exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 194 RSS Feed

Files Date: 2005-11-30 to 2005-11-30

netw-ib-ox-ag-5.32.0.tgz
Posted Nov 30, 2005
Authored by Laurent Constantin | Site laurentconstantin.com

Netwox is a network toolbox. This kit comes with 217 tools that can be used to perform a multitude of tasks that are very useful to any administrator. It supports various protocols (DHCP, DNS, FTP, HTTP, IDENT, IRC, NNTP, NTP, SMB/CIFS, SMTP, SNMP, TELNET, TFTP, WHOIS) and performs low level functions like sniffing, spoofing traffic, and playing client/server roles. It includes a graphical front-end named Netwag, and is based on a library named Netwib. Both Windows and Unix versions are included.

Changes: SMB/CIFS protocol is implemented. A new bash script permits to launch several tools simultaneously. Various other enhancements.
tags | tool, web, spoof, protocol
systems | windows, unix
SHA-256 | 758063d598d694080fcce1083eac4bb0fe96c4e920444d27afd1329012814eae
Gentoo Linux Security Advisory 200511-23
Posted Nov 30, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200511-23 - Sven Tantau reported about a buffer overflow vulnerability in chmlib. The function _chm_decompress_block() does not properly perform boundary checking, resulting in a stack-based buffer overflow. Versions less than 0.37.4 are affected.

tags | advisory, overflow
systems | linux, gentoo
SHA-256 | 10a6863941e87eadffa30c1303d11e9570df290bbbbeb18eec9fbea63602217c
Gentoo Linux Security Advisory 200511-22
Posted Nov 30, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200511-22 - Joxean Koret has discovered that Inkscape incorrectly allocates memory when opening an SVG file, creating the possibility of a buffer overflow if the SVG file being opened is specially crafted. Versions less than 0.43 are affected.

tags | advisory, overflow
systems | linux, gentoo
SHA-256 | a7669a0dd35190be7d3d5b83cb38276e22d7b4013be27e72517c71d8ee9ae345
vbullXSS.txt
Posted Nov 30, 2005
Authored by [N] Shell | Site nshell.h15.ru

vBulletin 3.5.1 suffers from a cross site scripting flaw due to the control panel not properly sanitizing variables.

tags | exploit, xss
SHA-256 | 15fa84271d93c8c72194b016c8d96de0fdf4e2671cf81aee98f9b6ab56b913ca
ZRCSA-200503.txt
Posted Nov 30, 2005
Authored by Siegfried, deepfear

ktools versions 0.3 and below suffer from a buffer overflow vulnerability.

tags | advisory, overflow
SHA-256 | 918ef9d4641780120c240699cc4f252ce1d302824630f5a0f13b19568aefca5d
qnews.txt
Posted Nov 30, 2005
Authored by GB

Q-News version 2.0 is susceptible to a remote file inclusion flaw.

tags | exploit, remote, file inclusion
SHA-256 | 65bdbd60ddbf1ed96db87260f3048da1788201fc1122a655cb0702a2fcd307df
phpgreetz.txt
Posted Nov 30, 2005
Authored by GB

phpgreetz version 0.1a is susceptible to a remote file inclusion flaw.

tags | exploit, remote, file inclusion
SHA-256 | 0c471f2fd4499db27d625c0956e3ee5b023b9f309aa57dbc0abb691c025580fb
athena.txt
Posted Nov 30, 2005
Authored by GB

Athena version 0.1a is susceptible to a remote file inclusion flaw.

tags | exploit, remote, file inclusion
SHA-256 | a5d94ad292f08cc31e2078317b7440fcf0f7e53e9574ef663d0b2d7c250e4352
webistanbul.txt
Posted Nov 30, 2005
Authored by khc

Webistanbul is susceptible to SQL injection attacks.

tags | exploit, sql injection
SHA-256 | 4fc8ee5339f5950cfbe6e0e838a61f598a45568d8b7a9a76d2f75fa238c0f1c8
PBLangXSS.txt
Posted Nov 30, 2005
Authored by r0xes

PBLang version 4.65 suffers from a cross site scripting flaw in profile.php and ucp.php.

tags | exploit, php, xss
SHA-256 | cf4782e0e03201f7fc46871933ede13324110a804079ccd1d47d4708502a29af
smuggler.c
Posted Nov 30, 2005
Authored by Andy Davis - IRMPLC

Smuggler demonstrates HTTP Request Smuggling techniques. Currently it only demonstrates the Microsoft IIS greater than 48K Request Truncation flaw in order to poison caching web proxies.

tags | tool, web
systems | unix
SHA-256 | 83742fae85d9cc74372cdf12ab8cccd9dee6bc94c8b8e72c09f5c52216d0cdc2
Gentoo Linux Security Advisory 200511-21
Posted Nov 30, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200511-21 - When handling a SWF file, the Macromedia Flash Player incorrectly validates the frame type identifier stored in the SWF file which is used as an index to reference an array of function pointers. A specially crafted SWF file can cause this index to reference memory outside of the scope of the Macromedia Flash Player, which in turn can cause the Macromedia Flash Player to use unintended memory address(es) as function pointers. Versions less than 7.0.61 are affected.

tags | advisory
systems | linux, gentoo
SHA-256 | 7794dc431b1b1bc5fb9a5c00d3bcdf6e49016beb9a07d8735fa3b99fd90c66d4
efiction2_xpl.txt
Posted Nov 30, 2005
Authored by rgod | Site retrogod.altervista.org

efiction versions 2.0 and below suffer from remote code execution, SQL injection, login bypass, cross site scripting, and path disclosure flaws. Full exploit and details provided.

tags | exploit, remote, code execution, xss, sql injection
SHA-256 | b6ee828afdcfdc0db17b52645c9dd264df2736df6e3028fc460d3c7405837afe
SEC-20051125-0.txt
Posted Nov 30, 2005
Authored by Daniel Fabian | Site sec-consult.com

SEC-CONSULT Security Advisory 20051125-0 - vTiger versions 4.2 and below have been found susceptible to SQL injection, cross site scripting, code execution, directory traversal, and arbitrary file upload flaws.

tags | exploit, arbitrary, code execution, xss, sql injection, file upload
SHA-256 | c40cfc60da4956c1504de1864fab0f8bc8c5873f798f96b78f0c2755e01d5af9
Hardened-PHP Project Security Advisory 2005-23.105
Posted Nov 30, 2005
Authored by Stefan Esser, Hardened-PHP Project | Site hardened-php.net

Multiple cross site scripting, authentication bypass, SQL injection, file inclusion, and password hash disclosure flaws exist in vTiger versions 4.2 and below. Various details disclosed.

tags | exploit, xss, sql injection, file inclusion
SHA-256 | 5cebea0b280288ffbeb4e2854a40c056858c7c6bd6909cddb3b0988a9a8c0f45
secunia-SpeedProject.txt
Posted Nov 30, 2005
Authored by Tan Chew Keong | Site secunia.com

Secunia Research has discovered two boundary error vulnerabilities in various SpeedProject products, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 40fcd4925c69b8512716ccb146a61281115a9d0d9c4924ad8db2a33fbfbe07b6
mailEnableDoS.txt
Posted Nov 30, 2005
Authored by Josh Zlatin

MailEnable Pro version 1.7 and MailEnable Enterprise version 1.1 are susceptible to a remote IMAP related denial of service flaw when a rename request with non existent mailbox names is presented.

tags | exploit, remote, denial of service, imap
SHA-256 | 3198f10d176771fde3a587491b924d65f7750f614ebf2bc7c1e2d7cabc92d4f9
freeFTPDoS.txt
Posted Nov 30, 2005
Authored by Stefan Lochbihler

freeFTPd version 1.0.10 is susceptible to a remote denial of service attack. Exploit included.

tags | exploit, remote, denial of service
SHA-256 | 2138a8818ceed92c5f02b77429a32caf9fc3719509b0fff67d444fb585e34eb4
Debian Linux Security Advisory 910-1
Posted Nov 30, 2005
Authored by Debian | Site security.debian.org

Debian Security Advisory DSA 910-1 - A vulnerability has been discovered in zope 2.7, as Open Source web application server, that allows remote attackers to insert arbitrary files via include directives in reStructuredText functionality.

tags | advisory, remote, web, arbitrary
systems | linux, debian
advisories | CVE-2005-3323
SHA-256 | a625631b09773f257c81b3e4f2c444e8b57051762929bbda759db6e1af9c5268
SmartPPCProXSS.txt
Posted Nov 30, 2005
Authored by BiPi_HaCk | Site NightmareSecurity.net

SmartPPC Pro is susceptible to multiple cross site scripting flaws. Details provided.

tags | exploit, xss
SHA-256 | 2a1dfc606427de60d8c28ce32641f67fe30c15ce158badee9e505ba57887f164
Mandriva Linux Security Advisory 2005.215
Posted Nov 30, 2005
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - Integer overflows in various applications in the binutils package may allow attackers to execute arbitrary code via a carefully crafted object file.

tags | advisory, overflow, arbitrary
systems | linux, mandriva
advisories | CVE-2005-1704
SHA-256 | 540de918934afc0fe9611a3320d8ad6d2edb153fd397148b8e79442f1afb750c
bitchxLocal.c
Posted Nov 30, 2005
Authored by sha0

Local root exploit for BitchX. Note that BitchX is not normally setuid by default.

tags | exploit, local, root
SHA-256 | 15287501f0909a92ceef2b952590a8030acdd609f74bc714559cd9bb0c867974
Debian Linux Security Advisory 909-1
Posted Nov 30, 2005
Authored by Debian | Site security.debian.org

Debian Security Advisory DSA 909-1 - Daniel Schreckling discovered that the MIME viewer in horde3, a web application suite, does not always sanitize its input leaving a possibility to force the return of malicious code that could be executed on the victim's machine.

tags | advisory, web
systems | linux, debian
SHA-256 | 2d43888a7680004331964aaed90cc0be49571ea724e23dcf3f8b74b8f0647243
Debian Linux Security Advisory 908-1
Posted Nov 30, 2005
Authored by Debian | Site security.debian.org

Debian Security Advisory DSA 908-1 - Colin Leroy discovered several buffer overflows in a number of importer routines in sylpheed-claws, an extended version of the Sylpheed mail client, that could lead to the execution of arbitrary code.

tags | advisory, overflow, arbitrary
systems | linux, debian
SHA-256 | 29d408151eb11090fb050627bb55902fc991f5c7420a64610b896162d6885fe8
Debian Linux Security Advisory 907-1
Posted Nov 30, 2005
Authored by Debian | Site security.debian.org

Debian Security Advisory DSA 907-1 - Akira Yoshiyama noticed that ipmenu, an cursel iptables/iproute2 GUI, creates a temporary file in an insecure fashion allowing a local attacker to overwrite arbitrary files utilising a symlink attack.

tags | advisory, arbitrary, local
systems | linux, debian
SHA-256 | 4cc891873340cf15ce5cf14c61cc397de1079521272b8a092b531faa709c0ab9
Page 1 of 8
Back12345Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close