exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 14 of 14 RSS Feed

Files Date: 2005-01-07

libvg-0.3.0.tar.gz
Posted Jan 7, 2005
Authored by Pluf | Site 7a69ezine.org

First public released of libvg, a runtime process manipulation library. Libvg was designed to provide a powerful and portable interface for writing non-complex programs that can get or change information of processes on the system.

tags | library
SHA-256 | 6cd35b18473ff6e881f833beb66fec0945da66f0b773f0b6ddbca106622065fb
mac_v01.zip
Posted Jan 7, 2005
Authored by Gogu Gigi

MAC address modification utility for Windows 2000 / XP / 2003 Server.

systems | windows
SHA-256 | 33f7901333edc14612ee42fc3eb035638e7eb59411438473257e8959204117cd
Secunia Security Advisory 13747
Posted Jan 7, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Santiago Cortes has reported a vulnerability in Sugar Sales, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 1db32c7f927e913852adcea84f09740e6d13a2eb4af84b5f706543d6a27d2f5b
isec-0021-uselib.txt
Posted Jan 7, 2005
Authored by Paul Starzetz | Site isec.pl

Locally exploitable flaws have been found in the Linux binary format loaders' uselib() functions that allow local users to gain root privileges. Linux kernel versions 2.4 up to and including 2.4.29-pre3, 2.6 up to and including 2.6.10 are affected. Exploit included.

tags | exploit, kernel, local, root
systems | linux
advisories | CVE-2004-1235
SHA-256 | dc8912477cabd4620eccb9621b77afc571d533b90b200dfc6fc0b9d16173ee04
amp2zero.zip
Posted Jan 7, 2005
Authored by Luigi Auriemma | Site aluigi.altervista.org

Proof of concept denial of service exploit for the Amp II 3D game engine that is susceptible to attack when receiving UDP datagrams of zero bytes.

tags | exploit, denial of service, udp, proof of concept
SHA-256 | 80d677ae8b10d22ddbe0c994296c32782336b61e029dcafac8acdd83a4c4290d
amp2zero.txt
Posted Jan 7, 2005
Authored by Luigi Auriemma | Site aluigi.altervista.org

The Amp II 3D game engine is susceptible to a denial of service attack when receiving UDP datagrams of zero bytes.

tags | advisory, denial of service, udp
SHA-256 | 48f45ec61d3cad1620022de97f403f68e46b8e9f946ff88c7d0f52349256fb6b
jakarta556_xss.txt
Posted Jan 7, 2005
Authored by Oliver Karow | Site oliverkarow.de

Apache Jakarta Tomcat version 5.5.6 is susceptible to cross site scripting attacks.

tags | exploit, xss
SHA-256 | 27105001fc27f96aa1eb4a7805155ca4e01d73ebea5c3512a754a06980fd505e
Secunia Security Advisory 13725
Posted Jan 7, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - LSS Security Team has reported a weakness in mod_dosevasive for Apache, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges.

tags | advisory, local
SHA-256 | cde707c1ec8034c5dee23d37d8c7db792e02d77e177c4c3bbdbd5eeb64275fb8
phpbb.ssh.D.txt
Posted Jan 7, 2005
Authored by priv8crew

New version of the phpBB worm with bot install that makes use of Altavista.

tags | exploit, worm
SHA-256 | c5803f6012ff7cfa1585917d923f94e611150553d2fb171052cdefe79a0f8b4f
winaceHKI.txt
Posted Jan 7, 2005
Authored by Rafel Ivgi | Site theinsider.deep-ice.com

WinAce WinHKI version 1.4d suffers from a directory traversal flaw that allows a compressed archive to overwrite files below the extraction directory.

tags | exploit
SHA-256 | 7acca77e689274d3cd982f9d900df6860a2925ef7a040d858a40a2163d48384e
Secunia Security Advisory 13713
Posted Jan 7, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Exim, which potentially can be exploited by malicious, local users to gain escalated privileges and by malicious people to compromise a vulnerable system.

tags | advisory, local, vulnerability
SHA-256 | 0126c14d80f535abb7d233cf47a538e44964560a4f376cb77e022e4f39ee01cb
Secunia Security Advisory 13732
Posted Jan 7, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ziv Kamir has discovered two vulnerabilities in Jeuce Personal Web Server, which can be exploited by malicious people to disclose sensitive information and cause a DoS (Denial of Service).

tags | advisory, web, denial of service, vulnerability
SHA-256 | d8e80259c936add710258705b3aaa2543a33818e0285a0fd79e80913d7a22bd7
Secunia Security Advisory 13718
Posted Jan 7, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - r0ut3r has reported a vulnerability in b2evolution, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | e68d038b9ba09b2335829760400071a3ffd0b6b1b0bd7eaaabebf90618521775
symantecBO.txt
Posted Jan 7, 2005
Authored by Rafel Ivgi | Site theinsider.deep-ice.com

A stack buffer overflow exists in all Symantec products in all versions until 2005.

tags | advisory, overflow
SHA-256 | 1547ccdc34d04f8a18cf75c06785fbcbed245d4632a1fa13b5ff3ead034b0424
Page 1 of 1
Back1Next

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close