what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 577 RSS Feed

Files Date: 2005-09-01 to 2005-09-30

mtaboom.txt
Posted Sep 26, 2005
Authored by Luigi Auriemma | Site aluigi.altervista.org

MultiTheftAuto versions 0.5 patch 1 and below allow anyone to modify the motd and cause a crash in Windows.

tags | advisory
systems | windows
SHA-256 | c64d313f5dc7c205478d5c7de60955c0bda03b5c79cb6ea40f3641bdbca0b54e
Ubuntu Security Notice 187-1
Posted Sep 26, 2005
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice USN-187-1 - A Denial of Service vulnerability was detected in the stack segment fault handler. A local attacker could exploit this by causing stack fault exceptions under special circumstances (scheduling), which lead to a kernel crash. Vasiliy Averin discovered a Denial of Service vulnerability in the tiocgdev ioctl call and in the routing_ioctl function. By calling fget() and fput() in special ways, a local attacker could exploit this to destroy file descriptor structures and crash the kernel.

tags | advisory, denial of service, kernel, local
systems | linux, ubuntu
advisories | CVE-2005-3044, CVE-2005-1767
SHA-256 | fae87c160625ea0aa26f17338f7d6f5053368777a81d857b5ae41a045d0dc217
contentServ.txt
Posted Sep 26, 2005
Authored by qobaiashi

The ContentServ CMS allows for remote file disclosure. Exploitation details provided.

tags | exploit, remote
SHA-256 | 7f023ffca1207787da7967c8d5fbee488ab07f7b2629827e0b3f0fd32b87fb26
poppassd-lnx.sh.txt
Posted Sep 26, 2005
Authored by Kingcope

Linux Qpopper poppassd latest version local root exploit.

tags | exploit, local, root
systems | linux
SHA-256 | 359257daa77f9f0e2c89be1a887fb0aee80f2b97f3cb11af5a5f3c2e3e21073d
poppassd-freebsd.sh.txt
Posted Sep 26, 2005
Authored by Kingcope

FreeBSD Qpopper poppassd latest version local root exploit. Tested on FreeBSD 5.4-RELEASE.

tags | exploit, local, root
systems | freebsd
SHA-256 | ec9e82155213753b712f0aa73de5fe9e2ef20be39dbc88b2b8f9c0fc19bed853
wzdftpdwarez.pl.txt
Posted Sep 26, 2005
Authored by Kingcope

WzdFTPd versions 0.5.4 and below remote command execution exploit.

tags | exploit, remote
SHA-256 | f7f9963844c4f4bd7d1a8a49da8c384e861ff2cf0f68aaf1cb006cec8543227d
xmlhttpRequestpaper.txt
Posted Sep 26, 2005
Authored by Amit Klein

Whitepaper entitled "Exploiting the XmlHttpRequest object in IE - Referrer spoofing, and a lot more."

tags | paper, spoof
SHA-256 | f9a2ac7567ed51e0a9e6e4ff4008bf10f202d346e42b74a07fdaa5b5d39e055f
GeSHi.txt
Posted Sep 26, 2005
Authored by Maksymilian Arciemowicz | Site securityreason.com

GeSHi version 1.0.72 is susceptible to a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 1b769d2ceebbe29458133f77b4b4f3c635e125a1a866a8a371bdfc04f5cfe7df
adv7.pdf
Posted Sep 26, 2005
Authored by Ilja van Sprundel | Site suresec.org

Suresec Security Advisory - The malloc() function on Mac OS X insecurely trusts a debug variable, regardless of the fact that the calling application may be suid root. This can result in an arbitrary file being overwritten, which can be used to escalate privileges.

tags | advisory, arbitrary, root
systems | apple, osx
advisories | CVE-2005-2748
SHA-256 | cdb59539bd347748b5b59524ac993ceffaf516ffabd88ddfebd8dcd9e1a43d1b
cmsXSS.txt
Posted Sep 26, 2005
Authored by X1ngBox

CMS Made Simple 0.10 is susceptible to a cross site scripting attack.

tags | exploit, xss
SHA-256 | ef63f404102edc1137d3a52efae22ba5c90c46ae26e8aab7cf1e6a21d42a4e3e
FiTechSummit_final_paper.pdf
Posted Sep 26, 2005
Authored by Kenneth F. Belva | Site ftusecurity.com

This presentation was given by the keynote speaker at the FiTech Summit 2005. It is entitled "How It's Difficult to Ruin a Good Name: An Analysis of Reputational Risk".

tags | paper
SHA-256 | 3ab52b06315c51be5592e0eb263596d926684a34f932ce28649184d7e7e1d185
bilbo-0.12.tar.gz
Posted Sep 26, 2005
Authored by Bart Somers | Site doornenburg.homelinux.net

Bilbo is a wrapper for nmap which makes it easier to scan lots of machines or networks.

Changes: Bilbo now takes command-line options, instead off hacking in the header, which makes it easier to control. Code clean up has also been performed.
tags | tool, nmap
systems | unix
SHA-256 | bff8373389454c65b14bc6b10a52eeb0a1fc61967fab8ade193b6092b2787f01
maildisgust.txt
Posted Sep 26, 2005
Authored by rgod | Site retrogod.altervista.org

MailGust 1.9 is vulnerable to a SQL injection attack that allows for board takeover. Exploit provided.

tags | exploit, sql injection
SHA-256 | 28ab60a0500bfc5e64b00a09e3e5cfc960c5842cc91fd51bd3f9c015be26ab73
efriends.txt
Posted Sep 26, 2005
Authored by khc

AlstraSoft E-Friends is susceptible to a remote command execution flaw. Details provided.

tags | exploit, remote
SHA-256 | 04558972c962230e473329bbe394de586e275912854405ac5f3ace9b2e51a9bd
Gentoo Linux Security Advisory 200509-17
Posted Sep 26, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200509-17 - Keigo Yamazaki discovered that the miniserv.pl webserver, used in both Webmin and Usermin, does not properly validate authentication credentials before sending them to the PAM (Pluggable Authentication Modules) authentication process. The default configuration shipped with Gentoo does not enable the full PAM conversations option and is therefore unaffected by this flaw. Versions less than 1.230 are affected.

tags | advisory
systems | linux, gentoo
advisories | CVE-2005-3042
SHA-256 | a2b323a8185b1247befd647c72d00f474b4dae1d7389cfb354d32de11d1f3ec6
Gentoo Linux Security Advisory 200509-16
Posted Sep 26, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200509-16 - Mantis fails to properly sanitize untrusted input before using it. This leads to an SQL injection and several cross-site scripting vulnerabilities. Versions less than 0.19.2 are affected.

tags | advisory, vulnerability, xss, sql injection
systems | linux, gentoo
advisories | CVE-2005-2556, CVE-2005-2557
SHA-256 | 7943ef5dd4c3e9711bd373818cc301f5f129200015fc560385abe50b03004649
Debian Linux Security Advisory 820-1
Posted Sep 26, 2005
Authored by Debian | Site debian.org

Debian Security Advisory DSA 820-1 - Jakob Balle discovered that with Conditional Comments in Internet Explorer it is possible to hide javascript code in comments that will be executed when the browser views a malicious email via sqwebmail. Successful exploitation requires that the user is using Internet Explorer.

tags | advisory, javascript
systems | linux, debian
advisories | CVE-2005-2820
SHA-256 | d39e1b10d15a759ca8220ce2607902c1ac4d3eea7d83cd7421c8f083820eb551
riverdarkXSS.txt
Posted Sep 24, 2005
Authored by X1ngBox

Riverdark RSS Syndicator version 2.17 is susceptible to cross site scripting attacks.

tags | exploit, xss
SHA-256 | 6088a27b40b8d5a5418660901ae75e2e548a229ca66a4042b59480a19e67bc68
HijackHeadSet.txt
Posted Sep 24, 2005
Authored by Kevin Finisterre | Site digitalmunition.com

Small write up entitled "Hijacking Bluetooth Headsets for Fun and Profit".

tags | paper
SHA-256 | 77323c05bbb2580095063a300d007938e1bc5d61ac068734b800ab7a87e42caf
Ubuntu Security Notice 186-1
Posted Sep 24, 2005
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice USN-186-1 - Peter Zelezny discovered that URLs which are passed to Firefox or Mozilla on the command line are not correctly protected against interpretation by the shell. If Firefox or Mozilla is configured as the default handler for URLs (which is the default in Ubuntu), this could be exploited to execute arbitrary code with user privileges by tricking the user into clicking on a specially crafted URL (for example, in an email or chat client).

tags | advisory, arbitrary, shell
systems | linux, ubuntu
advisories | CVE-2005-2968
SHA-256 | a55ca2e35e593d050ddf54300ab88ea5d9ec5a91596f7da1133b8128d74794d2
secunia-PowerArchiver.txt
Posted Sep 24, 2005
Authored by Tan Chew Keong | Site secunia.com

Secunia Research has discovered a vulnerability in PowerArchiver, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error when reading the filename of a compressed file from an ACE/ARJ archive. This can be exploited to cause a stack-based buffer overflow when a malicious archive containing a file with an overly long filename is opened. Successful exploitation allows arbitrary code execution. Versions affected: PowerArchiver 2006 version 9.5 Beta 4/Beta 5, PowerArchiver 2004 version 9.25, PowerArchiver 2003 version 8.60, PowerArchiver 2002 version 8.10.

tags | advisory, overflow, arbitrary, code execution
SHA-256 | d91f317dc4dfa469154642413a7d8614b4d771da4b5bc132088b13598dfad62d
jPortalSQL.txt
Posted Sep 24, 2005
Authored by krasza | Site krewniacy.pl

jPortal versions 2.2.1 through 2.3.1 suffer from a SQL injection vulnerability. Exploitation details provided.

tags | exploit, sql injection
SHA-256 | 0ba299252a5279ea725d0580269305521c10ef80d327e966584571381b79bb1f
Debian Linux Security Advisory 819-1
Posted Sep 24, 2005
Authored by Debian | Site debian.org

Debian Security Advisory DSA 819-1 - An integer overflow with a subsequent buffer overflow has been detected in PCRE, the Perl Compatible Regular Expressions library, which allows an attacker to execute arbitrary code, and is also present in Python. Exploiting this vulnerability requires an attacker to specify the used regular expression.

tags | advisory, overflow, arbitrary, perl, python
systems | linux, debian
advisories | CVE-2005-2491
SHA-256 | 81da3abd2ec36bf75527851c662acd3db1a2bf4da02cf816f39b873cca9be400
secunia-7zip.txt
Posted Sep 24, 2005
Authored by Tan Chew Keong | Site secunia.com

Secunia Research has discovered a vulnerability in 7-Zip, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error when handling an ARJ block that is larger than 2600 bytes. This can be exploited to cause a stack-based buffer overflow when a specially crafted ARJ file is opened. Successful exploitation allows arbitrary code execution. Affected versions are: 7-Zip Version 3.13, 4.23, and 4.26 BETA.

tags | advisory, overflow, arbitrary, code execution
SHA-256 | 21f735293b5f28bb27d6b63dd540c87041eb152dc9e1fbffb657bd18d8139676
Secunia Security Advisory 16913
Posted Sep 24, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - rgod has discovered a vulnerability in My Little Forum, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 3bad1aa628298941fd8dce61478171d94c00ae7a0db1292b310148826c0ed534
Page 4 of 24
Back23456Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    38 Files
  • 24
    Sep 24th
    65 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close