exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 13 of 13 RSS Feed

Files Date: 2004-09-13

qnx-crttrap-race-condition.txt
Posted Sep 13, 2004
Authored by Julio Cesar Fort | Site rfdslabs.com.br

A possible race condition exists in QNX RTP 6.1 due to a program being called without a complete path.

tags | advisory
SHA-256 | a9f8a0e80084bb3cbcd294a6a08d9050b2f8a488b2ad2599b22b26500637b8c8
qnx-rtp610_ftp.txt
Posted Sep 13, 2004
Authored by Julio Cesar Fort | Site rfdslabs.com.br

The QNX FTP client is susceptible to a format string attack.

tags | advisory
SHA-256 | 54dbf220789cb41ca47430f8e654f569abfc0cc3ba2d95fd72f40e340ff4ce8d
qnx-photon_multiple_overflows.txt
Posted Sep 13, 2004
Authored by Julio Cesar Fort | Site rfdslabs.com.br

Various buffer overflow conditions exist in four binaries of QNX Photon.

tags | advisory, overflow
SHA-256 | 7d4fd2f4fa6f9fcbf81ffa0c9a0d491f52069de930018beb226dff49f8c43510
samba30x.txt
Posted Sep 13, 2004
Site idefense.com

Samba 3.0.x is susceptible to multiple denial of services bugs that can remotely crash the daemons nmbd and smbd.

tags | advisory, denial of service
advisories | CVE-2004-0807, CVE-2004-0808
SHA-256 | f4537d8e10bef6278b460a495b011aa96a2114153cc957d69798d3055570f110
adv17.txt
Posted Sep 13, 2004
Authored by durito | Site lwb57.org

A vulnerability in Turbo Seek 1.x allows an attacker the ability to access the contents of any file in the file system.

tags | exploit
SHA-256 | fad5b7e11a59e7a95ea1a03df172d19dd0c7273b055c119e5e06dc2f9135f4e5
Secunia Security Advisory 12302
Posted Sep 13, 2004
Authored by Carsten Eiram, Secunia | Site secunia.com

Secunia Security Advisory - Secunia has discovered a vulnerability in OpenOffice and StarOffice, which can be exploited by malicious, local users to gain knowledge of sensitive information.

tags | advisory, local
SHA-256 | 3b42a4de1894fb36879f486d5528b9ab61b6508f9397b5b03fc8fee129db81b1
twinftp103r2.txt
Posted Sep 13, 2004
Authored by Tan Chew Keong | Site security.org.sg

A directory traversal vulnerability exists in several FTP commands of TwinFTP that may be exploited by a malicious user to access files outside the FTP directory. The problem lies with the incorrect filtering of directory name supplied to CWD, STOR and RETR commands. Versions tested: TwinFTP Server Standard 1.0.3 R2 (Win32) on English WinXP SP1, TwinFTP Server Enterprise 1.0.3 R2 (Win32) on English Win2K SP2.

tags | advisory
systems | windows
SHA-256 | d6f72bc7fab9132f3f56758b94be272eefba30b76a4c1dabb51e82a11d482c15
sm00ny-courier_imap_fsx.c
Posted Sep 13, 2004
Authored by ktha

courier-imap 3.0.2-r1 and below remote format string vulnerability exploit. Tested on FreeBSD 4.10-RELEASE with courier-imap-3.0.2.

tags | exploit, remote, imap
systems | freebsd
advisories | CVE-2004-0777
SHA-256 | 6b6fd0cbc65997bc5ba71342249c8d839b98e3f0017bd1622b2c633be2fd18a1
portknock-sshd_lkm.c
Posted Sep 13, 2004
Authored by Bugghy | Site vaida.bogdan.googlepages.com

Kernel module using portknocking to get sshd spawned after challenging a list of specified daemons. Designed for 2.4 kernels.

tags | kernel
systems | linux
SHA-256 | 2303c404a77a1d6f3f56d085ebc66a8d7c5ec6c8da1d01103b154df38163e80c
readcd_exp.sh
Posted Sep 13, 2004
Authored by newbug | Site chroot.org

Local root exploit for readcd that comes setuid default on some Linux distributions.

tags | exploit, local, root
systems | linux
advisories | CVE-2004-0806
SHA-256 | ebf6074259a64754f450086d3b5f185f63aadb539439f649e0aa62d989444041
gadu-gadu.txt
Posted Sep 13, 2004
Authored by Lord Yup | Site sec-labs.hack.pl

Sec-Labs Advisory - Gadu-Gadu is susceptible to a heap overflow that allows for arbitrary code execution. Tested against version 6.0 build 149.

tags | advisory, overflow, arbitrary, code execution
SHA-256 | c439851c4bd7fe8790976ac8da0cb2ed86c17f1eda67ae166eb128b68e66b817
servUftpd.txt
Posted Sep 13, 2004
Authored by Patrick Thomassen

Multiple methods exist that allow for a crash of the Serv-U FTP server versions 4.x through 5.x.

tags | advisory
SHA-256 | d941fdd90d43d505caf64fd5ccd29666e277692cc3b92dcb7f904ebe311179ac
modSSLreverse.txt
Posted Sep 13, 2004
Authored by M. Alex Hankins

mod_ssl segmentation faults in the char_buffer_read function when reverse proxying SSL originating from an IIS server. Verified in build 2.0.50.

tags | advisory
advisories | CVE-2004-0751
SHA-256 | d910ca66c0aedc6006ed88626bf0d22fd6876bafac2e861f30b44b53a18befce
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close