exploit the possibilities
Showing 1 - 20 of 20 RSS Feed

Files Date: 2005-09-26

TOR Virtual Network Tunneling Tool 0.1.0.15
Posted Sep 26, 2005
Authored by Roger Dingledine | Site tor.eff.org

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).

Changes: Various bug fixes.
tags | tool, remote, local, peer2peer
MD5 | b2f1002da96ebfbfac7edf2272733967
disftpsc-0.1.tar.bz2
Posted Sep 26, 2005
Authored by Piotr Sobolewski | Site rozrywka.jawsieci.pl

disftpsc is a tool that makes use of FTP bounce and each port of the target machine is scanned using another FTP proxy.

tags | tool, scanner
systems | unix
MD5 | f78723894504462d337d22c51a8df6ef
mtaboom.zip
Posted Sep 26, 2005
Authored by Luigi Auriemma | Site aluigi.altervista.org

Proof of concept exploit for MultiTheftAuto versions 0.5 patch 1 and below. This causes Windows to crash.

tags | exploit, proof of concept
systems | windows
MD5 | 99976b5912749ccd7466e53d66e16d27
mtaboom.txt
Posted Sep 26, 2005
Authored by Luigi Auriemma | Site aluigi.altervista.org

MultiTheftAuto versions 0.5 patch 1 and below allow anyone to modify the motd and cause a crash in Windows.

tags | advisory
systems | windows
MD5 | dc66e81c931325d1b0a9188baa1cc4b3
Ubuntu Security Notice 187-1
Posted Sep 26, 2005
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice USN-187-1 - A Denial of Service vulnerability was detected in the stack segment fault handler. A local attacker could exploit this by causing stack fault exceptions under special circumstances (scheduling), which lead to a kernel crash. Vasiliy Averin discovered a Denial of Service vulnerability in the tiocgdev ioctl call and in the routing_ioctl function. By calling fget() and fput() in special ways, a local attacker could exploit this to destroy file descriptor structures and crash the kernel.

tags | advisory, denial of service, kernel, local
systems | linux, ubuntu
advisories | CVE-2005-3044, CVE-2005-1767
MD5 | 9c94e14baa10340a55a28a2b68688221
contentServ.txt
Posted Sep 26, 2005
Authored by qobaiashi

The ContentServ CMS allows for remote file disclosure. Exploitation details provided.

tags | exploit, remote
MD5 | 932b8ac4713feab27795b6e0420a24f4
poppassd-lnx.sh.txt
Posted Sep 26, 2005
Authored by Kingcope

Linux Qpopper poppassd latest version local root exploit.

tags | exploit, local, root
systems | linux
MD5 | 880ae69daa8a80e3e1fce451afcb85f6
poppassd-freebsd.sh.txt
Posted Sep 26, 2005
Authored by Kingcope

FreeBSD Qpopper poppassd latest version local root exploit. Tested on FreeBSD 5.4-RELEASE.

tags | exploit, local, root
systems | freebsd
MD5 | 162efe574682e6d657e6b9d1c60362f7
wzdftpdwarez.pl.txt
Posted Sep 26, 2005
Authored by Kingcope

WzdFTPd versions 0.5.4 and below remote command execution exploit.

tags | exploit, remote
MD5 | 053667191211ded156b69fabd6c0f93c
xmlhttpRequestpaper.txt
Posted Sep 26, 2005
Authored by Amit Klein

Whitepaper entitled "Exploiting the XmlHttpRequest object in IE - Referrer spoofing, and a lot more."

tags | paper, spoof
MD5 | b35c1b9ca1f4d300051b8c530d0e19d0
GeSHi.txt
Posted Sep 26, 2005
Authored by Maksymilian Arciemowicz | Site securityreason.com

GeSHi version 1.0.72 is susceptible to a local file inclusion vulnerability.

tags | exploit, local, file inclusion
MD5 | f1aa4004e9b285d93d41b03809a4bab1
adv7.pdf
Posted Sep 26, 2005
Authored by Ilja van Sprundel | Site suresec.org

Suresec Security Advisory - The malloc() function on Mac OS X insecurely trusts a debug variable, regardless of the fact that the calling application may be suid root. This can result in an arbitrary file being overwritten, which can be used to escalate privileges.

tags | advisory, arbitrary, root
systems | apple, osx
advisories | CVE-2005-2748
MD5 | 071d0bc06fad795fdcaab89bb6bc1613
cmsXSS.txt
Posted Sep 26, 2005
Authored by X1ngBox

CMS Made Simple 0.10 is susceptible to a cross site scripting attack.

tags | exploit, xss
MD5 | af9cd509dd4e0c9de4f5b49ce90ecd54
FiTechSummit_final_paper.pdf
Posted Sep 26, 2005
Authored by Kenneth F. Belva | Site ftusecurity.com

This presentation was given by the keynote speaker at the FiTech Summit 2005. It is entitled "How It's Difficult to Ruin a Good Name: An Analysis of Reputational Risk".

tags | paper
MD5 | 5131f07bb7a4df687b2eb4106ce4c174
bilbo-0.12.tar.gz
Posted Sep 26, 2005
Authored by Bart Somers | Site doornenburg.homelinux.net

Bilbo is a wrapper for nmap which makes it easier to scan lots of machines or networks.

Changes: Bilbo now takes command-line options, instead off hacking in the header, which makes it easier to control. Code clean up has also been performed.
tags | tool, nmap
systems | unix
MD5 | b12b3cd0ae2498c65837da00210c7999
maildisgust.txt
Posted Sep 26, 2005
Authored by rgod | Site retrogod.altervista.org

MailGust 1.9 is vulnerable to a SQL injection attack that allows for board takeover. Exploit provided.

tags | exploit, sql injection
MD5 | 2af5368ea3e4eb646f7368060ac87c62
efriends.txt
Posted Sep 26, 2005
Authored by khc

AlstraSoft E-Friends is susceptible to a remote command execution flaw. Details provided.

tags | exploit, remote
MD5 | c44bd751fc3d504fe3d73034311b7bad
Gentoo Linux Security Advisory 200509-17
Posted Sep 26, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200509-17 - Keigo Yamazaki discovered that the miniserv.pl webserver, used in both Webmin and Usermin, does not properly validate authentication credentials before sending them to the PAM (Pluggable Authentication Modules) authentication process. The default configuration shipped with Gentoo does not enable the full PAM conversations option and is therefore unaffected by this flaw. Versions less than 1.230 are affected.

tags | advisory
systems | linux, gentoo
advisories | CVE-2005-3042
MD5 | 9f4155c087134998b1aa090f84c04a34
Gentoo Linux Security Advisory 200509-16
Posted Sep 26, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200509-16 - Mantis fails to properly sanitize untrusted input before using it. This leads to an SQL injection and several cross-site scripting vulnerabilities. Versions less than 0.19.2 are affected.

tags | advisory, vulnerability, xss, sql injection
systems | linux, gentoo
advisories | CVE-2005-2556, CVE-2005-2557
MD5 | 8b81d09a956f71cfa432d989bf303cc2
Debian Linux Security Advisory 820-1
Posted Sep 26, 2005
Authored by Debian | Site debian.org

Debian Security Advisory DSA 820-1 - Jakob Balle discovered that with Conditional Comments in Internet Explorer it is possible to hide javascript code in comments that will be executed when the browser views a malicious email via sqwebmail. Successful exploitation requires that the user is using Internet Explorer.

tags | advisory, javascript
systems | linux, debian
advisories | CVE-2005-2820
MD5 | 4961f30f93557783466ddb8c6951b8d5
Page 1 of 1
Back1Next

File Archive:

June 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    1 Files
  • 2
    Jun 2nd
    2 Files
  • 3
    Jun 3rd
    19 Files
  • 4
    Jun 4th
    21 Files
  • 5
    Jun 5th
    15 Files
  • 6
    Jun 6th
    12 Files
  • 7
    Jun 7th
    11 Files
  • 8
    Jun 8th
    1 Files
  • 9
    Jun 9th
    1 Files
  • 10
    Jun 10th
    15 Files
  • 11
    Jun 11th
    15 Files
  • 12
    Jun 12th
    15 Files
  • 13
    Jun 13th
    8 Files
  • 14
    Jun 14th
    16 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    0 Files
  • 18
    Jun 18th
    0 Files
  • 19
    Jun 19th
    0 Files
  • 20
    Jun 20th
    0 Files
  • 21
    Jun 21st
    0 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close