seeing is believing
Showing 1 - 25 of 58 RSS Feed

Files Date: 2006-05-21

raydiumx.zip
Posted May 21, 2006
Authored by Luigi Auriemma | Site aluigi.org

Remote proof of concept exploit for Raydium versions SVN revision 309 and below.

tags | exploit, remote, proof of concept
MD5 | 840c51521229c96ec8befa14174f520e
raydiumx.txt
Posted May 21, 2006
Authored by Luigi Auriemma | Site aluigi.org

Raydium versions SVN revision 309 and below suffer from buffer overflows, format string, and invalid memory access flaws.

tags | advisory, overflow
MD5 | 98700ca05091113c9c05018423c8c422
phpbb2020multi.txt
Posted May 21, 2006
Authored by rgod | Site retrogod.altervista.org

PHPBB 2.0.20 suffers from multiple security related issues having to do with avatars.

tags | advisory
MD5 | 74e439e3f0c5bc174924656114fdc928
open.txt
Posted May 21, 2006
Authored by Kiki | Site kiki91.altervista.org

Open Directory Project suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 2516759eed8972ca5cd903d9734d4717
jax.txt
Posted May 21, 2006
Authored by Kiki | Site kiki91.altervista.org

Jax Guestbook version 3.50 suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 152adf15d095e771251af93b84d04a02
McAfee-2006-0511.txt
Posted May 21, 2006
Authored by Mike Price

Two code execution vulnerabilities are present in Apple QuickDraw PICT image format support. Twenty one code execution vulnerabilities are present in Apple QuickTime support for various multimedia formats including: MOV, H.264, MPEG 4, AVI, FPX and SWF. Exploitation could lead to execution of arbitrary code. In order for an attack to succeed user interaction is required and therefore the risk factor for these issues is medium. Vulnerable systems include Mac OS X versions 10.4.6 and below without the May 2006 security update installed, QuickTime versions 7.0.4 and below for Mac OS X, and QuickTime for Windows versions 7.0.4 and below.

tags | advisory, arbitrary, vulnerability, code execution
systems | windows, apple, osx
advisories | CVE-2006-1249, CVE-2006-1453, CVE-2006-1454, CVE-2006-1459, CVE-2006-1460, CVE-2006-1461, CVE-2006-1462, CVE-2006-1464, CVE-2006-1465
MD5 | 1d79a56fa59628c48481d75f805348b7
dir.txt
Posted May 21, 2006
Authored by Kiki | Site kiki91.altervista.org

Directory Listing Script is susceptible to cross site scripting attacks.

tags | exploit, xss
MD5 | e1402600c5ac9adca046681da6a9bbe6
livehelper.txt
Posted May 21, 2006
Authored by Mr-X | Site alshmokh.com

chat.php from PHP Live Help ASP is susceptible to a cross site scripting vulnerability.

tags | exploit, php, xss, asp
MD5 | 11ddbf78eb6e2524c8bc03e769df78af
foing-remote-file.txt
Posted May 21, 2006
Authored by Andries Bruinsma

Foing suffers from a remote file inclusion flaw that allows for arbitrary code execution. Versions 0.2.0 through 0.7.0 are susceptible.

tags | exploit, remote, arbitrary, code execution, file inclusion
MD5 | 7beb2a9b994d3d120fa78f41ed29b121
Trustix Secure Linux Security Advisory 2006.26
Posted May 21, 2006
Authored by Trustix | Site http.trustix.org

Trustix Secure Linux Security Advisory #2006-0026 - Multiple kernel vulnerabilities have been fixed for Trustix Secure Linux 3.0.

tags | advisory, kernel, vulnerability
systems | linux
advisories | CVE-2006-2271, CVE-2006-2272, CVE-2006-2274, CVE-2006-2275, CVE-2006-1864
MD5 | cd5598e6acdb879a6245117723811d0d
dovecotIssue.txt
Posted May 21, 2006
Authored by Timo Sirainen

Dovecot 1.0 beta is susceptible to an information disclosure flaw.

tags | advisory, info disclosure
MD5 | 9fd3fcfccd3eca5d2326c2d8bd2b341f
smac20_setup.exe
Posted May 21, 2006
Authored by KLC Consulting Security Team | Site klcconsulting.net

SMAC 2.0 is a MAC Address spoofer for Windows 2000, XP and 2003 systems. Users can generate random MAC Address and SMAC will validate MAC Address before spoofing. User can pre-define MAC addresses and load the MAC Address list. Spoofed MAC Address can sustain from reboots.

tags | spoof
systems | windows, 2k
MD5 | f97d67f4a512b747d736151a11cacde4
SEC-20060512-0.txt
Posted May 21, 2006
Authored by Bernhard Mueller | Site sec-consult.com

SEC-CONSULT Security Advisory 20060512-0 - The Symantec Enterprise Firewall leaks internal IPs of natted machines in response to certain HTTP requests. Version 8.0 is vulnerable.

tags | exploit, web
MD5 | 45efb7adcb6dbcfec7f0bab930904131
AD20060512.txt
Posted May 21, 2006
Authored by Sowhat | Site nevisnetworks.com

A vulnerability that allows for arbitrary code execution in Apple QuickTime versions below 7.1 can be exploited by persuading a user to open a carefully crafted .mov files or visit a website embedding the malicious .mov file.

tags | advisory, arbitrary, code execution
systems | apple
MD5 | a6b5418a2c7a31e937c6b5f0b7a8686b
touch2v2.c
Posted May 21, 2006
Authored by Ighighi

Touch2 is a utility which modifies the ctime. Touch(1) can be used to change the last-access & last-modification times on the files (or directories) you read or modify, but doing this will change the last-inode-change time to the current time. Touch2 can be run after touch(1) or other commands.

systems | unix
MD5 | df35882f1fc0937cc70fd882f2cb797d
Zero Day Initiative Advisory 06-015
Posted May 21, 2006
Authored by Tipping Point | Site zerodayinitiative.com

ZDI-06-015 - This vulnerability allows attackers to execute arbitrary code on vulnerable installations of Apple's QuickTime media player. The specific flaw exists within the parsing of H.264 content. The implicit trust of a user-supplied size value during a memory copy loop allows an attacker to create an exploitable memory corruption condition. Exploitation requires that an attacker either coerce the target to open a malformed media file or visit a website embedding the malicious file. Versions prior to 7.1 of Apple Quicktime are affected.

tags | advisory, arbitrary
systems | apple
advisories | CVE-2006-1463
MD5 | df19f70a0f598f9afa328427a852326c
MU Security Advisory 2006-05.02
Posted May 21, 2006
Authored by MU Dynamics | Site labs.musecurity.com

MU-200605-02 - A remote buffer overflow condition in Apple's RTSP service could allow for arbitrary code execution. The vulnerable code is triggered with the use of a malformed RTSP header. QuickTime Streaming Server versions 5.5 and below are affected.

tags | advisory, remote, overflow, arbitrary, code execution
systems | apple
MD5 | 1d90fb401c7d13d3e639753d642c2ba4
EEYEB-20060307.txt
Posted May 21, 2006
Authored by Fang Xing | Site eeye.com

eEye Digital Security has discovered a critical vulnerability in QuickTime Player. There is a integer overflow in the way QuickTime processes fpx format files. An attacker can create a fpx file and send it to the user via email, web page, or fpx file with activex.

tags | advisory, web, overflow, activex
advisories | CVE-2006-1249
MD5 | 2a65823ba1f098e05bf2b7f47f274f5f
ipswitchXSS.txt
Posted May 21, 2006
Authored by David Maciejak

Ipswitch WhatsUp Professional suffers from source disclosure, information disclosure, and cross site scripting flaws. Weaknesses are confirmed in version 2006. Earlier versions may also be susceptible.

tags | exploit, xss, info disclosure
MD5 | b2debe79832942b4a35c1a7ad4af0af2
phpBBcharts.txt
Posted May 21, 2006
Site LoK-Crew.de

The phpBB charts.php code suffers from cross site scripting and SQL injection flaws.

tags | exploit, php, xss, sql injection
MD5 | 0ee5e39913d36a618fd750a4cfd02138
magnolia.txt
Posted May 21, 2006
Authored by Kiki | Site kiki91.altervista.org

Magnolia CMS suffers from a script insertion vulnerability.

tags | exploit
MD5 | 7a041569538175ebc183532f3d34ac83
ozjournals.txt
Posted May 21, 2006
Authored by Kiki | Site kiki91.altervista.org

OZJournals versions 1.2 and below suffer from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 109dd9670f7702d0c2605f153530b010
secunia-ultimatezip.txt
Posted May 21, 2006
Site secunia.com

Secunia Research has discovered a vulnerability in UltimateZip, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error in UNACEV2.DLL when extracting an ACE archive containing a file with an overly long filename. This can be exploited to cause a stack-based buffer overflow when a user extracts a specially crafted ACE archive.

tags | advisory, overflow
MD5 | a00115d97802abbcbb0cf9fc7764a142
unb_161p1_incl_xpl.txt
Posted May 21, 2006
Authored by rgod | Site retrogod.altervista.org

Remote exploit for an arbitrary file inclusion flaw in Unclassified NewsBoard versions 1.6.1 and below.

tags | exploit, remote, arbitrary, file inclusion
MD5 | e8f16fb1802a3ed9184772e24f918336
openp2m_crypt.java
Posted May 21, 2006
Authored by Fabiano Reese Righetti

Password encryption / decryption utility for OpenP2M.

tags | cracker
MD5 | d5a29574288c02d38a9c7a12e5f16a53
Page 1 of 3
Back123Next

File Archive:

July 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    2 Files
  • 2
    Jul 2nd
    3 Files
  • 3
    Jul 3rd
    15 Files
  • 4
    Jul 4th
    4 Files
  • 5
    Jul 5th
    15 Files
  • 6
    Jul 6th
    15 Files
  • 7
    Jul 7th
    10 Files
  • 8
    Jul 8th
    2 Files
  • 9
    Jul 9th
    10 Files
  • 10
    Jul 10th
    15 Files
  • 11
    Jul 11th
    15 Files
  • 12
    Jul 12th
    19 Files
  • 13
    Jul 13th
    16 Files
  • 14
    Jul 14th
    15 Files
  • 15
    Jul 15th
    3 Files
  • 16
    Jul 16th
    2 Files
  • 17
    Jul 17th
    8 Files
  • 18
    Jul 18th
    11 Files
  • 19
    Jul 19th
    15 Files
  • 20
    Jul 20th
    15 Files
  • 21
    Jul 21st
    15 Files
  • 22
    Jul 22nd
    7 Files
  • 23
    Jul 23rd
    2 Files
  • 24
    Jul 24th
    19 Files
  • 25
    Jul 25th
    28 Files
  • 26
    Jul 26th
    2 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close