what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 82 RSS Feed

Files Date: 2006-06-12 to 2006-06-13

f_0k-0.1.py.txt
Posted Jun 12, 2006
Authored by Federico Fazzi

0verkill version 0.16 remote integer overflow denial of service exploit.

tags | exploit, remote, denial of service, overflow
SHA-256 | bac493533dcb48792b7d6b8cc86bcfed5ddd0d2c1c8b7c6b55196f68349aaee6
stadmanager.txt
Posted Jun 12, 2006
Authored by Luny

ST AdManager Lite v1 suffers from a cross site scripting condition.

tags | advisory, xss
SHA-256 | 6f1a58780afe7f2e49100327fc8dfab116f085fcedd3cad871a087b9fc07b54e
phpNukeSQL.txt
Posted Jun 12, 2006
Authored by BuNy-m | Site alshmokh.com

The PHP-Nuke Download module is susceptible to remote SQL injection attacks.

tags | exploit, remote, php, sql injection
SHA-256 | 91429a97c385bdf7f71538e25c0b9ffa140a29dd5b922618fe24e76a6a6cc165
secunia-AutoMate.txt
Posted Jun 12, 2006
Site secunia.com

Secunia Research has discovered a vulnerability in AutoMate version 6.1.0.0, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error in UNACEV2.DLL when extracting an ACE archive containing a file with an overly long filename. This can be exploited to cause a stack-based buffer overflow when a user extracts a specially crafted ACE archive.

tags | advisory, overflow
advisories | CVE-2005-2856
SHA-256 | 52e044d4c6394bb5428d5aa19fb3a82863f00449b983f5a0bc10b0067841ca60
secunia-SelectaPix.txt
Posted Jun 12, 2006
Authored by Andreas Sandblad | Site secunia.com

Secunia Research has discovered some vulnerabilities in SelectaPix version 1.31, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks.

tags | exploit, vulnerability, xss, sql injection
SHA-256 | 93e653e7eea27cd305721490efe229af9bb3c11026f732cfdc7bd444fe7daa41
DoceboLms303.txt
Posted Jun 12, 2006
Authored by Federico Fazzi

Docebo Lms version 3.0.3 suffers from a remote command execution vulnerability.

tags | exploit, remote
SHA-256 | 7e5f86b1ae364da574479a6b204798c843c00e20b2d557a1cd3194972103a9b9
DoceboKms303.txt
Posted Jun 12, 2006
Authored by Federico Fazzi

Docebo Kms version 3.0.3 suffers from a remote command execution vulnerability.

tags | exploit, remote
SHA-256 | aff9b072b446193d9defc58c9557447584f2ba1a656990d522ffc4ea7ef71e08
DoceboCMS303.txt
Posted Jun 12, 2006
Authored by Federico Fazzi

Docebo CMS version 3.0.3 suffers from a remote command execution vulnerability.

tags | exploit, remote
SHA-256 | af547381eb822efc50972d0a109543bfea888442ab8f5daf8c425f668748dea7
HTM80211.pdf
Posted Jun 12, 2006
Site amilabs.com

802.11 Hack The Mac research report that offers in-depth protocol mechanics analysis, at the 802.11 MAC and PHY layers, with emphasis on research and implementation of Denial of Service and disruption exploits of a wireless cell and active 802.11 stations on the cell.

tags | paper, denial of service, protocol
SHA-256 | 9f405fa5d9e7a68dfc4e11274af36a25417406db13aa81ae9f50e89f4671a3fe
dellOpen.txt
Posted Jun 12, 2006
Authored by Mike

The Dell PowerEdge Installation and Server Management Disc boots a system with X11 open to the world and sshd spawned that allows anyone access.

tags | advisory
SHA-256 | 02dce744d87411c08bb70ff8942d29f15c497e3bc1e2210ebc0576c28b690f4d
FLoP-1.6.0.tar.gz
Posted Jun 12, 2006
Authored by DG | Site geschke-online.de

FLoP is utility designed to gather alerts with a payload from distributed Snort sensors at a central server, and to store them in a database. Both PostgreSQL and MySQL are currently supported. High priority alerts may be sent out via e-mail.

Changes: Documentation was updated and extended. Various bug fixes.
tags | tool, sniffer
SHA-256 | 4106a35e635121e7056aee91c7141d0babf3995c66321daf70f33c171f05bc4f
rsbac-common-1.2.7.tar.bz2
Posted Jun 12, 2006
Site rsbac.org

Rule Set Based Access Control (RSBAC) is an open source security extension for current Linux kernels. It is based on the Generalized Framework for Access Control (GFAC) and provides a flexible system of access control implemented with the help of a kernel patch. All security relevant system calls are extended by security enforcement code. This code calls the central decision component, which in turn calls all active decision modules and generates a combined decision. This decision is then enforced by the system call extensions.

Changes: Fixed spacing in debian changelog.
tags | kernel
systems | linux
SHA-256 | 709c2120927045704957078c0776486d8398633b96d537bc6a4998e4443abb39
marquee.txt
Posted Jun 12, 2006
Authored by n00b

Denial of service proof of concept exploit using marquee that affects Opera and Internet Explorer as well, not just Mozilla Firefox.

tags | exploit, denial of service, proof of concept
SHA-256 | 380b2b9ffc0077b1364b86395d51ece422b6c1601504c8f89b8757db8d146812
GUESTEX-exec.pl.txt
Posted Jun 12, 2006
Authored by K-sPecial

Remote exploit for an old flaw in GUESTEX 1.0 guestbook that allows for remote code execution.

tags | exploit, remote, code execution
SHA-256 | bb3e843dbd7e85e94f043786965ba4cf0fd2d1035be98b3b2b98554289d95f2a
mafiamoblog.txt
Posted Jun 12, 2006
Authored by Simo64

Mafia Moblog versions 6 Full and below suffer from full path disclosure and SQL injection flaws.

tags | exploit, sql injection
SHA-256 | 1deb63db6703b6151de14bacf8af4ad567d6d6eba9496bce41e44d866bb6c7c5
Back-end0721.txt
Posted Jun 12, 2006
Authored by Federico Fazzi

Back-end version 0.7.2.1 remote command execution exploit that makes use of jpcache.php.

tags | exploit, remote, php
SHA-256 | d9fdd92864264785d35fa24e0adc6d7412596b2fa226693c4949819315f4ae65
Bookmark4U.pl.txt
Posted Jun 12, 2006
Authored by Federico Fazzi

Bookmark4U versions 2.0 and below remote file inclusion exploit.

tags | exploit, remote, file inclusion
SHA-256 | 058e3fcd3f73b98b6c6acbdb9666aff13dd25b3ed9cfb80ac6696b671de40384
CyBoard125.c
Posted Jun 12, 2006
Authored by Federico Fazzi

CyBoard PHP Lite versions 1.25 and below remote file inclusion exploit.

tags | exploit, remote, php, file inclusion
SHA-256 | 936f47c9c9c2fc16f3b680f6ce727ead3ade1986f9843d500bce894830be3213
dreamaccount.py.txt
Posted Jun 12, 2006
Authored by Federico Fazzi

DreamAccount versions 3.1 and below remote file inclusion exploit.

tags | exploit, remote, file inclusion
SHA-256 | fe2eea244668a6dddcc67bc41726893b6307b4c572278854b565f505a8ef1a80
wingatex.pl.txt
Posted Jun 12, 2006
Authored by Kingcope

QBik Wingate version 6.1.1.1077 remote buffer overflow exploit for Windows 2000. Binds a shell to tcp/4444.

tags | exploit, remote, overflow, shell, tcp
systems | windows
SHA-256 | 3634dcb8240074e73c3a15a78c45b2ad9a7989d1f46f1f58e343d37350b464c8
f_bloggit-1.01.txt
Posted Jun 12, 2006
Authored by Federico Fazzi

BloggIt versions 1.01 and below suffer from an arbitrary code execution flaw via admin.php.

tags | advisory, arbitrary, php, code execution
SHA-256 | 7b52e7137e8f9fb7847958ed8511bf50d92882679c7881c96db9dab26f59e090
f_mg-2.62.py.txt
Posted Jun 12, 2006
Authored by Federico Fazzi

MiraksGalerie versions 2.62 and below remote command execution exploit that makes use of a file inclusion flaw.

tags | exploit, remote, file inclusion
SHA-256 | 83b0da3eb0978e2ba1200c09bc37db5c4b06803b49db2f5a76779974618c9583
vicestatsSQL.txt
Posted Jun 12, 2006
Authored by CrAzY CrAcKeR

Vice Stats version 0.5b is susceptible to a SQL injection attack.

tags | exploit, sql injection
SHA-256 | a8eff597d28ad674fadf81c1e1ff85993a9ae65bd6cc258b8ca01950d854a68a
calexp2.txt
Posted Jun 12, 2006
Authored by CrAzY CrAcKeR

Calendar Express 2 is susceptible to SQL injection attacks.

tags | exploit, sql injection
SHA-256 | 547ebe26040143eba3070519c1d81bdb107febc0005eeff1dd1f43ea9f62a203
HexView Security Advisory 2006-06-06.1
Posted Jun 12, 2006
Authored by HexView | Site hexview.com

The Microsoft NetMeeting application insufficiently validates received data opening a possibility to overwrite portions of application memory causing exceptions ranging from null-pointer access to a possible code execution. Version 3.01 has been found vulnerable.

tags | advisory, code execution
SHA-256 | a88f3c204e5b5b98c35fd8a74b701829f9b30f2c25275569137bbba6ad575152
Page 3 of 4
Back1234Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close