exploit the possibilities
Showing 1 - 21 of 21 RSS Feed

Files Date: 2005-08-19

gtchatDoS.txt
Posted Aug 19, 2005
Authored by x97Rang

GTChat versions 0.95 Alpha and below remote denial of service exploit.

tags | exploit, remote, denial of service
MD5 | fb94eeadfecd56bcc98ef2ef6565bb53
ninja-0.1.1.tar.bz2
Posted Aug 19, 2005
Authored by Tom Rune Flo | Site forkbomb.org

Ninja is a privilege escalation detection and prevention system for GNU/Linux hosts. While running, it will monitor process activity on the local host, and keep track of all processes running as root. If a process is spawned with UID or GID zero (root), ninja will log necessary information about this process, and optionally kill the process if it was spawned by an unauthorized user.

Changes: Minor updates.
tags | tool, local, root, intrusion detection
systems | linux, unix
MD5 | deb27909168eb6707fb5a139eef80571
afick-2.8-2.tgz
Posted Aug 19, 2005
Authored by Eric Gerbier | Site afick.sourceforge.net

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.

Changes: Some bug fixes and tweaks.
tags | tool, integrity
systems | windows, unix
MD5 | 2907a30119ff72b56500136cad0c3e7f
torHandshake.txt
Posted Aug 19, 2005
Authored by Roger Dingledine

Tor clients can completely lose anonymity, confidentiality, and data integrity if the first Tor server in their path is malicious. Versions affected: stable versions up through 0.1.0.13 and experimental versions up through 0.1.1.4-alpha.

tags | advisory
MD5 | 26947c51d61ed90bfeacc9053f3dbd93
kiosksBAD.txt
Posted Aug 19, 2005
Authored by Jason Coombs

The Airline check-in kiosk manufactured by Kinetics USA suffers from information leakage flaws.

tags | advisory
MD5 | 1a6bcd66a5f3004c79cb3a0bf30158bc
whisper32.txt
Posted Aug 19, 2005
Authored by Agapov Alexey

Whisper32 stores passwords in the clear in memory. Versions 1.16 and below are affected.

tags | advisory
MD5 | 55c1d51be390816c3b363097166e29ca
wagora240.txt
Posted Aug 19, 2005
Authored by matrix killer | Site h4cky0u.org

w-agora versions 4.2.0 and below suffer from directory traversal attacks.

tags | exploit
MD5 | de65ead31088b1588847201a38fb9f70
atutor151.txt
Posted Aug 19, 2005
Authored by matrix killer, h4cky0u | Site h4cky0u.org

ATutor versions 1.5.1 and below suffer from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
MD5 | fccc7b6e4fffe218a5e27fd4fae0f546
bbcaffe20XSS.txt
Posted Aug 19, 2005
Authored by rgod | Site retrogod.altervista.org

BBCaffe 2.0 is susceptible to cross site scripting attacks.

tags | exploit, xss
MD5 | c6500fadeb3fafe813e84a2915b24834
muttOverflow.txt
Posted Aug 19, 2005
Authored by Peter Valchev

Mutt is susceptible to a buffer overflow that can allow code execution from a maliciously sent mail.

tags | advisory, overflow, code execution
MD5 | 87c9fde65afcffbdc508ba5abf9293cb
juniperEnum.txt
Posted Aug 19, 2005
Authored by Roy Hills | Site nta-monitor.com

NTA Monitor has discovered a VPN username enumeration vulnerability in the Juniper Netscreen integrated Firewall/VPN products while performing a VPN security test for a customer. The issue is believed to affect all models of Juniper Netscreen running all ScreenOS software versions up to 5.2.0.

tags | advisory
systems | juniper
MD5 | 0a65bb7d7e281f801a8597617812e81a
IE-Msddsdll-0day.txt
Posted Aug 19, 2005

Microsoft Internet Explorer msdds.dll remote code execution exploit. z3r0 d4y. Binds a shell on port 28876. Tested on Microsoft Internet Explorer 6 SP2 (Windows XP SP2).

tags | exploit, remote, shell, code execution
systems | windows, xp
MD5 | d1fe9fb20e8dc5e0ef6fe7939785ef12
comBad.txt
Posted Aug 19, 2005
Authored by SkyLined

A number of issues have been reported lately by various sources about Internet Explorer vulnerabilities in relation to specific COM objects. Research has shown that the root cause is the fact that these COM objects are not designed to be loaded in IE at all. These objects therefore make wrongful assumptions about the state of the process they are loaded into, specifically about the contents of heap memory. This can be abused to uncover unwanted features, like the ability to run arbitrary code on a victims machine.

tags | advisory, arbitrary, root, vulnerability
MD5 | 4eec51dc4a217d5ba6a9784b4cc52f6f
Secunia Security Advisory 16472
Posted Aug 19, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Cisco Clean Access (CCA), which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
systems | cisco
MD5 | 16d8987ab93ccb0d43ea1b2c52ff0dfa
Secunia Security Advisory 16474
Posted Aug 19, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - NTA Monitor has reported a weakness in Juniper Netscreen VPN, which can be exploited by malicious people to gain knowledge of certain information.

tags | advisory
systems | juniper
MD5 | 5565fd7295ac7fb658b59a2b1f56df89
Secunia Security Advisory 16480
Posted Aug 19, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Visual Studio .NET, which potentially can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | ffe3890b0e721decf0675bbb85776302
Secunia Security Advisory 16490
Posted Aug 19, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - matrix_killer has discovered some vulnerabilities in PHPFreeNews, which can be exploited by malicious people to conduct SQL injection and cross-site scripting vulnerabilities.

tags | advisory, vulnerability, xss, sql injection
MD5 | 27d232529474ee6fda01d84c9c45e7e6
Secunia Security Advisory 16491
Posted Aug 19, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in MailWatch for MailScanner, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | 77d6c87b5984b2a5afc2114ea3472cf6
Secunia Security Advisory 16492
Posted Aug 19, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Filip Groszynski has discovered a vulnerability in PHPTB, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | bef7237890c4a5204cade89dc4fcbc15
Secunia Security Advisory 16493
Posted Aug 19, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Cedric Tissieres has reported a vulnerability in MediaBox404, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
MD5 | 0ff9e9b98293345abe83bf54788c9e5d
Secunia Security Advisory 16495
Posted Aug 19, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - UnixWare has issued an update for cpio. This fixes a vulnerability, which can be exploited by malicious people to cause files to be unpacked to arbitrary locations on a user's system.

tags | advisory, arbitrary
systems | unixware
MD5 | 9ce591f4e0a5df31806e03dd15d37ac2
Page 1 of 1
Back1Next

File Archive:

April 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    21 Files
  • 2
    Apr 2nd
    35 Files
  • 3
    Apr 3rd
    21 Files
  • 4
    Apr 4th
    16 Files
  • 5
    Apr 5th
    15 Files
  • 6
    Apr 6th
    1 Files
  • 7
    Apr 7th
    2 Files
  • 8
    Apr 8th
    23 Files
  • 9
    Apr 9th
    19 Files
  • 10
    Apr 10th
    15 Files
  • 11
    Apr 11th
    14 Files
  • 12
    Apr 12th
    11 Files
  • 13
    Apr 13th
    2 Files
  • 14
    Apr 14th
    5 Files
  • 15
    Apr 15th
    14 Files
  • 16
    Apr 16th
    19 Files
  • 17
    Apr 17th
    19 Files
  • 18
    Apr 18th
    8 Files
  • 19
    Apr 19th
    4 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close