exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 35 RSS Feed

Files Date: 2005-03-30

longlogo_web.gif
Posted Mar 30, 2005
Authored by hackademy

Graphic for the Hackademy.

SHA-256 | 62358939a7dabe715a659eeecd9e8e3a1de06f3b48d7044769da752bb14e9fa7
squirrelSQL.txt
Posted Mar 30, 2005
Authored by Diabolic Crab | Site hackerscenter.com

Squirrelcast PHP Shopping Cast is susceptible to SQL injection attacks. Sample exploitation details provided.

tags | exploit, php, sql injection
SHA-256 | 9034a1b7791dbb49ea62cba1ba3aa5f0d0c0d09c6551a60c8ca3c2d2764fd09e
Exploit Labs Security Advisory 2005.3
Posted Mar 30, 2005
Authored by Donnie Werner, Exploit Labs | Site exploitlabs.com

Adventia Chat Server Pro 3.0 suffers from cross site scripting flaw.

tags | advisory, xss
SHA-256 | f5be810e51ce7ac691078c31fe2d121af2db6850a6b2fbc89c05a553bf3508c8
Exploit Labs Security Advisory 2005.3
Posted Mar 30, 2005
Authored by Donnie Werner, Exploit Labs | Site exploitlabs.com

E-Data 2.0 is susceptible to cross site scripting flaws in its search functionality.

tags | advisory, xss
SHA-256 | 820a3a8cc04faebb9fe783b48bdadd595291f8984a989a7e12280e2bbcad577e
r57punbb.pl.txt
Posted Mar 30, 2005
Authored by 1dt.w0lf | Site rst.void.ru

PunBB versions 1.2.2 and below remote authentication bypass exploit.

tags | exploit, remote
SHA-256 | ae265851ac47823f8ae76c95583aa8683a2e45db1ec2b9babba2ec70b81b77e7
Secunia Security Advisory 14725
Posted Mar 30, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - 3nitro has reported two vulnerabilities in Ublog Reload, which can be exploited by malicious people to conduct cross-site scripting attacks and disclose sensitive information.

tags | advisory, vulnerability, xss
SHA-256 | 10aebd341e8a60eb3e674d5a292f31736cbbc58fa4718d45614c627b0f8a3913
nufw-1.0.2.tar.gz
Posted Mar 30, 2005
Authored by regit | Site nufw.org

NuFW is a set of daemons that filters packets on a per-user basis. The gateway authorizes a packet depending on which remote user has sent it. On the client side, users have to run a client that sends authentication packets to the gateway. On the server side, the gateway associates user ids to packets, thus enabling the possibility to filter packets on a user basis. Furthermore, the server architecture is done to use external authentication source such as an LDAP server.

Changes: This new release features some improvements in the management of TLS options. Additionally, some bugs have been fixed.
tags | tool, remote, firewall
systems | unix
SHA-256 | 1776e30d2079769e3a08efea35463b17c1ce136acb09aabd7852de0cd1f6c3b0
Ubuntu Security Notice 102-1
Posted Mar 30, 2005
Authored by Ubuntu | Site ubuntu.com

Ubuntu Security Notice USN-102-1 - Shaun Colley discovered a buffer overflow in shar that was triggered by output files (specified with -o) with names longer than 49 characters. This could be exploited to run arbitrary attacker specified code on systems that automatically process uploaded files with shar. Ulf Harnhammar discovered that shar does not check the data length returned by the 'wc' command. However, it is believed that this cannot actually be exploited on real systems.

tags | advisory, overflow, arbitrary
systems | linux, ubuntu
SHA-256 | 00f1a684d836d6e46b8902d1fa6d9f92e60ec000ed6ad8978b2ccbddf266b3f1
un-lkernel2.6.10.c
Posted Mar 30, 2005
Authored by choix | Site unl0ck.org

Linux kernel versions 2.6.10 and below denial of service exploit.

tags | exploit, denial of service, kernel
systems | linux
SHA-256 | 938cc0299f8a4057e16222de326a4e09e4ce59ed72d62a04d8344ba4c46e8be4
unrealmagic.c
Posted Mar 30, 2005
Authored by crash-x | Site unl0ck.org

Cyrus IMAPd versions 2.2.4 through 2.2.8 remote exploit. Original flaw discovered by Stefan Esser.

tags | exploit, remote
advisories | CVE-2004-1011, CVE-2004-1012, CVE-2004-1013
SHA-256 | e0f255c75d311de10a643e7710b403966a0b5738defe2ce707e360a1e03945bc
0x666-ftpd.c
Posted Mar 30, 2005
Authored by Darkeagle | Site unl0ck.org

mtftp versions 0.0.3 and below remote root exploit.

tags | exploit, remote, root
SHA-256 | 498f2cbb403d9f8b15e0a4ef0ec615248865a0c321b8ca6787cd4b8a8b8edb3a
Secunia Security Advisory 14732
Posted Mar 30, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - 3nitro has reported a vulnerability in Chatness, which can be exploited by malicious people to conduct script insertion attacks.

tags | advisory
SHA-256 | a7f4877916ce136f5e9ea9958b2d00a497d4005fca940c822b28b9151c5bd269
tripodXSS.txt
Posted Mar 30, 2005
Authored by Diabolic Crab | Site hackerscenter.com

Tripod.com suffers from multiple cross site scripting flaws.

tags | exploit, xss
SHA-256 | 5e26ffe5df8029d71eaf9663f809a5b324b485a87e40fab11d05f233ebdef46e
dsa-698.txt
Posted Mar 30, 2005
Site debian.org

Debian Security Advisory 698-1 - An unfixed buffer overflow has been discovered by Andrew V. Samoilov in mc, the midnight commander, a file browser and manager. This update also fixes a regression from DSA 497.

tags | advisory, overflow
systems | linux, debian
advisories | CVE-2005-0763
SHA-256 | f5dfdd2c884d038ad50759ea5988802dc7a0204e09e7e0721087fdbaedd2b223
Absinthe-1.3-MacOSX.tar.gz
Posted Mar 30, 2005
Authored by nummish | Site 0x90.org

Absinthe is a gui-based tool that automates the process of downloading the schema and contents of a database that is vulnerable to Blind SQL Injection. This is the same tool that was released as SQueaL at Defcon 12 and Blackhat USA 2004. Mac OS X version.

Changes: This version includes Basic, Digest and NTLM authentication. Additionally, several bug fixes, including the proxy rotation issues, have been addressed.
tags | sql injection
systems | unix, apple, osx
SHA-256 | 6d0507e7664151f65415759c55cb1a8a7879b3c99a49b859952b3d324f7cd0cc
Absinthe-1.3-Windows.zip
Posted Mar 30, 2005
Authored by nummish | Site 0x90.org

Absinthe is a gui-based tool that automates the process of downloading the schema and contents of a database that is vulnerable to Blind SQL Injection. This is the same tool that was released as SQueaL at Defcon 12 and Blackhat USA 2004. Windows version.

Changes: This version includes Basic, Digest and NTLM authentication. Additionally, several bug fixes, including the proxy rotation issues, have been addressed.
tags | sql injection
systems | windows, unix
SHA-256 | 270cc0d92bfd0dd7c514299861b77f2a82f117d4a0048d8796d96b959753781e
Absinthe-1.3-Linux.tar.gz
Posted Mar 30, 2005
Authored by nummish | Site 0x90.org

Absinthe is a gui-based tool that automates the process of downloading the schema and contents of a database that is vulnerable to Blind SQL Injection. This is the same tool that was released as SQueaL at Defcon 12 and Blackhat USA 2004. Linux version.

Changes: This version includes Basic, Digest and NTLM authentication. Additionally, several bug fixes, including the proxy rotation issues, have been addressed.
tags | sql injection
systems | linux, unix
SHA-256 | c153337d7ec7025eca51a2bb830a3f57729095cd23935b4701b8f1953ed2c37c
invision203.txt
Posted Mar 30, 2005
Authored by hoang yen

Invision Power Board version 2.0.3 is susceptible to cross site scripting attacks.

tags | exploit, xss
SHA-256 | db5664b11a593a45b23e7ca9e1159b41da75111a7eb23b377c6b10b2e17caef8
897.cpp
Posted Mar 30, 2005
Site milw0rm.com

phpBB versions 2.0.12 and below Change User Rights authentication bypass exploit.

tags | exploit
SHA-256 | 49b95a2b8882c99a45d27963477f2fa9d92b975c42322da9b1635fcc4ee30c68
Secunia Security Advisory 14711
Posted Mar 30, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Diabolic Crab has reported some vulnerabilities in various Esmi Studio products, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks.

tags | advisory, vulnerability, xss, sql injection
SHA-256 | 088884991745122bc25767f3e4b6e700776acdc370a25da652e2d5fcf7c20b52
Secunia Security Advisory 14723
Posted Mar 30, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Diabolic Crab has reported two vulnerabilities in E-Store Kit-2 PayPal Edition, which can be exploited by malicious people to conduct cross-site scripting attacks and potentially compromise a vulnerable system.

tags | advisory, vulnerability, xss
SHA-256 | 4d4a9aa45ebe9ac10c47b2209dd50def09ec49c02ef5b8b7e8ae98a54062166e
Secunia Security Advisory 14748
Posted Mar 30, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - mircia has reported two vulnerabilities in CPG Dragonfly CMS, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | f3d690bb3f92d734d3c59db4050125ba3babc9a414eb09831b83c37b3e6c8c64
Secunia Security Advisory 14722
Posted Mar 30, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Maty Siman has reported some vulnerabilities in BugTracker.NET, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, vulnerability, sql injection
SHA-256 | 12f69ae8000326e1db293cb7f0a41274b93ba747500590bf29e9fedfeb7bb217
Secunia Security Advisory 14730
Posted Mar 30, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Horde, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 642de7ce7912e2d00204dc4f85101ca2078045937a0ff902d3af1a3c6f36dea7
Secunia Security Advisory 14716
Posted Mar 30, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in WebAPP, which can be exploited by malicious people to disclose potentially sensitive information.

tags | advisory
SHA-256 | f67c58f2ddcb1f9125045e73d99a0c880342ef502bd8de206ee547df7064ec19
Page 1 of 2
Back12Next

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close