exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 17 of 17 RSS Feed

Files Date: 2003-09-10

moron.jpg
Posted Sep 10, 2003

Complete moron at Defcon 11 performing the Magnum look.

systems | unix
SHA-256 | f26beeae5b42adc59882e5ac7ffd6ae75ad7e815d641eb75a9cdcf8c3df5a878
libShellCode-0.2.0.tar.gz
Posted Sep 10, 2003
Authored by ORK | Site orkspace.net

libShellCode is a library that can be included when writing linux/i386 exploits by providing functions that generate shellcode with user given parameters during runtime.

Changes: Added support for port-binding and connect-back ShellCodes and the possibility to execute commands with parameters.
tags | shellcode
systems | linux
SHA-256 | 5b326563a47d6b38dab16822844291b3202ab83dac784bf2e4a5eff9e9fff6f2
PPC_OSX_Shellcode_Assembly.pdf
Posted Sep 10, 2003
Authored by B-r00t

White paper discussing OS X (Darwin) shellcode assembly on the PowerPC 32bit architecture. It covers design considerations, system calls, eliminating NULL bytes, self modifying shellcode, and more.

tags | shellcode
systems | apple, osx
SHA-256 | 302b93e116bcad5ce5620bf7d78e7d092c3331db1765871a148a0c9761f6e8c4
StackOverflow-en.pdf
Posted Sep 10, 2003
Authored by dsr, Angelo Rosiello, rosiello | Site rosiello.org

White paper discussing stack overflows, ways to exploit them, and SIMPLESEM.

tags | overflow
SHA-256 | 85ddc994e6b7cdd09d72c7e1a271c91908d9ccbd87b5a1ba218dbac260ff56ed
as2hex.tgz
Posted Sep 10, 2003
Authored by B-r00t | Site doris.scriptkiddie.net

An easy PowerPC shellcode generation program to extract the hex shellcode from an ASM program that has been assembled but not linked. Tested on programs assembled using the GAS (GNU Assembler) on OSX 10.2.6.

tags | shellcode
systems | apple
SHA-256 | 18f5f5d7bee35e7ae86717c77d8e308f29d7009587d29023536db62ca57c3053
ethereal-0.9.15.tar.gz
Posted Sep 10, 2003
Authored by Gerald Combs | Site ethereal.com

Ethereal is a GTK+-based network protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Ethereal features that are missing from closed-source sniffers. Screenshot available here.

Changes: Improved support for searching capture files. Conversation List (aka "top talker") support has been added to Ethereal and Tethereal. Protocol statistics in general have been updated. An H.225 dissector has been added. It can automatically recognize RTP and RTCP conversations. A preference file has been added for disabled protocols. Color filters may now be imported and exported from within Ethereal. A new column type has been added for cumulative bytes.
tags | tool, sniffer, protocol
systems | unix
SHA-256 | 947cd4d2309022e7deba9d345f05022412063591c1fdb4e1e6bcfa4a90b67aaf
secuniaApache.txt
Posted Sep 10, 2003
Site secunia.com

Secunia Research Advisory - Apache::Gallery module version 0.6 and below suffers from a privilege escalation vulnerability that exists due to shared libraries being created insecurely.

tags | advisory
SHA-256 | 3e95ec7ac378c1f0069a8509e5b8aea94c9e22c01f05a5955d5f7695d710443e
secuniaNetSNMP.txt
Posted Sep 10, 2003
Site secunia.com

Secunia Research Advisory - A vulnerability has been identified in Net-SNMP that is caused due to an unspecified error. This reportedly makes it is possible for a user or community to gain access to data in MIB objects that they explicitly have been restricted from accessing.

tags | advisory
SHA-256 | 75b4a2a5da5d69c52c7ff2aa190ab3025cf4c580fd544d378b42cf0c27d80e72
secuniaKokesh.txt
Posted Sep 10, 2003
Site secunia.com

Secunia Research Advisory - KokeshCMS 0.2 and below has a content editing vulnerability where the edit.php included with it does not force a remote user to be authenticated.

tags | advisory, remote, php
SHA-256 | 1ba33b1e220ef0cdd0c44479f4e3c8071fb35e31ab2440839c370ecbe0ba93e4
rhsa-2003-264.gtk
Posted Sep 10, 2003
Site redhat.com

RedHat Security Advisory - New GtkHTML packages have been released that fix a vulnerability discovered by Alan Cox. The problem discovered allowed certain malformed messages to cause the Evolution mail component to crash due to a null pointer dereference in the GtkHTML library.

tags | advisory
systems | linux, redhat
advisories | CVE-2003-0541
SHA-256 | 687951c367693bd2cc06136f6a39fdbddaad047dbee9294ec0328820e048e077
DSA-378-1
Posted Sep 10, 2003
Authored by Matt Zimmerman, Nicolas Boullis | Site debian.org

Debian Security Advisory DSA 378-1 - Two vulnerabilities have been found in the Mah-Jong server version 1.4 and below. One enables a remote attacker to gain privileges of the user running the server while the other leads to a denial of service.

tags | advisory, remote, denial of service, vulnerability
systems | linux, debian
advisories | CVE-2003-0705, CVE-2003-0706
SHA-256 | e161375ef6c09ff61f2b741e2582fbe332bd1e3fe1defc1ddc1487c6dd51bda2
secunia-b2evolution.txt
Posted Sep 10, 2003
Site secunia.com

Secunia Security Advisory - b2evolution versions 0.8.2 and prior have been found vulnerable to cross site scripting and SQL injection attacks.

tags | advisory, xss, sql injection
SHA-256 | 59a5b8a155051613d73dfe8647ac6f7c5dac547fe83ce6caad2ad5b13bf62dbf
secuniaOSSIM.txt
Posted Sep 10, 2003
Site secunia.com

Secunia Research Advisory - OSSIM, or Open Source Security Information Management, version 0.x is vulnerable to multiple SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 8314c356a3099a783137c34457c8be16febc4795cee9980efdebc73d5864b4d5
WebX.txt
Posted Sep 10, 2003
Authored by Dr. Insane | Site members.lycos.co.uk

WebX 1.1 and WebX Lite 1.1 web servers are vulnerable to a directory traversal attack that allows a remote attacker to access any files outside of the web root.

tags | exploit, remote, web, root
SHA-256 | 7014784cf66c6d123c7d3916676819429d1d52080f19f20f5455df1029596905
sp-myserver.c
Posted Sep 10, 2003
Authored by Badpack3t | Site security-protocols.com

Remote denial of service exploit for MyServer 0.4.3.

tags | exploit, remote, denial of service
SHA-256 | 6f3302a7429180063c9629e4dcd76ed0569671725b2912b7a5a1de9b985dee4b
myserver.txt
Posted Sep 10, 2003
Authored by Badpack3t | Site security-protocols.com

MyServer 0.4.3 is vulnerable to a denial of service attack when a malicious payload is sent to the web server.

tags | advisory, web, denial of service
SHA-256 | 18a96487b52cee3084b1e1ffafcc979a14878ee6126a4e71869ff7c8fa0610e0
winamp-midi-adv.txt
Posted Sep 10, 2003
Authored by Luigi Auriemma | Site aluigi.altervista.org

Winamp 2.91 uses a default plugin called IN_MIDI.DLL used to play MIDI files. Version 3.01 and below for this plugin lets an attacker execute code by simply setting the "Track data size" value of a MIDI file to 0xffffffff.

tags | advisory
SHA-256 | 2fc9611bfeadcb58fcff68ffdc0d8096baf4de99bb06c1985fae64101ac4c175
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    14 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close