exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 17 of 17 RSS Feed

Files Date: 2006-01-29 to 2006-01-30

communiLDAP.txt
Posted Jan 29, 2006
Site gleg.net

Multiple vulnerabilities in the LDAP component of CommuniGate Pro Server version 5.0.6 have been uncovered.

tags | advisory, vulnerability
SHA-256 | c122b73e3f2aa436f247e447fbdaab96d30da06836b9880f9e41cca5aa1015ed
hydra-5.2-src.tar.gz
Posted Jan 29, 2006
Authored by van Hauser, thc | Site thc.org

THC-Hydra is a high quality parallelized login hacker for Samba, Smbnt, Cisco AAA, FTP, POP3, IMAP, Telnet, HTTP Auth, LDAP, NNTP, MySQL, VNC, ICQ, Socks5, PCNFS, Cisco and more. Includes SSL support, parallel scans, and is part of Nessus.

Changes: Fix for the ssh2 module. VMWare-Auth module added.
tags | web, cracker, imap
systems | cisco
SHA-256 | a3793901ab06ebc896a9cb28db9a4da122515151f2227f4e16921d446a5cffe2
pwned-vpasp.txt
Posted Jan 29, 2006
Authored by tracewar

VP-ASP Shopping Cart version 5.50 is susceptible to SQL injection attacks.

tags | exploit, sql injection, asp
SHA-256 | 332f445af6a6c5c47f068cb8d8c03ed007441924b9c1604249e696ad8d996b1f
prdelka-vs-LINUX-shellcode.tgz
Posted Jan 29, 2006
Authored by prdelka | Site prdelka.blackart.org.uk

Score is an interactive shellcode that allows a user to work further with an exploited process. Designed for exploitation of Linux systems on x86.

tags | x86, shellcode
systems | linux
SHA-256 | f04cd91c321cff6cb5956c5d32f4877b06ebe3f28072ee5e9bf0708794928df0
Debian Linux Security Advisory 958-1
Posted Jan 29, 2006
Authored by Debian | Site debian.org

Debian Security Advisory DSA 958-1 - Several security related problems have been discovered in Drupal. Several cross-site scripting vulnerabilities allow remote attackers to inject arbitrary web script or HTML. When running on PHP5, Drupal does not correctly enforce user privileges, which allows remote attackers to bypass the 'access user profiles' permission. An interpretation conflict allows remote authenticated users to inject arbitrary web script or HTML via HTML in a file with a GIF or JPEG file extension.

tags | advisory, remote, web, arbitrary, vulnerability, xss
systems | linux, debian
advisories | CVE-2005-3973, CVE-2005-3974, CVE-2005-3975
SHA-256 | 6617ce3617d2df0765157c99bbfed6ac6846cdb4e42aa4be13ef98569b0ff189
CAID33778.txt
Posted Jan 29, 2006
Authored by Ken Williams | Site supportconnect.ca.com

The CA iGateway common component, which is included with several CA products for UNIX/Linux/Windows platforms, contains a buffer overflow vulnerability that can allow arbitrary code to be executed remotely with SYSTEM privileges on Windows, and cause iGateway component failure on UNIX and Linux platforms.

tags | advisory, overflow, arbitrary
systems | linux, windows, unix
SHA-256 | 8409e14595803164e947c37dd2dfbb346cd4de292b503ce34d26b1d3bf7dc40d
ASPThaiSQL.txt
Posted Jan 29, 2006
Authored by iM4n | Site imanonline.com

ASPThai Forums version 8.0 and below suffer from a SQL injection vulnerability.

tags | exploit, sql injection
SHA-256 | 93276453d3b2b676be84804ca850ae7bc84529e3932139ea4d06dc2ecdb516da
OraGENERATESCHEMAExploits.txt
Posted Jan 29, 2006
Authored by Esteban Martinez Fayo | Site argeniss.com

Oracle 10g Release 1 exploit for the GENERATESCHEMA buffer overflow with shellcode that creates a file named Unbreakable.txt.

tags | exploit, overflow, shellcode
SHA-256 | 8dcd96b32a3ae1a3fe4c1eab28829ac25e5c1eadd36797cb4a889d49c78de7f6
ARGENISS-ADV-010601.txt
Posted Jan 29, 2006
Authored by Esteban Martinez Fayo | Site argeniss.com

Argeniss Security Advisory - Oracle Database Server provides the DBMS_XMLSCHEMA and DBMS_XMLSCHEMA_INT Packages that include procedures to register and delete XML schemas. These packages contain the public procedures GENERATESCHEMA and GENERATESCHEMAS that are vulnerable to buffer overflow attacks.

tags | advisory, overflow
SHA-256 | 367ed9eab6261d53ec2bfcaf1f65901f75fa8a8fa1f0d9139fb4c8389da1b9d7
whitedustTranslate.txt
Posted Jan 29, 2006
Site whitedust.net

A severe problem with the way browsers translate the soft-hyphen (alt + 0173) character has been brought to light which malicious users could utilise alongside a multitude of injection methods as a way to gain unauthorized access and or to spoof content on websites. Both Microsoft Internet Explorer and Mozilla Firefox are affected.

tags | advisory, spoof
SHA-256 | d09b0df55ff9047753e2601a5303cfff7be219ab1bd6e4197197029d5cb00843
windowsMem.txt
Posted Jan 29, 2006
Authored by Endrazine

Windows DOS emulation allows dumping of the first 1 Mo of RAM with no particular privileges needed. asm code that demonstrates this is included.

tags | exploit
systems | windows
SHA-256 | aceb62ce144c71dd62228f743981f71247e409a1a283eb1c7c67042ed629b498
mircfontexploitXPSP2.c
Posted Jan 29, 2006
Authored by Jordi Corrales

mIRC /font exploit that spawns a cmd.exe.

tags | exploit
SHA-256 | 6bba1bfaa52ce010f24d124f672f209484623b97f3b5f54de63c58d741cbff1d
kapda-23.txt
Posted Jan 29, 2006
Authored by cvh | Site KAPDA.ir

The WorldsEnd.NET Free Ping script is susceptible to a restriction bypass condition.

tags | exploit
SHA-256 | 6d29d8f9f8da03aeba6ea1433f4351f9657d1209e01d0797f765715eb7f426b0
pixelpostXSS.txt
Posted Jan 29, 2006
Authored by Aliaksandr Hartsuyeu | Site evuln.com

Pixelpost version 1.4.3 is susceptible to cross site scripting attacks.

tags | exploit, xss
SHA-256 | 7348d6772006dbb9c4e9e232c87483f487fd980dbc8f6b11a8a7ec24c01a19dc
kapda-22.txt
Posted Jan 29, 2006
Authored by Roozbeh Afrasiabi | Site KAPDA.ir

Azbb versions 1.1.00 and below suffer from cross site scripting vulnerabilities. NASL plugin to test for this included.

tags | exploit, vulnerability, xss
SHA-256 | e46562189f15c20dbe453280bb61f21d177294498714aaf8c0eaf491c5f84eca
genie.zip
Posted Jan 29, 2006
Authored by prncipia

Genie is a simple Telnet backdoor program that spawns on port 1179. Written for Windows 98/NT/XP. Archive password is set to p4ssw0rd. Use at your own risk.

tags | trojan
systems | windows
SHA-256 | 6b2c844a48f914163cc86fe1d678b581e633d8a90a312f77d7d6aba2c01066f8
aawns.pdf
Posted Jan 29, 2006
Authored by Shane A. Macaulay, Dino A. Dai Zovi

Whitepaper entitled 'Attacking Automatic Wireless Network Selection'.

tags | paper
SHA-256 | 0fab76effc4d98fe89fa651a422e69e400fe3ac37312fd2e5b3e468409306386
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close