exploit the possibilities
Showing 1 - 25 of 43 RSS Feed

Files Date: 2005-06-23

mudpit-1.4.tar.gz
Posted Jun 23, 2005
Authored by farm9opensource

Mudpit is an intelligent, modular, and reliable spool processor for Snort's unified format.

tags | tool, sniffer
MD5 | 24b732eadc333f4704ad7459280d7533
compozitSQL.txt
Posted Jun 23, 2005
Authored by basher13

Compozit 1.0 is susceptible to SQL injection attacks.

tags | exploit, sql injection
MD5 | 42554337b9e9e4b3ee12dbd968458b96
phpBBsqlAll.txt
Posted Jun 23, 2005
Authored by James Bercegay | Site gulftech.org

phpBB suffers from SQL injection vulnerabilities.

tags | advisory, vulnerability, sql injection
MD5 | f94f31e4857c21006d283dbc672fb405
KMiNT21.txt
Posted Jun 23, 2005
Authored by Reed Arvin | Site reedarvin.thearvins.com

A buffer overflow exists in KMiNT21 Software Golden FTP Server Pro version 2.52.

tags | exploit, overflow
MD5 | bf3a9374bdef6708f95745e2dd16bd8f
clarolineVulns.txt
Posted Jun 23, 2005
Site fr.zone-h.org

Multiple Cross site scripting, 10 SQL injection, 7 directory traversal and 4 remote file inclusion vulnerabilities have been found in Claroline versions 1.6 and below.

tags | exploit, remote, vulnerability, xss, sql injection, file inclusion
MD5 | 8e29ee128704bd3e0dffcb7734264b9e
kismet-2005-06-R1.tar.gz
Posted Jun 23, 2005
Authored by Mike Kershaw | Site kismetwireless.net

Kismet is an 802.11 layer 2 wireless network sniffer. It can sniff 802.11b, 802.11a, and 802.11g traffic. It is capable of sniffing using almost any wireless card supported in Linux, which currently divide into cards handled by libpcap and the Linux-Wireless extensions (such as Cisco Aironet), and cards supported by the Wlan-NG project which use the Prism/2 chipset (such as Linksys, Dlink, and Zoom). Besides Linux, Kismet also supports FreeBSD, OpenBSD and Mac OS X systems. Features Multiple packet capture sources, Runtime network sorting by AP MAC address (bssid), IP block detection via ARP and DHCP packet dissection, Cisco product detection via CDP, Ethereal and tcpdump compatible file logging, Airsnort-compatible "interesting" (cryptographically weak) logging, Secure SUID behavior, GPS devices and wireless devices fingerprinting. Kismet also includes a tool called gpsmap that can be used to create maps from logged GPS data. Full changelog here.

Changes: OpenBSD radiotap support, New gpsd interface code, and much more.
tags | tool, wireless
systems | cisco, linux, freebsd, openbsd, apple, osx
MD5 | 253ed1e6c2c53e35864385965ef596f6
lids-2.2.1rc3-2.6.12.tar.gz
Posted Jun 23, 2005
Authored by Xie Hua Gang | Site lids.org

The Linux Intrusion Detection System (LIDS) is a patch which enhances the kernel's security by implementing a reference monitor and Mandatory Access Control (MAC). When it is in effect, chosen file access, all system/network administration operations, any capability use, raw device, memory, and I/O access can be made impossible even for root. You can define which programs may access specific files. It uses and extends the system capabilities bounding set to control the whole system and adds some network and filesystem security features to the kernel to enhance the security. You can finely tune the security protections online, hide sensitive processes, receive security alerts through the network, and more.

Changes: Fixed a security bug when checking the LD_XXXX. Some other changes.
tags | kernel, root
systems | linux
MD5 | e8cbb00a25506284c0bd544d06cd6da7
NsT-phpBBDoS.pl.txt
Posted Jun 23, 2005
Authored by HaCkZaTaN

phpBB versions 2.0.15 and below denial of service exploit that makes use of a flaw that relates to registering multiple users. Perl version of the exploit.

tags | exploit, denial of service, perl
MD5 | c9f86c6b6367e8730d942a48b9378e1a
NsT-phpBBDoS.c
Posted Jun 23, 2005
Authored by HaCkZaTaN

phpBB versions 2.0.15 and below denial of service exploit that makes use of a flaw that relates to registering multiple users. C version of the exploit.

tags | exploit, denial of service
MD5 | 7f83013c968358ef1bcad6e2a9bb7c86
whoiscartInsert.txt
Posted Jun 23, 2005
Authored by Elzar Stuffenbach

Saeven.net's WhoisCart is susceptible to an arbitrary javascript injection flaw and also suffers from a directory traversal vulnerability.

tags | exploit, arbitrary, javascript
MD5 | dd25be9f27aad102003c487aada7f0db
iDEFENSE Security Advisory 2005-06-22.4
Posted Jun 23, 2005
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 06.22.05-4 - Remote exploitation of a SQL injection vulnerability in IpSwitch Inc.'s WhatsUp Professional 2005 Service Pack 1 could allow a remote attacker to gain administrative access to the application.

tags | advisory, remote, sql injection
MD5 | 74fad0d763ec538e802654602b8b911a
cacti.pl.txt
Posted Jun 23, 2005
Authored by Alberto Trivero

Cacti versions 0.8.6d and below remote command execution exploit.

tags | exploit, remote
MD5 | 129bbc13dc26c639b3050ca8f8b72254
Gentoo Linux Security Advisory 200506-21
Posted Jun 23, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200506-21 - Stefan Esser of the Hardened-PHP project discovered that Trac fails to validate the id parameter when uploading attachments to the wiki or the bug tracking system. Versions less than 0.8.4 are affected.

tags | advisory, php
systems | linux, gentoo
MD5 | 56efddf93e01fad64a180fa8a2cb44f1
advisory-05-013.txt
Posted Jun 23, 2005
Authored by Wade Alcorn | Site portcullis-security.com

A programming error exists in the function that parses commands in the Asterisk 1.0.7 system. This is used by the manager interface if the user is allowed to submit CLI commands. The coding error can result in the overflow of one of the parameters of the calling function.

tags | advisory, overflow
MD5 | df2b41912f37ecf3899c9cd540b57d35
iDEFENSE Security Advisory 2005-06-22.3
Posted Jun 23, 2005
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 06.22.05-3 - Cacti contains an input validation error in the top_graph_header.php script that allows an attacker to include arbitrary PHP code from remote sites. This in effect allows arbitrary code execution with the privileges of the web server.

tags | advisory, remote, web, arbitrary, php, code execution
MD5 | 964cd0c3d9f3b4eb5c71a5400dfba515
iDEFENSE Security Advisory 2005-06-22.2
Posted Jun 23, 2005
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 06.22.05-2 - Cacti contains an input validation error in the config_settings.php script which allows an attacker to include arbitrary PHP code from remote sites.

tags | advisory, remote, arbitrary, php
MD5 | 56ab25ddde4a59b6ecb891a34cac18c9
iDEFENSE Security Advisory 2005-06-22.1
Posted Jun 23, 2005
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 06.22.05-1 - Remote exploitation of an input validation vulnerability in various vendors implementations of Cacti graph creation tool allows an attacker to make arbitrary SQL queries.

tags | advisory, remote, arbitrary
MD5 | 3f7ce39a7beb1548d051c6b56381ee85
Echo Security Advisory 2005.19
Posted Jun 23, 2005
Authored by Echo Security, the_day | Site theday.echo.or.id

A huge slew of SQL injection flaws exist in the DUWARE product inline, including but not limited to DUportal Pro, DUamazon Pro, and more.

tags | exploit, sql injection
MD5 | c5fe79c7777b3ae8f5b10525761c8ff8
igallery33.txt
Posted Jun 23, 2005
Authored by Seyed Hamid Kashfi | Site hat-squad.com

i-Gallery versions 3.3 and below suffer from a directory traversal vulnerability and cross site scripting flaws.

tags | exploit, xss
MD5 | 3f1cc193ca9ed14b18f053dc22bc804c
r57mercury.pl
Posted Jun 23, 2005
Authored by RST/GHC | Site rst.void.ru

MercuryBoard versions 1.1.4 and below remote SQL injection exploit.

tags | exploit, remote, sql injection
MD5 | 8c4f150082c0f6eff5d752ddc287a647
r57wp.pl
Posted Jun 23, 2005
Authored by RST/GHC | Site rst.void.ru

WordPress versions 1.5.1.1 and below SQL injection exploit that makes use of a bug in users.php to add a new admin user.

tags | exploit, php, sql injection
MD5 | ca93b5c505d9448b6472a9fb2bd3a80b
Gentoo Linux Security Advisory 200506-19
Posted Jun 23, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200506-19 - SquirrelMail is vulnerable to several cross-site scripting issues, most reported by Martijn Brinkers. Versions less than 1.4.4 are affected.

tags | advisory, xss
systems | linux, gentoo
advisories | CVE-2005-1769
MD5 | bed5b262a23853020a4e3998742768df
Gentoo Linux Security Advisory 200506-18
Posted Jun 23, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200506-18 - A bug in Tor allows attackers to view arbitrary memory contents from an exit server's process space. Versions less than 0.0.9.10 are affected.

tags | advisory, arbitrary
systems | linux, gentoo
MD5 | 1a78f5d0fdb0c505e37333a52165285b
Secunia Security Advisory 15490
Posted Jun 23, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Cacti, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks or compromise a vulnerable system.

tags | advisory, vulnerability, xss, sql injection
MD5 | 51131c4147f55dddff5b8778cca178b2
Secunia Security Advisory 15744
Posted Jun 23, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in sudo, which can be exploited by malicious, local users to execute arbitrary commands.

tags | advisory, arbitrary, local
MD5 | 1c4fdd1c4f468b3070345261a3ab2649
Page 1 of 2
Back12Next

File Archive:

December 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    18 Files
  • 2
    Dec 2nd
    11 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close