exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 59 RSS Feed

Files Date: 2006-07-24 to 2006-07-25

filecopa101.txt
Posted Jul 24, 2006
Authored by acaro

Remote buffer overflow exploit for FileCOPA FTP server versions 1.01 and below that spawns a shell on tcp/4444.

tags | exploit, remote, overflow, shell, tcp
SHA-256 | e37152dd62f73e8c31017964528bea873eeadc9434cbfb75b054f2890a273f13
ms06-035-coco.txt
Posted Jul 24, 2006
Authored by cocoruder | Site ruder.cdut.net

Microsoft SRV.SYS Mailslot Ring0 memory corruption denial of service exploit. Takes advantage of the vulnerability discussed in MS06-035.

tags | exploit, denial of service
SHA-256 | ef948b25077f0bacfddf3f7571a4d02fcea7abd9f1ee34de56e347327398f209
mammoodle.txt
Posted Jul 24, 2006
Authored by jank0

Mam - Moodle is susceptible to a remote file inclusion vulnerability.

tags | exploit, remote, file inclusion
SHA-256 | 530b1e344e974fbba59dcf19888be2452a8966d16921326a146d701dee547542
Gentoo Linux Security Advisory 200607-8
Posted Jul 24, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200607-08 - Henning Makholm discovered that the xcf_load_vector() function is vulnerable to a buffer overflow when loading a XCF file with a large num_axes value. Versions less than 1.2.12 are affected.

tags | advisory, overflow
systems | linux, gentoo
SHA-256 | 58f78dd070c382aca47c1a95c60e3f359e1168297a0668ead51b3f316a9324b5
snmpcheck-1.5.txt
Posted Jul 24, 2006
Authored by Matteo Cantoni | Site nothink.org

snmpcheck is a tool to get information via SNMP protocols for Windows, Linux, Cisco, HP-UX and SunOS platforms. Tested on GNU/Linux, *BSD and Windows (Cygwin and ActivePerl) systems. Distributed under the GPL license and based on Athena-2k script by jshaw.

tags | tool, scanner, protocol
systems | cisco, linux, windows, unix, solaris, bsd, hpux
SHA-256 | d41ac4459a12ff293160ae66984f94115d1ebd6f8943ec46db4edaf82ce8645b
paypalXSS.txt
Posted Jul 24, 2006
Site securitylab.ru

www.paypal.com suffers from another cross site scripting flaw.

tags | exploit, xss
SHA-256 | 07dd57fbd20d6fa3c6a318720fc44ef0b7cbf5533921de704423a242bdbab74f
Debian Linux Security Advisory 1120-1
Posted Jul 24, 2006
Authored by Debian | Site debian.org

Debian Security Advisory 1118-1 - A massive slew of vulnerabilities have been patched in mozilla-firefox for Debian.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2006-1942, CVE-2006-2775, CVE-2006-2776, CVE-2006-2777, CVE-2006-2778, CVE-2006-2779, CVE-2006-2780, CVE-2006-2781, CVE-2006-2782, CVE-2006-2783, CVE-2006-2784, CVE-2006-2785, CVE-2006-2786, CVE-2006-2787
SHA-256 | 74647171ac7c5a853d455aa5ae4c92c3a9a312ec6e66a93800ff635432cb6605
apexhali.txt
Posted Jul 24, 2006
Authored by samsainsekt

www.apexhali.com is susceptible to a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | dc1625fea720a0e4f3a41e8396eddbe63777d9552d88d226f83402cb6e28e688
Debian Linux Security Advisory 1119-1
Posted Jul 24, 2006
Authored by Debian | Site debian.org

Debian Security Advisory 1119-1 - Akira Tanaka discovered a vulnerability in Hiki Wiki, a Wiki engine written in Ruby that allows remote attackers to cause a denial of service via high CPU consumption using by performing a diff between large and specially crafted Wiki pages.

tags | advisory, remote, denial of service, ruby
systems | linux, debian
advisories | CVE-2006-3379
SHA-256 | 2a894e852244070fbaf772d3bd1b7b99a4bda4ee88d98071dad1e875171c6891
Debian Linux Security Advisory 1118-1
Posted Jul 24, 2006
Authored by Debian | Site debian.org

Debian Security Advisory 1118-1 - A massive slew of vulnerabilities have been patched in Mozilla for Debian.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2006-1942, CVE-2006-2775, CVE-2006-2776, CVE-2006-2777, CVE-2006-2778, CVE-2006-2779, CVE-2006-2780, CVE-2006-2781, CVE-2006-2782, CVE-2006-2783, CVE-2006-2784, CVE-2006-2785, CVE-2006-2786, CVE-2006-2787
SHA-256 | 8ec484871d9ba82c219fcbc3be77b04af539817165b2623e4f6288b1e27d5d93
NDSA20060705.txt
Posted Jul 24, 2006
Authored by Tim Brown | Site nth-dimension.org.uk

Nth Dimension Security Advisory (NDSA20060705) - The IPCalc CGI wrapper version 0.40 is vulnerable to Javascript injection within the request URL.

tags | advisory, cgi, javascript
SHA-256 | 513ab8a7e34357e669b4f147dd257356d71af53e3132e6abbcdb05f40e3bba13
major_rls24.txt
Posted Jul 24, 2006
Authored by David "Aesthetico" Vieira-Kurz | Site majorsecurity.de

Fire-Mouse TopList versions 1.1 and below suffer from a cross site scripting flaw.

tags | advisory, xss
SHA-256 | e05ec0a6191e1bed0d76d080acf9fdc00eced3bf1c3561ac89b33ee3d272ba08
major_rls25.txt
Posted Jul 24, 2006
Authored by David "Aesthetico" Vieira-Kurz | Site majorsecurity.de

Advanced Guestbook version 2.4 for phpBB suffers from SQL injection and cross site scripting flaws.

tags | advisory, xss, sql injection
SHA-256 | b67b1ed7ace90df14b07005282f1a53f186e99a81b64127332f7eafd4710d901
msieDoS.txt
Posted Jul 24, 2006
Authored by Firestorm

Microsoft Internet Explorer suffers from a denial of service flaw using the Content-Type directive.

tags | exploit, denial of service
SHA-256 | c2fdf0cde366d0a30a24316551d5348f86524eb049a31de0b164b5283ca1db5b
outpostPwn.txt
Posted Jul 24, 2006
Authored by H. Wiedemann

All current available Outpost Firewall versions suffer from severe vulnerabilities that allow any local user to gain access to the LocalSystem account.

tags | exploit, local, vulnerability
SHA-256 | 9f8073aa2da59bd44cac7addf49e490496ffab3e3b2d4cdf2c8ed4fc8dfa123a
MicroGuestBook.txt
Posted Jul 24, 2006
Authored by Omnipresent | Site it.security.netsons.org

MicroGuestBook suffers from a cross site scripting flaw.

tags | advisory, xss
SHA-256 | 8ed0dca4560aa0bc7dd5e706737062f3c99e5799c368920947cb7273e945cc24
BlueSpy-adv-com_trade.txt
Posted Jul 24, 2006
Authored by Blue|Spy | Site solpotcrew.org

com_trade suffers from a remote file inclusion vulnerability.

tags | exploit, remote, file inclusion
SHA-256 | 93a4116f51e330ceccb18230ff6f0e28ca382df080e859345d4620aa846b3b4f
black_RXenc-con-back-SOLARIS.tgz
Posted Jul 24, 2006
Authored by xort | Site blacksecurity.org

Solaris SPARC TCP connect-back shellcode (with XNOR encoded session) and client SPARC assembly shellcode.

tags | tcp, shellcode
systems | solaris
SHA-256 | ccfa1025e78e6cf31639c2c3fdca096a5bee3f74253ad408d8a969eec363f2b8
rbl4ck_sendmail.tgz
Posted Jul 24, 2006
Authored by redsand | Site blacksecurity.org

Remote signal handling exploit for Sendmail versions 8.13.5 and below.

tags | exploit, remote
advisories | CVE-2006-0058
SHA-256 | 85f87239559b74cd612452fda856576a82c5d997226da3905198f846a9f1c48f
bl4ck_ms06_036.tgz
Posted Jul 24, 2006
Authored by redsand | Site blacksecurity.org

Functioning remote exploit for the Windows DHCP Client broadcast attack vulnerability as described in MS06-036.

tags | exploit, remote
systems | windows
SHA-256 | 5e033b168105689986e7b2df247c78c44f22d6ec22b3b955cc3445ba86a8d6aa
bl4ck_ms06_014.tgz
Posted Jul 24, 2006
Authored by redsand | Site blacksecurity.org

Functioning exploit for the MDAC code execution vulnerability in Internet Explorer as described in MS06-014.

tags | exploit, code execution
SHA-256 | 65c29b0e50b075bd163514768c68b1d6980d3a22340dd9128eb836e280a1ad90
bl4ck_cyrus-imapd.tgz
Posted Jul 24, 2006
Authored by bannedit | Site blacksecurity.org

Functioning cyrus-imapd pop3d exploit that will bypass VA Randomization. Written in Ruby.

tags | exploit, ruby
SHA-256 | cacdc5be8bfaa3e014d1b725ab854c63f95de8e238d93ae9918354c38df1be94
iDEFENSE Security Advisory 2006-07-20.t
Posted Jul 24, 2006
Authored by iDefense Labs | Site idefense.com

iDefense Security Advisory 07.20.06 - Local exploitation of an integer overflow vulnerability in Sun Microsystems Inc. Solaris allows attackers to read kernel memory from a non-privileged userspace process.

tags | advisory, overflow, kernel, local
systems | solaris
SHA-256 | c80f753407d82d3fae12e5ba2a1d0f296b79aba5954f3e91039b7809696474f1
snortsms-1.3.3.tar.gz
Posted Jul 24, 2006
Authored by SmithJ108 | Site snortsms.servangle.net

SnortSMS is a highly configurable sensor management system that provides the ability to remotely administer Snort [and Barnyard] based Intrusion Detection Systems (IDS), push configuration files, add/edit rules, and monitor system health and statistics, all from a simple and clean Web interface console. Whether you have one or multiple Snort sensors, it can help unify and synchronize all sensor configurations.

Changes: Several database changes have occurred.
tags | tool, web, sniffer
SHA-256 | d3a83f713ade520cf0b1155ee4ca4bb69cb9e90f77d33afe68a171aae1de98d8
shade-1.1.0-src.tar.gz
Posted Jul 24, 2006
Authored by zeroth404 | Site shade.sourceforge.net

Shade (Steganographically Hide and Analyze Data Entries) is a versatile and feature-rich program designed to analyze and manipulate the LSBs (least significant bits) of files. LSB manipulation is a form of steganography, the art or science of making the existence of information undetectable by normal means. This is achieved by writing the contents of a file to the LSBs of a separate and inconspicuous host file.

Changes: Many data processing and output features have been added, and code is much much more friendly and efficient. Also, added an official change log.
tags | encryption, steganography
SHA-256 | 0b64f1fd8715d2328381199fc2be73f8da4369f50a8d913186ae591cc96b6931
Page 1 of 3
Back123Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close