exploit the possibilities
Showing 1 - 25 of 40 RSS Feed

Files Date: 2006-04-04

Debian Linux Security Advisory 1020-1
Posted Apr 4, 2006
Authored by Debian | Site debian.org

Debian Security Advisory DSA 1020-1 - Chris Moore discovered that flex, a scanner generator, generates code, which allocates insufficient memory, if the grammar contains REJECT statements or trailing context rules. This may lead to a buffer overflow and the execution of arbitrary code.

tags | overflow, arbitrary
systems | linux, debian
MD5 | 557d74c08692a9e9d71ade15777215df
Debian Linux Security Advisory 1018-1
Posted Apr 4, 2006
Authored by Debian | Site debian.org

Debian Security Advisory DSA 1018-1 - Several local and remote vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code.

tags | remote, denial of service, arbitrary, kernel, local, vulnerability
systems | linux, debian
MD5 | 37e753b6ecf40ba0e936845a971ad588
Debian Linux Security Advisory 1019-1
Posted Apr 4, 2006
Authored by Debian | Site debian.org

Debian Security Advisory DSA 1019-1 - Derek Noonburg has fixed several potential vulnerabilities in xpdf, the Portable Document Format (PDF) suite, which is also present in koffice, the KDE Office Suite.

tags | vulnerability
systems | linux, debian
MD5 | 69e7226c576237551049f0fc32bf37ed
Debian Linux Security Advisory 1017-1
Posted Apr 4, 2006
Authored by Debian | Site debian.org

Debian Security Advisory DSA 1017-1 - Several local and remote vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code.

tags | remote, denial of service, arbitrary, kernel, local, vulnerability
systems | linux, debian
MD5 | cdb76f5f9eff9a3337e81651d36d8915
Debian Linux Security Advisory 1016-1
Posted Apr 4, 2006
Authored by Debian | Site debian.org

Debian Security Advisory DSA 1016-1 - Ulf H

tags | arbitrary, vulnerability
systems | linux, debian
MD5 | 7aaa4ec433e22eb804294433aee764aa
Guru-Antilog.sh
Posted Apr 4, 2006
Authored by SoFy

A bash script to wipe or exchange your IP in unix log files. Also wipes out /root/.bash_history.

tags | tool, root, rootkit, bash
systems | unix
MD5 | f2407e8a4ccbde89d7ec768992803526
Detect Honeypots / Honeywalls Using Hping Whitepaper
Posted Apr 4, 2006
Authored by Amir Alsbih | Site informatik.uni-freiburg.de

This paper describes how to detect Honeypots / Honeywalls by using hping to send an ICMP packet containing shellcode and analyzing the response.

tags | paper, shellcode
MD5 | 942f361da108396aa0eb5f7b261e048d
pnc.pl.txt
Posted Apr 4, 2006
Authored by uid0 | Site exploitercode.com

PHPNuke-Clan 3.0.1 Remote File Inclusion Exploit

tags | exploit, remote, file inclusion
MD5 | 55cc530547edfc51ab101d2ca4e63e93
squery.pl.txt
Posted Apr 4, 2006
Authored by uid0 | Site exploitercode.com

SQuery versions less than or equal to 4.5 Remote File Inclusion Exploit

tags | exploit, remote, file inclusion
MD5 | 474b72ae87cc4b823c1b361cbdcc442b
linksubmit.txt
Posted Apr 4, 2006
Authored by s3rv3r_hack3r | Site hackerz.ir

Exploit for a html injection vulnerability in linksubmit.

tags | exploit
MD5 | d1395a9355d57e5bb8a80e31c616b24d
SpoofMe_backdoor.tar.bz2
Posted Apr 4, 2006
Authored by LOTFREE TEAM | Site lotfree.next-touch.com

SpoofMe Backdoor - The backdoor is composed of 3 parts. The client, the server, and a php script. The client is used to send spoofed udp packets to the victim. Theses packets contains the commands encrypted with the base64 algorithm. The server listens on a UDP port. When it receives a command, it decrypts it, executes it and encodes the output in base64. The result is sent in a HTTP (POST) packet to the php script called shell_output.php.

tags | tool, web, udp, spoof, php, rootkit
systems | unix
MD5 | 771abfe12e9767314a332871bef6102d
HookExplorer.zip
Posted Apr 4, 2006
Site labs.idefense.com

HookExplorer is a small GPL utility designed to scan a target process and identify any IAT or detours style hooks that may be installed by unknown code. Data is presented in an easy to digest format and allows for custom filters to help trim results.

MD5 | 2bb04344700caf643472255f3c4dafbf
HostingController.txt
Posted Apr 4, 2006
Authored by Paolo Di Febbo

2 vulnerabilities in Hosting Controller allow remote authenticated users to change every user password or upload files in every directory.

tags | exploit, remote, vulnerability
MD5 | 73f8fcbbe102156f13f4c8bfc77a1012
VWar-1.5.0.pl.txt
Posted Apr 4, 2006
Authored by uid0 | Site exploitercode.com

VWar versions less than or equal to 1.5.0 R12 Remote File Inclusion Exploit

tags | exploit, remote, file inclusion
MD5 | 59e895c329de628f9109aaf2f8f28e53
Debian Linux Security Advisory 1000-2
Posted Apr 4, 2006
Authored by Debian

Debian Security Advisory 1000-2: -An algorithm weakness has been discovered in Apache2::Request, the generic request library for Apache2 which can be exploited remotely and cause a denial of service via CPU consumption.

tags | advisory, denial of service
systems | linux, debian
MD5 | 64af351372835cbae3af05684e9352d3
Ubuntu Security Notice 265-1
Posted Apr 4, 2006
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice USN-265-1 - libcairo vulnerability: When rendering glyphs, the cairo graphics rendering library did not check the maximum length of character strings. A request to display an excessively long string with cairo caused a program crash due to an X library error.

tags | advisory
systems | linux, ubuntu
MD5 | 0a2ec4e25fc06fafb610e630ea9d68f6
Ubuntu Security Notice 266-1
Posted Apr 4, 2006
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice USN-266-1 - dia vulnerabilities: Three buffer overflows were discovered in the Xfig file format importer. By tricking a user into opening a specially crafted .fig file with dia, an attacker could exploit this to execute arbitrary code with the user's privileges.

tags | advisory, overflow, arbitrary, vulnerability
systems | linux, ubuntu
MD5 | e10a97caa07a4ec44dc0b9b7a4ee54a7
Ubuntu Security Notice 267-1
Posted Apr 4, 2006
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice USN-267-1 - mailman vulnerability: A remote Denial of Service vulnerability was discovered in the decoder for multipart messages. Certain parts of type "message/delivery-status" or parts containing only two blank lines triggered an exception. An attacker could exploit this to crash Mailman by sending a specially crafted email to a mailing list.

tags | advisory, remote, denial of service
systems | linux, ubuntu
MD5 | 102c06f7726019467050642f48bddf19
LukesTest.txt
Posted Apr 4, 2006
Authored by Hai Nam Luke | Site buctuong.com

An Internet Explorer Address Bar Spoofing Vulnerability that allows an attacker to inject a malicious shockwave-flash application into Internet Explorer while displaying another URL in the address bar.

tags | advisory, spoof
MD5 | ce16d96beb614256fe041f59f3c8b4f5
pirana-0.2.1.tar.gz
Posted Apr 4, 2006
Authored by Jean-Sebastien Guay-Leroux | Site guay-leroux.com

PIRANA is an exploitation framework that tests the security of a email content filter. By means of a vulnerability database, the content filter to be tested will be bombarded by various emails containing a malicious payload intended to compromise the computing platform. PIRANA's goal is to test whether or not any vulnerability exists on the content filtering platform.

systems | unix
MD5 | 28d3bb7afbac462f6abdd1eaf62aa020
Shelf_Solution_authbypass.txt
Posted Apr 4, 2006
Authored by MurderSkillz

Site Off the Shelf Solution from vrvirtual suffers from an authentication bypass vulnerability.

tags | advisory, bypass
MD5 | 481afffea016c241d4582d962d3ddf21
barracuda-advisory-LHA.txt
Posted Apr 4, 2006
Authored by Jean-Sebastien Guay-Leroux | Site guay-leroux.com

The Barracuda Spam Firewall with firmware less than 3.3.03.022 and spamdef less than 3.0.10045 suffers from a remote compromise via an email containing a specially crafted LHA archive.

tags | advisory, remote
MD5 | bf934daf249d3ad98aae3d555f9b84e6
barracuda-advisory-ZOO.txt
Posted Apr 4, 2006
Authored by Jean-Sebastien Guay-Leroux | Site guay-leroux.com

The Barracuda Spam Firewall with firmware less than 3.3.03.022 and spamdef less than 3.0.9388 suffers from a remote compromise via an email containing a specially crafted ZOO archive.

tags | advisory, remote
MD5 | 379bf603e70578a1219aafac2945801b
Secunia Security Advisory 19462
Posted Apr 4, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Mac OS X, which can be exploited by malicious people with physical access to a system to bypass certain security restrictions.

tags | advisory
systems | apple, osx
MD5 | b2c7c4c19f2bc36d34b5f4356b9e1f74
Secunia Security Advisory 19489
Posted Apr 4, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for storebackup. This fixes a vulnerability and a security issue, which potentially can be exploited by malicious, local users to gain access to sensitive information or perform certain actions on a vulnerable system with escalated privileges.

tags | advisory, local
systems | linux, debian
MD5 | 3c3b58d9a649cead93fe76c16b9f5e4d
Page 1 of 2
Back12Next

File Archive:

March 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    2 Files
  • 2
    Mar 2nd
    18 Files
  • 3
    Mar 3rd
    15 Files
  • 4
    Mar 4th
    12 Files
  • 5
    Mar 5th
    19 Files
  • 6
    Mar 6th
    8 Files
  • 7
    Mar 7th
    1 Files
  • 8
    Mar 8th
    1 Files
  • 9
    Mar 9th
    11 Files
  • 10
    Mar 10th
    15 Files
  • 11
    Mar 11th
    9 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    13 Files
  • 14
    Mar 14th
    10 Files
  • 15
    Mar 15th
    13 Files
  • 16
    Mar 16th
    27 Files
  • 17
    Mar 17th
    15 Files
  • 18
    Mar 18th
    23 Files
  • 19
    Mar 19th
    25 Files
  • 20
    Mar 20th
    10 Files
  • 21
    Mar 21st
    6 Files
  • 22
    Mar 22nd
    1 Files
  • 23
    Mar 23rd
    22 Files
  • 24
    Mar 24th
    15 Files
  • 25
    Mar 25th
    23 Files
  • 26
    Mar 26th
    20 Files
  • 27
    Mar 27th
    15 Files
  • 28
    Mar 28th
    10 Files
  • 29
    Mar 29th
    1 Files
  • 30
    Mar 30th
    18 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close