exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 40 RSS Feed

Files Date: 2006-04-04

Debian Linux Security Advisory 1020-1
Posted Apr 4, 2006
Authored by Debian | Site debian.org

Debian Security Advisory DSA 1020-1 - Chris Moore discovered that flex, a scanner generator, generates code, which allocates insufficient memory, if the grammar contains REJECT statements or trailing context rules. This may lead to a buffer overflow and the execution of arbitrary code.

tags | overflow, arbitrary
systems | linux, debian
SHA-256 | a8280e87ef0f7f1f0cc74271515b56d06737597802838c34e93e02af39e8c55e
Debian Linux Security Advisory 1018-1
Posted Apr 4, 2006
Authored by Debian | Site debian.org

Debian Security Advisory DSA 1018-1 - Several local and remote vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code.

tags | remote, denial of service, arbitrary, kernel, local, vulnerability
systems | linux, debian
SHA-256 | 514d0e52b64a14ef4fb5172fb027efb610892a274d5fccddcd078c5d5071540d
Debian Linux Security Advisory 1019-1
Posted Apr 4, 2006
Authored by Debian | Site debian.org

Debian Security Advisory DSA 1019-1 - Derek Noonburg has fixed several potential vulnerabilities in xpdf, the Portable Document Format (PDF) suite, which is also present in koffice, the KDE Office Suite.

tags | vulnerability
systems | linux, debian
SHA-256 | 280d878409707808626833e101e9628ee1a7a26197e19fd93be8f1d42196ac97
Debian Linux Security Advisory 1017-1
Posted Apr 4, 2006
Authored by Debian | Site debian.org

Debian Security Advisory DSA 1017-1 - Several local and remote vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code.

tags | remote, denial of service, arbitrary, kernel, local, vulnerability
systems | linux, debian
SHA-256 | 847aa8bc9855007fb988c559b0f83edd2e02fa2e071255baf120623e3366e301
Debian Linux Security Advisory 1016-1
Posted Apr 4, 2006
Authored by Debian | Site debian.org

Debian Security Advisory DSA 1016-1 - Ulf H

tags | arbitrary, vulnerability
systems | linux, debian
SHA-256 | 10db39848577ee6fd688cbd7865c31bf462fcb0ca9556b03009d2f5ef4f178e0
Guru-Antilog.sh
Posted Apr 4, 2006
Authored by SoFy

A bash script to wipe or exchange your IP in unix log files. Also wipes out /root/.bash_history.

tags | tool, root, rootkit, bash
systems | unix
SHA-256 | 8527df4efdd3ad8e0feba35bf4d1d9c964fd22c9c6d089151c264d6b9f694466
Detect Honeypots / Honeywalls Using Hping Whitepaper
Posted Apr 4, 2006
Authored by Amir Alsbih | Site informatik.uni-freiburg.de

This paper describes how to detect Honeypots / Honeywalls by using hping to send an ICMP packet containing shellcode and analyzing the response.

tags | paper, shellcode
SHA-256 | 9239f109f0a37a9b7bfba5c3af51feee113b633f86cd3cd17248aa31a91adb27
pnc.pl.txt
Posted Apr 4, 2006
Authored by uid0 | Site exploitercode.com

PHPNuke-Clan 3.0.1 Remote File Inclusion Exploit

tags | exploit, remote, file inclusion
SHA-256 | 7eeaf9103398d71ba5a7b9505983e8806a399d6f423e2ea55b807251f88ee6fa
squery.pl.txt
Posted Apr 4, 2006
Authored by uid0 | Site exploitercode.com

SQuery versions less than or equal to 4.5 Remote File Inclusion Exploit

tags | exploit, remote, file inclusion
SHA-256 | 3983cb1a5ed0a6c0b51f9df6ea485a577c976662152fef92ff787edf05b0d0dd
linksubmit.txt
Posted Apr 4, 2006
Authored by s3rv3r_hack3r | Site hackerz.ir

Exploit for a html injection vulnerability in linksubmit.

tags | exploit
SHA-256 | ea7bdb1a25bdeba1f349e9dfc5fb59097f219c838203bd2d882484c46dcbe9ac
SpoofMe_backdoor.tar.bz2
Posted Apr 4, 2006
Authored by LOTFREE TEAM | Site lotfree.next-touch.com

SpoofMe Backdoor - The backdoor is composed of 3 parts. The client, the server, and a php script. The client is used to send spoofed udp packets to the victim. Theses packets contains the commands encrypted with the base64 algorithm. The server listens on a UDP port. When it receives a command, it decrypts it, executes it and encodes the output in base64. The result is sent in a HTTP (POST) packet to the php script called shell_output.php.

tags | tool, web, udp, spoof, php, rootkit
systems | unix
SHA-256 | 8e17c6ce102ff05730182733e13de49ccf03ff371774d9935397c89de342bb6a
HookExplorer.zip
Posted Apr 4, 2006
Site labs.idefense.com

HookExplorer is a small GPL utility designed to scan a target process and identify any IAT or detours style hooks that may be installed by unknown code. Data is presented in an easy to digest format and allows for custom filters to help trim results.

SHA-256 | a2974dd2576c60e648ff3dbe58452a21fcab10547eb4c36da4259c015fcd4ea1
HostingController.txt
Posted Apr 4, 2006
Authored by Paolo Di Febbo

2 vulnerabilities in Hosting Controller allow remote authenticated users to change every user password or upload files in every directory.

tags | exploit, remote, vulnerability
SHA-256 | 94ba0a237df21bf6b4d45a0d0376b17453e5d93f93cbdfcbc22696bf830d76f8
VWar-1.5.0.pl.txt
Posted Apr 4, 2006
Authored by uid0 | Site exploitercode.com

VWar versions less than or equal to 1.5.0 R12 Remote File Inclusion Exploit

tags | exploit, remote, file inclusion
SHA-256 | b628fa387321bd8c113f04eac1b366e436f7069bd8e0f606374299b4f804b18a
Debian Linux Security Advisory 1000-2
Posted Apr 4, 2006
Authored by Debian

Debian Security Advisory 1000-2: -An algorithm weakness has been discovered in Apache2::Request, the generic request library for Apache2 which can be exploited remotely and cause a denial of service via CPU consumption.

tags | advisory, denial of service
systems | linux, debian
SHA-256 | 337dd864da01c06169b73b08bfc5a312efcf7cb1b04ff1fc6f68c63275c9b9fa
Ubuntu Security Notice 265-1
Posted Apr 4, 2006
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice USN-265-1 - libcairo vulnerability: When rendering glyphs, the cairo graphics rendering library did not check the maximum length of character strings. A request to display an excessively long string with cairo caused a program crash due to an X library error.

tags | advisory
systems | linux, ubuntu
SHA-256 | 3814c7f90d810b931633b3b601c635eccc6280eca06976c579eaba4bab8b6b4b
Ubuntu Security Notice 266-1
Posted Apr 4, 2006
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice USN-266-1 - dia vulnerabilities: Three buffer overflows were discovered in the Xfig file format importer. By tricking a user into opening a specially crafted .fig file with dia, an attacker could exploit this to execute arbitrary code with the user's privileges.

tags | advisory, overflow, arbitrary, vulnerability
systems | linux, ubuntu
SHA-256 | 0a479892e170c263bdd8280493e3931fee869bd1999ec578496b6c6c72f5eacb
Ubuntu Security Notice 267-1
Posted Apr 4, 2006
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice USN-267-1 - mailman vulnerability: A remote Denial of Service vulnerability was discovered in the decoder for multipart messages. Certain parts of type "message/delivery-status" or parts containing only two blank lines triggered an exception. An attacker could exploit this to crash Mailman by sending a specially crafted email to a mailing list.

tags | advisory, remote, denial of service
systems | linux, ubuntu
SHA-256 | e5f0e110c62ab169993446eaf82e43c6f71a4dca129137d3744f899ca8d7927d
LukesTest.txt
Posted Apr 4, 2006
Authored by Hai Nam Luke | Site buctuong.com

An Internet Explorer Address Bar Spoofing Vulnerability that allows an attacker to inject a malicious shockwave-flash application into Internet Explorer while displaying another URL in the address bar.

tags | advisory, spoof
SHA-256 | 3c79f849ce1fcbf0732dd771f03cec631b61c3c30910c252789e5b0e752fe2a8
pirana-0.2.1.tar.gz
Posted Apr 4, 2006
Authored by Jean-Sebastien Guay-Leroux | Site guay-leroux.com

PIRANA is an exploitation framework that tests the security of a email content filter. By means of a vulnerability database, the content filter to be tested will be bombarded by various emails containing a malicious payload intended to compromise the computing platform. PIRANA's goal is to test whether or not any vulnerability exists on the content filtering platform.

systems | unix
SHA-256 | 3657e8c9cb39fe8805ada794f7b9e5b5c772a6b208998810e38934e7268cc63d
Shelf_Solution_authbypass.txt
Posted Apr 4, 2006
Authored by MurderSkillz

Site Off the Shelf Solution from vrvirtual suffers from an authentication bypass vulnerability.

tags | advisory, bypass
SHA-256 | c2aa82463bd4c0b572c73e45f6a84ae465852e506dff4089d18a04b7fce6ee61
barracuda-advisory-LHA.txt
Posted Apr 4, 2006
Authored by Jean-Sebastien Guay-Leroux | Site guay-leroux.com

The Barracuda Spam Firewall with firmware less than 3.3.03.022 and spamdef less than 3.0.10045 suffers from a remote compromise via an email containing a specially crafted LHA archive.

tags | advisory, remote
SHA-256 | 1fc543a965dad878e85c76e8374b6bf456536444e43cef102ce41c68fd3b54f1
barracuda-advisory-ZOO.txt
Posted Apr 4, 2006
Authored by Jean-Sebastien Guay-Leroux | Site guay-leroux.com

The Barracuda Spam Firewall with firmware less than 3.3.03.022 and spamdef less than 3.0.9388 suffers from a remote compromise via an email containing a specially crafted ZOO archive.

tags | advisory, remote
SHA-256 | b1a125d11ebe95bcf9be62768a67891c17278898c0cd6217c2f1e78f625b5082
Secunia Security Advisory 19462
Posted Apr 4, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Mac OS X, which can be exploited by malicious people with physical access to a system to bypass certain security restrictions.

tags | advisory
systems | apple, osx
SHA-256 | cbd3694631da7e5e9dc1089edc34784e4d5338685f83eb465cda4f1fb910aacd
Secunia Security Advisory 19489
Posted Apr 4, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for storebackup. This fixes a vulnerability and a security issue, which potentially can be exploited by malicious, local users to gain access to sensitive information or perform certain actions on a vulnerable system with escalated privileges.

tags | advisory, local
systems | linux, debian
SHA-256 | 64dd1510304874f0631ec167c295d83fd685e8f7d46771acd8994b8237e761d9
Page 1 of 2
Back12Next

File Archive:

February 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    16 Files
  • 2
    Feb 2nd
    19 Files
  • 3
    Feb 3rd
    0 Files
  • 4
    Feb 4th
    0 Files
  • 5
    Feb 5th
    24 Files
  • 6
    Feb 6th
    2 Files
  • 7
    Feb 7th
    10 Files
  • 8
    Feb 8th
    25 Files
  • 9
    Feb 9th
    37 Files
  • 10
    Feb 10th
    0 Files
  • 11
    Feb 11th
    0 Files
  • 12
    Feb 12th
    17 Files
  • 13
    Feb 13th
    20 Files
  • 14
    Feb 14th
    25 Files
  • 15
    Feb 15th
    15 Files
  • 16
    Feb 16th
    6 Files
  • 17
    Feb 17th
    0 Files
  • 18
    Feb 18th
    0 Files
  • 19
    Feb 19th
    35 Files
  • 20
    Feb 20th
    25 Files
  • 21
    Feb 21st
    0 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files
  • 29
    Feb 29th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close