exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 28 RSS Feed

Files Date: 2006-05-02

linux24bytes.txt
Posted May 2, 2006
Authored by hophet | Site nlabs.com.br

Linux/x86 24 byte shellcode for execve /bin/sh.

tags | x86, shellcode
systems | linux
SHA-256 | b928039f81e965b053483b267c31c4bdda7b6730503d7aee2c0593ecffa44bad
osx32bytes.txt
Posted May 2, 2006
Authored by hophet | Site nlabs.com.br

MacOSX/PowerPC 32 byte shellcode for sync(), reboot().

tags | shellcode
SHA-256 | 5351c8b944368ba099bd46cb47915aa7e0786ff4351bf5533f14b4df81c31cac
osx72bytes.txt
Posted May 2, 2006
Authored by hophet | Site nlabs.com.br

MacOSX/PowerPC 72 byte shellcode for execve /bin/sh.

tags | shellcode
SHA-256 | ac91044711def1684cd5a9b2453d14c329e8a338863ce7e44ec4589f10d91bde
openbsd23bytes.txt
Posted May 2, 2006
Authored by hophet | Site nlabs.com.br

OpenBSD/x86 23 byte shellcode for execve /bin/sh.

tags | x86, shellcode
systems | openbsd
SHA-256 | cf9775af8c212ecdbae9ac1f1aee5347daeb57f734b31701789be64c4d662115
invision215-SQL.txt
Posted May 2, 2006
Authored by Ykstortion Security Team

Invision Power Board version 2.1.5 remote SQL injection exploit.

tags | exploit, remote, sql injection
SHA-256 | edff9ae3f3bd623917541b4b345ef9516e9bdff8fd1e9a4772fe6ca438d076dd
multiadm-1.0.5.tar.bz2
Posted May 2, 2006
Authored by Jan Engelhardt | Site alphagate.hopto.org

The MultiAdmin security framework kernel module provides a means to have multiple root users with unique UIDs. This bypasses collation order problems with NSCD, allows you to have files with unique owners, and allows you to track the quota usage for every real user. It also implements a sub-admin, a partially restricted root user who has full read-only access to most subsystems, but write rights only to a limited subset, for example writing to files or killing processes only of certain users.

Changes: Most LSM hooks have been collapsed and unused arguments have been removed. capable() was slightly changed which made the patch smaller. The MultiAdmin module and kernel patch were updated to 2.6.17-rc3.
tags | kernel, root
systems | linux
SHA-256 | 6b1f37152a2e647d2824a80fabe12edbd436668efa9a9c487f1fb91aca7ba41a
Mandriva Linux Security Advisory 2006.080
Posted May 2, 2006
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory MDKSA-2006-080: Ulf Harnhammar discovered that the freshclam tool does not do a proper check for the size of header data received from a web server. This could potentially allow a specially prepared HTTP server to exploit freshclam clients connecting to a database mirror and causing a DoS. The updated packages have been updated to Clamav 0.88.2 which corrects this problem.

tags | advisory, web
systems | linux, mandriva
advisories | CVE-2006-1989
SHA-256 | cd9da835477073b5e90d6e13b1ba55414304793ab54dca4323c406276e320f22
canbypass.txt
Posted May 2, 2006
Authored by MurderSkillz

Candidate Resources Inc. web software suffers from an administrative bypass flaw.

tags | exploit, web
SHA-256 | 685ea4431520ae34fd5c3a379c1216f2d30a9479cad58c7480b4453d76be45e6
SiteX07.txt
Posted May 2, 2006
Authored by MurderSkillz

SiteX version 0.7 is susceptible to SQL injection and cross site scripting attacks. Earlier versions may also be affected.

tags | exploit, xss, sql injection
SHA-256 | 8e938a60980f971677e0b03851bb086b0351931f243f602da70867b7a9afcab0
NEW-SOLUTION.txt
Posted May 2, 2006
Authored by MurderSkillz

NEW-SOLUTION is susceptible to SQL injection attacks that allow for administrative login bypass.

tags | exploit, sql injection
SHA-256 | 569dcb8ce1290d8aec101aa3b6abb9de30022c0bc7c88cfd0b97149661e986bf
ASPThai90.txt
Posted May 2, 2006
Authored by MurderSkillz

ASPThai Forums version 9.0 and below suffer cross site scripting flaws.

tags | exploit, xss
SHA-256 | eff15390edafcdcbb7b2f68952bacd9a16b110eed8447ce4b4072f35617a1fbe
ASP-Nuke-community-v1.4SP3.txt
Posted May 2, 2006
Authored by MurderSkillz

ASP-Nuke community version 1.4 SP3 suffers from multiple cross site scripting flaws. Earlier versions also may be affected.

tags | exploit, xss, asp
SHA-256 | 0e5f2db41beda4c6ddfb3e9d198570e36732152bc573d3031da6c77aa43fc95b
ASP-Nuke-community-v1.4SP2.txt
Posted May 2, 2006
Authored by MurderSkillz

ASP-Nuke community version 1.4 SP2 suffers from multiple cross site scripting flaws. Earlier versions also may be affected.

tags | exploit, xss, asp
SHA-256 | 36cb63a9d0d658055ccebc69af687636d7ed29a68857d40f431d925d633f3b17
DMCounter092b.txt
Posted May 2, 2006
Authored by beford

DMCounter version 0.9.2-b suffers from a remote file inclusion flaw that allows for arbitrary code execution.

tags | exploit, remote, arbitrary, code execution, file inclusion
SHA-256 | 54ebbb6e93d6616c08b63b3b9cd528ede87547af26e90848582b2291c5c817de
Gentoo Linux Security Advisory 200605-1
Posted May 2, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200605-01 - Xfocus Team discovered multiple integer overflows that may lead to a heap-based buffer overflow. Versions less than 1.0.20060415 are affected.

tags | advisory, overflow
systems | linux, gentoo
SHA-256 | 55d6cc6fdba89262f8cd462225602b14d23ccb9c5309f3e2e384d152b261dc92
JMKpicture.txt
Posted May 2, 2006
Authored by tugr, AlpEren

JMK's Picture Gallery allows for direct administrative access.

tags | exploit
SHA-256 | dee6d5dfe8cb32846de1bea7e5065d1aef9828726a9823c222393da46fe1663a
galleryadmin.txt
Posted May 2, 2006
Authored by tugr

planetGallery allows for direct administrative access without credentials.

tags | exploit
SHA-256 | e707ca4a64124d891cfa1c76cbcd5d1fa1f5c8a76ca6254c38bedace434a008b
freeadmin.txt
Posted May 2, 2006
Authored by tugr

free-php.net Poll version 1.0 allows for direct /admin/ access.

tags | exploit, php
SHA-256 | c7720f356005deec924f55a01f66ce3143eeff1367f0afab99ebca5c91fd433d
secunia-WinHKI.txt
Posted May 2, 2006
Authored by Tan Chew Keong | Site secunia.com

Secunia Research has discovered a vulnerability in WinHKI versions 1.66 and 1.67, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error in ztvunacev2.dll (UNACEV2.DLL) when extracting an ACE archive containing a file with an overly long filename. This can be exploited to cause a stack-based buffer overflow when a user extracts a specially crafted ACE archive.

tags | advisory, overflow
SHA-256 | 8d19c5c9543405f65e77f191242b6bcd10493614ad39c78d692b3fb58dd0ea1a
SWCS.rar
Posted May 2, 2006
Authored by nekd0, unl0ck | Site unl0ck.net

Silent web CGI shell that passes all data between the client and server via cookies.

tags | web, shell, cgi
SHA-256 | a410047e3049f504fb0a4cf57d0b03e0efbaf0c47007216944d2cb36be40092d
phiat.rar
Posted May 2, 2006
Authored by nekd0, unl0ck | Site unl0ck.net

Simple CGI scanner for doing large scans.

tags | cgi
SHA-256 | 6daa6a8d4611c642c1065b8be83dbf13b7d9cbb1c5fa825a76911e1bd4c10ed2
blodmodSQL.txt
Posted May 2, 2006
Authored by Qex

Blog Mod versions 0.2.x and below suffer from a SQL injection vulnerability.

tags | exploit, sql injection
SHA-256 | 77c148a6eb30f71545ab285133c87255a96ad295b1d410038c911f724dc0a510
thyme13.txt
Posted May 2, 2006
Authored by O.U.T.L.A.W | Site Aria-security.net

Thyme version 1.3 is susceptible to cross site scripting attacks.

tags | exploit, xss
SHA-256 | c812a14efeb560b99eb03160ad2007bc59b43bb31efcd7bc67246d33afd43a9c
xine0994.txt
Posted May 2, 2006
Authored by king_purba | Site kandangjamur.net

Xine version 0.99.4 appears susceptible to format string attacks.

tags | advisory
SHA-256 | 62f25a84eba9e3749d25e73f729fb0af230802b3b37ce4ae221f19a7c6f78478
coolmenus.txt
Posted May 2, 2006
Authored by AminRayden | Site Aria-security.net

CoolMenus Event remote file inclusion exploit.

tags | exploit, remote, file inclusion
SHA-256 | 886b473afcbe361564ad6e9f72a4ac3788cd931a85501d5595107885ad24a01a
Page 1 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close