what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 104 RSS Feed

Files Date: 2006-05-22 to 2006-05-23

secunia-IZArc.txt
Posted May 22, 2006
Site secunia.com

Secunia Research has discovered a vulnerability in IZArc versions 3.5 beta 3, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error in UNACEV2.DLL when extracting an ACE archive containing a file with an overly long filename. This can be exploited to cause a stack-based buffer overflow when a user extracts a specially crafted ACE archive.

tags | advisory, overflow
advisories | CVE-2005-2856
SHA-256 | 4d335da133db14bfdc46d66904276a34bbd6e869dd49fd3500636e0bfc58cce1
secunia-Eazel.txt
Posted May 22, 2006
Site secunia.com

Secunia Research has discovered a vulnerability in Eazel version 1.0, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error in ztvunacev2.dll (UNACEV2.DLL) when extracting an ACE archive containing a file with an overly long filename. This can be exploited to cause a stack-based buffer overflow when a user extracts a specially crafted ACE archive.

tags | advisory, overflow
advisories | CVE-2005-2856
SHA-256 | 6e456760da60d76c4f1ce8d66aef6fa2a1e5bf87c7d8f535aa769d262c1a5584
openwikiXSS.txt
Posted May 22, 2006
Authored by LiNuX_rOOt | Site alshmokh.com

ow.asp in OpenWiki version 0.78 is susceptible to cross site scripting.

tags | exploit, xss, asp
SHA-256 | b162a9916f44ca291b9578d8fbd14a2d8df097fd956581be4f020ddff8d03321
QuezzaBB.txt
Posted May 22, 2006
Authored by Mustafa Can Bjorn | Site nukedx.com

Quezza BB versions 1.0 and below suffer from a file inclusion vulnerability.

tags | exploit, file inclusion
SHA-256 | 5e95cc622ccd82fa42ce27440624ba99379e09cb0184b3fbf5d001c3fe5930c8
Boastmachine.txt
Posted May 22, 2006
Authored by Yunus Emre Yilmaz | Site yns.zaxaz.com

Boastmachine version 3.1 is susceptible to cross site scripting attacks.

tags | exploit, xss
SHA-256 | 246d5ae2429ee19ff2ff6b0019e1863cda7e63cd927aaa193249a8a5e99da715
deluxebb.txt
Posted May 22, 2006
Authored by rgod | Site retrogod.altervista.org

DeluxeBB versions 1.06 and below attachment momd_mime exploit.

tags | exploit
SHA-256 | 3f6d4e625dbc29d6156fea701b7208e0f13fd96d3e0bf7aeea56f486323eb740
phpfusion600306-2.txt
Posted May 22, 2006
Authored by rgod | Site retrogod.altervista.org

PHP-Fusion versions 6.00.306 and below "srch_where" SQL injection and administrative credential disclosure exploit.

tags | exploit, php, sql injection
SHA-256 | 0297d54fa03c13c829d97e23b9597e0a37532a05248e616af080ce1513ebd33f
Rapid7 Security Advisory 24
Posted May 22, 2006
Authored by Rapid7 | Site rapid7.com

Rapid7 Security Advisory - The Caucho Resin web application server for Windows contains a directory traversal vulnerability that allows remote unauthenticated users to download any file from the system. It is possible to download files from any drive on the system. Versions 3.0.18 and 3.0.17 for Windows are vulnerable.

tags | exploit, remote, web
systems | windows
advisories | CVE-2006-1953
SHA-256 | 036753be0009b340c6c34e30fe2e5d09b38d1425a2b47a6dd6cf1d7cfbc3352d
sa-caucho.txt
Posted May 22, 2006
Site scanalert.com

ScanAlert Security Advisory - Caucho Resin versions 3.0.17 and 3.0.18 suffer from arbitrary file access and information disclosure vulnerabilities.

tags | exploit, arbitrary, vulnerability, info disclosure
SHA-256 | 50f7b2639fa218567771d09c602263b7347f86854398843e9e649c2a91b6e27b
SAPwebas.txt
Posted May 22, 2006
Authored by A. Grossmann

SAP Web Application Server versions 7.00 and below suffer from a URL manipulation flaw that can allow for cross site scripting.

tags | exploit, web, xss
SHA-256 | 57b712925cbe4ffea02d0e4e6ff792dbdfd2303a794f6be17bbc80eb6b9fca5f
newsportal.txt
Posted May 22, 2006
Authored by Florian Amrhein

A code injection vulnerability exists in NewsPortal. Upgrading to 0.37 fixes this flaw.

tags | advisory
SHA-256 | 51dc033133e461b6d8fa03e2fd0cd31c8649f9e626213d40d6cfb5ce3311b46b
icewarp.txt
Posted May 22, 2006
Authored by LiNuX_rOOt | Site alshmokh.com

IceWarp is susceptible to cross site scripting attacks via the PHPSESSID variable.

tags | exploit, xss
SHA-256 | 1bb341fa52e57e2264f9b7ac098e7c7859cf19f059b9ded04d722cbe4b17385d
Sphider.txt
Posted May 22, 2006
Authored by Soot | Site shabgard.org

Sphider is susceptible to multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | a020c7da8614ed349f91e4c9ea735b80d96f46ce0c5d9de4a0eb2a3344248f9e
PhpRemoteView.txt
Posted May 22, 2006
Authored by Soot | Site shabgard.org

PhpRemoteView is susceptible to multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | d2676bdee55836a099078a42099d77db442df5682e9eb7fb691e2de18e8771a9
tinyurlfuckery.c
Posted May 22, 2006
Authored by lazy-xo of xoc | Site xoc-staff.com

The tinyurlfucker utility encodes data in base64 chunks and lets it get moved using tinyurl.com as a transit.

tags | web
SHA-256 | 417c1144e33a7bc2fd8d53e3fc3c3cc384535f3bf52b3cc8d1da70c772a4cc44
frontrange.txt
Posted May 22, 2006
Authored by mcdanielar

A vulnerability has been found in FrontRange's iHeat product that allows users to gain access to the host machine through a logged on session or execute arbitrary code while using the active-x version of the product.

tags | advisory, arbitrary, activex
SHA-256 | f49d0f1f9f5f56aa0a0ccd7fe56a2b3ef033e198e7b26a0dc427f85b4afc3bbf
phpinjectiontuto.txt
Posted May 22, 2006
Authored by mescalin | Site mescalin.100free.com

Small tutorial on PHP injection and utilizing it to compromise systems.

tags | paper, php
SHA-256 | d4797768252bf12c3d2ffb8b444f6dafec0dbf84436a35a8f727c946f7555bc3
ezusermanager.txt
Posted May 22, 2006
Authored by OLiBekaS

ezUserManager versions 1.6 and below suffer from a remote file inclusion vulnerability.

tags | exploit, remote, file inclusion
SHA-256 | 283204428b9d04c844c621690daa6e8664c7c75f0254da343e23d718c9bdd343
yapbb_advisory.txt
Posted May 22, 2006
Authored by x90c | Site chollian.net

YapBB versions 1.2 Beta2 and below suffer from a SQL injection vulnerability in find.php.

tags | advisory, php, sql injection
SHA-256 | 5eeae5ea0080765acf856d6b9d5cbad74da3bd9026ee1a9ce5d89c96e6592489
DeluxeBB.txt
Posted May 22, 2006
Authored by KingOfSka | Site contropotere.netsons.org

DeluxeBB version 1.06 remote SQL injection exploit.

tags | exploit, remote, sql injection
SHA-256 | 3f6d4e625dbc29d6156fea701b7208e0f13fd96d3e0bf7aeea56f486323eb740
orkutXSS.txt
Posted May 22, 2006
Authored by Rohin Koul

orkut.com is susceptible to a cross site scripting attack via search.aspx.

tags | exploit, xss
SHA-256 | b63922dbfc99e2b670d977f83e607820c1dedc38be8a4ed673fa8e9b8936fccf
confixx312.txt
Posted May 22, 2006
Authored by LoK-Crew

Confixx versions 3.1.2 and below suffer from a cross site scripting flaw.

tags | exploit, xss
SHA-256 | d63a099eef6b40b50881322547c4e55e3bd65b0c483ae03a46c805cbedd4d8e3
secunia-Abakt.txt
Posted May 22, 2006
Authored by Tan Chew Keong | Site secunia.com

Secunia Research has discovered a vulnerability in Abakt, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error when listing the contents of a ZIP archive. This can be exploited to cause a stack-based buffer overflow when a malicious ZIP archive containing a file with an overly long filename is opened. Versions 0.9.2 and 0.9.3-beta1 are affected.

tags | advisory, overflow
advisories | CVE-2006-2161
SHA-256 | 67471673445159616ecc2805692c08221a6e6eceb4b399e199f2b6db8e227996
arpalert-1.0.2.tar.gz
Posted May 22, 2006
Authored by Thierry Fournier | Site perso.numericable.fr

arpalert uses ARP address monitoring to help prevent unauthorized connections on the local network. If an illegal connection is detected, a program or script is launched, which could be used to send an alert message, for example.

Changes: A few additions, a minor security fix, and a minor bug fix.
tags | local
systems | unix
SHA-256 | ef0613fbb276eac0c84ac0ecb3c7b84612cf2f327cac76f2ec7e37d85cee5e1e
libnids-1.21.tar.gz
Posted May 22, 2006
Authored by Nergal | Site libnids.sourceforge.net

Libnids is a library that provides a functionality of one of NIDS (Network Intrusion Detection System) components, namely E-component. It means that libnids code watches all local network traffic, cooks received datagrams a bit, and provides convenient information on them to analyzing modules of NIDS. So, if you intend to develop a custom NIDS, you do not have to build low-level network code. If you decide to use libnids, and you have got E-component ready - you can focus on implementing other parts of NIDS.

Changes: Various code updates.
tags | tool, local, intrusion detection
systems | unix
SHA-256 | 91ec08b9aeb2f869009b5b099f318c476f75942db64804eb50acde94696f4bf5
Page 3 of 5
Back12345Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close