exploit the possibilities
Showing 1 - 25 of 109 RSS Feed

Files Date: 2005-04-18

sctune.zip
Posted Apr 18, 2005

Sctune is a small utility to generate copy/pasteable shellcode for various versions of Windows NT, 2000, 2003 and XP. Function addresses are automatically generated based on the system on which you run sctune.

tags | shellcode
systems | windows, nt
MD5 | e9e90e76be2912448233d681401ccab8
javamail_dir_travers.txt
Posted Apr 18, 2005
Authored by Rafael San Miguel Carrasco | Site dvc.es

JavaMail is vulnerable to a directory-traversal attack where files can be written to an arbitrary location within the filesystem, by specifying a Content-Disposition header which contains a relative path.

tags | advisory, arbitrary
MD5 | 844f6d9fad1e5d2e6c7817eec0434199
ie_dhtml_poc.txt
Posted Apr 18, 2005
Authored by SkyLined | Site edup.tudelft.nl

Proof-of-Concept exploit code for the MSIE DHTML object handling vulnerabilities (described in MS05-20).

tags | exploit, vulnerability
advisories | CVE-2005-0553
MD5 | 4682b826fd776764dcb3dbc6ee5c81c8
Gentoo Linux Security Advisory 200504-9
Posted Apr 18, 2005
Authored by Gentoo | Site security.gentoo.org

Gentooo Linux Security Advisory GLSA 200504-09 - Axel FTP/HTTP download "accelerator" is vulnerable to a buffer-overflow in code contained in conn.c. Versions up to 1.0b are affected.

tags | advisory, web, overflow
systems | linux
MD5 | 0acc99280ac053ac2b07eb8356fad3bd
centra_xss.txt
Posted Apr 18, 2005
Authored by clorox

Centra is a system designed to "webcast" MS Office documents. It is vulnerable to Cross-site scripting attacks.

tags | advisory, xss
MD5 | b089a295fcc9ee4c5cdb20023ed40dcd
04.12.05d.txt
Posted Apr 18, 2005
Site idefense.com

iDEFENSE Security Advisory 04.12.05 (d) - MSHTA vulnerabilities allow attacker-specified programs to be run by specifying a CLSID associated with the desired program.

tags | advisory, vulnerability
advisories | CVE-2005-0063
MD5 | a2d26409a183d6edbc25f9987bd804f1
04.12.05c.txt
Posted Apr 18, 2005
Site idefense.com

iDEFENSE Security Advisory 04.12.05 (c) - DHTML support in Internet Explorer is vulnerable to a number of attacks which may lead to arbitrary code execution.

tags | advisory, arbitrary, code execution
advisories | CVE-2005-0553
MD5 | 958b6691d680387c5848ab8fadca4344
04.12.05b.txt
Posted Apr 18, 2005
Site idefense.com

iDEFENSE Security Advisory 04.12.05 (b) - CSRSS.EXE (the core executable for the Windows Client/Server Runtime Server Subsystem, the process which manages most graphical commands in Windows) is vulnerable to a local stack-based buffer overflow.

tags | advisory, overflow, local
systems | windows
advisories | CVE-2005-0551
MD5 | 6d6fb29663ee606ec17f55239525b955
04.12.05a.txt
Posted Apr 18, 2005
Site idefense.com

MS Internet Explorer may allow execution of arbitrary code when it attempts to load a URL where the hostname is greater than 256 characters.

tags | advisory, arbitrary
advisories | CVE-2005-0554
MD5 | 31ea688d9494cf720e9b4a79ee873ef9
gg_crack.c
Posted Apr 18, 2005
Authored by Aleksander Ambrozkiewicz

Utility to decrypt stored passwords for the "Gadu-Gadu" Polish-language chat program.

tags | encryption
MD5 | 65e491064e613406abdafdebb495ef85
eGroupWare_infoleak.txt
Posted Apr 18, 2005
Authored by Gerald Quakenbush | Site mastermindsecuritygroup.com

eGroupWare contains a bug where mail attachments could be sent to the wrong recipient by mistake, due to eGroupWare caching attachments after a user decides to cancel a message.

tags | exploit
MD5 | b47ae0f4b64381cf82e80f88cee4e95c
101_WINS.cpp
Posted Apr 18, 2005
Authored by class101 | Site hat-squad.com

Remote heap buffer overflow exploit for the Microsoft Windows Internet Name Service. Tested against Win2k SP4 Advanced Server English. This exploit can bind a shell to port 101 or will reverse a cmd shell back to a listener.

tags | exploit, remote, overflow, shell
systems | windows, 2k
MD5 | b08e8dd6c1b44ec43827c25a4d9c7598
Exploit Labs Security Advisory 2005.6
Posted Apr 18, 2005
Authored by Exploit Labs, Morning Wood | Site exploitlabs.com

XAMPP contains multiple vulnerabilities, including default usernames / passwords and Cross-site scripting issues. Example exploit URLs provided as part of advisory.

tags | exploit, vulnerability, xss
MD5 | 6bba4395d9f460bc982e51b85993f88a
IRM Security Advisory 11
Posted Apr 18, 2005
Authored by IRM Research, IRM Advisories | Site irmplc.com

IRM Security Advisory 011 - Sygate Security Agent (Sygate Secure Enterprise) Denial of Service - A flaw in the policy management component allows malicious users to configure the firewall to use a nonexistent policy, thereby causing a Denial of Service condition.

tags | advisory, denial of service
MD5 | 2e5d2ba4ee4272618c24b0aa61fea01d
PreDebug.pdf
Posted Apr 18, 2005
Authored by Brett Moore SA | Site security-assessment.com

Bugger the Debugger is a whitepaper written by Brett Moore / Security Assessment describing how malicious code can be forced to run when a binary is loaded into a debugger / disassembler for analysis.

tags | paper
MD5 | 7c611e96714e4cfb2288a3471205fe88
XP_fake_loginscreen.zip
Posted Apr 18, 2005
Authored by ProgramOS32

Fake login screen emulating the normal Windows login screen. Logs username / password to a file. Requires the capability to install binaries on the affected system in the first place, and messages are apparently based on those in the Australian edition of Windows XP (so it would need to be modified if you plan on running this elsewhere without immediate detection).

systems | windows, xp
MD5 | a16a82eca96afc21fcf4685d8d9e7afc
Secunia Security Advisory 14971
Posted Apr 18, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Solaris, which potentially can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | solaris
MD5 | 4ecb7b877fd20668f3f27982487ad171
Secunia Security Advisory 14967
Posted Apr 18, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Luigi Auriemma has reported some vulnerabilities in Yager, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
MD5 | 4bd278c33483f8c6644ca905e56226cd
Secunia Security Advisory 14959
Posted Apr 18, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ilja van Sprundel has reported a vulnerability in FreeBSD, which can be exploited by malicious, local users to gain knowledge of potentially sensitive information.

tags | advisory, local
systems | freebsd
MD5 | fe53e82883c40bc390e3aae73905756f
Secunia Security Advisory 14969
Posted Apr 18, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Diabolic Crab has reported some vulnerabilities in OneWorldStore, which can be exploited by malicious people to conduct cross-site scripting, script insertion and SQL injection attacks.

tags | advisory, vulnerability, xss, sql injection
MD5 | bca8717df4984055eb0addb61be0bbcb
Secunia Security Advisory 14972
Posted Apr 18, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Francisco Alisson has reported a vulnerability in All4WWW-

tags | advisory
MD5 | cc81c5ae6578d2868d5f56963da74014
Secunia Security Advisory 14954
Posted Apr 18, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Oliver Karow has reported a vulnerability in RSA Authentication Agent for Web for IIS, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, web, xss
MD5 | 055bb850a9086cba1f757d90db8d21fb
Secunia Security Advisory 14953
Posted Apr 18, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Monkey HTTP Daemon, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system.

tags | advisory, web, denial of service, vulnerability
MD5 | c9e4e482d01cb746d089c5e8f6b97ec9
Secunia Security Advisory 14964
Posted Apr 18, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Shalom Carmel has reported a weakness in OS/400, which can be exploited by malicious people to identify valid user accounts.

tags | advisory
MD5 | a48d2f89070fa238e388ec772f2c3fe3
Secunia Security Advisory 14958
Posted Apr 18, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Stefan Schmidt has reported a vulnerability in Postgrey, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | adb42a96e4b53e228bc7892e7067edc3
Page 1 of 5
Back12345Next

File Archive:

December 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    1 Files
  • 2
    Dec 2nd
    16 Files
  • 3
    Dec 3rd
    17 Files
  • 4
    Dec 4th
    23 Files
  • 5
    Dec 5th
    11 Files
  • 6
    Dec 6th
    10 Files
  • 7
    Dec 7th
    1 Files
  • 8
    Dec 8th
    1 Files
  • 9
    Dec 9th
    15 Files
  • 10
    Dec 10th
    30 Files
  • 11
    Dec 11th
    8 Files
  • 12
    Dec 12th
    16 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close