exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 94 RSS Feed

Files Date: 2006-05-09

vinetto-alpha-0.06.tar.gz
Posted May 9, 2006
Authored by rukin | Site vinetto.sourceforge.net

Vinetto is a tool intended for forensics examinations. It is a console program to extract thumbnail images and their metadata from those thumbs.db files generated under Microsoft Windows. Vinetto works under Linux, Cygwin(win32) and Mac OS X.

tags | tool, forensics
systems | linux, windows, apple, osx
SHA-256 | 6e80e1f1e854bf73507fd122a85a405832ccd122a979b8774612f92a468fd939
combina-0.4.0_src.tar.gz
Posted May 9, 2006
Authored by Danilo Cicerone | Site digitazero.org

combina is a password generator that uses three different algorithms based on combinatorial analysis. It implements the permutation without repetition, permutation with repetition (the famous brute force), and combination without repetition. It supports an unlimited number of characters in the input and MD5 password hashes.

Changes: The algorithm for Combination without repetition was added.
systems | unix
SHA-256 | f4f839004ad233f896c7e7db673a6c5f72c5e42af415571ad2ab3493fe0dccbc
nuface-1.0.4.tar.gz
Posted May 9, 2006
Authored by Vincent Deffontaines | Site inl.fr

Nuface is a Web-based administration tool that generates Edenwall, NuFW, or simple Netfilter firewall rules. It features a high level abstraction on the security policy set by the administrator, and works internally on an XML data scheme. Its philosophy is to let you agglomerate subjects, resources, or protocols into meta-objects, and use those meta objects to generate ACLs, which are then interpreted as netfilter rules by Nupyf, the internal XML parser. This tool may easily be extended to support firewall implementations other than Netfilter.

Changes: Fixed handling on ICMP types in the protocols page. Floating elements menu can now be replied. Added strict checking on all form input.
tags | tool, web, firewall, protocol
systems | unix
SHA-256 | 9290a88831678a15d0361428fc162206eca29e243e12ae7ea5283898f6a33d1b
Gentoo Linux Security Advisory 200605-9
Posted May 9, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200605-09 - Several vulnerabilities were found and fixed in Mozilla Thunderbird. Versions less than 1.0.8 are affected.

tags | advisory, vulnerability
systems | linux, gentoo
SHA-256 | f7838d3b2ef760aae0d5b268714bd43cf0928c40c8b54623182870918adaf047
Gentoo Linux Security Advisory 200605-8
Posted May 9, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200605-08 - Several vulnerabilities were discovered on PHP4 and PHP5 by Infigo, Tonu Samuel and Maksymilian Arciemowicz. These included a buffer overflow in the wordwrap() function, restriction bypasses in the copy() and tempname() functions, a cross-site scripting issue in the phpinfo() function, a potential crash in the substr_compare() function and a memory leak in the non-binary-safe html_entity_decode() function. Versions less than 5.1.4 are affected.

tags | advisory, overflow, vulnerability, xss, memory leak
systems | linux, gentoo
SHA-256 | 9d13e5a186587a253d3c96a80403f56da396ad68673d4d2118a3a56f61061f02
secunia-anti.txt
Posted May 9, 2006
Site secunia.com

Secunia Research has discovered a vulnerability in Anti-Trojan version 5.5.421, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error in UNACEV2.DLL when extracting an ACE archive containing a file with an overly long filename. This can be exploited to cause a stack-based buffer overflow when a user scans a specially crafted ACE archive.

tags | advisory, overflow, trojan
advisories | CVE-2005-2856
SHA-256 | b004e09b97667279cf951bdcf7c770c81f941af8129fc0aa335826759577e51c
secunia-TZip.txt
Posted May 9, 2006
Authored by Tan Chew Keong | Site secunia.com

Secunia Research has discovered a vulnerability in TZipBuilder version 1.79.03.01, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error when listing the contents of a ZIP archive that contains a file with an overly long filename. This can be exploited to cause a stack-based buffer overflow when a specially crafted ZIP archive is opened. Successful exploitation allows execution of arbitrary code with the privileges of an application that uses the library.

tags | advisory, overflow, arbitrary
advisories | CVE-2006-2161
SHA-256 | d82a5e72087c2ff64ade5023af3e50aef3b2192651f8f09e5fb8213dcdd4bc82
Ubuntu Security Notice 283-1
Posted May 9, 2006
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 283-1 - Stefano Di Paola discovered an information leak in the login packet parser. By sending a specially crafted malformed login packet, a remote attacker could exploit this to read a random piece of memory, which could potentially reveal sensitive data. Stefano Di Paola also found a similar information leak in the parser for the COM_TABLE_DUMP request.

tags | advisory, remote
systems | linux, ubuntu
advisories | CVE-2006-1516, CVE-2006-1517
SHA-256 | e8cd7bab51b75522d4800d3388509a457a0c30807305f15339b0fb4f92a3b049
Ubuntu Security Notice 282-1
Posted May 9, 2006
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 282-1 - The nagios CGI scripts did not sufficiently check the validity of the HTTP Content-Length attribute. By sending a specially crafted HTTP request with a negative Content-Length value to the Nagios server, a remote attacker could exploit this to execute arbitrary code with web server privileges.

tags | advisory, remote, web, arbitrary, cgi
systems | linux, ubuntu
advisories | CVE-2006-2162
SHA-256 | c8e26228db75b2700a79eb87a14c7a3c0caf44cd8e6a05d0f9dac1fd23d939bf
phpRaid-2.txt
Posted May 9, 2006
Authored by Andries Bruinsma

phpRaid versions 3.0.b3 through 2.9.5 suffer from a remote file inclusion vulnerability when used with SMF.

tags | exploit, remote, file inclusion
SHA-256 | 2620f6b73912889ef72c682aec30b6af9d36a3e71e44e7bbc5ec1afa2a6f434f
phpRaid-1.txt
Posted May 9, 2006
Authored by Andries Bruinsma

phpRaid versions 3.0.b3 through 2.9.5 suffer from a remote file inclusion vulnerability when used with the phpBB portal.

tags | exploit, remote, file inclusion
SHA-256 | 1b570e9cbe4f1c200d5caaf97c6f192c279a31a248d587bf4d7c2a50d0389311
INFIGO-2006-05-03.txt
Posted May 9, 2006
Authored by Leon Juranic | Site infigo.hr

INFIGO IS Security Advisory #ADV-2006-05-03 - New vulnerabilities have been discovered in ArgoSoft FTP server version 1.4.3.6, Golden FTP server version 2.70, FileZilla version 2.2.22, and WarFTP Daemon / Guild FTP server version 0.999.13.

tags | advisory, vulnerability
SHA-256 | f7e189f0655ec928de2b27d398b63004754ae6497a019f787feea012621c36f3
singapore097.txt
Posted May 9, 2006
Authored by AlpEren | Site ayyildiz.org

Singapore version 0.9.7 suffers from cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 96b5b40603c1ebeda4080fa0910b9c9820504a0c6b0d5b47a7a4aadc07f0275e
IdealBBASP.txt
Posted May 9, 2006
Authored by CodeScan Labs

IdealBB ASP Bulletin Board versions 1.5.4a and below suffer from file reading, file upload, and cross site scripting flaws.

tags | advisory, xss, asp, file upload
SHA-256 | 7fcc9d4b17811aa2b9759b668c666de7be25b522adfcc2632cfcfd19d30a59b2
dokeos.txt
Posted May 9, 2006
Authored by beford

Dokeos Learning Management System version 1.6.4 remote file inclusion exploit.

tags | exploit, remote, file inclusion
SHA-256 | a65551cfb4daaff3020c323e85bd1c34a82ba4b0333bf1c16b2bdf8a706bcb45
Debian Linux Security Advisory 1052-1
Posted May 9, 2006
Authored by Debian | Site debian.org

Debian Security Advisory 1052-1 - Several buffer overflows have been discovered in cgiirc, a web-based IRC client, which could be exploited to execute arbitrary code.

tags | advisory, web, overflow, arbitrary
systems | linux, debian
advisories | CVE-2006-2148
SHA-256 | 51b887a45d3140f358a310ac21dc5c63cb40e7833f982a2f821361aaedaa1a91
x86-linux-portbind.c
Posted May 9, 2006
Authored by Benjamin Orozco

100 byte portbinding shellcode for Linux/x86.

tags | x86, shellcode
systems | linux
SHA-256 | 44bc9490ce1bacc73b32414915fbc2b3470926e9375cebee893ba2a19b64a318
x86-linux-connectback.c
Posted May 9, 2006
Authored by Benjamin Orozco

82 byte connectback shellcode for Linux/x86.

tags | x86, shellcode
systems | linux
SHA-256 | ab637b4adc168c0332027973da2c91c9285c3abbf8641f9140cd5fa6539d5034
eqdkp.txt
Posted May 9, 2006
Authored by OLiBekaS

EQdkp versions 1.3.0 and below suffer from a remote file inclusion flaw.

tags | exploit, remote, file inclusion
SHA-256 | c79d69680a79632b7a7bac18e5fbe9a184a5f820b9d8167a04e11509f94e21d5
Gentoo Linux Security Advisory 200606-7
Posted May 9, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200605-07 - Sebastian Krahmer of the SuSE security team discovered a buffer overflow vulnerability in the handling of a negative HTTP Content-Length header. Versions less than 1.4 are affected.

tags | advisory, web, overflow
systems | linux, suse, gentoo
SHA-256 | e46d44c18be98ba4510029ce5638ef162f65783b2f2b57ffe282e5a24cce1f14
OpenEngineTraverse.txt
Posted May 9, 2006
Authored by ck

OpenEngine CMS versions 1.8 Beta 2 and below are susceptible to directory traversal attacks.

tags | exploit
SHA-256 | 90a511712002f7589378c74448862f3f2e6638f15ca0e988b4047c51dc24e9a7
philbookmark.txt
Posted May 9, 2006
Authored by AlpEren | Site ayyildiz.org

Phil's Bookmark script allows for direct administrative access without authentication.

tags | exploit
SHA-256 | 3d0a25423fc2198866a5bb2cb42f1119703cecf02bb6b59e811063b5e8f047d1
limboCMS.txt
Posted May 9, 2006
Site cyber-security.org

Limbo CMS remote SQL injection exploit.

tags | exploit, remote, sql injection
SHA-256 | 5efc47a796f44499977624bd822304165155f3e561af15fd1b2dfb122e3691cb
ISPConfig.txt
Posted May 9, 2006
Authored by ReZEN | Site xorcrew.net

ISPConfig versions 2.2.2 and below suffer from a remote command execution vulnerability.

tags | exploit, remote
SHA-256 | 3afa11d4e09943f0e83eb84d90ebb26e401ddc3d3d28c6ac7b0108d1353be252
1asphost.txt
Posted May 9, 2006
Authored by Spymeta

1ASPHost and Domain DLX hosting services suffer from cross site scripting flaws.

tags | exploit, xss
SHA-256 | 23381a3f72a1a116ebfbcc9d32d752b2cf5d56957a239a28aadd37be6c9f6248
Page 1 of 4
Back1234Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close