what you don't know can hurt you
Showing 1 - 25 of 111 RSS Feed

Files Date: 2005-03-15

photopost50rc3.txt
Posted Mar 15, 2005
Authored by Igor Franchuk

PhotoPost 5.0RC3 is susceptible to SQL injection, arbitrary file upload, cross site scripting, and various manipulation flaws.

tags | exploit, arbitrary, xss, sql injection, file upload
MD5 | f0f5aae8beaa16c5547ce21650869b4d
ubbSQL.txt
Posted Mar 15, 2005
Authored by kreon | Site adz.void.ru

UBB.threads version 6 is susceptible to a SQL injection attack in the editpost.php module.

tags | exploit, php, sql injection
MD5 | b9d551ba7c4cebb73bdb3429fb9fc9f5
spinworkds.txt
Posted Mar 15, 2005
Authored by Dr. Insane

A vulnerability has been identified in Spinworks application server that allow a remote user to succesfully crash the server by supplying a '.' in the sid parameter.

tags | advisory, remote
MD5 | 4408bc3d528df3d873bfd610ddd24ec3
exp3.pl.txt
Posted Mar 15, 2005
Authored by Stefano Di Paola | Site wisec.it

Proof of concept exploit that makes use of functions in libc in order to gain MySQL user privileges. Version 4.1.10 and versions below and equal to 4.0.23 are affected.

tags | exploit, proof of concept
MD5 | 03d076773b4edd27cd71264b66a9ea04
mysqlCreatelibc.txt
Posted Mar 15, 2005
Authored by Stefano Di Paola | Site wisec.it

If an authenticated user has INSERT and DELETE privileges on an mysql administrative database, it is possible, by using the CREATE FUNCTION command, to take advantage of functions from libc in order to gain mysql user privileges. Version 4.1.10 and versions below and equal to 4.0.23 are affected.

tags | advisory
MD5 | 5cfad60ee180443cf9a873e46849dd96
exp2.php.txt
Posted Mar 15, 2005
Authored by Stefano Di Paola | Site wisec.it

Proof of concept exploit that makes use of a library injection flaw in MySQL via the CREATE function. Version 4.1.10 and versions below and equal to 4.0.23 are affected.

tags | exploit, proof of concept
MD5 | 0d778bbae9d865a9ba85379b9ed620fe
mysqlCreateinject.txt
Posted Mar 15, 2005
Authored by Stefano Di Paola | Site wisec.it

If an authenticated user has INSERT and DELETE privileges on a mysql administrative database, it is possible to use a library located in an arbitrary directory using the CREATE function. Version 4.1.10 and versions below and equal to 4.0.23 are affected.

tags | advisory, arbitrary
MD5 | 8a1165837393ec03c54a528723db2f41
nufw-1.0.0.tar.gz
Posted Mar 15, 2005
Authored by regit | Site nufw.org

NuFW is a set of daemons that filters packets on a per-user basis. The gateway authorizes a packet depending on which remote user has sent it. On the client side, users have to run a client that sends authentication packets to the gateway. On the server side, the gateway associates user ids to packets, thus enabling the possibility to filter packets on a user basis. Furthermore, the server architecture is done to use external authentication source such as an LDAP server.

Changes: Some code cleaning and a new configure option.
tags | tool, remote, firewall
systems | unix
MD5 | 5a474be1d8b3ed2bf964a68f3a08123a
Linux IPTables Firewall
Posted Mar 15, 2005
Site iptables.org

iptables is the new packet alteration framework (firewall utility) for Linux 2.4. It is an enhancement on ipchains, and is used to control packet filtering, Network Address Translation (masquerading, port forwarding, transparent proxying), and special effects.

Changes: Various bug fixes.
tags | tool, firewall
systems | linux
MD5 | c3358a3bd0d7755df0b64a5063db296b
ap-utils-1.5.tar.bz2
Posted Mar 15, 2005
Authored by roma | Site ap-utils.polesye.net

Access Point Utilities for Unix is a set of utilities that configure and monitor a Wireless Access Point under Unix. It is known to compile (with GCC and the IBM C compiler) and run under Linux, FreeBSD, OpenBSD, MacOS X, AIX, and QNX.

Changes: Documentation and translation updates. Various bug fixes and feature enhancements.
tags | tool, wireless
systems | linux, unix, freebsd, openbsd, aix, osx
MD5 | ebdb2a03302648c939ac965617de2889
p0f-db-20050307.tar.gz
Posted Mar 15, 2005
Authored by Michal Zalewski | Site lcamtuf.coredump.cx

p0f performs passive OS detection by watching SYN packets with tcpdump. Additionally, it is able to determine distance to remote host, and can be used to determine the structure of a foreign or local network. When running on the gateway of a network it is able to gather huge amounts of data and provide useful statistics. On a user-end computer it could be used to track which operating systems are making each connection. p0f supports full tcpdump-style filtering expressions, and has an easily modified fingerprinting database. Tested on Linux, FreeBSD, OpenBSD, NetBSD, SunOS, and Solaris. This particular version is modified by Nerijus Krukauskas to store the data in a database.

Changes: Added a patch.
tags | tool, remote, local, scanner
systems | linux, netbsd, unix, solaris, freebsd, openbsd
MD5 | b95d46afd1f43382b862b880bfac6aa2
iDEFENSE Security Advisory 2005-03-10.t
Posted Mar 15, 2005
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 03.10.05 - Exploitation of a remote buffer overflow within the IMAP daemon of Ipswitch Collaboration Suite allows attackers to execute arbitrary code with administrator privileges.

tags | advisory, remote, overflow, arbitrary, imap
advisories | CVE-2005-0707
MD5 | 7fea7bd4722f44e071d098daa39bf96a
sdf1-apple.txt
Posted Mar 15, 2005
Authored by Ray Slakinski

Apple ships XCode 1.5 with a feature for distributed compiling that ships with distcc, a Samba module that is susceptible to known exploits allowing for full user access to the target machine.

tags | advisory
systems | apple
MD5 | be1059990db7881c0244429fc0aea630
Secunia Security Advisory 14580
Posted Mar 15, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - farhad koosha has reported a security issue in aeNovo, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
MD5 | 7d34e9df225699b8db1536bc8f70ab76
Secunia Security Advisory 14564
Posted Mar 15, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Luca Ercoli has reported a vulnerability in MySQL, which can be exploited by malicious users to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | f1d1030d49b568307900028ff37c63aa
Secunia Security Advisory 14578
Posted Mar 15, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - ADZ Security Team has reported a vulnerability in UBB.threads, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
MD5 | 89cda7f56e1ac3c5ad9988a4c851865d
Secunia Security Advisory 14566
Posted Mar 15, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Virginity has reported a vulnerability in holaCMS, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | 6c59b358ca5cc1bf5dd14bd79cdc2824
Secunia Security Advisory 14579
Posted Mar 15, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Dr_insane has discovered a vulnerability in Spinworks Application Server, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | 492e70efdfa1335b5c5a6186fc978123
Secunia Security Advisory 14576
Posted Mar 15, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Igor Franchuk has reported some vulnerabilities in PhotoPost PHP Pro, which can be exploited to conduct script insertion and SQL injection attacks, bypass certain security restrictions and manipulate potentially sensitive information.

tags | advisory, php, vulnerability, sql injection
MD5 | 31e02e73b8f9961506bcc83501a611e2
Secunia Security Advisory 14567
Posted Mar 15, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - bitlance winter has discovered a weakness in Thunderbird, which can be exploited by malicious people to trick users into saving malicious files by obfuscating URLs.

tags | advisory
MD5 | 9f38bc46090e260a49cb113dec671cf8
Secunia Security Advisory 14568
Posted Mar 15, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - bitlance winter has discovered a weakness in Mozilla, which can be exploited by malicious people to trick users into saving malicious files by obfuscating URLs.

tags | advisory
MD5 | 6c06960a9d5059cc2791cef52a5e654e
Secunia Security Advisory 14565
Posted Mar 15, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - bitlance winter has discovered a weakness in Firefox, which can be exploited by malicious people to trick users into saving malicious files by obfuscating URLs.

tags | advisory
MD5 | 91fad53830f1bd3fe49795f3cededcfc
Secunia Security Advisory 14547
Posted Mar 15, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Stefano Di Paola has reported two vulnerabilities in MySQL, which potentially can be exploited by malicious users to compromise a vulnerable system and by malicious, local users to perform certain actions on a vulnerable system with escalated privileges.

tags | advisory, local, vulnerability
MD5 | 9b684216734622abf3a796d2b0f349b0
Secunia Security Advisory 14554
Posted Mar 15, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Phorum, which potentially can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | 70e5b04b9d1ed320971fa4573c9618ab
Secunia Security Advisory 14559
Posted Mar 15, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fidel Costa has discovered a vulnerability in WEBInsta Limbo, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | 81b24037c508ed72160d10a745a98ac0
Page 1 of 5
Back12345Next

File Archive:

October 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    24 Files
  • 2
    Oct 2nd
    15 Files
  • 3
    Oct 3rd
    7 Files
  • 4
    Oct 4th
    4 Files
  • 5
    Oct 5th
    10 Files
  • 6
    Oct 6th
    1 Files
  • 7
    Oct 7th
    21 Files
  • 8
    Oct 8th
    19 Files
  • 9
    Oct 9th
    5 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    17 Files
  • 12
    Oct 12th
    4 Files
  • 13
    Oct 13th
    4 Files
  • 14
    Oct 14th
    15 Files
  • 15
    Oct 15th
    19 Files
  • 16
    Oct 16th
    25 Files
  • 17
    Oct 17th
    17 Files
  • 18
    Oct 18th
    7 Files
  • 19
    Oct 19th
    1 Files
  • 20
    Oct 20th
    3 Files
  • 21
    Oct 21st
    12 Files
  • 22
    Oct 22nd
    11 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close