exploit the possibilities
Showing 1 - 25 of 56 RSS Feed

Files Date: 2006-11-20

Secunia Security Advisory 22931
Posted Nov 20, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - bd0rk has discovered a vulnerability in MxBB Portal CalSnails Module, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | 51c053603c2e2493d5353913d162d79d
Secunia Security Advisory 23028
Posted Nov 20, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in IBM WebSphere Application Server, where some have unknown impacts and others can be exploited by malicious users to bypass certain security restrictions, and by malicious people to potentially compromise a vulnerable system.

tags | advisory, vulnerability
MD5 | 2f9098348a25515d7ab374cef5c37e99
ms06070-py.txt
Posted Nov 20, 2006
Authored by Winny Thomas

Microsoft Windows NetpManageIPCConnect stack overflow exploit that works against the vulnerability described in MS06-070. Written in Python.

tags | exploit, overflow, python
systems | windows
MD5 | 0210686b4f18932df18a30cbe244212d
ms06070-2.c
Posted Nov 20, 2006
Authored by cocoruder, S A Stevens | Site ruder.cdut.net

Microsoft Windows Wkssvc NetrJoinDomain2 stack overflow exploit that works against the vulnerability described in MS06-070. Fixed by S A Stevens.

tags | exploit, overflow
systems | windows
MD5 | 95bc617d247f39dd3011dc8d9d277937
asterisk-vta.txt
Posted Nov 20, 2006
Authored by Marek Roy | Site sekcore.com

Whitepaper detailing step by step instructions on how to connect Vonage to an Asterisk PBX.

tags | paper
MD5 | d5f8a4ad8e900ab29691244fd48fa846
IRCRv2.3.zip
Posted Nov 20, 2006
Authored by John McLeod | Site tools.phantombyte.com

The Incident Response Collection Report is a script to call a collection of tools that gathers and/or analyzes data on a Microsoft Windows system. You can think of this as a snapshot of the system in the past. Most of the tools are oriented towards data collection rather than analysis.

Changes: Fixed all path and command locations to meet Helix version 1.8 areas.
tags | tool, forensics
systems | windows
MD5 | 98d72034d5d39c40a39cc6fb8b2c53ea
lft-2.6b5.tar.gz
Posted Nov 20, 2006
Authored by Victor Oppleman | Site pwhois.org

LFT, short for Layer Four Traceroute, is a sort of 'traceroute' that often works much faster (than the commonly-used Van Jacobson method) and goes through many configurations of packet-filters (firewalls). More importantly, LFT implements numerous other features including AS number lookups through several reliable sources, loose source routing, netblock name lookups, load balancer and firewall detection, et al.

tags | tool, scanner
systems | unix
MD5 | ca97905f8c6aa2dfb858b63afe7cdde8
Secunia Security Advisory 22966
Posted Nov 20, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SHiKaA has reported a vulnerability in Powies PSCRIPT pMM, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
MD5 | e5c5bc924654b9746257b0e8d7065be0
Secunia Security Advisory 23026
Posted Nov 20, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Laurent Gaffi

tags | advisory, vulnerability
MD5 | 625d62212bd16bc826b7a38836919450
ixprimcms12.txt
Posted Nov 20, 2006
Authored by vitux

Ixprim CMS version 1.2 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, file inclusion
MD5 | 6cf5a0816ef6107b61674402cf7e5f54
stime2.c
Posted Nov 20, 2006
Authored by Kris Katterjohn

This shellcode sets the system time to 0 (00:00:00 GMT Jan 1, 1970) and exits in 12 bytes for Linux/x86.

tags | x86, shellcode
systems | linux
MD5 | 25e8d240d957fe909e4670e2537d4838
rmrootdir2.c
Posted Nov 20, 2006
Authored by Kris Katterjohn

45 byte shellcode for Linux/x86 that performs execve("rm -rf /").

tags | x86, shellcode
systems | linux
MD5 | 6c9fa298f888298b59480ef845baa372
flushiptables2.c
Posted Nov 20, 2006
Authored by Kris Katterjohn

40 byte shellcode to flush iptables for Linux/x86.

tags | x86, shellcode
systems | linux
MD5 | 991dc381d5235cbde7b719f7ac6d6b03
flushipchains2.c
Posted Nov 20, 2006
Authored by Kris Katterjohn

This shellcode does a execve("ipchains -F") in 40 bytes for Linux/x86.

tags | x86, shellcode
systems | linux
MD5 | fe2bfe42cdc3a92768c8f4b19037d998
vikiboard012.txt
Posted Nov 20, 2006
Authored by benjamin moss, laurent gaffie | Site s-a-p.ca

Vikingboard version 0.1.2 suffers from cross site scripting and local file inclusion flaws.

tags | exploit, local, xss, file inclusion
MD5 | 2c05d54af97763e0817ba295fa171bc3
blogcmsxss.txt
Posted Nov 20, 2006
Authored by Katatafish

BLOG:CMS versions 4.1.3 and below suffer from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 99ff25c02585f5f9eec973b16a167bd5
oxygen-SQL.txt
Posted Nov 20, 2006
Authored by DarkFig

Oxygen versions 1.1.3 and below remote SQL injection exploit.

tags | exploit, remote, sql injection
MD5 | f1620d700dfcee2ba6dbe5e24376c796
Debian Linux Security Advisory 1207-2
Posted Nov 20, 2006
Authored by Debian | Site debian.org

Debian Security Advisory 1207-2 - The phpmyadmin update in DSA 1207 introduced a regression. This update corrects this flaw.

tags | advisory
systems | linux, debian
advisories | CVE-2006-1678, CVE-2006-2418, CVE-2005-3621, CVE-2005-3665, CVE-2006-5116
MD5 | ca0b5598d4fa38f4b8fa69a1747138c3
Debian Linux Security Advisory 1213-1
Posted Nov 20, 2006
Authored by Debian | Site debian.org

Debian Security Advisory 1213-1 - Several remote vulnerabilities have been discovered in Imagemagick, a collection of image manipulation programs, which may lead to the execution of arbitrary code.

tags | advisory, remote, arbitrary, vulnerability
systems | linux, debian
advisories | CVE-2006-0082, CVE-2006-4144, CVE-2006-5456, CVE-2006-5868
MD5 | 8ff43563f8a61e2916980182f1678506
major_rls36.txt
Posted Nov 20, 2006
Authored by David "Aesthetico" Vieira-Kurz | Site majorsecurity.de

dev4u CMS suffers from multiple SQL injection and cross site scripting issues.

tags | advisory, xss, sql injection
MD5 | eeeee3b9863e1b85fdf8041defc6873e
major_rls35.txt
Posted Nov 20, 2006
Authored by David "Aesthetico" Vieira-Kurz | Site majorsecurity.de

Travelsized CMS versions 0.4.1 and below suffer from multiple cross site scripting issues.

tags | advisory, xss
MD5 | f4b1f739125939857682836820c27f28
Mandriva Linux Security Advisory 2006.164
Posted Nov 20, 2006
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory MDKSA-2006-164-1 - Local exploitation of an integer overflow vulnerability in the 'CIDAFM()' function in the X.Org and XFree86 X server could allow an attacker to execute arbitrary code with privileges of the X server, typically root. Local exploitation of an integer overflow vulnerability in the 'scan_cidfont()' function in the X.Org and XFree86 X server could allow an attacker to execute arbitrary code with privileges of the X server, typically root.

tags | advisory, overflow, arbitrary, local, root
systems | linux, mandriva
advisories | CVE-2006-3740, CVE-2006-3739
MD5 | 525faee36903bfd7a1303ad01c93fe1e
texasrankem.txt
Posted Nov 20, 2006
Site aria-security.com

Texas Rank'em suffers from multiple SQL injection vulnerabilities.

tags | exploit, vulnerability, sql injection
MD5 | 50f5ce9d889f8068bcebc624e4aab857
infinsql.txt
Posted Nov 20, 2006
Authored by benjamin moss, laurent gaffie | Site s-a-p.ca

Infinitytechs Restaurants CM suffers from SQL injection vulnerabilities.

tags | exploit, vulnerability, sql injection
MD5 | 307bee599b68462b088a8f72ea39f9d6
Secunia Security Advisory 23025
Posted Nov 20, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - katatafish has discovered a vulnerability in BLOG:CMS, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | d32e6f88eb303e3c0a95b819b4d9c2f2
Page 1 of 3
Back123Next

File Archive:

February 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    1 Files
  • 2
    Feb 2nd
    2 Files
  • 3
    Feb 3rd
    17 Files
  • 4
    Feb 4th
    15 Files
  • 5
    Feb 5th
    24 Files
  • 6
    Feb 6th
    16 Files
  • 7
    Feb 7th
    19 Files
  • 8
    Feb 8th
    1 Files
  • 9
    Feb 9th
    2 Files
  • 10
    Feb 10th
    15 Files
  • 11
    Feb 11th
    20 Files
  • 12
    Feb 12th
    12 Files
  • 13
    Feb 13th
    18 Files
  • 14
    Feb 14th
    17 Files
  • 15
    Feb 15th
    4 Files
  • 16
    Feb 16th
    4 Files
  • 17
    Feb 17th
    34 Files
  • 18
    Feb 18th
    15 Files
  • 19
    Feb 19th
    19 Files
  • 20
    Feb 20th
    20 Files
  • 21
    Feb 21st
    15 Files
  • 22
    Feb 22nd
    2 Files
  • 23
    Feb 23rd
    2 Files
  • 24
    Feb 24th
    16 Files
  • 25
    Feb 25th
    37 Files
  • 26
    Feb 26th
    15 Files
  • 27
    Feb 27th
    15 Files
  • 28
    Feb 28th
    4 Files
  • 29
    Feb 29th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close