![]() Snort signatures that identify the new Sass worm that is propagating. tags | advisory, remote, arbitrary, vulnerability, xss SHA-256 | 7415e5415321c84c93f3ecfdfa2f75966b919e898dbdd4cc97a03587a1583d66 Download | Favorite | View Posted Authored by Martin Overton These range from small flaws like path disclosure, cross site scripting, and arbitrary directory browsing, to remote command execution on the underlying server. Multiple vulnerabilities in Coppermine Photo Gallery version 1.2.2b for PhpNuke. tags | exploit, remote, web systems | windows SHA-256 | 639a5b9daeec5ce3fedb73bbc100d9733a8a0a3dfedccdc525198e2cf000b64e Download | Favorite | View waraxe-2004-SA026.txt Posted Authored by Janek Vind aka waraxe | Site tags | exploit SHA-256 | a65b66ef8af1cc9495cc9fd0ca5c58f21b69e261b6e0304aa32ec1022fd5e31b Download | Favorite | View aldosweb.txt Posted Authored by Oliver Karow | Site Īldo's web server version 1.5 on Windows is susceptible to path disclosure and pathetic directory traversal attack that allows for remote access to any file on the system. Serv-U ftpd versions older than 5.0.0.6 suffer from a flaw where a user issuing a long parameter as a value to a LIST command can cause the server to try and read a value that is outside the memory location causing a crash. ![]() tags | exploit, remote, overflow, shell SHA-256 | 2fee8170f90a051fd47c72f81150fec692e3bf4fac546c3cd394c69c90bc8001 Download | Favorite | View servuLIST.txt Posted Authored by storm ![]() Successful exploitation binds a shell to port 7979. X-Chat versions 2.0.8 through 1.8.0 remote exploit that makes use of a buffer overflow in the SOCKS-5 proxy code. tags | exploit, kernel, local, root systems | linux, debian SHA-256 | 6157a4eb97ac74cc3337b905b33aa88c26ff87f621b2f36ac1cf440cdd4a4aad Download | Favorite | View xxchat-socks5.c Posted Authored by vade79 Tested on GNU/Debian with kernel 2.4.24 and on RH 9.0 shrike with kernel 2.4.20. Local root exploit for Squirrelmail's chpasswd utility. tags | advisory, web, vulnerability, sql injection SHA-256 | 024ed03e7937f3b0cf30e5a45a9ee9bce998f485ff34e66cf5910706d8b35241 Download | Favorite | View sq-chpass-exp.c Posted Authored by Michal Stys tags | advisory, overflow advisories | CVE-2004-0234, CVE-2004-0235 SHA-256 | 7ae3e4725ed69dd046198c050806c9823138937d3f1cdf941f31a097fd5ab9b4 Download | Favorite | View Secunia Security Advisory 11525 Posted Authored by Alexander Antipov, Secunia | Site Īlexander Antipov has reported some vulnerabilities in Web Wiz Forum, allowing malicious people to conduct SQL injection attacks and perform certain administrative functions. LHa versions 1.14d to 1.14i and 1.17 suffer from buffer overflows and directory traversal flaws. tags | remote, web, udp SHA-256 | f3d219d793029162c4fa053ee2a58e4f4d70e87c733f0b822ac77c04ad1ccf0d Download | Favorite | View lha.txt Posted Authored by Ulf Harnhammar Prox圜ap version 2.0 introduces support for UDP-based networking clients, optional remote name resolution, and more detailed Session Logs. Prox圜ap provides a flexible rule system and allows the end user to define their own tunneling rules. This is done through a user friendly interface, without the need to reconfigure any clients. It can be told which applications will connect to the Internet through a proxy and under what circumstances. Prox圜ap enables users to tunnel Internet applications through HTTP, SOCKS v4, and SOCKS v5 Proxy Servers. Makes use of the recent vulnerable released by Paul A. It uses the Winpcap libraries to sniff for TCP packets on a network and then sends out a forged RST packet after calculating the appropriate sequence number and forging the MAC address. tags | exploit SHA-256 | cfaceed6fb98501b73a6b3f8ffef33d4ba76ca8a5e534ed5c8ac151d426863f7 Download | Favorite | View autoRST.c Posted Authored by Matt EdmanĪutoRST is an automated TCP RST exploit. Packet Storm new exploits for March, 2004. 0403-exploits.tgz Posted Authored by Todd J. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |