exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files Date: 2004-07-26

eSeSIX.txt
Posted Jul 26, 2004
Authored by Dirk Loss | Site it-consult.net

eSeSIX Thintune with a firmware equal to or below 2.4.38 is susceptible to multiple vulnerabilities. These include having a backdoored service on a high port with an embedded password giving a remote root shell, various other passwords being stored locally in clear text, and a local root shell vulnerability.

tags | exploit, remote, shell, local, root, vulnerability
SHA-256 | c7d6d010b7722058b4e87e183838984d6663484de3c895b5781af6297637e073
mod_authz_svn-copy-advisory.txt
Posted Jul 26, 2004
Site subversion.tigris.org

Subversion versions up to and including 1.0.5 have a bug in mod_authz_svn that allows users with write access to read portions of the repository that they do not have read access to.

tags | advisory
SHA-256 | aefe57e387f1f845c751e1078943c6c758ae74b2db1ff47970653f4b44b69547
priv8wst.c
Posted Jul 26, 2004
Authored by konewka | Site priv8security.com

Simple utility that will generate Linux x86 shellcode from provided text.

tags | x86, shellcode
systems | linux
SHA-256 | 8f5e0de853ec45a6ed5484d10e28fb3854b1f9fe91fb9937f26a01d6e7b7e7b8
priv8hex.c
Posted Jul 26, 2004
Authored by konewka | Site priv8security.com

Simple utility to view hex.

SHA-256 | aac4af0dd11b60dd8e9c9f7d53aac544ce99b0e1fedce792e18d52f71a54f3c7
Secunia Security Advisory 12153
Posted Jul 26, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Arne Bernin has reported a vulnerability in Dropbear SSH Server, potentially allowing malicious people to compromise a vulnerable system. The vulnerability is caused due freeing of uninitialised variables in the DSS verification code. Successful exploitation may allow execution of arbitrary code. This affects version 0.42 and earlier.

tags | advisory, arbitrary
SHA-256 | 2ef92612bc83eac47ceced4c8ce188b117dd105756878c1c8db98ce98baea42f
ew_file_manager.txt
Posted Jul 26, 2004
Authored by Sullo | Site cirt.net

The EasyWeb FileManager Module for PostNuke is vulnerable to a directory traversal problem which allows retrieval of arbitrary files from the remote system. Versions affected: EasyWeb FileManager 1.0 RC-1.

tags | exploit, remote, arbitrary
SHA-256 | 303f3fe96f6776b82f0eb5c7e944c6c222704eb9f590c10ad306018b5ee14b58
Secunia Security Advisory 12159
Posted Jul 26, 2004
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in OpenDocMan, which can be exploited by malicious users to bypass certain security restrictions. The vulnerability is caused due to a missing authentication check in commitchange.php when committing changes. This allows users to make unauthorised changes.

tags | advisory, php
SHA-256 | 710464e1182e21316b61e9a641e1903c6adbf087e83ee6e9c7013afe772779b2
Mozilla_FireFox_25-07-2004.txt
Posted Jul 26, 2004
Authored by E. Kellinis | Site cipher.org.uk

Mozilla FireFox versions 0.9.1 and 0.9.2 has a flaw where it is possible to make a browser load a valid certificate from a trusted website by using a specially crafted onunload event

tags | exploit
SHA-256 | 4035bc3b56a76e6a5acb1578979af0b395e4078e677ed97e922a6cc9a11c4813
write-filter_lkm.c
Posted Jul 26, 2004
Authored by Bugghy | Site vaida.bogdan.googlepages.com

Linux kernel module that will filter writes for the 2.4 kernel series.

tags | kernel
systems | linux
SHA-256 | 0ecb743a9551bc4043cfabca5eea5394543c2ad4e7287889998590e34e3126a6
uname_lkm.c
Posted Jul 26, 2004
Authored by Bugghy | Site vaida.bogdan.googlepages.com

Linux kernel module that will fake uname output for the 2.4 kernel series.

tags | kernel
systems | linux
SHA-256 | d20de33de4d5fa22a3db75f01fb41451871e54126d92a933a2f391636e6d7d5a
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    69 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close