exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 72 RSS Feed

Files Date: 2005-11-15 to 2005-11-16

md5coll.zip
Posted Nov 15, 2005
Authored by Patrick Stach, Steve Dispensa

MD5 collision generator tool. Windows port with source.

tags | encryption
systems | windows
SHA-256 | f974e3601b4fcbc763a0348feb1f9026e98d412d2a6aeaea42273546d1a8008c
md5coll.c
Posted Nov 15, 2005
Authored by Patrick Stach

MD5 collision generator tool.

tags | encryption
SHA-256 | ce00158446d946f0333baec9f38470f3670d46c1086d3d71b28ddee5313c5542
Debian Linux Security Advisory 895-1
Posted Nov 15, 2005
Authored by Debian | Site security.debian.org

Debian Security Advisory DSA 895-1 - Masanari Yamamoto discovered incorrect use of environment variables in uim, a flexible input method collection and library, that could lead to escalated privileges in setuid/setgid applications linked to libuim. Affected in Debian is at least mlterm.

tags | advisory
systems | linux, debian
advisories | CVE-2005-3149
SHA-256 | fbd6afdd2f4e94788d55ce21d57a301d428511fd62d47e20165373a1be362f0e
walla30.txt
Posted Nov 15, 2005
Authored by Rafi Nahum, Pokerface

Walla Telesite versions 3.0 and below are susceptible to cross site scripting, SQL injection, and more. Details provided.

tags | exploit, xss, sql injection
SHA-256 | 3029dba35a73a6580ed83f41cb04ab6b626605998100431382b494603a6fcab4
kapda-12.txt
Posted Nov 15, 2005
Authored by trueend5 | Site KAPDA.ir

KAPDA Advisory - ekinboard version 1.0.3 is susceptible to cross site scripting and html injection flaws.

tags | exploit, xss
SHA-256 | f2e17a9c85b4d4db9dda650d51963910482d98e209bc126458dbbef1ebcbe96f
Debian Linux Security Advisory 894-1
Posted Nov 15, 2005
Authored by Debian | Site security.debian.org

Debian Security Advisory DSA 894-1 - Chris Evans discoverd several buffer overflows in the RTF import mechanism of AbiWord, a WYSIWYG word processor based on GTK 2. Opening a specially crafted RTF file could lead to the execution of arbitrary code.

tags | advisory, overflow, arbitrary
systems | linux, debian
advisories | CVE-2005-2964, CVE-2005-2972
SHA-256 | 274758bf137822499400b3faab5dd8c66fdc5fca9ce222e98d17e12741ff3f4b
unb153pl3_xpl.html
Posted Nov 15, 2005
Authored by rgod | Site retrogod.altervista.org

Unclassified NewsBoard version 1.5.3 patch level 3 DateFrom and DateUntil blind SQL injection remote exploit.

tags | exploit, remote, sql injection
SHA-256 | 22deafafcb2fa5cf284ca67667292d8daa35ffabb767aa74fbebc0a1de799792
Cisco Security Advisory 20051114-ipsec
Posted Nov 15, 2005
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - Multiple Cisco products contain vulnerabilities in the processing of IPSec IKE (Internet Key Exchange) messages. These vulnerabilities were identified by the University of Oulu Secure Programming Group (OUSPG) PROTOS Test Suite for IPSec and can be repeatedly exploited to produce a denial of service.

tags | advisory, denial of service, vulnerability
systems | cisco
SHA-256 | 62467cd8f9762f3b1cf8b27df5955296f8b290cc4efa539b57080b841395c7f8
Debian Linux Security Advisory 893-1
Posted Nov 15, 2005
Authored by Debian | Site security.debian.org

Debian Security Advisory DSA 893-1 - Remco Verhoef has discovered a vulnerability in acidlab, Analysis Console for Intrusion Databases, and in acidbase, Basic Analysis and Security Engine, which can be exploited by malicious users to conduct SQL injection attacks.

tags | advisory, sql injection
systems | linux, debian
advisories | CVE-2005-3325
SHA-256 | 3f26a21e5ef30a23b42843797800aaf58c13e2eba9634ca28e60e1f136ed4b5f
fbsdmaster.c
Posted Nov 15, 2005
Authored by Kingcope

master.passwd disclosure local exploit for FreeBSD versions 4.11 and below and 5.4 and below.

tags | exploit, local
systems | freebsd
SHA-256 | 3a61fec1748cbc5fd100cae534599348960f67d0d18a74422f337336777b870f
ciscoASA.txt
Posted Nov 15, 2005
Authored by Amin Tora

An inherent weakness in the CISCO ASA failover testing algorithm and methodology was identified and noted to CISCO TAC and PSIRT. In general, the two weaknesses have been identified as a race condition between two different failover testing processes and a lack of authentication for failover messages between active and standby.

tags | advisory
systems | cisco
SHA-256 | 3dd74cf1fa6ca679acb232d9fc1c99c23c64a3a684a9cc4768f16b9c4c36c2e7
upnp-dos.c
Posted Nov 15, 2005
Authored by Winny Thomas

Denial of service exploit that makes use of a memory leak when sending a specially crafted upnp_getdevicelist request.

tags | exploit, denial of service, memory leak
SHA-256 | c4ad49a26be74e913688c536620eb0a55ff34d9b4d6b43f53754461c413ae7c8
mybbFlaws.txt
Posted Nov 15, 2005
Authored by August Christopher

MyBB is susceptible to multiple user input validation flaws.

tags | advisory
SHA-256 | b1619bfa4b50d81091090007080081672bd37684d4ed4e4d4be1c87371715054
pollvote.txt
Posted Nov 15, 2005
Authored by rUnViRuS

PollVote is susceptible to a remote file inclusion flaw.

tags | exploit, remote, file inclusion
SHA-256 | 284b9ec1459b822c63882279347e143a6f762f1fd9128b0b675fbc1a93eedfd5
fipsCMS.txt
Posted Nov 15, 2005
Authored by Preben Nylokken

fipsCMS is susceptible to cross site scripting.

tags | exploit, xss
SHA-256 | d30e2a08fb610241f8c040d9943b0f66bf652eee6f38565ebbddc2c539d1e258
execMacOSX.txt
Posted Nov 15, 2005
Authored by nemo

execve("/bin/sh",{"/bin/sh",NULL},NULL) shellcode for Mac OSX on both the PPC and x86 platforms.

tags | x86, shellcode, ppc
systems | apple
SHA-256 | a8906c546585510d29afd14973965fe1856fd3050999ab89dc35b4d8c1a853fb
cyphorSQL.txt
Posted Nov 15, 2005
Authored by HACKERS PAL

Cyphor versions 0.19 and below suffer from a SQL injection attack. Exploit provided.

tags | exploit, sql injection
SHA-256 | f0ff18d36ebedf80f58b098297e039e3a6ce902578726def5279e9a35264baf6
EasyPageCMSXSS.txt
Posted Nov 15, 2005
Authored by BiPi_HaCk | Site NightmareSecurity.net

EasyPageCMS is susceptible to cross site scripting attacks. Details provided.

tags | exploit, xss
SHA-256 | bb5df34d5c7cc6efd88bea73311464dd7b653e7a8b51dd4b8d42eae260645bb0
PHPCalendar.txt
Posted Nov 15, 2005
Authored by Robin Verton

A remote code execution vulnerability has been discovered in various CodeGrrl products including PHPCalendar, PHPClique, PHPFanBase, PHPCurrently, and PHPQuotes.

tags | exploit, remote, code execution
SHA-256 | 2539e6a0a10e5c9a163b673cf8ee1861d726956268b445b7b8fd95553d9bb737
Hardened-PHP Project Security Advisory 2005-21.81
Posted Nov 15, 2005
Authored by Christopher Kunz, Hardened-PHP Project | Site hardened-php.net

phpSysInfo versions 2.4 and below suffer from cross site scripting, HTTP response splitting, and arbitrary file inclusion flaws.

tags | exploit, web, arbitrary, xss, file inclusion
advisories | CVE-2005-3347, CVE-2005-3348
SHA-256 | 0e06964507a7ccca53a11efcf06c1e94edfb9afdc2311b04881c95bf3b588fcd
Gentoo Linux Security Advisory 200511-11
Posted Nov 15, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200511-11 - A buffer overflow vulnerability has been found in the linux-ftpd-ssl package. A command that generates an excessively long response from the server may overrun a stack buffer. Versions less than 0.17-r3 are affected.

tags | advisory, overflow
systems | linux, gentoo
SHA-256 | dade794ea74012cf2404a07e204a7197ccb2f31f21ed84588f27a1b24840fd38
Gentoo Linux Security Advisory 200511-10
Posted Nov 15, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200511-10 - RAR contains a format string error and a buffer overflow vulnerability that may be used to execute arbitrary code. Versions less than 3.5.1 are affected.

tags | advisory, overflow, arbitrary
systems | linux, gentoo
SHA-256 | f509a56777c8585e8d79a4605f6d0fa86acd02dba256799399ab3c3efe879cd4
Gentoo Linux Security Advisory 200511-9
Posted Nov 15, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200511-09 - iDefense labs discovered a problem within the feature to execute local cgi-bin programs via the lynxcgi: URI handler. Due to a configuration error, the default settings allow websites to specify commands to run as the user running Lynx. Versions less than 2.8.5-r2 are affected.

tags | advisory, local, cgi
systems | linux, gentoo
SHA-256 | 8f0c15d987285f26b027c9b91e283469123b5d0102e988c19cede40bd432f3e7
Gentoo Linux Security Advisory 200511-8
Posted Nov 15, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200511-08 - PHP suffers from multiple issues, resulting in security functions bypass, local Denial of service, cross-site scripting or PHP variables overwrite. Versions less than 4.4.0-r4 are affected.

tags | advisory, denial of service, local, php, xss
systems | linux, gentoo
SHA-256 | 8c8d573636963b0275b2670b472e162b3f34e1bf9e504f949049830a22748719
iwar-0.01.tar.gz
Posted Nov 15, 2005
Authored by Da Beave | Site softwink.com

Iwar is a war dialer written for Unix type (Linux/OpenBSD/etc) operating systems. It supports a nice curses based front end, ASCII/MySQL logging, system identification, multiple modems support, random/sequential dialing, key stroke logging, and more.

tags | tool, wardialer
systems | linux, unix, openbsd
SHA-256 | c2255c1313a021d07426506aa61acf3072a9876ef3aa56f577698663b47e9351
Page 2 of 3
Back123Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close