what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 762 RSS Feed

Files Date: 2006-01-01 to 2006-01-31

Posted Jan 30, 2006
Authored by ATmaCA | Site atmacasoft.com

Winamp versions 5.12 and below remote buffer overflow universal exploit that makes use of the PLS file handing buffer overflow flaw.

tags | exploit, remote, overflow
SHA-256 | da39fb74316372b26791276c6d55da9f1eb0f5ea23213bbbf6a3cf15301ee5db
Posted Jan 30, 2006
Authored by Pasv

Cisco Aironet wireless access point ARP replies remote denial of service exploit. Takes advantage of the flaw originally discovered by Eric Smith.

tags | exploit, remote, denial of service
systems | cisco
SHA-256 | b17826ff1372241f7c5dd19ac37d536c1e6b60c8feb6a1cbd15c76477bfd0310
Nmap Scanning Utility 3.9999
Posted Jan 30, 2006
Authored by Fyodor | Site insecure.org

Nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). Nmap supports Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments (bypasses some packet filters), TCP ACK and Window scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping scanning, Direct (non portmapper) RPC scanning, Remote OS Identification by TCP/IP Fingerprinting, and Reverse-ident scanning. Nmap also supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings. Full changelog available here.

Changes: Generated a new libpcre/configure to cope with changes in LibPCRE 6.4. Various other enhancements.
tags | tool, remote, udp, tcp, protocol, nmap
systems | unix
SHA-256 | 8f6950d721fcc1e39c08e8dec358596029456a4cc955d18ec22938688b21cc6a
Scapy Packet Manipulation Tool 1.0.3
Posted Jan 30, 2006
Authored by Philippe Biondi | Site secdev.org

Scapy is a powerful interactive packet manipulation tool, packet generator, network scanner, network discovery tool, and packet sniffer. It provides classes to interactively create packets or sets of packets, manipulate them, send them over the wire, sniff other packets from the wire, match answers and replies, and more. Interaction is provided by the Python interpreter, so Python programming structures can be used (such as variables, loops, and functions). Report modules are possible and easy to make. It is intended to do the same things as ttlscan, nmap, hping, queso, p0f, xprobe, arping, arp-sk, arpspoof, firewalk, irpas, tethereal, tcpdump, etc.

Changes: See changelog.
tags | tool, scanner, python
systems | unix
SHA-256 | f7f5626cafe4354a298937de65107260b67668c21706361913b2db99d08ce458
Posted Jan 30, 2006
Authored by Solar Designer | Site openwall.com

John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, and BeOS. Its primary purpose is to detect weak Unix passwords, but a number of other hash types are supported as well.

tags | cracker
systems | windows, unix, beos
SHA-256 | 5fc569c95bcef92522f9cd81cdda01fcfabc4c2f226197ba108fa7fd5af07f3d
Posted Jan 30, 2006
Authored by Markus Fraczek | Site mpscan.sourceforge.net

mpscan is a parallel network scanner that checks for open ports. It uses select() to increase its speed and was designed for rapidly scanning large networks, but also works with a single IP.

tags | tool, scanner
systems | unix
SHA-256 | a3beaf6671c94ba672b6c9be285a7c464e624e7ede8ffaa5e2e457fa7a0f3bda
Posted Jan 30, 2006
Authored by Dianne Skoll | Site mimedefang.org

MIMEDefang is a flexible MIME email scanner designed to protect Windows clients from viruses. Includes the ability to do many other kinds of mail processing, such as replacing parts of messages with URLs. It can alter or delete various parts of a MIME message according to a very flexible configuration file. It can also bounce messages with unacceptable attachments. MIMEDefang works with Sendmail 8.11/8.12's new "Milter" API, which makes it more flexible and efficient than procmail-based approaches.

Changes: Added -R option.
systems | windows, unix
SHA-256 | ca3588e4b0ca7c4525f449078aa9b21c880c76783465fed4844451386a54f3fd
Posted Jan 30, 2006
Site opensc-project.org

OpenSC consists of a SmartCard library that uses any common transport API (e.g. PC/SC, CT-API, OpenCT) as its backend and applications that use the library. It has been tested extensively on Finnish Electronic Identity (FINEID) cards, but a number of other PKCS #15 and ISO 7816 compatible cards work too. Also implemented are a PKCS #11 module (e.g. for Mozilla Web/email usage), a PAM module, somewhat working OpenSSH support, an OpenSSL engine, a few basic tools, and a PKCS #15 structure generation tool for supported cards.

Changes: Various improvements. Check changelog for more info.
tags | web, library
SHA-256 | 0dfb546fd9a8c3fea3d65d710f5c780825ad8b52cd6b1fdc6f1cf54eb7e9503a
strongSwan IPsec / IKEv1 / IKEv2 Implementation For Linux
Posted Jan 30, 2006
Authored by Andreas Steffen | Site strongswan.org

strongSwan is a complete IPsec and IKEv1 implementation for Linux 2.4 and 2.6 kernels. It interoperates with most other IPsec-based VPN products. It is a descendant of the discontinued FreeS/WAN project. The focus of the strongSwan project is on strong authentication mechanisms using X.509 public key certificates and optional secure storage of private keys on smartcards through a standardized PKCS#11 interface. A unique feature is the use of X.509 attribute certificates to implement advanced access control schemes based on group memberships.

Changes: ipsec starter now supports the also parameter which allows a modular structure of the connection definitions.
tags | kernel, encryption
systems | linux
SHA-256 | a531094db27558ef8e75984548612ded4fb0a261b8591a3f91185a1ed2844399
Posted Jan 30, 2006
Authored by Eric des Courtis

Simple utility that allows a user to switch applications while keeping a TCP connection established.

tags | tool, tcp
systems | unix
SHA-256 | a0c182bcd496f827d938424a3fac78ce510a38178ebc89fa5b9559c6a4ef10a9
Gentoo Linux Security Advisory 200601-15
Posted Jan 30, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200601-15 - Andrew Christensen discovered that in older versions of Paros the database component HSQLDB is installed with an empty password for the database administrator sa. Versions less than or equal to 3.2.5 are affected.

tags | advisory
systems | linux, gentoo
SHA-256 | 872f21d9d135884bad3393b867af39b9e71bfca1f5d2f1edcdb2b44e8329b03d
Gentoo Linux Security Advisory 200601-14
Posted Jan 30, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200601-14 - Michael Jennings discovered an exploitable buffer overflow in the configuration engine of LibAST. Versions less than 0.7 are affected.

tags | advisory, overflow
systems | linux, gentoo
SHA-256 | 6f389af4b0b1137bc30a424b2e0a3668b49c50e0fa1ac4a67aa39e45af48e512
Posted Jan 30, 2006
Authored by Michal Zalewski | Site lcamtuf.coredump.cx

Whitepaper discussing three fairly interesting flaws in how HTTP cookies were designed and later implemented in various browsers.

tags | paper, web
SHA-256 | d849035a1f06e3a9cad55a9295d2a7c43b7d6123119210ab738c87baad77219b
Posted Jan 30, 2006
Authored by MoHaJaLi

The file hosting company rapidshare.de suffers from cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | bd92187f385cdf9689b10bb4b8e8bea8324006a843561d8b1fd5cc608f5d4001
Posted Jan 29, 2006
Site gleg.net

Multiple vulnerabilities in the LDAP component of CommuniGate Pro Server version 5.0.6 have been uncovered.

tags | advisory, vulnerability
SHA-256 | c122b73e3f2aa436f247e447fbdaab96d30da06836b9880f9e41cca5aa1015ed
Posted Jan 29, 2006
Authored by van Hauser, thc | Site thc.org

THC-Hydra is a high quality parallelized login hacker for Samba, Smbnt, Cisco AAA, FTP, POP3, IMAP, Telnet, HTTP Auth, LDAP, NNTP, MySQL, VNC, ICQ, Socks5, PCNFS, Cisco and more. Includes SSL support, parallel scans, and is part of Nessus.

Changes: Fix for the ssh2 module. VMWare-Auth module added.
tags | web, imap
systems | cisco
SHA-256 | a3793901ab06ebc896a9cb28db9a4da122515151f2227f4e16921d446a5cffe2
Posted Jan 29, 2006
Authored by tracewar

VP-ASP Shopping Cart version 5.50 is susceptible to SQL injection attacks.

tags | exploit, sql injection, asp
SHA-256 | 332f445af6a6c5c47f068cb8d8c03ed007441924b9c1604249e696ad8d996b1f
Posted Jan 29, 2006
Authored by prdelka | Site prdelka.blackart.org.uk

Score is an interactive shellcode that allows a user to work further with an exploited process. Designed for exploitation of Linux systems on x86.

tags | x86, shellcode
systems | linux
SHA-256 | f04cd91c321cff6cb5956c5d32f4877b06ebe3f28072ee5e9bf0708794928df0
Debian Linux Security Advisory 958-1
Posted Jan 29, 2006
Authored by Debian | Site debian.org

Debian Security Advisory DSA 958-1 - Several security related problems have been discovered in Drupal. Several cross-site scripting vulnerabilities allow remote attackers to inject arbitrary web script or HTML. When running on PHP5, Drupal does not correctly enforce user privileges, which allows remote attackers to bypass the 'access user profiles' permission. An interpretation conflict allows remote authenticated users to inject arbitrary web script or HTML via HTML in a file with a GIF or JPEG file extension.

tags | advisory, remote, web, arbitrary, vulnerability, xss
systems | linux, debian
advisories | CVE-2005-3973, CVE-2005-3974, CVE-2005-3975
SHA-256 | 6617ce3617d2df0765157c99bbfed6ac6846cdb4e42aa4be13ef98569b0ff189
Posted Jan 29, 2006
Authored by Ken Williams | Site supportconnect.ca.com

The CA iGateway common component, which is included with several CA products for UNIX/Linux/Windows platforms, contains a buffer overflow vulnerability that can allow arbitrary code to be executed remotely with SYSTEM privileges on Windows, and cause iGateway component failure on UNIX and Linux platforms.

tags | advisory, overflow, arbitrary
systems | linux, windows, unix
SHA-256 | 8409e14595803164e947c37dd2dfbb346cd4de292b503ce34d26b1d3bf7dc40d
Posted Jan 29, 2006
Authored by iM4n | Site imanonline.com

ASPThai Forums version 8.0 and below suffer from a SQL injection vulnerability.

tags | exploit, sql injection
SHA-256 | 93276453d3b2b676be84804ca850ae7bc84529e3932139ea4d06dc2ecdb516da
Posted Jan 29, 2006
Authored by Esteban Martinez Fayo | Site argeniss.com

Oracle 10g Release 1 exploit for the GENERATESCHEMA buffer overflow with shellcode that creates a file named Unbreakable.txt.

tags | exploit, overflow, shellcode
SHA-256 | 8dcd96b32a3ae1a3fe4c1eab28829ac25e5c1eadd36797cb4a889d49c78de7f6
Posted Jan 29, 2006
Authored by Esteban Martinez Fayo | Site argeniss.com

Argeniss Security Advisory - Oracle Database Server provides the DBMS_XMLSCHEMA and DBMS_XMLSCHEMA_INT Packages that include procedures to register and delete XML schemas. These packages contain the public procedures GENERATESCHEMA and GENERATESCHEMAS that are vulnerable to buffer overflow attacks.

tags | advisory, overflow
SHA-256 | 367ed9eab6261d53ec2bfcaf1f65901f75fa8a8fa1f0d9139fb4c8389da1b9d7
Posted Jan 29, 2006
Site whitedust.net

A severe problem with the way browsers translate the soft-hyphen (alt + 0173) character has been brought to light which malicious users could utilise alongside a multitude of injection methods as a way to gain unauthorized access and or to spoof content on websites. Both Microsoft Internet Explorer and Mozilla Firefox are affected.

tags | advisory, spoof
SHA-256 | d09b0df55ff9047753e2601a5303cfff7be219ab1bd6e4197197029d5cb00843
Posted Jan 29, 2006
Authored by Endrazine

Windows DOS emulation allows dumping of the first 1 Mo of RAM with no particular privileges needed. asm code that demonstrates this is included.

tags | exploit
systems | windows
SHA-256 | aceb62ce144c71dd62228f743981f71247e409a1a283eb1c7c67042ed629b498
Page 1 of 31

File Archive:

July 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    52 Files
  • 2
    Jul 2nd
    0 Files
  • 3
    Jul 3rd
    0 Files
  • 4
    Jul 4th
    11 Files
  • 5
    Jul 5th
    8 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    0 Files
  • 9
    Jul 9th
    0 Files
  • 10
    Jul 10th
    0 Files
  • 11
    Jul 11th
    0 Files
  • 12
    Jul 12th
    0 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By