exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 12 of 12 RSS Feed

Files Date: 2003-07-11

Some_people_walk_in_the_rain.GIF
Posted Jul 11, 2003
Authored by erfmufn

Another submission of a t-shirt graphic for Packet Storm.

SHA-256 | 794a4b796619be7e502818e0873d5237f7795ce41886683121a1e66ccefd49a9
DSR-mirc-url-spoofing.txt
Posted Jul 11, 2003
Authored by dsr, Knud Erik Hojgaard | Site dtors.net

mIRC 6.03 and below allows an attacker to misleading supply a URL that poses as one URL but leads to another by setting the color of the secondary URL to the default background color.

SHA-256 | 6b69a01535a0c67322cb56b25faa8fc7dba090f0825a3a04ed026b05cdd0462d
DSR-mirc-dcc-server.txt
Posted Jul 11, 2003
Authored by dsr, Knud Erik Hojgaard | Site dtors.net

mIRC 6.03 and below allow the ability for a remote attacker to spoof a dcc chat request in a targets client.

tags | remote, spoof
SHA-256 | e563523994f9fa8795dd89183f1920def4ff07f15d1392c758656569e82a5204
DSR-mnogo.pl
Posted Jul 11, 2003
Authored by dsr, inv | Site dtors.net

Proof of concept exploit for mnoGoSearch 3.1.20 (and possibly works on 3.2.10) that binds a shell to port 10000. Tested against FreeBSD.

tags | exploit, shell, proof of concept
systems | freebsd
SHA-256 | 3b52260178c6331557b9865a060541ff07d5cdeeedbe2e926b3952bdeac4b23d
Shatter_Redux.pdf
Posted Jul 11, 2003
Authored by Oliver Lavery | Site idefense.com

An iDEFENSE released security paper reflecting on the Shatter Attacks found against the Windows operating system in 2002. It clarifies what the flaws in the Windows event model are, describes a related vulnerability that continues to exist in many popular software products and suggests ways in which these unfixable flaws might be addressed.

tags | paper
systems | windows
SHA-256 | fb0fa8745192613a9bdb181c4d941509343bd2f72a05a7a56786349fd4ee1876
TurboFTP.txt
Posted Jul 11, 2003
Authored by Peter Winter-Smith

The TurboFTP client version 3.85 Build 304 is vulnerable to a buffer overflow attack from a malicious FTP server that can result in a denial of service and possibly remote command execution.

tags | advisory, remote, denial of service, overflow
SHA-256 | f666e3f6258f9bbb643fec3e3b0a1981eba0a2e3fab1c7aec152a14da0621a2d
SCSA019.txt
Posted Jul 11, 2003
Authored by Gregory Le Bras | Site Security-Corp.org

Security Corporation Security Advisory [SCSA-019]: Gattaca Server 2003 version 1.0.8.1 and below is vulnerable to displaying of directory contents and files, a denial a service, a directory traversal attack, and cross site scripting.

tags | exploit, xss
SHA-256 | 567072b06c844be28273933bafad463f99bca30b3c52eca5e292bebfabe4576e
MABRYdtv.txt
Posted Jul 11, 2003
Authored by Dr. Insane

The Mabry HTTP server version 1.00.047 suffers from multiple directory traversal attacks that allow an attacker to view the content of files outside of the web root.

tags | exploit, web, root
SHA-256 | 43cbd6585f19a0ab1503f294f841079b535fa4c9fde705680474e47079f77515
MABRYadv.txt
Posted Jul 11, 2003
Authored by Dr. Insane

MABRY ftpd is vulnerable to buffer overflows that result in a denial of service via the CWD, STAT, MKD, LIST, and RMD commands when an excess of 3200 bytes are sent.

tags | advisory, denial of service, overflow
SHA-256 | 2bd66cc50e84bb2b6524a75df67d487708d102ac22c134345b076c0ea1a49942
0x333shadow.tar.gz
Posted Jul 11, 2003
Authored by 0x333, nsn | Site 0x333.org

Log cleaner, for Linux, Freebsd, Irix and SunOS. While in the midst of cleaning, various system checks are performed to monitor presence of detection.

tags | tool, rootkit
systems | linux, unix, solaris, freebsd, irix
SHA-256 | ac7c25f0290ba5ef2ac9356d2eeaeb7e0973c568e4f1a337da703005cae7353a
ciscoCatOS.txt
Posted Jul 11, 2003
Authored by Cisco Systems PSIRT | Site cisco.com

Cisco Security Advisory: After receiving eight TCP connection attempts using a non-standard TCP flags combination, a Catalyst switch will stop responding to further TCP connections to that particular service. In order to re-establish functionality of that service, the switch must be rebooted. CatOS for the following models is affected: 4000 Series including models 2948G and 2980G/2980G-A, 5000 Series including models 2901, 2902 and 2926, and the 6000.

tags | advisory, tcp
systems | cisco
SHA-256 | 43e0117dba1a5cf8c123455025e2ce7fb4995a48d74dcb66f65cba5b74ca7a5f
a070803-1-2.txt
Posted Jul 11, 2003
Authored by Andreas Junestam | Site atstake.com

Addition to Atstake Security Advisory A070803-1 clarifying that the named pipe vulnerability discussed lies within the Windows NT/XP/2000 platform and that SQL Server 7.0 can be used as an attack vector along with potentially many other applications.

tags | advisory
systems | windows
SHA-256 | 26389446575344782062c92749190328e8a6e10abf5b4d0f5b30a7cea7e76538
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close