exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files Date: 2005-03-28

relayscanner.zip
Posted Mar 28, 2005
Authored by CIRTDK | Site cirt.dk

SMTP relay scanner checks for open relays and misconfigurations that allow spoofing via the tested mailserver or for internal mail to internal address from external nets. Supports plugins for additional tests. Approximately 20 different misconfigurations are checked for, using a total of around 150 different tests. Written in Perl and tested on Windows and Linux.

tags | perl, spoof
systems | linux, windows, unix
SHA-256 | 3669766cc3a5e54ff8da711f3496bc595261900c567146943c589828eff68dae
Secunia Security Advisory 14692
Posted Mar 28, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - mircia has reported a vulnerability in phpMyDirectory, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | e8a6e19f1ef60fa7a111e1c9333d6f9481732db3cfd7e295faea8a9a6c45c852
Secunia Security Advisory 14727
Posted Mar 28, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for ipsec-tools. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, gentoo
SHA-256 | 04f78b9e0f3290e05eee71a01560c624a1f050960e2d99ff7159323f243b3c49
Secunia Security Advisory 14714
Posted Mar 28, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Slackware has issued an update for mozilla. This fixes some vulnerabilities, which can be exploited to bypass certain security restrictions, conduct spoofing and script insertion attacks, disclose various information, or compromise a user's system.

tags | advisory, spoof, vulnerability
systems | linux, slackware
SHA-256 | 9dc034d44353294bf6fbe5904b11f53ce243451d423981aef7a1fbd5bf444060
Secunia Security Advisory 14697
Posted Mar 28, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Diabolic Crab has reported some vulnerabilities in exoops, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks.

tags | advisory, vulnerability, xss, sql injection
SHA-256 | 5a3f3b4985fa46f3baa0f538930c008b8890e365d6b62f428263eb4b01b6b1a4
Secunia Security Advisory 14712
Posted Mar 28, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Aviv Raff has reported a vulnerability in Maxthon, which can be exploited by malicious people to disclose some potentially sensitive information.

tags | advisory
SHA-256 | 87440c1dab3a4f2df2e1ad7124a012979bb9e82c5efc0d10443604666bdc6377
Secunia Security Advisory 14735
Posted Mar 28, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for Thunderbird. This fixes four vulnerabilities, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
systems | linux, gentoo
SHA-256 | 3fe5b367857e0869dfa98f0b26c693163c74db4393ed4b4961689077c2ee878e
Secunia Security Advisory 14715
Posted Mar 28, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gerardo 'Astharot' Di Giacomo has reported some vulnerabilities in the Nuke Bookmarks module for PHP-Nuke, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks.

tags | advisory, php, vulnerability, xss, sql injection
SHA-256 | deaa338c13d08b2030eb64ce45b5ad57c433c9d138d36cd4008008d8d845448e
dcrab-e-xoops.txt
Posted Mar 28, 2005
Authored by Diabolic Crab | Site icis.digitalparadox.org

Easy Community Management System Forum (E-XOOPS) contains multiple SQL injection and cross-site scripting vulnerabilities. Some of these may not be exploitable depending on how PHP, Apache, and MySQL have been configured. Advisory contains proof-of-concept exploit URLs.

tags | exploit, php, vulnerability, xss, sql injection
SHA-256 | 383b99f55a4400a2bec840c614876918516b6901632de122f0ebc7126617cb4f
timbuktu_userbrute.c
Posted Mar 28, 2005
Authored by Conehead

Timbuktu Pro Remote Control user enumeration program. Wordlist-based bruteforce tool that checks whether a given username exists on the target server or not, which is possible due to a difference in the error message returned when the username is invalid versus when the password is invalid.

tags | exploit, remote
SHA-256 | c1316cb0a42dbdc8c71076a0435e16160c2cbab2ffe04ba0757c56504e85b033
ZH2005-03SA.txt
Posted Mar 28, 2005
Authored by Astharot | Site zone-h.org

NukeBookmarks version 6 contains SQL injection, cross site scripting, and path-disclosure vulnerabilities. Advisory contains example exploit URLs.

tags | exploit, vulnerability, xss, sql injection
SHA-256 | aa04cadcaf0e6dc00925b0ece1251381dcb2058c48cddd82c5318bc21db41adc
Page 1 of 1
Back1Next

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    25 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close