what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files Date: 2004-04-17

gemitelv3.txt
Posted Apr 17, 2004
Authored by jaguar | Site wulab.com

Gemitel versions 3.5 and below allow for malicious file inclusion in its affich.php script. This vulnerability allows an attacker to forcibly execute arbitrary scripts from remote resources on the server.

tags | exploit, remote, arbitrary, php, file inclusion
SHA-256 | 483f0f3f00299f5b8710d0ee6366376e76b18b0d54ae99b5df2b8b47f8dac39d
navNest.txt
Posted Apr 17, 2004
Authored by Bipin Gautam

Norton Antivirus is susceptible to a nested file manual scan bypass attack.

tags | advisory
SHA-256 | ca93438b7c9ea3dc6ec50a2867da283a445c246f3149cf5a65d2c644ba088113
Secunia Security Advisory 11394
Posted Apr 17, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory SA11394 - A vulnerability in WIKINDX allows remote attackers the ability to read the configuration file.

tags | advisory, remote
SHA-256 | ee342545e2df7fd12434bdc4d699fb5898e616061e3500f5199f9bdce38ebf41
Secunia Security Advisory 11367
Posted Apr 17, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory SA11367 - Subversion versions 0.x to 1.x are reportedly affected by some vulnerabilities, which potentially can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
SHA-256 | b54ff37cbaf0637ed2490a2f37b5ef05279d4058f159713993eb18cb5a926975
mac.txt
Posted Apr 17, 2004
Authored by Bugghy | Site vaida.bogdan.googlepages.com

Mandatory Access Control tutorial to correctly and safely install, configure, and use MAC policies. Written for FreeBSD users. Full step by step details given with explanations.

tags | paper
systems | unix, freebsd
SHA-256 | 207406b5776a26ca845f149070406f74a77aefe86a8bb83717528be689f9754b
ettercap-NG-0.7.0_pre1.tar.gz
Posted Apr 17, 2004
Authored by Alberto Ornaghi, Marco Valleri | Site ettercap.sourceforge.net

Ettercap NG is a network sniffer/interceptor/logger for switched LANs. It uses ARP poisoning and the man-in-the-middle technique to sniff all the connections between two hosts. Features character injection in an established connection - you can inject characters to server (emulating commands) or to client (emulating replies) while maintaining an established TCP connection! Integrated into a easy-to-use and powerful ncurses interface.

tags | tool, sniffer, tcp
SHA-256 | c3a67ffc8c13d8c873c38c35c2e29748767230fd3664584f907e4da2e43a5079
billybastard.c
Posted Apr 17, 2004
Authored by Hi_Tech_Assassin

Local exploit that makes use of the flaw in lsass.exe. Binds a shell to port 31337.

tags | exploit, shell, local
SHA-256 | 5ab651d859d8f895fdbb8b2254456e49cb8e5b76f76710c0e0c66777d172abb3
Secunia Security Advisory 11396
Posted Apr 17, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory SA11396 - The SCT Campus Pipeline attachment script has a vulnerability that allows for a cross site scripting attack.

tags | advisory, xss
SHA-256 | a04a37084472dc5e42132b2098cf642069be0c7055f61266e861f2c2a0693dcb
cfdos.txt
Posted Apr 17, 2004
Authored by K. K. Mookhey | Site nii.co.in

ColdFusion MX versions 6.0 and below suffer from a denial of service vulnerability when memory usage gets saturated due to an oversized string being returned as part of an error message.

tags | advisory, denial of service
SHA-256 | 619d02fdd2afd7d22cc8e5417214549294b00a682f1dafc88add6159e988ecf4
chpasswd.txt
Posted Apr 17, 2004
Authored by Matias Neiff

The chpasswd binary plugin version 3.x that comes with SquirrelMail is susceptible to a buffer overflow.

tags | advisory, overflow
SHA-256 | 51bed8c4cf3edfac90f26c1ed8d63cd3bf848fa26f97b3022a5c47a95bfe5974
Page 1 of 1
Back1Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    0 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    0 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close