what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 47 RSS Feed

Files Date: 2005-09-13

azdg.html
Posted Sep 13, 2005
Authored by rgod | Site retrogod.altervista.org

AzDGDatingLite version 2.1.3 suffers from a remote code execution flaw due to a directory traversal.

tags | exploit, remote, code execution
SHA-256 | 97556fbb2e367d70682acc839f014c8f2cc2cb37a9f76858a487910b1385d69a
Nmap Scanning Utility 3.93
Posted Sep 13, 2005
Authored by Fyodor | Site insecure.org

Nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). Nmap supports Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments (bypasses some packet filters), TCP ACK and Window scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping scanning, Direct (non portmapper) RPC scanning, Remote OS Identification by TCP/IP Fingerprinting, and Reverse-ident scanning. Nmap also supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings. Full changelog available here.

Changes: Modified Libpcap's configure.ac to compile with the --fno-strict-aliasing option if gcc 4.X is used. Patched libdnet to include sys/uio.h in src/tun-linux.c. Fixed a crash which could occur when a ridiculously short --host_timeout was specified on Windows (or on UNIX if --send_eth was specified). Nmap now also prints a warning if you specify a host_timeout of less than 1 second.
tags | tool, remote, udp, tcp, protocol, nmap
systems | unix
SHA-256 | fdd695ed646ba03890abf55e57c52fe65df0144d354c80352574a5c83adfe5cc
airfinder.tar.gz
Posted Sep 13, 2005
Authored by tdotreppe | Site wifi-security.be

Airfinder is a simple Linux program written to help locate a specific wireless MAC address.

tags | tool, wireless
systems | linux
SHA-256 | 385a8138d7669f4b728acc8837a144a14b443211f3f843935cdd729a252adb1c
openct-0.6.6.tar.gz
Posted Sep 13, 2005
Authored by Andreas Jellinghaus | Site opensc-project.org

OpenCT is a library for accessing smart card terminals. It provides a rich set of functions for driver writers, protocol drivers for T=0 and T=1, serial and USB functionality, including USB hotplugging. The main user of OpenCT is the OpenSC smart card framework, but OpenCT can of course be used by other applications as well. OpenCT provides a native OpenCT, CT-API and PC/SC Lite IFD interface with an OpenCT ifdhandler resource manager.

tags | protocol, library
SHA-256 | 73b57ac842a30b40507de2e2cad20efb84fcaf3aae49823dd96f2eaaec54132c
valhalasource.zip
Posted Sep 13, 2005
Authored by Marcos Flavio | Site sourceforge.net

Valhala Honeypot is a simple and easy-to-use honeypot for Windows. It provides servers like ftp, finger, telnet, smtp, etc.

systems | windows
SHA-256 | 75d30e8c33a80f66ae44b0f1f6d3fb8d70f9803ef7578c3d3e4827af2673b5ab
cirt-36-advisory.pdf
Posted Sep 13, 2005
Authored by Dennis Rand | Site cirt.dk

CIRT Advisory - Ipswitch Whatsup small Business 2004 suffers from a source code disclosure flaw.

tags | advisory
SHA-256 | 2a4a3eeff68c3411a3722811eefd0cd686d1571e0dc6357ac69038b0d5b0f5d0
cirt-35-advisory.pdf
Posted Sep 13, 2005
Authored by Dennis Rand | Site cirt.dk

CIRT Advisory - Ipswitch Whatsup Gold 8.04 is susceptible to a cross site scripting attack.

tags | advisory, xss
SHA-256 | 25c3c63923c1717774536bee62236cd9d948ab3e6e782fc3aa7fd852809595bd
cirt-34-advisory.pdf
Posted Sep 13, 2005
Authored by Dennis Rand | Site cirt.dk

CIRT Advisory - Ipswitch Whatsup Gold 8.04 suffers from a vulnerability where access is allowed to the source code of all files.

tags | advisory
SHA-256 | dee853136bfeb67555671bd11ba86523606228c30de1e0f44b322b931fc25069
distorm64.zip
Posted Sep 13, 2005
Authored by Gil Dabah | Site ragestorm.net

diStorm is a binary stream disassembler. It's capable of disassembling 80x86 instructions in 64 bits (AMD64, x86-64) and both in 16 and 32 bits. In addition, it disassembles FPU, MMX, SSE, SSE2, SSE3 and 3DNow! (w/ extensions) and new x86-64 instruction sets. diStorm was written to decode every instruction as accurately as possible. Robust decoding, while taking special care for valid or unused prefixes, is what makes this disassembler powerful, especially for research. Another benefit that might come in handy is that the module was written as multi-threaded, which means you could disassemble several streams or more simultaneously.

tags | x86, library
SHA-256 | bd785497e0466296f83fa4aa1d81e5e1eac3e326bc73e47146593b00a62513ff
filezilla-pwdump.zip
Posted Sep 13, 2005
Authored by pagvac aka Adrian Pastor | Site adrianpv.com

FileZilla PWDump is a utility that dumps all FileZilla (client) credentials from the Windows Registry and decrypts the passwords. It should work on FileZilla client versions 2.2.15 and below.

tags | cracker, registry
systems | windows
SHA-256 | 378cdb61ac64bab86c3b4b5f3b05feeeeef81ebecf16a82d019521a2621361cd
tapion_pack01b.zip
Posted Sep 13, 2005
Authored by Piotr Bania | Site pb.specialised.info

The TAPiON engine is a polymorphic shellcode system that can create unical decryptor, encrypt original data and decrypt it on the fly as code executes.

tags | shellcode
SHA-256 | 46e981124f029e6bff5e827c01a14fbe86a35f042e105eb57e2ab580f4216114
cjXSS.txt
Posted Sep 13, 2005
Authored by Psymera

CjTagBoard 3.0, CjLinkOut 1.0, and CjWeb2Mail 3.0 all suffer from an excessive amount of cross site scripting flaws. Example exploitation provided.

tags | exploit, xss
SHA-256 | 09bffe46fa6ea9c1306389f3c89327e686f6366679c3d0b248e1c39073d8b21f
umountFlaw.txt
Posted Sep 13, 2005
Authored by David Watson

The Linux umount command as provided in the util-linux package in versions 2.8 to 2.12q, 2.13-pre1 and 2.13-pre2, allows for bypass of the nosuid and nodev when a user uses the -r option.

tags | advisory
systems | linux
SHA-256 | 9536b7be9fa39bf6d7245bade27ac38d2b961b78e3a9de5e7aa119217548696f
Debian Linux Security Advisory 808-1
Posted Sep 13, 2005
Authored by Debian | Site debian.org

Debian Security Advisory DSA 808-1 - The tdiary Development Team has discovered a Cross-Site Request Forgery (CSRF) vulnerability in tdiary, a new generation weblog that can be exploited by remote attackers to alter the users information.

tags | advisory, remote, csrf
systems | linux, debian
advisories | CVE-2005-2411
SHA-256 | 93c9d838f5ce059d6e93fe0f4247fca9cb7ba89ea55716f3358a15eb76cc9ad9
PHPNuke78.txt
Posted Sep 13, 2005
Authored by onkel_fisch

PHPNuke 7.8 is susceptible to multiple SQL injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input before using it in SQL queries.

tags | exploit, vulnerability, sql injection
SHA-256 | f60b1657c0752301ded19d5dbdf7d4aabd1a7345e2e2808f012768746a7ffa35
Gentoo Linux Security Advisory 200509-8
Posted Sep 13, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200509-08 - The re Python module makes use of a private copy of libpcre which is subject to an integer overflow leading to a heap overflow (see GLSA 200508-17). Versions less than 2.3.5-r2 are affected.

tags | advisory, overflow, python
systems | linux, gentoo
advisories | CVE-2005-2491
SHA-256 | cc8050eb66c1eca66f2d198ae6eefa65b0f303f7ebd3c0ae896f494fc5a012cf
Gentoo Linux Security Advisory 200509-7
Posted Sep 13, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200509-07 - X.Org is missing an integer overflow check during pixmap memory allocation. Versions less than 6.8.2-r3 are affected.

tags | advisory, overflow
systems | linux, gentoo
advisories | CVE-2005-2495
SHA-256 | 892e492456e0e544ed9fe829ea0dc72e2ac3b084ace7dba2c4825cd81bcd518f
Debian Linux Security Advisory 807-1
Posted Sep 13, 2005
Authored by Debian | Site debian.org

Debian Security Advisory DSA 807-1 - A problem has been discovered in mod_ssl, which provides strong cryptography (HTTPS support) for Apache that allows remote attackers to bypass access restrictions.

tags | advisory, remote, web
systems | linux, debian
advisories | CVE-2005-2700
SHA-256 | 64c4fd269f6db8701f4f4fe549738e4f401dac7d4390012b1519e374c2461b6c
Ubuntu Security Notice 181-1
Posted Sep 13, 2005
Authored by Ubuntu, Martin Pitt | Site security.ubuntu.com

Ubuntu Security Notice USN-181-1 - Tom Ferris discovered a buffer overflow in the Mozilla products (Mozilla browser, Firefox, Thunderbird). By tricking an user to click on a Hyperlink with a specially crafted destination URL, a remote attacker could crash the application. It might even be possible to exploit this vulnerability to execute arbitrary code, but this has not yet been confirmed.

tags | advisory, remote, overflow, arbitrary
systems | linux, ubuntu
advisories | CVE-2005-2871
SHA-256 | 3b223821c2ce5a857a5b2f633896042c055216b8d5f8278366f84df4cab5d47f
Ubuntu Security Notice 182-1
Posted Sep 13, 2005
Authored by Ubuntu, Martin Pitt | Site security.ubuntu.com

Ubuntu Security Notice USN-182-1 - A local privilege escalation vulnerability has been discovered in the pixmap allocation handling of the X server. By allocating a huge pixmap, a local user could trigger an integer overflow that resulted in a memory allocation that was too small for the requested pixmap. This resulted in a buffer overflow which could eventually be exploited to execute arbitrary code with full root privileges.

tags | advisory, overflow, arbitrary, local, root
systems | linux, ubuntu
advisories | CVE-2005-2495
SHA-256 | df061683391f3f8fa82ddbd8ec3b3729ebd73d7587534f98ab8e2debcc7fff0d
pamperuser.txt
Posted Sep 13, 2005
Authored by Vijay Tandeker

There is a security flaw in the pam_per_user PAM module that can allow someone to authenticate as any user on the system, provided that they already have the proper credentials for one account. This security hole is fixed in pam_per_user-0.4.

tags | advisory
SHA-256 | c08068a5c22426bfdff9950f6f4e9a8f6e3d23754c84ed58d604bd3bbc34e155
snortrigger.c
Posted Sep 13, 2005
Authored by nitrous

Snort versions 2.4.0 and below remote proof of concept exploit that creates a malformed TCP/IP packet that will trigger a vulnerability in the PrintTcpOptions() function from log.c.

tags | exploit, remote, tcp, proof of concept
SHA-256 | 5cb6f490e8d8bdbbc7c4c7316ff20da370bf31d280b268795c2bb556ca899b9a
mailitnow.html
Posted Sep 13, 2005
Authored by rgod | Site retrogod.altervista.org

The contact.php code from Mail-it Now! version 1.5 is susceptible to a remote code execution flaw. Exploit included.

tags | exploit, remote, php, code execution
SHA-256 | 438c94c5c0d10165cdda769f9bdedf00736a08cc1f02479fc8011940fff08786
spymac-web-os-40-variable-xss.txt
Posted Sep 13, 2005
Authored by Lostmon

Spymac Web Os 4.0 is susceptible to cross site scripting attacks due to a lack of variable sanitization.

tags | exploit, web, xss
SHA-256 | 0680e9e980fd465ffff08943d784651f353f1a506461ba31c3acdc16803c3af6
firefoxIDN.txt
Posted Sep 13, 2005
Authored by SkyLined | Site edup.tudelft.nl

Research and development has led to a 90% reliable working exploit for the IDN Heap Buffer overrun in FireFox on WinXP and Win2k3 as long as DEP is turned off and JavaScript is enabled.

tags | advisory, overflow, javascript
systems | windows
SHA-256 | 58cfafa307dfccf01eda97c1848bac293eebcf18ec5734852be83abf76e17e11
Page 1 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close