exploit the possibilities
Showing 1 - 25 of 88 RSS Feed

Files Date: 2005-10-26

magicByte.txt
Posted Oct 26, 2005
Authored by Andrey Bayora | Site securityelf.org

Multiple AV software vendors suffer from an evasion vulnerability through a forged magic byte.

tags | advisory
MD5 | 6156fc9c6e798ec23d38e0223ae580b5
Debian Linux Security Advisory 870-1
Posted Oct 26, 2005
Authored by Debian | Site security.debian.org

Debian Security Advisory DSA 870-1 - Tavis Ormandy noticed that sudo, a program that provides limited super user privileges to specific users, does not clean the environment sufficiently. The SHELLOPTS and PS4 variables are dangerous and are still passed through to the program running as privileged user. This can result in the execution of arbitrary commands as privileged user when a bash script is executed. These vulnerabilities can only be exploited by users who have been granted limited super user privileges.

tags | advisory, arbitrary, vulnerability, bash
systems | linux, debian
MD5 | 0b1e1580180ca271afd1ca1d778577e2
Debian Linux Security Advisory 872-1
Posted Oct 26, 2005
Authored by Debian | Site security.debian.org

Debian Security Advisory DSA 872-1 - Chris Evans discovered a buffer overflow in the RTF importer of kword, a word processor for the KDE Office Suite that can lead to the execution of arbitrary code.

tags | advisory, overflow, arbitrary
systems | linux, debian
MD5 | c333764333948fc9f43f8b53414ae981
Debian Linux Security Advisory 548-2
Posted Oct 26, 2005
Authored by Debian | Site security.debian.org

Debian Security Advisory DSA 548-2 - Marcus Meissner discovered a heap overflow error in imlib, an imaging library for X and X11, that could be abused by an attacker to execute arbitrary code on the victims machine. The updated packages we have provided in DSA 548-1 did not seem to be sufficient, which should be fixed by this update.

tags | advisory, overflow, arbitrary
systems | linux, debian
MD5 | 306772e216014e9f61f1153079172fc7
Debian Linux Security Advisory 871-2
Posted Oct 26, 2005
Authored by Debian | Site security.debian.org

Debian Security Advisory DSA 871-2 - Steve Kemp discovered two format string vulnerabilities in libgda2, the GNOME Data Access library for GNOME2, which may lead to the execution of arbitrary code in programs that use this library.

tags | advisory, arbitrary, vulnerability
systems | linux, debian
MD5 | 68177bea0a6260a20647a679889837d6
Debian Linux Security Advisory 871-1
Posted Oct 26, 2005
Authored by Debian | Site security.debian.org

Debian Security Advisory DSA 871-1 - Steve Kemp discovered two format string vulnerabilities in libgda2, the GNOME Data Access library for GNOME2, which may lead to the execution of arbitrary code in programs that use this library.

tags | advisory, arbitrary, vulnerability
systems | linux, debian
MD5 | f158e2c49c7df8beb7aa3c6fc1a26697
iDEFENSE Security Advisory 2005-10-24.3
Posted Oct 26, 2005
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 10.24.05 - Local exploitation of a buffer overflow vulnerability in the ppp binary, as included in multiple versions of The SCO Group Inc.'s Unixware, allows attackers to gain root privileges.

tags | advisory, overflow, local, root
systems | unixware
MD5 | 640c9c15d3ceddc23f8d2563508b9f97
iDEFENSE Security Advisory 2005-10-24.2
Posted Oct 26, 2005
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 10.24.05 - Local exploitation of a buffer overflow vulnerability in The SCO Group Inc.'s Openserver operating system could allow an attacker to gain root privileges.

tags | advisory, overflow, local, root
MD5 | 63d763cb7e1af7e3c4bc14a8e3815e10
iDEFENSE Security Advisory 2005-10-24.1
Posted Oct 26, 2005
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 10.24.05 - Local exploitation of a buffer overflow vulnerability in The SCO Group Inc.'s Openserver operating system could allow an attacker to gain access to the backup group.

tags | advisory, overflow, local
MD5 | 98a57c44aea2430ad8d9aaa18e579498
HP Security Bulletin 2005-10.55
Posted Oct 26, 2005
Authored by Hewlett Packard | Site h30046.www3.hp.com

HP SECURITY BULLETIN HPSBMA01235 - Oracle(R) has issued a Critical Patch Update which contains solutions for a number of potential security vulnerabilities. These vulnerabilities may be exploited locally or remotely to compromise the confidentiality, availability or integrity of Oracle for OpenView (OfO).

tags | advisory, vulnerability
MD5 | 3dfcdc29c108413fb4d085f1d4988c66
saphpLesson.txt
Posted Oct 26, 2005
Authored by aLMaSTeR

saphp Lesson is vulnerable to SQL injection. Exploitation provided.

tags | advisory, sql injection
MD5 | db3b0a9cb6db15a940fc0325e552b73a
dcp-portalv6.txt
Posted Oct 26, 2005
Authored by alex from aleksanet

DCP Portal versions less than or equal to v6 are vulnerable to SQL injection and XSS attacks.

tags | advisory, sql injection
MD5 | 83358b82fd82da5d3f9cc61a872720f4
nklan.pl
Posted Oct 26, 2005
Authored by papipsycho

Nuked klan 1.7: Remote Exploit.

tags | exploit, remote
MD5 | ac98f39d40e290013cbbb559c6fa2854
SUSE-SA-2005-062.txt
Posted Oct 26, 2005
Site suse.com

SUSE Security Announcement - information disclosure via permissions package.

tags | advisory, info disclosure
systems | linux, suse
MD5 | 14c97bf4b1a5df996de733d6335193d5
Trustix Secure Linux Security Advisory 2005.59
Posted Oct 26, 2005
Authored by Trustix | Site http.trustix.org

Trustix Secure Linux Security Advisory #2005-0059 - Multiple vulnerabilities in apache, lynx, mod_php4, openssl, php4, php, squid, texinfo, and wget.

tags | advisory, php, vulnerability
systems | linux
MD5 | 62a84bf361e6d1206e0dc38321a95056
php.4.4.1.txt
Posted Oct 26, 2005
Authored by Eric Romang | Site zataz.com

php version 4.4.1 .htaccess apache DOS exploit.

tags | exploit, php
MD5 | 260ebaf862ca70c620a9d4ceb5df872c
phpnuke78sql.txt
Posted Oct 26, 2005
Authored by rgod | Site retrogod.altervista.org

PHPNuke 7.8 SQL INjection and remote commands execution poc exploit.

tags | exploit, remote, sql injection
MD5 | 8ba2cc7bd2edf2b2699106975a371fa0
punbb-1.1.2.txt
Posted Oct 26, 2005
Authored by rod hedor | Site lezr.com

PunBB versions between 1.1.2 and 1.1.5 suffer from a remote file inclusion vulnerability.

tags | exploit, remote, file inclusion
MD5 | 2da4b4cc5fb86883e47233374bb472e3
msn-cap.c
Posted Oct 26, 2005
Authored by Gabriel Menezes Nunes | Site dragonf.v10.com.br

A simple libpcap based MSN protocol sniffer.

tags | tool, sniffer, protocol
MD5 | 900be0beea498b18f03e2d67656d9d32
cb4n6.c
Posted Oct 26, 2005
Authored by rotor | Site c1zc0.com

This is a ipv6 banner grabber by c1zc0 Security

systems | cisco
MD5 | 64a6b14eb310e9d6411f70b649081612
c1zc0-mgx.pl
Posted Oct 26, 2005
Authored by rotor | Site c1zc0.com

This is a basic cisco mgx scanner that scans for default passwords.

systems | cisco
MD5 | 2b21758183c68db36649bc33d0c73c9e
qcrack-v0.2.tgz
Posted Oct 26, 2005
Authored by Q nix | Site 0x11.org

Qcrack is a program written to test the security of md5 passwords by attempting to brute force them. The user can also specify the characters to use when brute-forcing.

Changes: Added md2 & md4 brute force, Added md2 & md4 verbose & quite mode, Added md2 & md4 calculator
tags | cracker
MD5 | a45b9d996a01450b1384ddbb0e0ec2ca
flatnuke.txt
Posted Oct 26, 2005
Authored by Abducter

Flatnuke suffers from file inclusion vulnerabilities and XSS

tags | exploit, vulnerability, file inclusion
MD5 | 7bb0f39a1f5edc226c30a03c9ae1893a
AL-Caricatier.txt
Posted Oct 26, 2005
Authored by MoHaJaLi

AL-Caricatier suffers from a login bypass vulnerability.

tags | exploit, bypass
MD5 | a3414aac20e3cc2f75a00ed591e0bc37
162005.txt
Posted Oct 26, 2005
Authored by Stefan Esser | Site hardened-php.net

Hardened-PHP Project Security Advisory - And audit of phpMyAdmin revealed a design flaw in the way phpMyAdmin includes it's register_globals compatibility layer, that allows inclusion of arbitrary local files, which usually leads to remote code execution.

tags | advisory, remote, arbitrary, local, php, code execution
MD5 | 4235c84230ae57cb8ff4cb921fe3a668
Page 1 of 4
Back1234Next

File Archive:

October 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    25 Files
  • 2
    Oct 2nd
    13 Files
  • 3
    Oct 3rd
    1 Files
  • 4
    Oct 4th
    1 Files
  • 5
    Oct 5th
    15 Files
  • 6
    Oct 6th
    15 Files
  • 7
    Oct 7th
    15 Files
  • 8
    Oct 8th
    11 Files
  • 9
    Oct 9th
    3 Files
  • 10
    Oct 10th
    1 Files
  • 11
    Oct 11th
    1 Files
  • 12
    Oct 12th
    8 Files
  • 13
    Oct 13th
    12 Files
  • 14
    Oct 14th
    23 Files
  • 15
    Oct 15th
    4 Files
  • 16
    Oct 16th
    13 Files
  • 17
    Oct 17th
    1 Files
  • 18
    Oct 18th
    1 Files
  • 19
    Oct 19th
    27 Files
  • 20
    Oct 20th
    41 Files
  • 21
    Oct 21st
    15 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close