what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 60 RSS Feed

Files Date: 2006-09-16

haberx.txt
Posted Sep 16, 2006
Authored by Fix TR | Site hack.gen.tr

Haberx version 1.1 suffers from a SQL injection vulnerability.

tags | exploit, sql injection
SHA-256 | 41125b7c38881d9dbe9e0cf3a5a3afd4d8bbb28667326904d4c52cc4599a81e6
phpdocwriter.txt
Posted Sep 16, 2006
Authored by Kacper | Site rahim.webd.pl

PHP DocWriter versions 0.3 and below remote file inclusion exploit.

tags | exploit, remote, php, file inclusion
SHA-256 | 8c9cdefd0810252b3fb6bcc265fefa95f6273dfa2ac74a6392b479565052320a
md5tables-0.2.tar.gz
Posted Sep 16, 2006
Authored by Cody "CypherXero" Rester | Site cypherxero.net

md5tables is a shell script that references a wordlist of md5 hashes and words for password auditing.

tags | shell, cracker
SHA-256 | c9ba9acafe6babf9fadbb9d9c6394ac75654d69684da4c884029cedd12da9237
home_edition2001-adv-01.txt
Posted Sep 16, 2006
Authored by home_edition2001 | Site nyubicrew.org

ReviewPost version 2.5 suffers from a remote file inclusion flaw in RP_PATH.

tags | exploit, remote, file inclusion
SHA-256 | 6bea4ea57f84a8a2b6494117f06a72fbd9484a7d5258cf3eed7a5317bea2aa81
poc_fli.zip
Posted Sep 16, 2006
Authored by Rub | Site reversemode.com

Proof of concept exploit for Apple Quicktime versions 7.1 and below that are prone to a heap overflow vulnerability.

tags | exploit, overflow, proof of concept
systems | apple
SHA-256 | b6924fd8d23236869e71f67e91da66270a169683e2aefcecfc8cf47722b4f2f2
aq71.txt
Posted Sep 16, 2006
Authored by Rub | Site reversemode.com

Apple Quicktime versions 7.1 and below are prone to a heap overflow vulnerability. This flaw could lead to a remote code execution if an attacker tricks the victim to visit a malicious webpage with a specially crafted .fli animation embedded.

tags | advisory, remote, overflow, code execution
systems | apple
SHA-256 | 1ee5211d786a1ec037a48775c13cf4a4da8d8e8aceaab35cd135b1d92de5fb0a
Noge_adv_02.txt
Posted Sep 16, 2006
Authored by NoGe | Site nyubicrew.org

phpBB XS suffers from a remote file inclusion flaw in phpbb_root_path.

tags | exploit, remote, file inclusion
SHA-256 | 9e31daaf0663ca092a23c5ec5112cef49fc3350b0d34a6faddc0add52c3b3df7
Debian Linux Security Advisory 1177-1
Posted Sep 16, 2006
Authored by Debian | Site debian.org

Debian Security Advisory 1177-1 - Hendrik Weimer discovered that it is possible for a normal user to disable the login shell of the root account via usermin, a web-based administration tool.

tags | advisory, web, shell, root
systems | linux, debian
advisories | CVE-2006-4246
SHA-256 | b68001507b7777908f508eebc31fd47b3262dd03cbac031d4ca7b25fee50dba1
easypageSQL.txt
Posted Sep 16, 2006
Authored by s3rv3r_hack3r

easypage.org version 7 is susceptible to a SQL injection attack.

tags | exploit, sql injection
SHA-256 | 6479c3c561edb20908a4aaa39f017e3f305dcd175cdcad211407b9a8c4864611
bolinOS.txt
Posted Sep 16, 2006
Authored by XORON

BolinOS version 4.5.5 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, file inclusion
SHA-256 | 1f2836339350c669c1082c1977a5ec86128dc463039070e6bc8502cc9326b5b2
BTP00011P002NF.zip
Posted Sep 16, 2006
Authored by David Matousek | Site matousec.com

Testing program that checks for an insufficient validation flaw in the "SymEvent" driver input buffer in Norton Personal Firewall 2006 version 9.1.0.33.

tags | exploit
SHA-256 | 6142c7d7e49020be09f24de4def0eb42eef262aec8d49a1d936f6dc8bbe73f7f
norton91033.txt
Posted Sep 16, 2006
Authored by David Matousek | Site matousec.com

Norton insufficiently protects its driver '\Device\SymEvent' against manipulation from malicious applications and it fails to validate its input buffer.

tags | advisory
SHA-256 | 6b85048dc98dd8c7e77dace699b1ca0ce1382f547a60a5f92c7709c883ccf21b
snort-2.6.0.2.tar.gz
Posted Sep 16, 2006
Authored by Martin Roesch | Site snort.org

Snort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more. Includes real time alerting, incorporating alerting mechanisms for syslog, a user specified file, a UNIX socket, or WinPopup messages via smbclient.

Changes: Added a DNS preprocessor and protocol decoder. This DNS preprocessor addresses vulnerabilities in Microsoft Windows DNS resolution identified in MS06-041.
tags | tool, overflow, cgi, sniffer, protocol
systems | unix
SHA-256 | 07bd7ac7b645d1380ace65b33c064ed58d9dc21bd736b1f76bc575dc22e1a5e2
advchk-0.9.tar.gz
Posted Sep 16, 2006
Authored by Stephan Schmieder | Site advchk.unixgu.ru

Advchk (Advisory Check) reads security advisories so you do not have to. Advchk gathers security advisories using RSS feeds, compares them to a list of known services, and alerts you if you are vulnerable. Since adding hosts and services by hand would be quite a boring task, advchk leverages nmap for automatic service and version discovery.

systems | unix
SHA-256 | e35d5c1dc1a555251834e05e78af310b90c1f406a65c401623c817549bef03ce
phpquiz.txt
Posted Sep 16, 2006
Authored by sn0oPy

phpQuiz suffers from a flaw that leaks sensitive information about the system.

tags | exploit
SHA-256 | 09205ce1e9a97700b6765568130b3d61a5d9fb1caa21eecf4093a6326afe5a04
Gentoo Linux Security Advisory 200609-11
Posted Sep 16, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200609-11 - Queries for SIG records will cause an assertion error if more than one SIG RRset is returned. Additionally, an INSIST failure can be triggered by sending multiple recursive queries if the response to the query arrives after all the clients looking for the response have left the recursion queue. Versions less than 9.3.2-r4 are affected.

tags | advisory
systems | linux, gentoo
SHA-256 | 07ea4a1dcb3d20f2b25899b79e578592fbbed0c77e281f587becabfe0901bdf7
roller.txt
Posted Sep 16, 2006
Authored by Avinash Shenoi

Roller version 2.3 is susceptible to cross site scripting attacks.

tags | advisory, xss
SHA-256 | 6e7c8b2284046e0dcf15ef8f1a71e39d90134aaa33700badfb88aa9810b51ab1
Debian Linux Security Advisory 1160-2
Posted Sep 16, 2006
Authored by Debian | Site debian.org

Debian Security Advisory 1160-2 - The latest security updates of Mozilla introduced a regression that led to a disfunctional attachment panel which warrants a correction to fix this issue.

tags | advisory
systems | linux, debian
advisories | CVE-2006-2779, CVE-2006-3805, CVE-2006-3806, CVE-2006-3807, CVE-2006-3808, CVE-2006-3809, CVE-2006-3810
SHA-256 | 8d6b786145d2ff0f66fe2784b8d16a28b0bd3f0fd56781568664c160cd010322
asp-audit-v2.tar.gz
Posted Sep 16, 2006
Authored by David Kierznowski | Site michaeldaw.org

ASP Auditor is a cool utility that helps identify vulnerable and weakly configured ASP.NET servers.

tags | tool, scanner, asp
systems | unix
SHA-256 | 8c5a8da14dddd9a6ec816d308ef1e0adc080cc5af52ab4e9cd870adfe27796f6
mybbxss.txt
Posted Sep 16, 2006
Authored by HACKERS PAL | Site soqor.net

MyBB suffers from full path disclosure and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | b786ab0ae4e350c4571a4084fb9aece80d04e2ac7c9e008b4d661579642eb64c
jupiterCMS-sql.txt
Posted Sep 16, 2006
Authored by HACKERS PAL | Site soqor.net

The Jupiter CMS suffers from SQL injection, full path disclosure, and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, sql injection
SHA-256 | 14f38326a92f77da3ad6e2171702a182c136cb34437919df0954146718023047
mclinkscounter11.txt
Posted Sep 16, 2006
Authored by ErNe

mcLinksCounter version 1.1 suffers from remote file inclusion vulnerabilities.

tags | exploit, remote, vulnerability, file inclusion
SHA-256 | eff67f37d1ab237612fe9181ef9bb80071c957dad6f1348e1bf74752a94b99c9
H2HC-CFP-2006.txt
Posted Sep 16, 2006
Authored by Rodrigo Rubira Branco | Site kernelhacking.com

The call for papers is open for the Hackers to Hackers Conference being held in November, 2006.

tags | paper, conference
SHA-256 | 55382a5bcdc4f88194115aa1e7d5f7c18732c40caa229cc5e4cdba265ecb05f0
HP Security Bulletin 2005-10.19
Posted Sep 16, 2006
Authored by Hewlett Packard, HP | Site hp.com

HP Security Bulletin - A potential security vulnerability has been identified with HP-UX running X.25. The vulnerability could be exploited by a local user to create a denial of service.

tags | advisory, denial of service, local
systems | hpux
SHA-256 | 7c112aaf0512d775d14cca9e930421d006cd284407cda0854db3e6b1f791c784
clickblog20.txt
Posted Sep 16, 2006
Authored by ajann

ClickBlog! versions 2.0 and below suffer from a SQL injection vulnerability that allows for login bypass.

tags | exploit, sql injection
SHA-256 | cf7533d49e3535f4a6fd852922e644ab836a8935d0126c7b898ade9b2bec450e
Page 1 of 3
Back123Next

File Archive:

February 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    11 Files
  • 2
    Feb 2nd
    9 Files
  • 3
    Feb 3rd
    5 Files
  • 4
    Feb 4th
    0 Files
  • 5
    Feb 5th
    0 Files
  • 6
    Feb 6th
    0 Files
  • 7
    Feb 7th
    0 Files
  • 8
    Feb 8th
    0 Files
  • 9
    Feb 9th
    0 Files
  • 10
    Feb 10th
    0 Files
  • 11
    Feb 11th
    0 Files
  • 12
    Feb 12th
    0 Files
  • 13
    Feb 13th
    0 Files
  • 14
    Feb 14th
    0 Files
  • 15
    Feb 15th
    0 Files
  • 16
    Feb 16th
    0 Files
  • 17
    Feb 17th
    0 Files
  • 18
    Feb 18th
    0 Files
  • 19
    Feb 19th
    0 Files
  • 20
    Feb 20th
    0 Files
  • 21
    Feb 21st
    0 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close