exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 76 RSS Feed

Files

0510-exploits.tgz
Posted Nov 1, 2005
Authored by Todd J. | Site packetstormsecurity.com

New Packet Storm exploits for October, 2005.

tags | exploit
SHA-256 | 698e4f77033a3e807e82317dd0e4d7c7ba22daae9e6cda2b09f4f01044396696
mg2-image.txt
Posted Oct 31, 2005
Authored by Preben Nylokken

The MG2 Image Gallery system suffers from a password bypass flaw that allows remote viewing of any images.

tags | exploit, remote
SHA-256 | 7df04dc5ac65d5cefdee724dc80dfed919b5cb1a1b200892f08d09976dee6376
swisscom-XSS.txt
Posted Oct 30, 2005
Authored by deepquest

Swisscom EuroSpot wireless service suffers from multiple cross site scripting vulnerabilities. Details provided.

tags | exploit, vulnerability, xss
SHA-256 | 12ac9a5eaae2ce4ca5f76f2b9eed2d4b8311c75ab8487c21f985d6cf1d5e64ff
ethereal_slimp3_bof.py.txt
Posted Oct 30, 2005
Authored by Sowhat | Site secway.org

Ethereal SLIMP3 protocol dissector remote buffer overflow proof of concept exploit that crashes the program. Tested with Ethereal 0.10.12, WinPcap 3.1 beta4, WinXP SP2.

tags | exploit, remote, overflow, protocol, proof of concept
systems | windows
SHA-256 | 4040c8f6a0687370d485ce7020c65239db8950551fc47099f8dc2c15e9977dfb
VERITAS-OSX.pl.txt
Posted Oct 30, 2005
Authored by John H. | Site digitalmunition.com

VERITAS Netbackup remote format string exploit for Mac OS-X.

tags | exploit, remote
systems | apple, osx
SHA-256 | 40b19b405339547ac14c58e1de679ac1b08b64282cb47cc79e27e76f6c37eef0
VERITAS-Win32.pl.txt
Posted Oct 30, 2005
Authored by John H. | Site digitalmunition.com

VERITAS Netbackup remote format string exploit for Win32.

tags | exploit, remote
systems | windows
SHA-256 | e2096b1eb9ba99343b4455d73ecb4e8d9884c541e9cf863e8877ae37da43c17b
VERITAS-Linux.pl.txt
Posted Oct 30, 2005
Authored by John H. | Site digitalmunition.com

VERITAS Netbackup remote format string exploit for Linux.

tags | exploit, remote
systems | linux
SHA-256 | 5ffffc3997e8bb1ec7434b97c95d74bb2103cc01e15991b4779df4cabaf30ce5
mirabilis.c
Posted Oct 30, 2005
Authored by ATmaCA | Site atmacasoft.com

Mirabilis ICQ 2003a buffer overflow download shellcoded exploit. Affected versions: Mirabilis ICQ Pro versions 2003a and below.

tags | exploit, overflow, shellcode
SHA-256 | 01676ac1acef6ab5d516ee90542dec43fea9c4accbc3df9c2c03d2a059fe0351
ong_bak-0.9.c
Posted Oct 30, 2005
Authored by qobaiashi

Updated and improved version of the local root exploit for the Linux kernel code that has the Bluetooth related flaw.

tags | exploit, kernel, local, root
systems | linux
SHA-256 | 41cf67b44ead5be4a7bf304315be0c442ff77ad14a01b9d00c0f87d107b198e5
Rockliffe.txt
Posted Oct 30, 2005
Authored by Paul Craig | Site security-assessment.com

During an audit of a client, Security-Assessment.com discovered multiple critical vulnerabilities within the RockLiffe MailSite Express WebMail software. The vulnerabilities include the retrieval of arbitrary files from the web server, and bypassing attachment validation routines allowing for remote code execution. Exploitation details included. All versions of RockLiffe MailSite Express WebMail prior to version 6.1.22 are affected.

tags | exploit, remote, web, arbitrary, vulnerability, code execution
SHA-256 | 620b1bc3c58fa84fa86dd64e75b2c243efc3431f8bb6eb7c5bd361422269be97
XH-Hasbani-HTTPD-DoS.c
Posted Oct 30, 2005
Authored by Expanders | Site x0n3-h4ck.org

Exploit for a remote denial of service flaw for HTTP GET in Hasbani-WindWeb version 2.0.

tags | exploit, remote, web, denial of service
SHA-256 | e7ea5226541a9e30177def6562f8d6efcb06aad03e47001f1f145555549dc8b9
MS05-047-DoS.c
Posted Oct 30, 2005
Authored by Winny Thomas

Remote denial of service exploit that makes of a length checking issue in the Microsoft UMPNPMGR PNP_GetDeviceList. This code crashes services.exe.

tags | exploit, remote, denial of service
SHA-256 | 4c414db62f8080df8cfa4b3c934df6fe1b7ac73cf2921817e10cd4373baf9f07
secunia-ATutor.txt
Posted Oct 30, 2005
Authored by Andreas Sandblad | Site secunia.com

Secunia Research has discovered some vulnerabilities in ATutor, which can be exploited by malicious people to conduct cross-site scripting attacks, disclose sensitive information, and compromise a vulnerable system. The vulnerabilities have been confirmed in version 1.5.1-pl1. Other versions may also be affected.

tags | exploit, vulnerability, xss
SHA-256 | ea4981890b687d4caff07c6b7157202c331ffe371d5cb42efe41a196ad0226d2
cirt-39-advisory.pdf
Posted Oct 30, 2005
Authored by Dennis Rand | Site cirt.dk

The Novell ZENworks Patch Management Server version 6.0.0.52 is vulnerable to SQL injection attacks in the management console. Details provided.

tags | exploit, sql injection
SHA-256 | 433dd55fe01eda54cebd993ccd449398457f8bc1cc0d256a5b77221b267c9724
PBLang465.txt
Posted Oct 30, 2005
Authored by Abducter | Site s4c.cc

PBLang versions 4.65 and below suffer from file inclusion and cross site scripting flaws. Details provided.

tags | exploit, xss, file inclusion
SHA-256 | 9c67a5099937795f1f627d81c47071fb10063ae4b20ab0a75f2c7709a2340d5f
vCard29.txt
Posted Oct 30, 2005
Authored by [ x ]

vCard 2.9 is susceptible to a remote file inclusion vulnerability. Details provided.

tags | exploit, remote, file inclusion
SHA-256 | f8910920dda6615647cd0118794d1884f1bf33d873a6448b6725a54edd512f0d
cpanelBlank.txt
Posted Oct 30, 2005
Authored by sup3r_linux

The latest version of cPanel comes with a blank remote MySQL user password.

tags | exploit, remote
SHA-256 | 136b01f8cf20ccb3c5294d848d2e7bf7c6a4b6454b8905cb7548235f558bc9ce
advisory-103.txt
Posted Oct 27, 2005
Authored by Farhad Koosha | Site kapda.ir

Various Techno Dreams scripts are susceptible to sql injection flaws. Proof of concept examples provided.

tags | exploit, sql injection, proof of concept
SHA-256 | 366fb83d32315f71627422a527b6480b8afc654f0ebe44f9173576308a730e15
secunia-Mantis.txt
Posted Oct 27, 2005
Authored by Andreas Sandblad | Site secunia.com

Secunia Research has discovered a vulnerability in Mantis, which can be exploited by malicious people to compromise a vulnerable system. Input passed to the t_core_path parameter in bug_sponsorship_list_view_inc.php is not properly verified before it used to include files. This can be exploited to include arbitrary files from external and local resources. Affected versions: Mantis 0.19.2 and 1.0.0rc2. Other versions may also be affected.

tags | exploit, arbitrary, local, php
SHA-256 | 9bffa4eac73d1c9558283150c0455ab3a80cf530a7ad18fdfa75a7a20f03f5d7
WoltlabSQL.txt
Posted Oct 27, 2005
Authored by [R] | Site batznet.com

Woltlab Burning Board info_db.php is susceptible to multiple sql injection flaws. Versions 2.7 and below are affected.

tags | exploit, php, sql injection
SHA-256 | 56555ebbf2731c32a918087c5f649bb3bf7d5b0cf6337ae6f829abf8cf554618
mybbpr2.pl.txt
Posted Oct 27, 2005
Authored by cOre

MyBB Preview Release 2 sql injection proof of concept exploit.

tags | exploit, sql injection, proof of concept
SHA-256 | 803c051a1a45e4ab44b58c7c24729ab0b562c9cc412b25125e210bed72c2dc19
PHP-Nuke-XSS.txt
Posted Oct 27, 2005
Authored by bhfh01

PHP-Nuke is susceptible to cross site scripting attacks.

tags | exploit, php, xss
SHA-256 | 7d26a61ef6f2ad7823422e467d0666ed5a5618f7a4980bb9f719510f18948a95
flysprayXSS.txt
Posted Oct 27, 2005
Authored by Lostmon | Site lostmon.blogspot.com

Flyspray versions 0.9.7, 0.9.8, and 0.9.8-devel are susceptible to cross site scripting. Exploitation details included.

tags | exploit, xss
SHA-256 | 0bab5f01b7c758426334bbe468c48da3450971005b0015fe8140d3acfbc45c89
SEC-20051025-1.txt
Posted Oct 27, 2005
Site sec-consult.com

SEC-CONSULT Security Advisory 20051025-1 - RSA Authentication Agent for Web 5.1 is prone to a cross site scripting vulnerability. Please note that this is issue is different from CVE-2003-0389. Affected versions: This flaw was discovered in version 5.1 of RSA Agent for Web. No other versions were available for testing. Web Agents greater than 5.1 may also be vulnerable.

tags | exploit, web, xss
SHA-256 | 2d40e47e26366a81608e58eb701e131d921abb75ec18f1bc0763fd4b69a57ad9
SEC-20051025-0.txt
Posted Oct 27, 2005
Authored by Daniel Fabian | Site sec-consult.com

SEC-CONSULT Security Advisory 20051025-0 - The Snoop PHP web client is susceptible to a remote command execution vulnerability when a specially crafted URL is supplied. Versions 1.2 and earlier are affected.

tags | exploit, remote, web, php
SHA-256 | 3d4b8192b526f1b4f047163bef662b30bca31b99670048e5fedfcec7d1e728d6
Page 1 of 4
Back1234Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close