exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 101 RSS Feed

Files Date: 2006-04-01 to 2006-04-02

Gentoo Linux Security Advisory 200603-26
Posted Apr 1, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200603-26 - Tavis Ormandy of the Gentoo Linux Security Audit Team discovered that the checkscores() function in scores.c reads in the data from the /var/games/tetris-bsd.scores file without validation, rendering it vulnerable to buffer overflows and incompatible with the system used for managing games on Gentoo Linux. As a result, it cannot be played securely on systems with multiple users. Please note that this is probably a Gentoo-specific issue. Versions less than 2.17-r1 are affected.

tags | advisory, overflow
systems | linux, bsd, gentoo
SHA-256 | d0f87aeaafa934094329ce0f12fd9f65d7fb52924fc7b923e2382ff49dd95ad0
xfocus-SD-060329.txt
Posted Apr 1, 2006
Site xfocus.org

The XFOCUS team has discovered multiple integer overflows in MPlayer version 1.0.20060329 and below.

tags | advisory, overflow
SHA-256 | 63e762c39c00d599fa0d7e78eb9ca9d54e84981185e128bb6f6230abf893bf4d
EV0105.txt
Posted Apr 1, 2006
Authored by Aliaksandr Hartsuyeu | Site evuln.com

Skull-Splitter's PHP Downloadcounter for Wallpapers version 1.0 suffers from SQL injection flaws.

tags | exploit, php, sql injection
advisories | CVE-2006-1328
SHA-256 | c35f236b1b08f9577dd04d07c8d25b34c2acae462f7e9b485009a9a829eab0f4
EV0104.txt
Posted Apr 1, 2006
Authored by Aliaksandr Hartsuyeu | Site evuln.com

Skull-Splitter's PHP Guestbook versions 2.6 and 2.7 suffer from cross site scripting flaws.

tags | exploit, php, xss
advisories | CVE-2006-1256
SHA-256 | d50f7b3a5666f18c71dccd563d2beaed5988c448a8e490ff37a25710dd4d185c
realplayer-swf-PoC.pl.txt
Posted Apr 1, 2006
Authored by Federico L. Bossi Bonin

RealPlayer versions 10.5 and below SWF buffer overflow proof of concept exploit.

tags | exploit, overflow, proof of concept
advisories | CVE-2006-0323
SHA-256 | 414e3afcf58e08b1af847b2e480cc14176277187f373317744e60300a876dc45
PhxContactsSQL.txt
Posted Apr 1, 2006
Authored by Morocco Security Team

PhxContacts is susceptible to cross site scripting and SQL injection attacks.

tags | exploit, xss, sql injection
SHA-256 | 4774b065c8209bc86f66015b175739273d84ea4fff686de76672c30d782b43dc
phpkitXSS.txt
Posted Apr 1, 2006
Authored by BadNet

PHPKIT version 1.6.03 suffers from a cross site scripting flaw.

tags | exploit, xss
SHA-256 | 64fcca7d2034961cc6f6fb5137f9987a08a9c989ffa6035b89bd71fc65b493e2
arabportalXSS.txt
Posted Apr 1, 2006

ArabPortal version 2.0 is susceptible to cross site scripting attacks.

tags | exploit, xss
SHA-256 | b271bbc43e51cd6545bac7a72d48af082a936be43e8e1143e2e61884bffe6fc9
Debian Linux Security Advisory 1021-1
Posted Apr 1, 2006
Authored by Debian | Site debian.org

Debian Security Advisory DSA 1021-1 - Max Vozeler from the Debian Audit Project discovered that pstopnm, a converter from Postscript to the PBM, PGM and PNM formats, launches Ghostscript in an insecure manner, which might lead to the execution of arbitrary shell commands, when converting specially crafted Postscript files.

tags | advisory, arbitrary, shell
systems | linux, debian
advisories | CVE-2005-2471
SHA-256 | c805afd688bd7387640c3694a50b68d7630757d17cd7512253e04e23bcfd57c8
secunia-Blazix.txt
Posted Apr 1, 2006
Authored by Tan Chew Keong | Site secunia.com

Secunia Research has discovered a vulnerability in Blazix, which can be exploited by malicious people to disclose potentially sensitive information. The vulnerability is caused due to a validation error of the filename extension supplied by the user in the URL. This can be exploited to retrieve the source code of JSP files from the server via specially crafted requests containing dot, space, and slash characters. Version 1.2.5 is affected.

tags | advisory
SHA-256 | 3604e084018ebac5c828858ccaf9a13fdb6c16dd20d3d34b1392abab5ccb8b31
msie-createTextRang-2.c
Posted Apr 1, 2006
Authored by ATmaCA | Site spyinstructors.com

Microsoft Internet Explorer createTextRang download shellcoded exploit. Second version.

tags | exploit, shellcode
SHA-256 | 192bb54b48a9f20380a7abdef8d6b39eb738a80b5f5682ee428fe37fe2a51af4
peercast01216.pm.txt
Posted Apr 1, 2006
Authored by H D Moore | Site metasploit.com

This Metasploit module exploits a stack overflow in PeerCast version 0.1216 and below. The vulnerability is caused due to a boundary error within the handling of URL parameters.

tags | exploit, overflow
SHA-256 | 5df98c072ead0db9bfc32de3fd48f0ed1721865288b1926f120f6f47bf449043
msie-createTextRang.pm.txt
Posted Apr 1, 2006
Authored by justfriends4n0w

This Metasploit module exploits a vulnerability in Internet Explorer's setTextRange on a checkbox.

tags | exploit
SHA-256 | d88d10eefc1151c15d86169bcb06ae44b634aacc19080eb4cd937c787a9843d3
msie-createTextRang-script.txt
Posted Apr 1, 2006
Authored by Darkeagle | Site unl0ck.net

Microsoft Internet Explorer createTextRang remote command execution exploit. Tested against WinXP SP2 RUS IE 6.0.

tags | exploit, remote
systems | windows
SHA-256 | a2766d515bd66ef3fd37e9617c76b3ab7d6de03231a59be4454f195a4b5f3907
msie-createTextRang.c
Posted Apr 1, 2006
Authored by ATmaCA | Site spyinstructors.com

Microsoft Internet Explorer createTextRang download shellcoded exploit.

tags | exploit, shellcode
SHA-256 | 9adfd05f0d777459838812e04ced967b108595b6b9d3acd4e3a6ce8307b51816
greymatter121d-2.c
Posted Apr 1, 2006
Authored by No_Face_king | Site crouz.com

GreyMatter WebLog versions 1.21d and below remote command execution exploit.

tags | exploit, remote
SHA-256 | ad617062aff17f427e3bbad02653ce94694faa679458a3e75bfb3f7e8092f652
greymatter121d-1.pl.txt
Posted Apr 1, 2006
Authored by Hessam-x | Site deltahacking.com

GreyMatter WebLog versions 1.21d and below remote command execution exploit.

tags | exploit, remote
SHA-256 | b607b78672cfa0b6607c9223bb9272c64d54b00df086a8e659cdaf0c1d9efa34
rdist.pl.txt
Posted Apr 1, 2006
Authored by Kevin Finisterre | Site digitalmunition.com

rdist NLSPATH buffer overflow exploit for Tru64 UNIX 5.0 (Rev. 910).

tags | exploit, overflow
systems | unix
SHA-256 | 4c4a19453affa5482e5bbca99f5e8e7e6d25e7f2f3f895644df68abc77e86074
edauth.pl.txt
Posted Apr 1, 2006
Authored by Kevin Finisterre | Site digitalmunition.com

edauth NLSPATH buffer overflow exploit for Tru64 UNIX 5.0 (Rev. 910).

tags | exploit, overflow
systems | unix
SHA-256 | f73421b49ce9bd7859f4e56e743fa6c9d04c1db4b6d1f331a4c65e5863484bf0
EV0103.txt
Posted Apr 1, 2006
Authored by Aliaksandr Hartsuyeu | Site evuln.com

Maian Support version 1.0 suffers from a SQL injection flaw allowing for authentication bypass.

tags | exploit, sql injection
advisories | CVE-2006-1259
SHA-256 | 283ea12b9fb8215868c76df046f3dd365903dba00cc56ed89772730e5dea9413
EV0102.txt
Posted Apr 1, 2006
Authored by Aliaksandr Hartsuyeu | Site evuln.com

Maian Events version 1.0 suffers from a SQL injection flaw.

tags | exploit, sql injection
advisories | CVE-2006-1341
SHA-256 | 5fe7cbd8f8a97ff006e00911b015e012293a2d4ce39f04e1c0d24cb7e4537bdb
NotSoGenius.txt
Posted Apr 1, 2006
Authored by beford

Genius VideoCAM BN is susceptible to a local privilege escalation flaw.

tags | exploit, local
SHA-256 | c6a5fb176d590a289db5941aa235aa32e3610ef9d31ae14c0f34c7b8c0a3d29d
vwar.pl.txt
Posted Apr 1, 2006
Authored by uid0 | Site exploitercode.com

VWar version 1.5.0 R11 and below remote command execution exploit.

tags | exploit, remote
SHA-256 | b4bf7d3fa3219423536b9e28e36b61aaf94d831b2b7a74812717fc00a9893f44
explorerXP.txt
Posted Apr 1, 2006
Authored by Amine ABOUD aka Silitix | Site Silitix.com

All versions of ExplorerXP suffer cross site scripting and directory traversal flaws. Written in French.

tags | exploit, xss
SHA-256 | 13ea3c716c7168598c296075e5b0c01df9475c8fb2d5e2692c305bd486810b68
alcaricatier.txt
Posted Apr 1, 2006
Authored by Linux_Drox

AL-Caricatier version 2.5 is susceptible to cross site scripting attacks.

tags | exploit, xss
SHA-256 | 81a3e146413c3532574a6bb29c11fffc524f76d947a6399666918d72a881e61b
Page 2 of 4
Back1234Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close