what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 56 RSS Feed

Files Date: 2006-11-20

Secunia Security Advisory 22931
Posted Nov 20, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - bd0rk has discovered a vulnerability in MxBB Portal CalSnails Module, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | e4b0c62c91e968205d98fa8a2714c320eff94496c4320d6f0edfc10e1aec397c
Secunia Security Advisory 23028
Posted Nov 20, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in IBM WebSphere Application Server, where some have unknown impacts and others can be exploited by malicious users to bypass certain security restrictions, and by malicious people to potentially compromise a vulnerable system.

tags | advisory, vulnerability
SHA-256 | 81ef9317b95b453bc97adc69d0cc0e624e6196507bd5556c2226e34d1d4fb7cf
ms06070-py.txt
Posted Nov 20, 2006
Authored by Winny Thomas

Microsoft Windows NetpManageIPCConnect stack overflow exploit that works against the vulnerability described in MS06-070. Written in Python.

tags | exploit, overflow, python
systems | windows
SHA-256 | e7219e5b943a866820e11731ac4d79f821c338fc4ecd563f5a6243aef702e248
ms06070-2.c
Posted Nov 20, 2006
Authored by cocoruder, S A Stevens | Site ruder.cdut.net

Microsoft Windows Wkssvc NetrJoinDomain2 stack overflow exploit that works against the vulnerability described in MS06-070. Fixed by S A Stevens.

tags | exploit, overflow
systems | windows
SHA-256 | 62779cfe53ca1f084826667abf8b472343327f839ff012becfc0af25416c3f80
asterisk-vta.txt
Posted Nov 20, 2006
Authored by Marek Roy | Site sekcore.com

Whitepaper detailing step by step instructions on how to connect Vonage to an Asterisk PBX.

tags | paper
SHA-256 | ccd01db66d130c1f335c2abafb8f43419c81878543fafc420e22f8b91fe7cba2
IRCRv2.3.zip
Posted Nov 20, 2006
Authored by John McLeod | Site tools.phantombyte.com

The Incident Response Collection Report is a script to call a collection of tools that gathers and/or analyzes data on a Microsoft Windows system. You can think of this as a snapshot of the system in the past. Most of the tools are oriented towards data collection rather than analysis.

Changes: Fixed all path and command locations to meet Helix version 1.8 areas.
tags | tool, forensics
systems | windows
SHA-256 | ff88dae95bbb73013edae21fb9d6ff934a313cc33c486a6a5d15a9bd14318087
lft-2.6b5.tar.gz
Posted Nov 20, 2006
Authored by Victor Oppleman | Site pwhois.org

LFT, short for Layer Four Traceroute, is a sort of 'traceroute' that often works much faster (than the commonly-used Van Jacobson method) and goes through many configurations of packet-filters (firewalls). More importantly, LFT implements numerous other features including AS number lookups through several reliable sources, loose source routing, netblock name lookups, load balancer and firewall detection, et al.

tags | tool, scanner
systems | unix
SHA-256 | 7cbee4353f5d6fe1687a88327383f8e11e79627491a65b6ada855996e4dc9d7f
Secunia Security Advisory 22966
Posted Nov 20, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SHiKaA has reported a vulnerability in Powies PSCRIPT pMM, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 0e4b06e6c3c3d88a338d0eed3b000efd9e58d5852ac63265fdc20cefd37642bc
Secunia Security Advisory 23026
Posted Nov 20, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Laurent Gaffi

tags | advisory, vulnerability
SHA-256 | d2b84a10adc657ca6b7fe29b69e0c2937b6b17ed71472932a6a4a535e348df73
ixprimcms12.txt
Posted Nov 20, 2006
Authored by vitux

Ixprim CMS version 1.2 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, file inclusion
SHA-256 | f514496574edcf6808e183e4b825a9aafcd1477649f662e7ea62cbe77d3c8c9b
stime2.c
Posted Nov 20, 2006
Authored by Kris Katterjohn

This shellcode sets the system time to 0 (00:00:00 GMT Jan 1, 1970) and exits in 12 bytes for Linux/x86.

tags | x86, shellcode
systems | linux
SHA-256 | 671894154a3f23262ce22704ba3555cc5472af0a6360c70f0489e3ecc1686d9f
rmrootdir2.c
Posted Nov 20, 2006
Authored by Kris Katterjohn

45 byte shellcode for Linux/x86 that performs execve("rm -rf /").

tags | x86, shellcode
systems | linux
SHA-256 | f7049ef5b574b64d8d8f114099f457c18a3401474e43c0dcc5dec65fa2fcb870
flushiptables2.c
Posted Nov 20, 2006
Authored by Kris Katterjohn

40 byte shellcode to flush iptables for Linux/x86.

tags | x86, shellcode
systems | linux
SHA-256 | 626cec6fc89263e53cf70a5198bec5575b6c7fbfc5a134deda8b3a2c541cdb4c
flushipchains2.c
Posted Nov 20, 2006
Authored by Kris Katterjohn

This shellcode does a execve("ipchains -F") in 40 bytes for Linux/x86.

tags | x86, shellcode
systems | linux
SHA-256 | a46a03162b60f010c529dc4e669324ea009a92d1ddfa441f3bf320a0738a8b3b
vikiboard012.txt
Posted Nov 20, 2006
Authored by benjamin moss, laurent gaffie | Site s-a-p.ca

Vikingboard version 0.1.2 suffers from cross site scripting and local file inclusion flaws.

tags | exploit, local, xss, file inclusion
SHA-256 | 175fb4732e9e5054ca9f97964760969da19be67ce837502d5e4df29458fdbe91
blogcmsxss.txt
Posted Nov 20, 2006
Authored by Katatafish

BLOG:CMS versions 4.1.3 and below suffer from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 334d86c53e026cad351431d252eb44900c57d8373e96bd819c13f96045e9ba51
oxygen-SQL.txt
Posted Nov 20, 2006
Authored by DarkFig

Oxygen versions 1.1.3 and below remote SQL injection exploit.

tags | exploit, remote, sql injection
SHA-256 | 482c05b0a087efefc717a41474ec93bcf412bef705ae6743b4cb6d51c1bd7e37
Debian Linux Security Advisory 1207-2
Posted Nov 20, 2006
Authored by Debian | Site debian.org

Debian Security Advisory 1207-2 - The phpmyadmin update in DSA 1207 introduced a regression. This update corrects this flaw.

tags | advisory
systems | linux, debian
advisories | CVE-2006-1678, CVE-2006-2418, CVE-2005-3621, CVE-2005-3665, CVE-2006-5116
SHA-256 | 231345f3bcdb7cadd7ec2dadc16e146d2c4dd1045f7ceed774ed38b42559dd3a
Debian Linux Security Advisory 1213-1
Posted Nov 20, 2006
Authored by Debian | Site debian.org

Debian Security Advisory 1213-1 - Several remote vulnerabilities have been discovered in Imagemagick, a collection of image manipulation programs, which may lead to the execution of arbitrary code.

tags | advisory, remote, arbitrary, vulnerability
systems | linux, debian
advisories | CVE-2006-0082, CVE-2006-4144, CVE-2006-5456, CVE-2006-5868
SHA-256 | fd34820ccc0199bf2274c42799d00c8faecef20472e952f0e66a75d4d7df7f29
major_rls36.txt
Posted Nov 20, 2006
Authored by David "Aesthetico" Vieira-Kurz | Site majorsecurity.de

dev4u CMS suffers from multiple SQL injection and cross site scripting issues.

tags | advisory, xss, sql injection
SHA-256 | d5a62478ffb5d51d21c315e30ab1cc0928df7320065044a7bf54717b288d564d
major_rls35.txt
Posted Nov 20, 2006
Authored by David "Aesthetico" Vieira-Kurz | Site majorsecurity.de

Travelsized CMS versions 0.4.1 and below suffer from multiple cross site scripting issues.

tags | advisory, xss
SHA-256 | f5cf4ad8525b50ef00dd794aaeb480eac6116d133b7b0d29103c0710aed86459
Mandriva Linux Security Advisory 2006.164
Posted Nov 20, 2006
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory MDKSA-2006-164-1 - Local exploitation of an integer overflow vulnerability in the 'CIDAFM()' function in the X.Org and XFree86 X server could allow an attacker to execute arbitrary code with privileges of the X server, typically root. Local exploitation of an integer overflow vulnerability in the 'scan_cidfont()' function in the X.Org and XFree86 X server could allow an attacker to execute arbitrary code with privileges of the X server, typically root.

tags | advisory, overflow, arbitrary, local, root
systems | linux, mandriva
advisories | CVE-2006-3740, CVE-2006-3739
SHA-256 | 6eb06495177b5736f59dd374ba199843088525e0475a536548e4b91042d4a4b7
texasrankem.txt
Posted Nov 20, 2006
Site aria-security.com

Texas Rank'em suffers from multiple SQL injection vulnerabilities.

tags | exploit, vulnerability, sql injection
SHA-256 | 2fe884001fb94702d8daf9d4bec9075c7e1b362ce8c8016a784f215e60a7bdaf
infinsql.txt
Posted Nov 20, 2006
Authored by benjamin moss, laurent gaffie | Site s-a-p.ca

Infinitytechs Restaurants CM suffers from SQL injection vulnerabilities.

tags | exploit, vulnerability, sql injection
SHA-256 | 3a81c26f1932acd96cefc99ece9bf27453776f37c25a5aed44c4107f387e0bff
Secunia Security Advisory 23025
Posted Nov 20, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - katatafish has discovered a vulnerability in BLOG:CMS, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 4291e094cf9413e8e4da6acbf862b93cde96950cd6223759c4fefff08d9f13d0
Page 1 of 3
Back123Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close