exploit the possibilities
Showing 1 - 25 of 47 RSS Feed

Files Date: 2006-12-08

tucows-rfi.txt
Posted Dec 8, 2006
Authored by Dr Max Virus

Tucows Client Code Suite versions 1.2.1015 and below remote file inclusion exploit.

tags | exploit, remote, code execution, file inclusion
MD5 | b8f9e61ed5f098493fa7105b77f1e6e8
cm68news-rfi.txt
Posted Dec 8, 2006
Authored by Paul Bakoyiannis

CM68 News versions 12.02.06 and below suffer from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
MD5 | 58a0bffb220828beff16bc18e620c72f
thinkedit-rfi.txt
Posted Dec 8, 2006
Authored by r0ut3r

ThinkEdit version 1.9.2 remote file inclusion exploit that makes use of render.php.

tags | exploit, remote, php, code execution, file inclusion
MD5 | 21bc1dde0ace199aab870e0c235683d4
Nmap Scanning Utility 4.20
Posted Dec 8, 2006
Authored by Fyodor | Site insecure.org

Nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). Nmap supports Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments (bypasses some packet filters), TCP ACK and Window scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping scanning, Direct (non portmapper) RPC scanning, Remote OS Identification by TCP/IP Fingerprinting, and Reverse-ident scanning. Nmap also supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings. Full changelog available here.

Changes: New OS fingerprint submissions have been added. Fixed a segmentation fault in the new OS detection system. Fixed a TCP sequence prediction difficulty indicator bug.
tags | tool, remote, udp, tcp, protocol, nmap
systems | unix
MD5 | 93e3b2b6b11092a587c69b67cf27555f
sauerkraut.c
Posted Dec 8, 2006
Authored by softxor | Site bunnies.phpnet.us

sauerkraut is a lightweight, multi-threaded and very fast IP scanner with a built-in banner grabber.

tags | tool, scanner
systems | unix
MD5 | 07c2a78a634aa26078972439062833ad
refspoof.c
Posted Dec 8, 2006
Authored by softxor | Site bunnies.phpnet.us

Refspoof acts like a proxy server and is able to spoof your HTTP referrer and user-agent. This comes in handy to bypass certain authentication mechanisms or user-agent limitations for some download managers.

tags | web, spoof
MD5 | efa2344a37c1108a34821fce25644a3b
madwifi.txt
Posted Dec 8, 2006
Authored by Laurent Butti, Jerome RAZNIEWSKI, Julien Tinnes

There is a buffer overflow in the Madwifi Atheros driver in some functions called by SIOCSIWSCAN ioctl.

tags | advisory, overflow
advisories | CVE-2006-6332
MD5 | 85ad9569cc390f3940ea36572456c226
CA Security Advisory 34846
Posted Dec 8, 2006
Authored by Ken Williams, Computer Associates | Site www3.ca.com

CAID 34846 - CA BrightStor ARCserve Backup contains a buffer overflow that allows remote attackers to execute arbitrary code with local SYSTEM privileges on Windows. This issue affects the BrightStor Backup Discovery Service in multiple BrightStor ARCserve Backup application agents and the Base product.

tags | advisory, remote, overflow, arbitrary, local
systems | windows
advisories | CVE-2006-6379
MD5 | 8de71a296de6c70c131d297bdf14a0b4
OpenPKG Security Advisory 2006.38
Posted Dec 8, 2006
Authored by OpenPKG Foundation | Site openpkg.org

OpenPKG Security Advisory OpenPKG-SA-2006.038 - The archive format utility GNU tar, versions up to and including 1.16, allows user-assisted attackers to overwrite arbitrary files via a TAR format file that contains a "GNUTYPE_NAMES" record with a symbolic link.

tags | advisory, arbitrary
advisories | CVE-2006-6097, CVE-2002-1216
MD5 | ffcbff6b98fa861839e87d505859987c
Debian Linux Security Advisory 1230-1
Posted Dec 8, 2006
Authored by Debian | Site debian.org

Debian Security Advisory 1230-1 - Rhys Kidd discovered a vulnerability in l2tpns, a layer 2 tunneling protocol network server, which could be triggered by a remote user to execute arbitrary code.

tags | advisory, remote, arbitrary, protocol
systems | linux, debian
advisories | CVE-2006-5873
MD5 | 1c21f599702654e863c4ec9e4f951527
midiripoff.txt
Posted Dec 8, 2006
Authored by IFX

Midicart is susceptible to multiple vulnerabilities, including price manipulation.

tags | exploit, vulnerability
MD5 | 4e34b154b359a8013ad1a744e247a5d5
orkut-xss.txt
Posted Dec 8, 2006
Authored by Rajesh Sethumadhavan

Google's Orkut suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
MD5 | 9d9636427cbc206069e7fb1134dc9b4a
Ubuntu Security Notice 394-1
Posted Dec 8, 2006
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 394-1 - An error was found in Ruby's CGI library that did not correctly quote the boundary of multipart MIME requests. Using a crafted HTTP request, a remote user could cause a denial of service, where Ruby CGI applications would end up in a loop, monopolizing a CPU.

tags | advisory, remote, web, denial of service, cgi, ruby
systems | linux, ubuntu
advisories | CVE-2006-6303
MD5 | 1c6068d99a3db060a1425b45119d2ca7
aria-whm.txt
Posted Dec 8, 2006
Site Aria-security.net

WebHost Manager version 3.1.0 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
MD5 | 14c6f5c405b1e607eda9c0e27e2c0db1
aria-cpanel.txt
Posted Dec 8, 2006
Site Aria-security.net

CPanel 11 suffers from a cross site scripting vulnerability in pops.html.

tags | exploit, xss
MD5 | c5c9ebcf24a345eb0b5b6611e8622bb1
EEYE-Intel.txt
Posted Dec 8, 2006
Authored by Derek Soeder | Site eeye.com

eEye Digital Security has discovered a vulnerability in all Intel network adapter drivers ("NDIS miniport drivers") that could allow unprivileged code executing on an affected system to gain unfettered, kernel-level access. For instance, a malicious user, malware, or exploit payload taking advantage of an unrelated vulnerability could additionally exploit this vulnerability in order to completely compromise a system at the kernel level.

tags | advisory, kernel
MD5 | 8f5fd83e20858675b49c76f16aaa3256
OpenPKG Security Advisory 2006.37
Posted Dec 8, 2006
Authored by OpenPKG Foundation | Site openpkg.org

OpenPKG Security Advisory OpenPKG-SA-2006.037 - Two security issues were discovered in the OpenPGP cryptography tool GnuPG, versions up to and including 1.4.5 and 2.0.1. The first issue is a heap-based buffer overflow which has been identified by the vendor during fixing a bug reported by Hugh Warrington. The second issue is a memory management problem.

tags | advisory, overflow
advisories | CVE-2006-6169, CVE-2006-6235
MD5 | c5b07a3abce57ec57c834dfff17f3e4c
dudirBypass.txt
Posted Dec 8, 2006
Authored by C-W-M

DUdirectory suffers from an administrative login bypass vulnerability due to a SQL injection flaw.

tags | exploit, sql injection, bypass
MD5 | 7e2db4d4730e5f4ceeea0c44c84f784f
phpadsnew-rfi.txt
Posted Dec 8, 2006
Authored by Crackers_Child

phpAdsNew version 2.0.4-p2 remote file inclusion exploit.

tags | exploit, remote, code execution, file inclusion
MD5 | 9f2b027720d12f1455a1cc144ce4c05e
googlegath.txt
Posted Dec 8, 2006
Authored by Matteo Cantoni | Site nothink.org

googlegath is a free open source utility to obtain informations through Google searches. It could be useful for penetration testing, security scanning, etc. googlegath has been tested on GNU/Linux, *BSD systems.

tags | web
systems | linux, bsd
MD5 | 7258710bb9b915f89b5a84dcbc1c06ae
Gentoo Linux Security Advisory 200612-1
Posted Dec 8, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200612-01 - The wv library fails to do proper arithmetic checks in multiple places, possibly leading to integer overflows. Versions less than 1.2.3-r1 are affected.

tags | advisory, overflow
systems | linux, gentoo
MD5 | 8fa4ee8888e1abb657780f1e7fcf26b4
Secunia Security Advisory 22971
Posted Dec 8, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - sehato has reported a vulnerability in Windows Media Player, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a user's system.

tags | advisory, denial of service
systems | windows
MD5 | f68ebec6701ffae9c440ff544bbb7908
Secunia Security Advisory 23160
Posted Dec 8, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gummiente has discovered some vulnerabilities in the JCE Admin component for Joomla, which can be exploited by malicious people to conduct cross-site scripting attacks and disclose sensitive information.

tags | advisory, vulnerability, xss
MD5 | 76e2500e9eba716444b0ab7180a99dbe
Secunia Security Advisory 23165
Posted Dec 8, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for ruby1.8. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, ubuntu
MD5 | 0619d4ea1384260f7bcbf0554bb52a75
Secunia Security Advisory 23201
Posted Dec 8, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in MailEnable, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | 21b20b2dbe811ef57f1c25a097b70b77
Page 1 of 2
Back12Next

File Archive:

September 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    20 Files
  • 2
    Sep 2nd
    15 Files
  • 3
    Sep 3rd
    15 Files
  • 4
    Sep 4th
    4 Files
  • 5
    Sep 5th
    1 Files
  • 6
    Sep 6th
    1 Files
  • 7
    Sep 7th
    15 Files
  • 8
    Sep 8th
    27 Files
  • 9
    Sep 9th
    7 Files
  • 10
    Sep 10th
    16 Files
  • 11
    Sep 11th
    9 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    25 Files
  • 15
    Sep 15th
    15 Files
  • 16
    Sep 16th
    15 Files
  • 17
    Sep 17th
    15 Files
  • 18
    Sep 18th
    12 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close