Exploit the possiblities
Showing 1 - 25 of 42 RSS Feed

Files Date: 2006-02-22

tripp-alpha0.1.tar.gz
Posted Feb 22, 2006
Authored by poplix | Site tripp.dynalias.org

TRIPP is a utility to rewrite incoming and outgoing IP packets. Since it can rewrite both headers and payload, it can be used to configure the tcp/ip stack behavior in order to perform various tasks mainly intended for network tests, simulations and development.

tags | spoof, tcp
MD5 | 64fb10b1def8f0e6d9586a1c40c968a4
PHPNuke-Your_Account.txt
Posted Feb 22, 2006
Authored by sp3x | Site securityreason.com

PHPNuke version 7.8 "Your_Account" SQL injection exploit.

tags | exploit, sql injection
MD5 | 2a7cde876d2a3e35d794920dfbb5dcb8
genie_v13.zip
Posted Feb 22, 2006
Authored by prncipia | Site users.otenet.gr

Genie is a simple Telnet backdoor program that spawns on port 1179. Written for Windows 98/NT/XP. Version 1.3 Archive password is set to p4ssw0rd. Use at your own risk.

tags | trojan
systems | windows, 9x
MD5 | b9e8a14cd06aa8e40168f9a75d93ac24
dragonflycms9.0.6.1.txt
Posted Feb 22, 2006
Site lostmon.blogspot.com

dragonflycms 9.0.6.1 suffers from multiple XSS vulnerabilities.

tags | exploit, vulnerability
MD5 | 9cf3b9a2007b7801dba483ae5aa82dfa
Advisory-16.txt
Posted Feb 22, 2006
Authored by Paisterist | Site neosecurityteam.net

Invision Power Board 2.1.4 Multiple Full Path Disclosure Vulnerabilities.

tags | advisory, vulnerability
MD5 | 8e90337ff1f8286a3e838ee96d19f244
EV0073.txt
Posted Feb 22, 2006
Authored by Aliaksandr Hartsuyeu | Site evuln.com

Magic Downloads 1.1.3 allows untrusted users to make changes to config.php.

tags | exploit, php
MD5 | d5a391cbd20fe4750602836d4ea98074
EV0072.txt
Posted Feb 22, 2006
Authored by Aliaksandr Hartsuyeu | Site evuln.com

Reamday Enterprises Magic News Lite version 1.2.3 is vulnerable to remote code execution.

tags | exploit, remote, code execution
MD5 | 2d244d68e32852cd9e0c7a79b2925e18
EV0074.txt
Posted Feb 22, 2006
Authored by Aliaksandr Hartsuyeu | Site evuln.com

BirthSys 3.1 suffers from SQL injection.

tags | exploit, sql injection
MD5 | ada3e000fd0b7f44b73b741458622fdd
Mandriva Linux Security Advisory 2006.044
Posted Feb 22, 2006
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - A number of vulnerabilities have been discovered and corrected in the Linux 2.4 kernel.

tags | advisory, kernel, vulnerability
systems | linux, mandriva
MD5 | 62819356af6f80bbb22be6bfc17bea7b
Ubuntu Security Notice 255-1
Posted Feb 22, 2006
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice USN-255-1 - Tomas Mraz discovered a shell code injection flaw in scp. When doing local-to-local or remote-to-remote copying, scp expanded shell escape characters. By tricking an user into using scp on a specially crafted file name (which could also be caught by using an innocuous wild card like '*'), an attacker could exploit this to execute arbitrary shell commands with the privilege of that user.

tags | advisory, remote, arbitrary, shell, local
systems | linux, ubuntu
MD5 | 08178852ac4d01bbd9b62c1da09f06a4
Ubuntu Security Notice 254-1
Posted Feb 22, 2006
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice USN-254-1 - Javier Fern

tags | advisory, arbitrary
systems | linux, ubuntu
MD5 | d1ae4f90847defdc67779771afc759a0
Ubuntu Security Notice 256-1
Posted Feb 22, 2006
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice USN-256-1 - Pierre Betouin discovered a Denial of Service vulnerability in the handling of the L2CAP (Logical Link Control and Adaptation Layer Protocol) layer. By sending a specially crafted L2CAP packet through a wireless Bluetooth connection, a remote attacker could crash hcidump.

tags | advisory, remote, denial of service, protocol
systems | linux, ubuntu
MD5 | 05ab22fbb8665b4870827a960ca8b250
Gentoo Linux Security Advisory 200602-12
Posted Feb 22, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200602-12 - Dirk Mueller found a heap overflow vulnerability in the XPdf codebase when handling splash images that exceed size of the associated bitmap. Versions less than 2.10.0-r4 are affected.

tags | advisory, overflow
systems | linux, gentoo
MD5 | 95e8598870c2665aff843cb170abe6d4
Gentoo Linux Security Advisory 200602-11
Posted Feb 22, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200602-11 - To copy from a local filesystem to another local filesystem, scp constructs a command line using 'cp' which is then executed via system(). Josh Bressers discovered that special characters are not escaped by scp, but are simply passed to the shell. Versions less than 4.2_p1-r1 are affected.

tags | advisory, shell, local
systems | linux, gentoo
MD5 | 07a29c9ce849564f06d837b95ad63751
geeklog-1.3.11.txt
Posted Feb 22, 2006
Authored by James Bercegay | Site gulftech.org

Geeklog is vulnerable to a number of different attacks such as SQL Injection, and arbitrary file inclusion. These attacks can be combined to ultimately execute code on the vulnerable web server in a very reliable manner.

tags | exploit, web, arbitrary, sql injection, file inclusion
MD5 | b8d327eed304a17382aeea3644d954b8
MiniNukeCMS.txt
Posted Feb 22, 2006
Authored by Mustafa Can Bjorn | Site nukedx.com

The MiniNuke CMS system suffers from a SQL injection vulnerability in pages.asp. Detailed exploitation provided.

tags | exploit, sql injection, asp
MD5 | fefcb5dd1aeaff6889c62dfd06aface4
PostNuke-0.761.txt
Posted Feb 22, 2006
Authored by Maksymilian Arciemowicz | Site securityreason.com

PostNuke versions less than or equal to 0.761 suffer from SQL injection and XSS if magic_quotes_gpc is off.

tags | advisory, sql injection
MD5 | f83cc1d711366a7384a9b233de0892d0
PunBB1.2.10.txt
Posted Feb 22, 2006
Authored by Paisterist | Site neosecurityteam.net

PunBB 1.2.10 database flooding Denial of Service exploit.

tags | exploit, denial of service
MD5 | cb4ca4d6279339ddcef1c475822df27b
RCblog.xpl
Posted Feb 22, 2006
Authored by Hessam-x | Site hessamx.net

RCBlog 1.0.3 and 1.0.2 password disclosure exploit.

tags | exploit
MD5 | ac5daaba30961e3a866d7dc42cc4dddf
ADOdb-4.71.txt
Posted Feb 22, 2006
Authored by James Bercegay | Site gulftech.org

There are several cross site scripting issues within the ADODB_Pager class that may allow for an attacker to render malicious client side code in the victims browser.

tags | advisory, xss
MD5 | 55b5660568375f3ae73cd0d28274d1a8
cpg_143_incl_xpl
Posted Feb 22, 2006
Authored by rgod | Site retrogod.altervista.org

Coppermine Photo Gallery less than or equal to 1.4.3 remote commands execution exploit.

tags | exploit, remote
MD5 | 02c32adc8f890bff8758df17b58fc4bd
Secunia Security Advisory 18919
Posted Feb 22, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - albanialove has reported a vulnerability in CPG Dragonfly CMS, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | 20566f8c3b1d7ce725d75c95e8580861
Secunia Security Advisory 18935
Posted Feb 22, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Mambo, which potentially can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | c0600a230165461f836fba522a9f34cb
Secunia Security Advisory 18958
Posted Feb 22, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in UnixWare, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | unixware
MD5 | 7f2090a0e8b311d71c3b1b7c4d46c6d1
Secunia Security Advisory 18967
Posted Feb 22, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for noweb. This fixes multiple vulnerabilities, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges.

tags | advisory, local, vulnerability
systems | linux, ubuntu
MD5 | 44917c2903a0d08585632af4165c4fbb
Page 1 of 2
Back12Next

File Archive:

December 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    15 Files
  • 2
    Dec 2nd
    2 Files
  • 3
    Dec 3rd
    1 Files
  • 4
    Dec 4th
    15 Files
  • 5
    Dec 5th
    15 Files
  • 6
    Dec 6th
    18 Files
  • 7
    Dec 7th
    17 Files
  • 8
    Dec 8th
    15 Files
  • 9
    Dec 9th
    13 Files
  • 10
    Dec 10th
    4 Files
  • 11
    Dec 11th
    41 Files
  • 12
    Dec 12th
    44 Files
  • 13
    Dec 13th
    25 Files
  • 14
    Dec 14th
    15 Files
  • 15
    Dec 15th
    28 Files
  • 16
    Dec 16th
    3 Files
  • 17
    Dec 17th
    13 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close