exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 72 RSS Feed

Files Date: 2005-12-14 to 2005-12-15

MS05-053.c
Posted Dec 14, 2005
Authored by Winny Thomas

Microsoft Windows Metafile (WMF) remote exploit which takes advantage of the bug known as ms05-053. This program creates a special .wmf file which crashes IE by overflowing the "mtNoObjects" header.

tags | exploit, remote, overflow
systems | windows
SHA-256 | 8a69e2857d794a4dbba1f6eb8fe50a28af6da1e116e413522bef8d7a68279195
lsof_4.76.tar.gz
Posted Dec 14, 2005
Authored by Vic Abell

Lsof is an extremely powerful unix diagnostic tool. Its name stands for LiSt Open Files, and it does just that. It lists information about any files that are open by processes currently running on the system. It is useful for pinpointing which process is using each network socket. FAQ available here.

Changes: Bug fixes. Supports the newest operating systems.
tags | tool, intrusion detection
systems | unix
SHA-256 | 97215e607493ebd9099310ddda79908364edf011332636b2e1d87cc663e838d2
CounterDoS.c
Posted Dec 14, 2005
Authored by Iman Karim | Site home.inf.fh-rhein-sieg.de

Counter Strike 2D denial of service exploit that affects versions 0.1.0.1 and below.

tags | exploit, denial of service
SHA-256 | cb1001e86d9a7f9bccd81b9253e0b87ff9acbce3407259d4304e537114d3c854
openview_connectednodes_exec.pm.txt
Posted Dec 14, 2005
Authored by Valerio Tesei

This Metasploit module exploits an arbitrary command execution vulnerability in the HP OpenView connectedNodes.ovpl CGI application. The results of the command will not be displayed to the screen.

tags | exploit, arbitrary, cgi
advisories | CVE-2005-2773
SHA-256 | d646fce74ad83e7e6272baf588f3dee72965b9ac4d3228c55902d45feeb20878
oracle9i_xdb_http.pm.txt
Posted Dec 14, 2005
Authored by y0

This Metasploit module exploits a stack overflow in the authorization code of the Oracle 9i HTTP XDB service.

tags | exploit, web, overflow
SHA-256 | 4f4b1da5eb055a4a7fb509da7b708e276fbf6eb7e21f623f4d5f462f7c6375a2
fireburn.txt
Posted Dec 14, 2005
Authored by Aviv Raff | Site aviv.raffon.net

Proof of concept exploit for Firefox 1.0.4 for the InstallVersion.compareTo() vulnerability. Needs functional shellcode to work.

tags | exploit, shellcode, proof of concept
SHA-256 | 1ee1c947181c895864e1192cc8eba3c0c8fee83ced31bcb342f003342522e9b7
Technical Cyber Security Alert 2005-347A
Posted Dec 14, 2005
Authored by US-CERT | Site us-cert.gov

Technical Cyber Security Alert TA05-347A - Microsoft has released updates that address critical vulnerabilities in Internet Explorer (IE). A remote, unauthenticated attacker could exploit these vulnerabilities to execute arbitrary code or cause a denial of service on an affected system.

tags | advisory, remote, denial of service, arbitrary, vulnerability
advisories | CVE-2005-1790, CVE-2005-2127
SHA-256 | a14e4fd409749b1dcb627c71f7d1b18af314e447dde07afe0d11e981090d7f79
adpHashdisclose.txt
Posted Dec 14, 2005
Authored by Liz0ziM | Site biyo.tk

ADP Forum versions 2.0 through 2.0.3 suffers from a direct download flaw that discloses users' password hashes.

tags | exploit
SHA-256 | 994153cca5049cdb9d666d542a704146567edfd41e3d7d5c0530e89ca29a65af
secunia-IE2.txt
Posted Dec 14, 2005
Authored by Jakob Balle | Site secunia.com

Secunia Research has discovered a vulnerability in Internet Explorer, which can be exploited by malicious people to trick users into downloading and executing arbitrary programs on a user's system. A design error in the processing of mouse clicks in new browser windows and the predictability of the position of the File Download dialog box can be exploited to trick the user into clicking on the Run button of the dialog box.

tags | advisory, arbitrary
systems | windows
SHA-256 | add1b79fbba766c7c37cc6c8189b9162030b5a7c8c030db19bb507a324aed2cb
secunia-IE.txt
Posted Dec 14, 2005
Authored by Andreas Sandblad | Site secunia.com

Secunia Research has discovered a vulnerability in Microsoft Internet Explorer 6.0, which can be exploited by malicious people to trick users into executing malicious files. The vulnerability is caused due to a design error in the processing of keyboard shortcuts for certain security dialogs.

tags | advisory
advisories | CVE-2005-2829
SHA-256 | 8cbe12f30ecdf09218a3ea3684d7b349517dd89e19fcae3c26d49df76d3c246e
EEYEB-20050523.txt
Posted Dec 14, 2005
Authored by Derek Soeder | Site eeye.com

eEye Security Advisory - eEye Digital Security has discovered a local privilege escalation vulnerability in the Windows kernel that could allow any code executing on a Windows NT 4.0 or Windows 2000 system to elevate itself to the highest possible local privilege level (kernel).

tags | advisory, kernel, local
systems | windows
advisories | CVE-2005-2827
SHA-256 | 833bb985f7ebc68cacbf3f7fb0eeed820e4e83d92d17cfe255f77d5fe1397c4f
ICDCIT-CFP.txt
Posted Dec 14, 2005
Site cse.iitk.ac.in

CALL FOR PARTICIPATION for the 2nd International Conference on Distributed Computing (ICDCIT 2005).

tags | paper, conference
SHA-256 | f8b0d602567a0ecb2d226e5041da9fa401eaa0a1f0ed39c2eab9e4992bdf98c2
bd.c
Posted Dec 14, 2005
Authored by Endrazine | Site pulltheplug.org

Universal BIOS password dumping utility.

tags | cracker
SHA-256 | b1f6af1f82f09f8af28f41e9091033accee545c731eb71c50a2422055333be56
dbiosw.asm
Posted Dec 14, 2005
Authored by Endrazine | Site pulltheplug.org

BIOS password physical memory reading utility that displays to the screen.

tags | cracker
SHA-256 | eb06f2fd16b017c08eec4ae6bf10740c88c828cdd6354841179d634f9a6c0d0b
wbiosw.asm
Posted Dec 14, 2005
Authored by Endrazine | Site pulltheplug.org

BIOS password physical memory reading utility that writes to a file.

tags | cracker
SHA-256 | eda2018befaa92c06c565bfe52b36eb3c4b46699bc8d31f3df94cb7e532159c1
Bios.Information.Leakage.txt
Posted Dec 14, 2005
Authored by Endrazine

Whitepaper discussing information leakage and password extraction from a BIOS.

tags | paper
SHA-256 | 11c0d68db3008a8f6d96bdaa51cd4f9d4990d59b038ddbb12e9e044505537b96
phpcoin_122_sql_xpl.html
Posted Dec 14, 2005
Authored by rgod | Site retrogod.altervista.org

PhpCOIN version 1.2.2 blind SQL injection and remote code execution exploit.

tags | exploit, remote, code execution, sql injection
SHA-256 | e6491b9115632445f1126b4ada53cf24b74da78938376be7c8910c4a2dd5712a
phpcoin_122_incl_xpl.html
Posted Dec 14, 2005
Authored by rgod | Site retrogod.altervista.org

PhpCOIN version 1.2.2 remote code execution exploit.

tags | exploit, remote, code execution
SHA-256 | 530d3b16ddc3460e10120364301c0eaa44d6ac142a89ea0f60a8aebd1f7a7f58
phpcoin122.html
Posted Dec 14, 2005
Authored by rgod | Site retrogod.altervista.org

PhpCOIN version 1.2.2 is susceptible to arbitrary file inclusion, blind SQL injection, and path disclosure attacks.

tags | exploit, arbitrary, sql injection, file inclusion
SHA-256 | ccf829e31e902456ba3a368066bf407b79e58fa4c14c4e4c4b37ec709e45bd34
iDEFENSE Security Advisory 2005-12-12.t
Posted Dec 14, 2005
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 12.12.05 - Local exploitation of a buffer overflow vulnerability in the uidadmin binary included in multiple versions of The SCO Group Inc.'s Unixware allows attackers to gain root privileges. iDefense has confirmed the existence of this vulnerability in SCO Unixware versions 7.1.3 and 7.1.4. All previous versions of SCO Unixware are suspected to be vulnerable.

tags | advisory, overflow, local, root
systems | unixware
advisories | CVE-2005-3903
SHA-256 | 81d6f5c861aa58608e968aa8e634230e92cf48aa302927c34830e5e2ebeef582
Gentoo Linux Security Advisory 200512-4
Posted Dec 14, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200512-04 - The Oulu University Secure Programming Group (OUSPG) discovered that various ISAKMP implementations, including Openswan and racoon (included in the IPsec-Tools package), behave in an anomalous way when they receive and handle ISAKMP Phase 1 packets with invalid or abnormal contents. Versions less than 2.4.4 are affected.

tags | advisory
systems | linux, gentoo
SHA-256 | 9c819d190048fd3776fca9e1c83737151debd1ba69a9ced95413474895b0e1bc
BTGrup.txt
Posted Dec 14, 2005
Authored by khc

The BTGrup Admin WebController script is susceptible to a SQL injection attack.

tags | exploit, sql injection
SHA-256 | b719868fda75ccd00a066f7b0e6d235e7c927652ad88980c526e0c0fdd2c7e0a
imoelPassword.txt
Posted Dec 14, 2005
Authored by mehrtash mallahzadeh | Site ashiyane.com

Direct download access of the setting.php file in IMOEL CMS allows for disclosure of the SQL password.

tags | exploit, php
SHA-256 | 5a036ecf1cada1215eb1d1841f9db1825d1b5e76ddb379b1d75ba669e51bbb2b
NetGearRP114DoS.txt
Posted Dec 14, 2005
Authored by Marc Ruef | Site scip.ch

Marc Ruef found an old fashioned denial of service flaw in the NetGear RP114 device.

tags | advisory, denial of service
SHA-256 | 167e8da4ecc7e712ceaf1c5d26f4e4a95a24545fe23726e64b3d9b463f6f6364
SEC-20051212-0.txt
Posted Dec 14, 2005
Site sec-consult.com

SEC-CONSULT Security Advisory 20051212-0 - Due to insufficient input validation within the Nortel SSL VPN appliance's web interface, it is possible for an attacker to supply his victim with a malicious link that results in code execution on the victim's client. The problem has been reproduced with version 4.2.1.6, however other versions might be vulnerable as well.

tags | advisory, web, code execution
SHA-256 | e737b6c4b673f2f6f1dbf7cd8019450391400b84e288a3d5d30d3947f18fc0a2
Page 1 of 3
Back123Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close