exploit the possibilities
Showing 1 - 25 of 28 RSS Feed

Files Date: 2006-05-02

linux24bytes.txt
Posted May 2, 2006
Authored by hophet | Site nlabs.com.br

Linux/x86 24 byte shellcode for execve /bin/sh.

tags | x86, shellcode
systems | linux
MD5 | 309875e86c5b48393d148f5296f42293
osx32bytes.txt
Posted May 2, 2006
Authored by hophet | Site nlabs.com.br

MacOSX/PowerPC 32 byte shellcode for sync(), reboot().

tags | shellcode
MD5 | 4f8a4be79a035ea123122a72c15f8a98
osx72bytes.txt
Posted May 2, 2006
Authored by hophet | Site nlabs.com.br

MacOSX/PowerPC 72 byte shellcode for execve /bin/sh.

tags | shellcode
MD5 | d59a0b83447393e784d3ee17aef8bc3b
openbsd23bytes.txt
Posted May 2, 2006
Authored by hophet | Site nlabs.com.br

OpenBSD/x86 23 byte shellcode for execve /bin/sh.

tags | x86, shellcode
systems | openbsd
MD5 | 7ecae79dfe4cbbd42a7ab19b6a3d4a50
invision215-SQL.txt
Posted May 2, 2006
Authored by Ykstortion Security Team

Invision Power Board version 2.1.5 remote SQL injection exploit.

tags | exploit, remote, sql injection
MD5 | e117594ca9ad4e5fc2779a31025f6f57
multiadm-1.0.5.tar.bz2
Posted May 2, 2006
Authored by Jan Engelhardt | Site alphagate.hopto.org

The MultiAdmin security framework kernel module provides a means to have multiple root users with unique UIDs. This bypasses collation order problems with NSCD, allows you to have files with unique owners, and allows you to track the quota usage for every real user. It also implements a sub-admin, a partially restricted root user who has full read-only access to most subsystems, but write rights only to a limited subset, for example writing to files or killing processes only of certain users.

Changes: Most LSM hooks have been collapsed and unused arguments have been removed. capable() was slightly changed which made the patch smaller. The MultiAdmin module and kernel patch were updated to 2.6.17-rc3.
tags | kernel, root
systems | linux
MD5 | bb52729a71ea68c7b6f177ed1a85a738
Mandriva Linux Security Advisory 2006.080
Posted May 2, 2006
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory MDKSA-2006-080: Ulf Harnhammar discovered that the freshclam tool does not do a proper check for the size of header data received from a web server. This could potentially allow a specially prepared HTTP server to exploit freshclam clients connecting to a database mirror and causing a DoS. The updated packages have been updated to Clamav 0.88.2 which corrects this problem.

tags | advisory, web
systems | linux, mandriva
advisories | CVE-2006-1989
MD5 | b0dfc92ffcb94492e4df354fa32a0164
canbypass.txt
Posted May 2, 2006
Authored by MurderSkillz

Candidate Resources Inc. web software suffers from an administrative bypass flaw.

tags | exploit, web
MD5 | edbfdd13dbedc76b5b4c19396ac19cfd
SiteX07.txt
Posted May 2, 2006
Authored by MurderSkillz

SiteX version 0.7 is susceptible to SQL injection and cross site scripting attacks. Earlier versions may also be affected.

tags | exploit, xss, sql injection
MD5 | c312c18877e3911bbf2840c39226336d
NEW-SOLUTION.txt
Posted May 2, 2006
Authored by MurderSkillz

NEW-SOLUTION is susceptible to SQL injection attacks that allow for administrative login bypass.

tags | exploit, sql injection
MD5 | 2fb1e2b00a3683f59ba6850a4c0b5a3a
ASPThai90.txt
Posted May 2, 2006
Authored by MurderSkillz

ASPThai Forums version 9.0 and below suffer cross site scripting flaws.

tags | exploit, xss
MD5 | 8076738ab3ffc687d6c43653ec49de4a
ASP-Nuke-community-v1.4SP3.txt
Posted May 2, 2006
Authored by MurderSkillz

ASP-Nuke community version 1.4 SP3 suffers from multiple cross site scripting flaws. Earlier versions also may be affected.

tags | exploit, xss, asp
MD5 | ba8311fc8187005b26340c6a1363716f
ASP-Nuke-community-v1.4SP2.txt
Posted May 2, 2006
Authored by MurderSkillz

ASP-Nuke community version 1.4 SP2 suffers from multiple cross site scripting flaws. Earlier versions also may be affected.

tags | exploit, xss, asp
MD5 | 751beb9cfb8c24fd29f482e246c74bbd
DMCounter092b.txt
Posted May 2, 2006
Authored by beford

DMCounter version 0.9.2-b suffers from a remote file inclusion flaw that allows for arbitrary code execution.

tags | exploit, remote, arbitrary, code execution, file inclusion
MD5 | 187ac0d1ffb1dc44d1502e5c69d1ae0d
Gentoo Linux Security Advisory 200605-1
Posted May 2, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200605-01 - Xfocus Team discovered multiple integer overflows that may lead to a heap-based buffer overflow. Versions less than 1.0.20060415 are affected.

tags | advisory, overflow
systems | linux, gentoo
MD5 | 7c6f5684e584cba01ec4c5addd941858
JMKpicture.txt
Posted May 2, 2006
Authored by tugr, AlpEren

JMK's Picture Gallery allows for direct administrative access.

tags | exploit
MD5 | 30f017624be72eaace452508f9cdcc21
galleryadmin.txt
Posted May 2, 2006
Authored by tugr

planetGallery allows for direct administrative access without credentials.

tags | exploit
MD5 | a4d3157c2bcdf265f4b9a87c80e79754
freeadmin.txt
Posted May 2, 2006
Authored by tugr

free-php.net Poll version 1.0 allows for direct /admin/ access.

tags | exploit, php
MD5 | b585be66030140bd115c1ffdb215813c
secunia-WinHKI.txt
Posted May 2, 2006
Authored by Tan Chew Keong | Site secunia.com

Secunia Research has discovered a vulnerability in WinHKI versions 1.66 and 1.67, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error in ztvunacev2.dll (UNACEV2.DLL) when extracting an ACE archive containing a file with an overly long filename. This can be exploited to cause a stack-based buffer overflow when a user extracts a specially crafted ACE archive.

tags | advisory, overflow
MD5 | 000c8244680ac371d46388259aa339c8
SWCS.rar
Posted May 2, 2006
Authored by nekd0, unl0ck | Site unl0ck.net

Silent web CGI shell that passes all data between the client and server via cookies.

tags | web, shell, cgi
MD5 | 53dfd59e48e5a457a11e9f3c9a1cd3dd
phiat.rar
Posted May 2, 2006
Authored by nekd0, unl0ck | Site unl0ck.net

Simple CGI scanner for doing large scans.

tags | cgi
MD5 | 6a18e1e9d6621619221d91c3c6c231ae
blodmodSQL.txt
Posted May 2, 2006
Authored by Qex

Blog Mod versions 0.2.x and below suffer from a SQL injection vulnerability.

tags | exploit, sql injection
MD5 | 3e21e5fae3228cfed657dab389c797b1
thyme13.txt
Posted May 2, 2006
Authored by O.U.T.L.A.W | Site Aria-security.net

Thyme version 1.3 is susceptible to cross site scripting attacks.

tags | exploit, xss
MD5 | b0cdf5f20701a4f59ebf17104f30d954
xine0994.txt
Posted May 2, 2006
Authored by king_purba | Site kandangjamur.net

Xine version 0.99.4 appears susceptible to format string attacks.

tags | advisory
MD5 | 35903154c046b291fd2cf40640e4f829
coolmenus.txt
Posted May 2, 2006
Authored by AminRayden | Site Aria-security.net

CoolMenus Event remote file inclusion exploit.

tags | exploit, remote, file inclusion
MD5 | d208f4e6fc8eda51cee4357ceb0866c1
Page 1 of 2
Back12Next

File Archive:

October 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    25 Files
  • 2
    Oct 2nd
    13 Files
  • 3
    Oct 3rd
    1 Files
  • 4
    Oct 4th
    1 Files
  • 5
    Oct 5th
    15 Files
  • 6
    Oct 6th
    15 Files
  • 7
    Oct 7th
    15 Files
  • 8
    Oct 8th
    11 Files
  • 9
    Oct 9th
    3 Files
  • 10
    Oct 10th
    1 Files
  • 11
    Oct 11th
    1 Files
  • 12
    Oct 12th
    8 Files
  • 13
    Oct 13th
    12 Files
  • 14
    Oct 14th
    23 Files
  • 15
    Oct 15th
    4 Files
  • 16
    Oct 16th
    13 Files
  • 17
    Oct 17th
    1 Files
  • 18
    Oct 18th
    1 Files
  • 19
    Oct 19th
    27 Files
  • 20
    Oct 20th
    41 Files
  • 21
    Oct 21st
    15 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close