what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 929 RSS Feed

Files Date: 2006-04-01 to 2006-04-30

linux-cisco-PSIRT.txt
Posted Apr 29, 2006
Site cisco.com

Cisco PSIRT's response to the privilege escalation vulnerability in multiple Linux based Cicso products including: Cisco Wireless LAN Solution Engine (WLSE), Cisco Hosting Solution Engine (HSE), Cisco User Registration Tool (URT), Cisco Ethernet Subscriber Solution Engine (ESSE), CiscoWorks2000 Service Management Solution (SMS)

tags | advisory
systems | cisco, linux
SHA-256 | 5fed5f29f98f68d37f4b0e34a99ad89ec73549e4955eedd56cf3633347bb56be
linux-cisco.txt
Posted Apr 29, 2006
Site assurance.com.au

Assurance.com.au - Vulnerability Advisory: Multiple vulnerabilities in Linux based Cisco products. the "show" application has several vulnerabilities which allow an attacker to "break out" of the shell and execute commands (including /bin/sh) as the root user.

tags | advisory, shell, root, vulnerability
systems | cisco, linux
SHA-256 | ffd7ec925a08321578c4606c7b0a6bde0583a426858c95a75515779c416b030a
SYS.DBMS_LOGMNR_SESSION.txt
Posted Apr 29, 2006
Site red-database-security.com

The package SYS.DBMS_LOGMNR_SESSION contains a SQL injection vulnerability in the procedure DELETE_FROM_TABLE. Oracle fixed this problem by using the package DBMS_ASSERT.

tags | advisory, sql injection
SHA-256 | 1eb412d989006bda131499a0f77fe151a8bbbc7dc287b8e0d7be3dc8c7bd297f
LiveUpdate-mac.txt
Posted Apr 29, 2006
Site symantec.com

Some components of Symantecs LiveUpdate for Macintosh do not set their execution path environment. A non-privileged user can change their execution path environment. If the user then executes one of these components, it will inherit the changed environment and use it to locate system commands. These components are configured to run with System Administrative privileges (SUID) and are vulnerable to a potential Trojan horse attack.

tags | advisory, trojan
SHA-256 | a36f19d2a6ed11d0ffb67d60451dbbfebd2b4a55d7432dc8a62f16c20cc2b9fc
phpListerv.0.4.1.txt
Posted Apr 29, 2006
Site advisory.patriotichackers.com

phpLister v. 0.4.1 suffers from XSS.

tags | advisory
SHA-256 | 8b1f1255e539096abf589d91e29f48549f7c3a9af76ed4ba68514c56be5bde95
Ad-Aware.txt
Posted Apr 29, 2006
Authored by Roy.Batty

A paper discussing the various vulnerabilities in Ad-Aware.

tags | advisory, vulnerability
SHA-256 | 4b6a28f895b49f29af11ab0ad13559dae263a936ed19aedc7e28d7ca632b9ba8
proxytest.pl
Posted Apr 29, 2006
Authored by Andrea Purificato | Site rawlab.altervista.org

proxytest.pl is a perl script that reads in a list of proxies from a text file and checks their state.

tags | web, perl
SHA-256 | 6ee7234a27bb8276b190e57089ec9fe6039dd9086a9ef97adaf4240fcfd66ed9
wnetstat.pl
Posted Apr 29, 2006
Authored by Andrea Purificato | Site rawlab.altervista.org

wnetstat.pl is a small perl wrapper script to hide IPs from netstat.

tags | tool, perl, rootkit
systems | unix
SHA-256 | 02bc906fe5883774a8295c8c29a77175963ce43fbd71869d1fef8126325afe45
Becoming_a_Hacker_-_Part_1.pdf
Posted Apr 28, 2006
Authored by Elite Nabukadnezar

An introductory paper for would-be hackers. It could also prove useful for network admins and hackers that want to improve themselves. Chapters include: The OS, Understanding TCP/IP, Becoming a Hacker, WHOIS Databases, Basic Tracerouting and Path Analysis, Mapping with DNS and Geolocation and more.

tags | paper, tcp
SHA-256 | b4e91f313fa1cce8a5f8538e82a63ea7ab2d08cf63b8afe5a744d2e88801afa3
libShellCode-0.3.2.tar.gz
Posted Apr 28, 2006
Authored by ORK | Site orkspace.net

libShellCode is a library that can be included when writing Linux and BSD i386 based exploits by providing functions that generate shellcode with user given parameters during runtime.

Changes: Completed support for BSD shellcodes.
tags | shellcode
systems | linux, bsd
SHA-256 | 62dc05ebdc7b74df8811246fb68046d2fcd9f998a5c37747b2183c8dd2035545
16.txt
Posted Apr 28, 2006
Authored by c0ntex | Site open-security.org

open security advisory #16 - Xine Media Player Format String Bug - There are 2 format string bugs in the latest version of Xine that could be exploited by a malicious person to execute code on the system of a remote user running the media player against a malicious playlist file. By passing a format specifier in the path of a file that is embedded in a remote playlist, it is possible to trigger this bug.

tags | advisory, remote
SHA-256 | d4f570c418c920fa2ace268f9e01803444655bf73c95bb1f9a806e7168cb8848
SA-03.txt
Posted Apr 28, 2006
Site pinkhat.org

An example of a return into libc exploit that possibly works though grsecurity patch protection.

tags | exploit
SHA-256 | 3d52d2bc3578ca63d91d157654640485e25d9bb02f962aa6d3f5f5cfb99a6f01
Linpha1.1.0.txt
Posted Apr 28, 2006
Authored by d4igoro

Linpha 1.1.0 suffers from a XSS vulnerability.

tags | advisory
SHA-256 | f7e3f5d7e4eb3b1bc3ee23685ee770c5e7307dd23fd9a66a2f4042defa1f53b3
FlexBB-0.5.5.xpl.txt
Posted Apr 28, 2006
Authored by D3vil-0x1

FlexBB 0.5.5 remote SQL login bypass exploit.

tags | exploit, remote
SHA-256 | 8ec957f077965343b237cb624658ab727dbed83ca28cd9460e3a4489e4d2e1b8
NeonResponder-5.4.txt
Posted Apr 28, 2006
Site xion-security.at

Neon Responder 5.4 for Windows suffers from a DOS - sending it a specially crafted "Clock Synchronization" packet causes it to crash. POC included.

tags | exploit
systems | windows
SHA-256 | 00308f6b50521d1c774a89502ee9de291b104713e6c78d55efed7ad64f9478bd
rz2-adv
Posted Apr 28, 2006
Authored by GroundZero Security | Site GroundZero-Security.com

RechnungsZentrale v2 suffers from SQL Injection and Remote File inclusion Vulnerabilities.

tags | advisory, remote, vulnerability, sql injection, file inclusion
SHA-256 | 199f60d5a50ae67e551c0a6e37b12a5cd7446cbdbfe0fa75e2ffcebfaec62501
FN15398.txt
Posted Apr 28, 2006
Authored by 123 Privacy Advisories | Site findnot.com

Findnot.com DNS Privacy Breach, DNS Spoofing Exposure, and ISP Monitoring Vulnerability - Several vulnerabilities have been reported in Findnot.com's SSH Proxy Service which can cause all DNS requests for lookup of sites visited to be resolved using local DNS servers.

tags | advisory, local, spoof, vulnerability
SHA-256 | a31794b9b3bd88d68a780c393eeb2de80a451637e98988ab84f8fef14ed66b8c
FN15294.txt
Posted Apr 28, 2006
Authored by 123 Privacy Advisories

Findnot.com IP Address Privacy Breach and Unencrypted Data Vulnerability - Several vulnerabilities have been reported in Findnot.com's Microsoft PPTP VPN Service Client, which can cause intermittent immediate loss of anonymity and privacy while using the service.

tags | advisory, vulnerability
SHA-256 | c0752cb8fe102e220a572433d2dce33f44c4db45a14e50386da67dfd2e8bc542
SnmShred_pl.txt
Posted Apr 28, 2006
Authored by AdityaSood

SnmShred Mail Shredder - A perl script designed to exploit the RCPT function of sendmail to flood a mail server.

tags | denial of service, perl
SHA-256 | cce6ffec509ff19248173998ae0f248d9ec996a9de28ed4954b65b709b198d89
HijackArt.txt
Posted Apr 28, 2006
Authored by AdityaSood

Defacing The Art Of Hijacking Spamming And EMail Viruses - A paper analyzing the methodology of hijacking a users web browser focusing mainly on Internet Explorer.

tags | advisory, web
SHA-256 | a19d8c74cf6da99ca80f6b3a1494254c3e49702f0a7e4c81583dd174eeb52bf6
WebPcon_pl.txt
Posted Apr 28, 2006
Authored by AdityaSood | Site rxlabs.metaeye.org

Web Management Port Scanner - a portscanner written in perl to find open web management ports.

tags | tool, web, scanner, perl
systems | unix
SHA-256 | 8cad85f4aa0349fabc4af990c1d5409313e9fa2e773e2125d265b5db72cf634c
NetProx_pl.txt
Posted Apr 28, 2006
Authored by AdityaSood | Site rxlabs.metaeye.org

NetProx Proxy Redirector - a proxy redirector written in PERL for connection redirection between remote machines.

tags | remote, perl
systems | unix
SHA-256 | 7bb571bfb44fe6f5af0880fd8cc2ca70bcb72f15d7bc2483d40bae54f239f0f2
phpMyAgenda-3.0.txt
Posted Apr 28, 2006
Authored by David Vieira-Kurz

phpMyAgenda 3.0 Final suffers from a Remote File Include Vulnerability in agenda.php3.

tags | exploit, remote
SHA-256 | 0127ffa3f68c50522dd1e30f8420f3e869bbb31c79e98814dd7ee96be5025be1
bloggage.txt
Posted Apr 28, 2006
Authored by Omnipresent | Site colander.altervista.org

bloggage suffers from a SQL injection vulnerability. POC included.

tags | advisory, sql injection
SHA-256 | 7a2ffb82807a4c80dfb88bf703c3f20e81c36ea5204da378e2d297a46d82a022
Mini-NUKEv2.3.txt
Posted Apr 28, 2006
Authored by CrAzY CrAcKeR

Mini-NUKE v2.3 suffers from a SQL injection vulnerability.

tags | advisory, sql injection
SHA-256 | 114b0a0ebc035da9aeb614dc226952c5976517fc0db78b6fd4b1da9be7fdc486
Page 4 of 38
Back23456Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close