what you don't know can hurt you
Showing 1 - 25 of 77 RSS Feed

Files Date: 2005-02-25

usr9105.bz2
Posted Feb 25, 2005
Authored by Mark Wadham

usr9105.c is a very simple interface to the US Robotics 9105 ADSL router's command shell (linux-based). The program lets you send commands directly to the router's telnet interface and capture the output (if any). Very useful for taking advantage of the very powerful iptables firewall that this router implements. Also allows you to run several commands at once specified in a config file. Tested on the 9105, may also work on the 9106 and others.

tags | shell
systems | linux, unix
MD5 | 78e32fd8783d9bc9ae45b6c96698376b
pcap202.msi
Posted Feb 25, 2005
Authored by Proxy Labs | Site proxylabs.netwu.com

ProxyCap enables users to tunnel Internet applications through HTTP, SOCKS v4, and SOCKS v5 Proxy Servers. It can be told which applications will connect to the Internet through a proxy and under what circumstances. This is done through a user friendly interface, without the need to reconfigure any clients. ProxyCap provides a flexible rule system and allows the end user to define their own tunneling rules.

tags | web
MD5 | be335287cf5dbfae344b1be88bff4be1
adpl33t.txt
Posted Feb 25, 2005
Authored by rootfiend

ADP Elite invoice and purchasing systems allow for a user to circumvent their menuing system and drop into a shell.

tags | exploit, shell
MD5 | 5d339d904d508ef5b80004ae8b5874d2
zeroboardXSS.txt
Posted Feb 25, 2005
Site albanianhaxorz.org

Zeroboard is susceptible to numerous cross site scripting and path disclosure vulnerabilities.

tags | exploit, vulnerability, xss
MD5 | 0c047ab66780899e831d464528dd9a63
pmachineExec.txt
Posted Feb 25, 2005
Authored by Kingcope

A lack of variable sanitizing in PMachine online publishing tools allows for remote command execution as the webserver uid.

tags | exploit, remote
MD5 | c2e223e491811c7bf3c697ec5aaaab3b
exwormshoutcast.c
Posted Feb 25, 2005
Authored by jsk

SHOUTcast version 1.9.4 remote exploit. Tested on RedHat 90 and Fedora 1. Has connectback shellcode.

tags | exploit, remote, shellcode
systems | linux, redhat, fedora
MD5 | b7b06a33c0c111aef84cecd419d8fbc6
cisco-torch-0.3b.tar.bz2
Posted Feb 25, 2005
Authored by Arhont Team | Site arhont.com

Cisco Torch mass scanning, fingerprinting, and exploitation tool.

Changes: Significant code optimizations and improvements, CIDR notations now taken in as input properly, more telnet fingerprints added.
systems | cisco
MD5 | 9260fe0f901cf84ce934d0dee8e413d0
tcambof.zip
Posted Feb 25, 2005
Authored by Luigi Auriemma | Site aluigi.altervista.org

TrackerCam versions 5.12 and below remote buffer overflow exploit.

tags | exploit, remote, overflow
MD5 | 001ec622d3dd7a4d4b2ceed5d1f0ba16
tcambof.txt
Posted Feb 25, 2005
Authored by Luigi Auriemma | Site aluigi.altervista.org

TrackerCam versions 5.12 and below are susceptible to a User-Agent buffer overflow, PHP argument buffer overflow, directory traversal, path disclosure, html injection to its log file, information disclosure, and remote denial of service flaws.

tags | exploit, remote, denial of service, overflow, php, info disclosure
MD5 | 6c9f2f12696b38bc8f996573f2a0bd34
dsa-687.txt
Posted Feb 25, 2005
Site debian.org

Debian Security Advisory 687-1 - The Debian Security Audit Project discovered a format string vulnerability in bidwatcher, a tool for watching and bidding on eBay auctions. This problem can be triggered remotely by a web server of eBay, or someone pretending to be eBay, sending certain data back. As of version 1.3.17 the program uses cURL and is not vulnerable anymore.

tags | advisory, web
systems | linux, debian
advisories | CVE-2005-0158
MD5 | df6bed9a19630133a6474d1fa60e9310
silePNUKExpl_v7.4.c
Posted Feb 25, 2005
Authored by Silentium | Site autistici.org

phpNUKE version 7.4 remote exploit that adds an administrative user.

tags | exploit, remote
MD5 | 2775c70af6fd6755265151681e293c57
cfengineRSA.c
Posted Feb 25, 2005
Authored by jsk

cfengine RSA remote heap overflow exploit.

tags | exploit, remote, overflow
MD5 | fd09b537a45ba6641e6050125c466781
arksink2.c
Posted Feb 25, 2005

Remote root exploit for Arkeia 5.3.x that makes use of a stack overflow when handling a Type 77 request. Targets for Redhat 7.2/8.0, Win2k SP2/SP3/SP4, WinXP SP1, Win 2003 EE.

tags | exploit, remote, overflow, root
systems | linux, redhat, windows, 2k
MD5 | 01618af7bd938309c21c07af52130c27
Gentoo Linux Security Advisory 200502-26
Posted Feb 25, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200502-26 - gprostats, distributed with GProFTPD, is vulnerable to a format string vulnerability, potentially leading to the execution of arbitrary code. Versions below 8.1.9 are affected.

tags | advisory, arbitrary
systems | linux, gentoo
MD5 | c0da849c3e4ab949e5641dc635383495
3CDaemon.c
Posted Feb 25, 2005
Authored by class101 | Site class101.org

3com 3CDaemon FTP unauthorized USER remote buffer overflow exploit that can bind a shell or reverse a shell back to a listener.

tags | exploit, remote, overflow, shell
MD5 | c3fed19b473c2219a2699220fa4e4a31
Gentoo Linux Security Advisory 200502-25
Posted Feb 25, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200502-25 - Squid contains a bug in the handling of certain DNS responses resulting in a Denial of Service. Versions below 2.5.8 are affected.

tags | advisory, denial of service
systems | linux, gentoo
MD5 | 4eece8348d24eace641792e8a8ed641a
secres18022005-2.txt
Posted Feb 25, 2005
Authored by Carsten Eiram | Site secunia.com

Secunia Research Advisory - Secunia Research has discovered a vulnerability in Yahoo! Messenger, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
advisories | CVE-2005-0242
MD5 | 34e6afd02ad73ed18c8db53af858b870
secres18022005-1.txt
Posted Feb 25, 2005
Authored by Andreas Sandblad | Site secunia.com

Secunia Research Advisory - Secunia Research has discovered a vulnerability in Yahoo! Messenger, which can be exploited by malicious people to trick users into executing malicious files.

tags | advisory
advisories | CVE-2005-0243
MD5 | d28d3f6c3fa16c0ff63049b3b40e08f6
Secunia Security Advisory 14322
Posted Feb 25, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two weaknesses have been reported in Gaim, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | b1b23735aa29722a4807ab6c693025ea
PeerFTP_5.c
Posted Feb 25, 2005
Authored by ATmaCA, Kozan | Site netmagister.com

PeerFTP_5 local password disclosure exploit.

tags | exploit, local
MD5 | 6177674b657c57c14c45ce2162f2fc02
arkeia_type77_win32.pm
Posted Feb 25, 2005
Authored by H D Moore

Remote root exploit for Arkeia 5.3.x that makes use of a stack overflow when handling a Type 77 request. Windows version.

tags | exploit, remote, overflow, root
systems | windows
MD5 | 9253160b8213ad70e54884cc654bb859
arkeia_type77_macos.pm
Posted Feb 25, 2005

Remote root exploit for Arkeia 5.3.x that makes use of a stack overflow when handling a Type 77 request. Mac OSX version.

tags | exploit, remote, overflow, root
systems | apple
MD5 | e633555df138c51c1585e9108b8fd5e1
shoutcastPoC.c
Posted Feb 25, 2005
Authored by mandragore, Tomasz Trojanowski

Proof of concept exploit for the Nullsoft SHOUTcast 1.9.4 File Request format string vulnerability.

tags | exploit, proof of concept
MD5 | 1cb6880586a6c02de8cb5a1ee8c24c4c
TCW690.txt
Posted Feb 25, 2005
Authored by MurDoK

Thomson TCW690 POST password validation exploit. Tested with hardware version 2.1 and software version ST42.03.0a.

tags | exploit
MD5 | bd964a49fa754263fcf02921244b10a8
visualboyadv.c
Posted Feb 25, 2005
Authored by Qnix

Local exploit for VisualBoyAdvanced 1.x.x that is not normally setuid by default.

tags | exploit, local
MD5 | cdb6ec68d4c468ec8859817c0255fd15
Page 1 of 4
Back1234Next

File Archive:

September 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    20 Files
  • 2
    Sep 2nd
    15 Files
  • 3
    Sep 3rd
    15 Files
  • 4
    Sep 4th
    4 Files
  • 5
    Sep 5th
    1 Files
  • 6
    Sep 6th
    1 Files
  • 7
    Sep 7th
    15 Files
  • 8
    Sep 8th
    27 Files
  • 9
    Sep 9th
    7 Files
  • 10
    Sep 10th
    16 Files
  • 11
    Sep 11th
    9 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    25 Files
  • 15
    Sep 15th
    15 Files
  • 16
    Sep 16th
    15 Files
  • 17
    Sep 17th
    15 Files
  • 18
    Sep 18th
    12 Files
  • 19
    Sep 19th
    1 Files
  • 20
    Sep 20th
    1 Files
  • 21
    Sep 21st
    15 Files
  • 22
    Sep 22nd
    21 Files
  • 23
    Sep 23rd
    8 Files
  • 24
    Sep 24th
    15 Files
  • 25
    Sep 25th
    4 Files
  • 26
    Sep 26th
    1 Files
  • 27
    Sep 27th
    1 Files
  • 28
    Sep 28th
    20 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close