exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 7 of 7 RSS Feed

Files Date: 2003-04-27

xrunas11eval.zip
Posted Apr 27, 2003
Authored by Lazy Sysadmin | Site lazysysadmin.com

XRunAs is a tool that allows administrators to run commands on remote computers under the context of a specified user account without the use of the Schedule service. If XRunAs is used in conjunction with a domain account, commands that are run will be able to access network resources given that the domain account used to run the command has access to the network resource. All information that is transferred over the network while using XRunAs is encrypted using a standard encryption algorithm.

tags | remote
SHA-256 | 51938cd5cf73547c2518625847c45890d6f4d003fc9bbe10365e752f82e33a08
klgr.tgz
Posted Apr 27, 2003
Authored by LyNx | Site rootteam.void.ru

klgr is a basic keylogger for Linux that loads as a module, but will hide from lsmod.

systems | linux
SHA-256 | a78acf15db3c7c1cd70f1439dd7d6b36d63c23e525a24aed8d77ea5835763498
ie-parse.txt
Posted Apr 27, 2003

The code used in Microsoft Internet Explorer to parse web servers' HTTP

tags | advisory, web
SHA-256 | 8409c280ff9852eade3c78cd582096e5c515b89d13acd91bc6e53196eeb73d5b
ESc.c
Posted Apr 27, 2003
Authored by electronicsouls, Lunar Fault

(N)compress 4.2.4 local root exploit.

tags | local, root
SHA-256 | 8ad5fecf9ab689d4c57252919836ecd38d23f16efdaea8755879e04bdd2451c3
truegalerie.txt
Posted Apr 27, 2003
Authored by Frog Man | Site frog-man.org

A problem exists in True Galerie v1.0 that allows a remote attacker to obtain administrative access to this utility due to misuse of cookies.

tags | exploit, remote
SHA-256 | d60704ec2fd8a3caefc2462af52a5c5019ab052febae606e69424fa837d5ec1a
SRT2003-04-24-1532.txt
Posted Apr 27, 2003
Authored by Strategic Reconnaissance Team | Site secnetops.com

Secure Network Operations Advisory SRT2003-04-24-1532 - The Options Parsing Tool shared library is vulnerable to a buffer overflow. If a setuid application makes use of this shared library privilege escalation can occur.

tags | advisory, overflow
SHA-256 | 27653feb879a2466532cbf9dc02ab5adf50adeae30aed387f0723aaaaf1e7e51
ie-heap1.txt
Posted Apr 27, 2003
Authored by Mark Litchfield | Site ngssoftware.com

NGSSoftware Insight Security Research Advisory NISR24042003 - There is an exploitable heap overflow vulnerability in Microsoft's ActiveX control, Plugin.ocx. By default, plugin.ocx is marked safe for scripting, and as such, if an IE user were to visit a malicious web page, the overflow could be triggered allowing for a remote compromise of the user's machine. Systems Affected: IE 5.01 SP3, 5.5 SP2, 6.0 Gold, 6.0 SP1.

tags | advisory, remote, web, overflow, activex
SHA-256 | 09846f5747f8a68ae2082855b7b8bddf3aa795b6b67998718a647a62cd330cdc
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close