exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 60 RSS Feed

Files Date: 2006-03-09

exegesis.pdf
Posted Mar 9, 2006
Authored by PAgVac | Site public.gnucitizen.org

Purple Paper: Exegesis Of Virtual Hosts Hacking - First paper written on the topic of virtual hosts hacking. It covers basic skills such as passive discovery techniques and (almost) stealth active discovery techniques. It also presents possible scenarios of exploitation.

tags | paper
SHA-256 | 6a45b8e7895fe76ca657fbbe88dec0c24eff9e9c15bb2b9647844931fd4e3168
Secunia Security Advisory 19149
Posted Mar 9, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - retard has discovered a vulnerability in textfileBB, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | f5f9bd5e7787e71bbb36995fb3ace8bcafd05035637670f97c74e49a5d915a08
Secunia Security Advisory 19150
Posted Mar 9, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Kerio MailServer, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 3e7d46655d5f45c98d037e253e2fb16c7d24d1cc87cebcd5a1da9f26dbbf470b
Secunia Security Advisory 19165
Posted Mar 9, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Hamid Ebadi has discovered two vulnerabilities in Nodez, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a vulnerable system.

tags | advisory, vulnerability, xss
SHA-256 | 9e9e00fde7451dee8da5ca08c8bcfaa6331a54724ec99ee9d55755681a4abec9
Secunia Security Advisory 19175
Posted Mar 9, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - rgod has discovered a vulnerability in Gallery, which can be exploited by malicious people to disclose sensitive information and compromise a vulnerable system.

tags | advisory
SHA-256 | 2ce8caf030c0c89391565bc1349c6914506860406e66b82a1926a4bde65422c2
Secunia Security Advisory 19176
Posted Mar 9, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for squirrelmail. This fixes some vulnerabilities, which can be exploited by malicious users to manipulate certain information and by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
systems | linux, debian
SHA-256 | 2855d97b2816c867a62c4938b1f163ba511df4d04745f327f85d638eb7bfad19
Secunia Security Advisory 19177
Posted Mar 9, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - KAPDA has discovered two vulnerabilities in D2KBlog, which can be exploited by malicious people to conduct script insertion and SQL injection attacks.

tags | advisory, vulnerability, sql injection
SHA-256 | 0bfced96a2db3b8fca66a21e8f6b835f829a16a03cac5195b456d7c5af2565c0
Secunia Security Advisory 19181
Posted Mar 9, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - x128 has discovered a vulnerability in RedBLoG, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | ab043439404a82dbae2b05bea2f03b9784255636021bd2755bd82553c98189bb
Secunia Security Advisory 19183
Posted Mar 9, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SGI has issued a patch for SGI Advanced Linux Environment. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service), cause files to be extracted to arbitrary locations on a user's system, and potentially compromise a user's system.

tags | advisory, denial of service, arbitrary, vulnerability
systems | linux
SHA-256 | 9a5242d666a7077c8d2087fb893bac056f822f21bef490985c6e99747b8ee143
gallery203.php.txt
Posted Mar 9, 2006
Authored by rgod | Site retrogod.altervista.org

Gallery version 2.0.3 and below stepOrder[] remote command execution exploit.

tags | exploit, remote
SHA-256 | f8924adab9bc965dfeac5c86eb94a9bd4a873ce8874d3b75619b71e3f623ee76
noahClassified.txt
Posted Mar 9, 2006
Authored by zeus | Site elitemexico.org

Noah's Classifieds version 1.x is susceptible to multiple cross site scripting flaws.

tags | exploit, xss
SHA-256 | a4f4050450ea038d773fad923cd13ddc8bb97173cfcf10ae5e33658a5c63febd
snort-2.4.4.tar.gz
Posted Mar 9, 2006
Authored by Martin Roesch | Site snort.org

Snort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more. Includes real time alerting, incorporating alerting mechanisms for syslog, a user specified file, a UNIX socket, or WinPopup messages via smbclient.

Changes: The Snort 2.4.4 release fixes an issue where under certain conditions the frag3 preprocessor will not properly refragment stream data. Improvements have also been made to stream4 and a fix for Snort in inline mode was added. Numerous other improvements are detailed in the changelog for this release.
tags | tool, overflow, cgi, sniffer, protocol
systems | unix
SHA-256 | b9f3e21467a5f6dd827ddb80dc9ac29ea272e4a5633a6a8a583f523a219e00e9
18ZLZA.txt
Posted Mar 9, 2006
Authored by Reed Arvin | Site reedarvin.thearvins.com

18 ways to escalate privileges in Zone Labs ZoneAlarm Security Suite build 6.1.744.000.

tags | exploit
SHA-256 | 58f962ac238c6133586c48ff429444c47dea31886161594510684c0686e9bf7b
apguard-0.1.tar.gz
Posted Mar 9, 2006
Site urug.gnu.pl

apGuard is an innovative project which automates the process of setting up permanent rights for files and directories.

systems | unix
SHA-256 | 2c0c851432a2725e0e5720ccf1cb8d621ddcfe03edec952d532212a9cab42c5d
sec_cloak.zip
Posted Mar 9, 2006
Authored by Craig Heffner | Site craigheffner.com

Security Cloak is designed to protect against TCP/IP stack fingerprinting and computer identification/information leakage via timestamp and window options by modifying relevant registry keys. The settings used are based on the results of SYN packet analysis by p0f. While the OS reported by other OS detection scanners were not identical to those of p0f, testing against Nmap, xprobe2, queso and cheops showed that they were unable to identify the correct operating system/version after Security Cloak settings had been applied.

tags | registry, tcp
SHA-256 | 66e4dab7b1c77acc36e113c187db43fce3b3e2841a33f0be05bdce710d59e95b
netcoolLeak.txt
Posted Mar 9, 2006
Authored by Dimitry Snezhkov

Another credential leak was found in the Netcool/NeuSecure Security Information Management platform which allows for remote backend database access with administrative privileges by an unauthenticated remote user.

tags | advisory, remote
SHA-256 | 0415c243f02aa6998f94cdbbc394030b7d77015586e9f344715982d6638a0b4c
textfilebbmessanger.txt
Posted Mar 9, 2006
Authored by retard

textfileBB versions 1.0 and below suffer from multiple cross site scripting flaws.

tags | exploit, xss
SHA-256 | 5eb4e5cf22834d35068ecfd02e8d2c4ff8cab55454516658027b2915c06aa0f1
capi4hylafax.txt
Posted Mar 9, 2006
Authored by DrFrancky

capi4hylafax version 01.03.00 is susceptible to a symbolic link creation vulnerability.

tags | advisory
SHA-256 | d1187b6447a12e8aa60baebabb24d3f366afa29a92c4f621947b96d0a4a6c446
dropbear-PoC.c
Posted Mar 9, 2006
Authored by Pablo Fernandez

Dropbear SSH server remote denial of service exploit that makes use of a design error in the authorizations-pending connection code. Version 0.47 and below are susceptible to attack.

tags | exploit, remote, denial of service
SHA-256 | 8a2ce32dd786ff500d942044c4e4b7de76dd2cf0e0f782fab34404795ffeaa46
sBlog_0.72_xss.txt
Posted Mar 9, 2006
Authored by Kiki | Site kiki91.altervista.org

sBlog version 0.7.2 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 3efd11fdde77f4a3ac198fa685c5bdbe4f4eafb8e987b89af57c116ed761bf5d
aa2k6x.zip
Posted Mar 9, 2006
Authored by Luigi Auriemma | Site aluigi.altervista.org

Proof of concept exploit for Alien Arena 2006 Gold Edition versions 5.00 and below which suffer from format string and buffer overflow vulnerabilities.

tags | exploit, overflow, vulnerability, proof of concept
SHA-256 | a8503872a481d4bca38db317775f731292d9c2a870c718e7ef2526bb0c9b0989
aa2k6x.txt
Posted Mar 9, 2006
Authored by Luigi Auriemma | Site aluigi.altervista.org

Alien Arena 2006 Gold Edition versions 5.00 and below suffer from format string and buffer overflow vulnerabilities.

tags | advisory, overflow, vulnerability
SHA-256 | 758b2865a8389885d4f51a1d927a643500f2bd9557c72ef68f88f5c01b9939b9
loudCMS.txt
Posted Mar 9, 2006
Authored by tzitaroth

Loudblog CMS is susceptible to SQL injection and a couple inclusion flaws.

tags | exploit, sql injection
SHA-256 | a87c53fc69e1553e5d8ba4572e563ff78f4913d6365ff10d0deefc888916ca31
rev.txt
Posted Mar 9, 2006
Authored by Securma Massine | Site morx.org

Revilloc MailServer and Proxy version 1.21 remote proof of concept exploit for the USER directive heap overflow. Binds a shell to port 9191.

tags | exploit, remote, overflow, shell, proof of concept
SHA-256 | 3c9ad856259ed9d850a7e48cd14c79377eb82fa3483a9cd37f035a2880eedc5a
oinkmaster-2.0.tar.gz
Posted Mar 9, 2006
Authored by Andreas Oestling | Site oinkmaster.sourceforge.net

Oinkmaster is simple Perl script released under the BSD license to help update and manage Snort 2.0+ rules and to comment out the unwanted ones after each update. It will report what has changed since the last update, offering good change control.

Changes: Major version bump to celebrate that Oinkmaster has now turned 5 years old! Check the changelog for more.
tags | tool, perl, sniffer
systems | bsd
SHA-256 | 3d52f0426aa7c81b122cef22b80d708d8bb8337537e48754a065804f46c46162
Page 1 of 3
Back123Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    28 Files
  • 16
    Jul 16th
    6 Files
  • 17
    Jul 17th
    34 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close