and allows an attackers to mount a dos attack, gather info, or execute arbitrary code. Passing a specially-crafted block of invalid compressed data to a program that includes zlib, the program's attempt to decompress the crafted data can cause the zlib routines to corrupt the internal data structures. Fix available here.

tags | arbitrary
SHA-256 | 027ea4a9b9fc60c7fe3a2fa2e98a44ecd8a73fe17a8674c2a37e4e3c66be400e
ptrace-dark.c
Posted Mar 13, 2002
Authored by Darknessx

Ptrace2.4 is a local root exploit for linux kernels prior to v2.4.9 and 2.2.20.

tags | exploit, kernel, local, root
systems | linux
SHA-256 | e985a2a3cfca07b197336e769c86daa09d889ea8c80b3e00fc8291655c670ba1
Wellenreiter-v07-alpha.tar.gz
Posted Mar 13, 2002
Authored by Max Moser | Site remote-exploit.org

Wellenreiter is a GTK/Perl program that makes the discovery and the auditing of 802.11b wireless-networks much easier. It has an embedded statistics engine for the common parameters provided by the wireless drivers, enabling you to view details about the consistency and signal strength of the network. A scanner window can be used to discover access-points, networks, and ad-hoc cards. It detects essid broadcasting or non-broadcasting networks in every channel, automatically switching frequencies. Wellenreiter can run on low-resolution devices that can run GTK/Perl and Linux/BSD (such as iPaqs).

tags | tool, perl, wireless
systems | linux, bsd
SHA-256 | c9b6dc3395ff1b64fbe2b8c00b21bac822f84ceb255603b81ce306b90c3453cd
php-nuke.5.5.css.txt
Posted Mar 13, 2002
Authored by Ravish | Site hackergurus.tk

PHP Nuke v5.5 has a cross site scripting vulnerability. Exploit information included.

tags | exploit, php, xss
SHA-256 | ea0a2f907d32e11a8d8ea2a9d231190a234851a4b50bf5f9b2a309b314e8c10a
hhp-qtip.c
Posted Mar 13, 2002
Authored by hhp, Cody Tubbs | Site hhp-programming.net

Hhp-qtip.c is a local root exploit for /usr/bin/tip on BSDI 4.2. Requires access to tip, usually gid(dialer).

tags | exploit, local, root
SHA-256 | 68b298f994c8c477f0f7455e566dc8f16aa96901ae020b249e0593c73d2ca8d6
Page 1 of 1
Back1Next

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    25 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close