what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 101 - 125 of 748 RSS Feed

Files Date: 2005-10-01 to 2005-10-31

saphpLesson.txt
Posted Oct 26, 2005
Authored by aLMaSTeR

saphp Lesson is vulnerable to SQL injection. Exploitation provided.

tags | advisory, sql injection
SHA-256 | b18e140b3a9e28b98d2832d38991426a351a2144143751fa0b2cc1f5ec52768c
dcp-portalv6.txt
Posted Oct 26, 2005
Authored by alex from aleksanet

DCP Portal versions less than or equal to v6 are vulnerable to SQL injection and XSS attacks.

tags | advisory, sql injection
SHA-256 | 59b439177fcdb36ff0ee49e4344d52bbda2cdf6d0181c073634a787e13c0130c
nklan.pl
Posted Oct 26, 2005
Authored by papipsycho

Nuked klan 1.7: Remote Exploit.

tags | exploit, remote
SHA-256 | 3c8098a28fe10e80eaf203e2936fec0e9630968fb220238be19fb8ba9d349779
SUSE-SA-2005-062.txt
Posted Oct 26, 2005
Site suse.com

SUSE Security Announcement - information disclosure via permissions package.

tags | advisory, info disclosure
systems | linux, suse
SHA-256 | 889712208a141b0cc0923e610a384ea3c068b06274ed61d01d4e3c65d7770093
Trustix Secure Linux Security Advisory 2005.59
Posted Oct 26, 2005
Authored by Trustix | Site http.trustix.org

Trustix Secure Linux Security Advisory #2005-0059 - Multiple vulnerabilities in apache, lynx, mod_php4, openssl, php4, php, squid, texinfo, and wget.

tags | advisory, php, vulnerability
systems | linux
SHA-256 | b4197c01fe5f684fdb98b3e5b534d68a67f885d006e32bc2b7bb8fef99c8c5f0
php.4.4.1.txt
Posted Oct 26, 2005
Authored by Eric Romang | Site zataz.com

php version 4.4.1 .htaccess apache DOS exploit.

tags | exploit, php
SHA-256 | 89b45db948a6dc9783df06193d900b40d886c9e201fd99c49f8648806d4d12c6
phpnuke78sql.txt
Posted Oct 26, 2005
Authored by rgod | Site retrogod.altervista.org

PHPNuke 7.8 SQL INjection and remote commands execution poc exploit.

tags | exploit, remote, sql injection
SHA-256 | df4acdcff0846dbb205c33f3ea005fe82b2971d79290c887fc92d2b99710b645
punbb-1.1.2.txt
Posted Oct 26, 2005
Authored by rod hedor | Site lezr.com

PunBB versions between 1.1.2 and 1.1.5 suffer from a remote file inclusion vulnerability.

tags | exploit, remote, file inclusion
SHA-256 | f713bad666ccd0bd7baae90f57cab948c2071b3654468d1386d041ef728e2c96
msn-cap.c
Posted Oct 26, 2005
Authored by Gabriel Menezes Nunes | Site dragonf.v10.com.br

A simple libpcap based MSN protocol sniffer.

tags | tool, sniffer, protocol
SHA-256 | f03c69e064f1269dfd5adbc668204d0a7e0eafb86317e293e9d6c1ce0a4f5761
cb4n6.c
Posted Oct 26, 2005
Authored by rotor | Site c1zc0.com

This is a ipv6 banner grabber by c1zc0 Security

systems | cisco
SHA-256 | e85388d2e1be213c5e3ff508b15076266d49cb3ff37175580006ed793cf2433e
c1zc0-mgx.pl
Posted Oct 26, 2005
Authored by rotor | Site c1zc0.com

This is a basic cisco mgx scanner that scans for default passwords.

systems | cisco
SHA-256 | 645f8f559a0d20025f86a35683429de0b85591f451ec739fd80a1c5d15bc5966
qcrack-v0.2.tgz
Posted Oct 26, 2005
Authored by Q nix | Site 0x11.org

Qcrack is a program written to test the security of md5 passwords by attempting to brute force them. The user can also specify the characters to use when brute-forcing.

Changes: Added md2 & md4 brute force, Added md2 & md4 verbose & quite mode, Added md2 & md4 calculator
tags | cracker
SHA-256 | 8474efd25891851e4fd91bf9b3ce4da6f2ec3c5a13c27121c5f4c24a0de25238
flatnuke.txt
Posted Oct 26, 2005
Authored by Abducter

Flatnuke suffers from file inclusion vulnerabilities and XSS

tags | exploit, vulnerability, file inclusion
SHA-256 | bb52f22a19b5c079e852968d2c6a8389a56300c5f66d5204debbb35f52f6e435
AL-Caricatier.txt
Posted Oct 26, 2005
Authored by MoHaJaLi

AL-Caricatier suffers from a login bypass vulnerability.

tags | exploit, bypass
SHA-256 | f7b1cadb07d37326efea2ea0eb7d07f8d10779038dba1b6279795775bdd42eb2
162005.txt
Posted Oct 26, 2005
Authored by Stefan Esser | Site hardened-php.net

Hardened-PHP Project Security Advisory - And audit of phpMyAdmin revealed a design flaw in the way phpMyAdmin includes it's register_globals compatibility layer, that allows inclusion of arbitrary local files, which usually leads to remote code execution.

tags | advisory, remote, arbitrary, local, php, code execution
SHA-256 | 07c39621998dfc6ec31c6e8cee28b68e1549bc5e4f8dd5cf117ed955de7ddbc5
phpBB-IE-gif.txt
Posted Oct 26, 2005
Authored by alphakgen

phpBB 2.0.17 (and other BB systems as well) Cookie disclosure exploit - This exploit details a method which uses the Gif bug in IE to perform a XSS attack.

tags | exploit
SHA-256 | d91dff60352e732640beee7806aa41a9c45b5959d3f48c32e267e9a5b93cc466
Gentoo Linux Security Advisory 200510-21
Posted Oct 26, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200510-21 - Stefan Esser discovered that by calling certain PHP files directly, it was possible to workaround the grab_globals.lib.php security model and overwrite the $cfg configuration array. Systems running PHP in safe mode are not affected. Furthermore, Tobias Klein reported several cross-site-scripting issues resulting from insufficient user input sanitizing. Versions less than 2.6.4_p3 are affected.

tags | advisory, php
systems | linux, gentoo
SHA-256 | bdc34b73151d595048e983ee59c1ac6b53aeef0310b18852111bdc00a67958ec
Gentoo Linux Security Advisory 200510-20
Posted Oct 26, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200510-20 - Zope honors file inclusion directives in RestructuredText objects by default. Versions less than 2.7.8 are affected.

tags | advisory, file inclusion
systems | linux, gentoo
SHA-256 | fa3508d05860a34beb4eaf6ad27147ade6dd88c2ba2ef0d5255a87e4300bf526
Gentoo Linux Security Advisory 200510-19
Posted Oct 26, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200510-19 - iDEFENSE reported that insufficient bounds checking on a memcpy() of the supplied NTLM username can result in a stack overflow. Versions less than 7.15.0 are affected.

tags | advisory, overflow
systems | linux, gentoo
SHA-256 | b403869cb001836a2a8f8c3b58aa4ab7d808f737aa05a63af0cbcdbbd522b133
BMC-Control-M.txt
Posted Oct 26, 2005
Authored by Scott Cromar

BMC's Control M enterprise scheduling facility creates temporary files insecurely.

tags | advisory
SHA-256 | 10159e46cbab518398523ed1786a87cbc0d512a8f648293114d56d7015f86202
qcrack-v0.17.tgz
Posted Oct 26, 2005
Authored by Q nix | Site 0x11.org

Qcrack is a program written to test the security of md5 passwords by attempting to brute force them. The user can also specify the characters to use when brute-forcing.

Changes: Added Hash Calculate, Full ANSI Colors, Buffer overflow Bug Fixed, Added Verbose & quite mode
tags | cracker
SHA-256 | 67aa24c0dcc7ce582aa9d7359224e4f37030cfa21591ca3eb4a793a2d8e7985d
dmproxss.txt
Posted Oct 26, 2005
Authored by Farhad Koosha | Site kapda.ir

[KAPDA::#8] Domain Manager Pro Vulnerability - A remote user can conduct cross-site scripting attacks.The 'panel' script does not properly validate user-supplied input at the 'err' parameter.So remote user can inject html script to fake login form and steal admin's password.

tags | advisory, remote, xss
SHA-256 | 884d2c7cab6a1fb8491aefd45b26685f951bc1ff50e09b9c0295fdebbf165705
Newsworld-1.5.0.txt
Posted Oct 26, 2005
Authored by Chb | Site incast-security.de

aRCHILLES Newsworld versions less than 1.5.0-rc1 suffer from multiple vulnerabilities including login bypass and information disclosure. POC and workarounds included.

tags | advisory, vulnerability, info disclosure
SHA-256 | 9227656086e77f731c91ef4311c8666b9482d7c9442c448649307de93e6d155c
mwchat.txt
Posted Oct 26, 2005
Authored by rgod | Site retrogod.altervista.org

MWCHAT 6.8 SQL injection and remote command execution exploit.

tags | exploit, remote, sql injection
SHA-256 | 41110b8a0d1dc327dbda05febcf2566569f15a2637fd71c9e8c0e5d01e2bc6f7
fear-lithsock.txt
Posted Oct 26, 2005
Authored by Luigi Auriemma | Site aluigi.altervista.org

F.E.A.R. (First Encounter Assault and Recon) 1.01 is still vulnerable to a bug discovered in December 2004.

tags | advisory
SHA-256 | 1bd561f56fa4976f859ecef647720e1eb9ae93c82482cbb22ccd4ed2d2c48187
Page 5 of 30
Back34567Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close