Exploit the possiblities
Showing 1 - 25 of 51 RSS Feed

Files Date: 2005-01-16

itunesPLS-local.txt
Posted Jan 16, 2005
Authored by nemo

Proof of concept exploit for iTunes 4.3.7 on OS X 10.3.7. Shellcode binds a shell to port 4444.

tags | exploit, shell, shellcode, proof of concept
systems | apple, osx
MD5 | 2ec510bd1e7504720e2969ebeccde787
itunesPLS.txt
Posted Jan 16, 2005
Authored by ATmaCA | Site atmacasoft.com

Apple iTunes Playlist buffer overflow download shellcoded exploit. Versions up to 4.7 are affected. Tested with iTunes v4.7 on WinXP SP2 EN.

tags | exploit, overflow, shellcode
systems | windows, apple
MD5 | 708d91464c8f5f9de07c54ea32e04338
MinisTraverse.txt
Posted Jan 16, 2005
Authored by Madelman

Minis 0.2.1 suffers from a directory traversal flaw that allows for viewing of files outside of the webroot. If the server does not have access to the file, it enters into a loop causing a denial of service.

tags | exploit, denial of service
MD5 | d3aedc1d21e4c6f53b73e22762727c7d
phpGiftReq.txt
Posted Jan 16, 2005
Authored by Madelman

phpGiftReq 1.4.0 suffers from multiple SQL injection flaws that allow for manipulation of the database.

tags | exploit, sql injection
MD5 | 7c0a1e1bb740848737f21d9abdbd4990
froogleCookie.txt
Posted Jan 16, 2005
Authored by Nir Goldshlager

A cross site scripting vulnerability in Froogle allows for theft of the Google GMail cookie.

tags | exploit, xss
MD5 | 47c5c30fb8e4ac424d9837135fe87121
ciphire-mail-0.10.45-linux-i686.tar.gz
Posted Jan 16, 2005
Site ciphire.com

Ciphire Mail is an email encryption tool. It works in conjunction with your existing email client. It operates seamlessly in the background and does not interfere with normal email routines. It encrypts and decrypts email messages, and can digitally sign each message to provide authentication and guard against identity theft. It resides on your computer, between your email client and your email server, transparently encrypting/decrypting and digitally signing your email communication. It is compatible with all email clients using standard SMTP, POP3, or IMAP4 (including SSL/TLS variants and STARTTLS support). It is free for consumers, non-profit organizations, and the press. Linux version.

tags | encryption
systems | linux
MD5 | bcffc6072284aaf27a7dc0c59a51f196
ciphire-mail-0.10.41-osx-ppc.zip
Posted Jan 16, 2005
Site ciphire.com

Ciphire Mail is an email encryption tool. It works in conjunction with your existing email client. It operates seamlessly in the background and does not interfere with normal email routines. It encrypts and decrypts email messages, and can digitally sign each message to provide authentication and guard against identity theft. It resides on your computer, between your email client and your email server, transparently encrypting/decrypting and digitally signing your email communication. It is compatible with all email clients using standard SMTP, POP3, or IMAP4 (including SSL/TLS variants and STARTTLS support). It is free for consumers, non-profit organizations, and the press. Mac version.

tags | encryption
MD5 | c226e7818b8ac9cc81079f1067c16b39
ciphire-mail-0.10.43.exe
Posted Jan 16, 2005
Site ciphire.com

Ciphire Mail is an email encryption tool. It works in conjunction with your existing email client. It operates seamlessly in the background and does not interfere with normal email routines. It encrypts and decrypts email messages, and can digitally sign each message to provide authentication and guard against identity theft. It resides on your computer, between your email client and your email server, transparently encrypting/decrypting and digitally signing your email communication. It is compatible with all email clients using standard SMTP, POP3, or IMAP4 (including SSL/TLS variants and STARTTLS support). It is free for consumers, non-profit organizations, and the press. Windows version.

tags | encryption
systems | windows
MD5 | 496e871e87204957f4eb73df77653a27
050110_ciphire_home_grafik.jpg
Posted Jan 16, 2005

Ciphire structure graphic.

tags | encryption
MD5 | bc9a3260943b68e0abc5619df10bab8b
1C-logo2.png
Posted Jan 16, 2005

Ciphire Logo.

tags | encryption
MD5 | 9df7b48b2e4065cb892fbd08ba7bb405
afick-2.6-2.tgz
Posted Jan 16, 2005
Authored by Eric Gerbier | Site afick.sourceforge.net

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.

Changes: Various bug fixes.
tags | tool, integrity
systems | windows, unix
MD5 | 63bfdb094032ddb2ed136b6291f3dcef
pam_usb-0.3.2.tar.gz
Posted Jan 16, 2005
Authored by Andrea Luzzardi | Site sig11.org

pam_usb is a PAM module that enables authentication using a USB storage device through DSA private/public keys. It can also work with floppy disks, CD-ROMs, or any kind of mountable device.

Changes: Will try to autodetect /dev/sdN devices (not just /dev/sdNX). Fixed a bug that happened when the application using PAM did not set PAM_TTY correctly. Added the use_first_pass and try_first_pass options. Now if you enter your password on another PAM module (such as pam_mount or pam_ssh), pam_usb will use that password to decrypt the private key.
systems | linux
MD5 | e3e011e54b992a3c0330f825609fb07d
knock-0.4.tar.gz
Posted Jan 16, 2005
Authored by Judd Vinet | Site zeroflux.org

knock is a server/client set of tools that implements the idea known as port-knocking. Port-knocking is a method of accessing a backdoor to your firewall through a special sequence of port hits. This can be useful for opening up temporary holes in a restrictive firewall for SSH access or similar.

Changes: Added support for DLT_RAW (PPPoE) interfaces, Changed packet inspection to use the interface's IP address to determine the flow direction, rather than the ethernet MAC address, Changed logging date format to ISO (yyyy-mm-dd), Added hostnames to logging output.
tags | tool, scanner
systems | unix
MD5 | 6795a3c32d8e4373790bed50655360a9
stackgrow2.c
Posted Jan 16, 2005
Authored by Christophe Devine

Full version of the expand_stack SMP race proof of concept exploit that makes use of a locally exploitable flaw in the Linux page fault handler code.

tags | exploit, proof of concept
systems | linux
advisories | CVE-2005-0001
MD5 | 4f314b5f96fa72c44fff19048f9962b6
exim.pl.txt
Posted Jan 16, 2005
Authored by Rafael San Miguel Carrasco | Site dvc.es

Proof of concept exploit for the locally exploitable buffer overflow in Exim version 4.41.

tags | exploit, overflow, proof of concept
MD5 | aa9545a6aeb06b9e4cd8c085f6770585
siteman119.txt
Posted Jan 16, 2005
Authored by Pi3cH | Site persianhacker.net

Siteman version 1.1.9 is susceptible to cross site scripting attacks.

tags | exploit, xss
MD5 | dfbac9435848a88522bc7e07e3e2fcb1
iDEFENSE Security Advisory 2005-01-14.t
Posted Jan 16, 2005
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 01.14.05 - Local exploitation of a buffer overflow vulnerability in Exim 4.41 may allow execution of arbitrary commands with elevated privileges.

tags | advisory, overflow, arbitrary, local
MD5 | c89e0df39e35bdf791e26e039588e1b6
Secunia Security Advisory 13854
Posted Jan 16, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Paul Brereton has reported a vulnerability in PRADO 1.x, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | 1c3c972b631549e8e1b94cff45c94d42
dimva2005-2.txt
Posted Jan 16, 2005
Site dimva.org

Second Call For Papers - DIMVA 2005. Second GI SIG SIDAR Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. In Cooperation with the IEEE Task Force on Information Assurance.

tags | paper, conference
MD5 | ba951586989aa1370f81bb4d1fa11fb5
57717.html
Posted Jan 16, 2005
Site sunsolve.sun.com

Sun Security Advisory - User accounts created with the Solaris Management Console (SMC) GUI which are configured for password aging may allow login without specifying a password.

tags | advisory
systems | solaris
MD5 | a5ab82c79195d43cec5e7a170b1ab56e
Secunia Security Advisory 13844
Posted Jan 16, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Adam Baldwin has discovered a weakness in Encrypted Messenger, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory
MD5 | b1316ec12da131dc090d439baa7a43e6
dsa-639.txt
Posted Jan 16, 2005
Site debian.org

Debian Security Advisory 639-1 - Andrew V. Samoilov has noticed that several bugfixes which were applied to the source by upstream developers of mc, the midnight commander, a file browser and manager, were not backported to the current version of mc that Debian ships in their stable release.

tags | advisory
systems | linux, debian
advisories | CVE-2004-1004, CVE-2004-1005, CVE-2004-1009, CVE-2004-1090, CVE-2004-1091, CVE-2004-1092, CVE-2004-1093, CVE-2004-1174, CVE-2004-1175, CVE-2004-1176
MD5 | 1b321b47d0b3443a6a50b4b94958e220
ExploitingFedora.txt
Posted Jan 16, 2005
Authored by vangelis

Whitepaper discussing how to exploit overflow vulnerabilities on Fedora Core 2.

tags | paper, overflow, vulnerability
systems | linux, fedora
MD5 | 3559a134fd68ccf8a3fa3739a40b45c3
Secunia Security Advisory 13790
Posted Jan 16, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - OpenBSD has acknowledged a vulnerability in httpd's mod_include module, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | openbsd
MD5 | e0906500a66de0985c1d943338ef0106
Secunia Security Advisory 13825
Posted Jan 16, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Squid, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
MD5 | 85cbac0e3308193593175dea41ec606c
Page 1 of 3
Back123Next

File Archive:

November 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    22 Files
  • 2
    Nov 2nd
    28 Files
  • 3
    Nov 3rd
    10 Files
  • 4
    Nov 4th
    1 Files
  • 5
    Nov 5th
    5 Files
  • 6
    Nov 6th
    15 Files
  • 7
    Nov 7th
    15 Files
  • 8
    Nov 8th
    13 Files
  • 9
    Nov 9th
    9 Files
  • 10
    Nov 10th
    9 Files
  • 11
    Nov 11th
    3 Files
  • 12
    Nov 12th
    2 Files
  • 13
    Nov 13th
    15 Files
  • 14
    Nov 14th
    17 Files
  • 15
    Nov 15th
    19 Files
  • 16
    Nov 16th
    15 Files
  • 17
    Nov 17th
    19 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close