exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 52 RSS Feed

Files Date: 2006-07-02 to 2006-07-03

0606-exploits.tgz
Posted Jul 2, 2006
Authored by Todd J. | Site packetstormsecurity.com

Packet Storm new exploits for June, 2006.

tags | exploit
SHA-256 | ef986d31111ecd89b355da1eebe9b88999a1cff75cf296157040977217cc3794
Clam AntiVirus Toolkit 0.88.3
Posted Jul 2, 2006
Authored by Tomasz Kojm | Site clamav.net

Clam AntiVirus is an anti-virus toolkit for Unix. The main purpose of this software is the integration with mail servers (attachment scanning). The package provides a flexible and scalable multi-threaded daemon, a commandline scanner, and a tool for automatic updating via Internet. The programs are based on a shared library distributed with the Clam AntiVirus package, which you can use in your own software.

Changes: Various bug fixes.
tags | virus
systems | unix
SHA-256 | 26104bca0780ed8eb99f5a08259bf09d55a374572ba1af28e661cae64da5fb84
ttyrpld-2.18.tar.bz2
Posted Jul 2, 2006
Authored by Jan Engelhardt | Site ttyrpld.sourceforge.net

ttyrpld is a kernel-based TTY shell, screen, and key logger for Linux, FreeBSD/PCBSD, and OpenBSD. It has a real-time log analyzer. It supports any TTY type (vc (console), BSD/Unix98 pty (xterm/SSH), serial, ISDN, USB, etc.).

Changes: Fixed OpenBSD 3.9 kpatch. Readded workaround for OpenBSD/NetBSD EINTR signal handling that got lost in 2.17.
tags | shell, kernel, system logging
systems | linux, unix, freebsd, bsd, openbsd
SHA-256 | 6bd1149148ead2a60e8e4240f0e21a2b37902de7897f914e1c6150d44ba17e3f
tinyca2-0.7.4.tar.gz
Posted Jul 2, 2006
Authored by Stephan Martin | Site tinyca.sm-zone.net

TinyCA is a simple GUI written in Perl-Gtk to manage a small certification authority. It works as a frontend to OpenSSL. TinyCA lets you manage x509 certificates. It is possible to export data in PEM or DER format for use with servers, as PKCS#12 for use with clients, or as S/MIME certificates for use with email programs. It is also possible to import your own PKCS#10 requests and generate certificates from them. It also lets you create and manage SubCAs for more complex setups. The most important certificate extensions can be configured with the graphical frontend. English and German translations are included.

Changes: Fixed invalid filename encoding with German umlauts in base64. Fixed display of UTF8 characters in the GUI.
tags | perl, encryption
SHA-256 | ab6af750b0f9bed8beda103cdfb25bebf841c504cb77c40d5f66548a4eb58a3f
Nmap Scanning Utility 4.11
Posted Jul 2, 2006
Authored by Fyodor | Site insecure.org

Nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). Nmap supports Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments (bypasses some packet filters), TCP ACK and Window scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping scanning, Direct (non portmapper) RPC scanning, Remote OS Identification by TCP/IP Fingerprinting, and Reverse-ident scanning. Nmap also supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings. Full changelog available here.

Changes: Dozens of SSH version detection signatures added. Added Nessus daemon detection. Various other bug fixes.
tags | tool, remote, udp, tcp, protocol, nmap
systems | unix
SHA-256 | 9fe98d5d8c8867c44a307c21277043b2f93d50f1d753e0d23133507a6d1599a7
nuhe-0.01.tar.gz
Posted Jul 2, 2006
Authored by Tuomo Makinen | Site nuhe.sourceforge.net

Nuhe is a rule based log monitoring system which is capable of taking action when rules are matched against log activity. By default, Nuhe runs in the background (as a daemon), but it can also be used in the foreground in a log analyzer mode.

tags | system logging
systems | unix
SHA-256 | edcc580b161a01f1914a0fc8937717390707daa6ea9844b2b3de2730cfc16cee
sturgeon.txt
Posted Jul 2, 2006
Authored by DarkFig

SturGeoN Upload version 1 remote command execution exploit.

tags | exploit, remote
SHA-256 | 0c230bcfa7a02cd96b039e4c1222ce46590e4a5fd4064dbe1ae21768cf7abebd
dieselJoke.txt
Posted Jul 2, 2006
Authored by black-code

Diesel Joke Site is susceptible to SQL injection attacks.

tags | exploit, sql injection
SHA-256 | 5cc1340b9849376f32eec0a440b8ca4f06ac18ca579f05df6c929043c82ab637
SmSSQL.txt
Posted Jul 2, 2006
Authored by Breeeeh

SmS is susceptible to a SQL injection flaw.

tags | exploit, sql injection
SHA-256 | 1a15a6cde51433c9df9b0252ca2f4b100c92b2fae9b0fcb0b6b1cea78e0d7264
icgSQL.txt
Posted Jul 2, 2006
Authored by Breeeeh

Internet Crna Gora is susceptible to a SQL injection flaw.

tags | exploit, sql injection
SHA-256 | d12f2e8aac4a4120ea4140d4dbe62de26f69c68e9a14559d7c6c124eeafbd574
Echo Security Advisory 2006.35
Posted Jul 2, 2006
Authored by Echo Security, Ahmad Muammar W.K | Site y3d1ps.blogspot.com

Opera 9 denial of service exploit that makes use of an iframe tag combined with javascript.

tags | exploit, denial of service, javascript
SHA-256 | 3a72851408478693c2eb244116cf8756c354328e97d661538d17a699a0fc0362
randshop.txt
Posted Jul 2, 2006
Authored by OLiBekaS

Randshop versions 1.1.1 and below are susceptible to a remote file inclusion vulnerability.

tags | exploit, remote, file inclusion
SHA-256 | 13fe55d24d7aea5b1f7040c9422f39a0f8ed7e51784bd0b41b118e0f38ed181e
phpmyadmin281.txt
Posted Jul 2, 2006
Site securitynews.ir

phpMyAdmin version 2.8.1 is susceptible to a cross site scripting vulnerability.

tags | advisory, xss
SHA-256 | 440fe7901b4d78c5456f7f2ed67eddf86e2894bac4491200852b12c63b44d4cd
mAds10.txt
Posted Jul 2, 2006
Authored by Luny

mAds version 1.0 is susceptible to a cross site scripting attack.

tags | exploit, xss
SHA-256 | fc36227ee12cb3147237e4c8cb08537035307d7ab7d06158b192b2cc3a8b9e7d
buddyzone101.txt
Posted Jul 2, 2006
Authored by Luny

Buddy Zone version 1.0.1 suffers from a multitude of cross site scripting flaws.

tags | exploit, xss
SHA-256 | 8ec209529f92d5dc49d00f7252757c9264294887c656dd817d26b0fb77012679
Exploit Labs Security Advisory 2006.4
Posted Jul 2, 2006
Authored by Donnie Werner, Exploit Labs | Site exploitlabs.com

EXPL-A-2006-004 exploitlabs.com Advisory 049 - phpFormGenerator forces insecure usage of permissions for the application to work.

tags | exploit
SHA-256 | 7409cc0d2a8c442311df468f57b9b2f314bdcfcc3caa612cba3fa534895c9ee8
SSRT5996.txt
Posted Jul 2, 2006
Site hp.com

HP Security Bulletin - A potential security vulnerability has been identified with HP-UX mkdir(1). The vulnerability could be exploited by a local user to gain unauthorized access.

tags | advisory, local
systems | hpux
SHA-256 | 57e9c4b390b967fa083ef946b86858693eae423f55868f2ae8d46ec2ee333746
bulletins.txt
Posted Jul 2, 2006
Authored by stderr | Site chokepoint.net

This is an article discussing some dangers of Myspace bulletins. It includes proof of concept code that can be used to download hundreds of thousands of bulletins that most users assume to be only accessible by friends.

tags | web, proof of concept
SHA-256 | 95a60ae09887fead4b742c1cd15fd4683edcbd124708fcb44cf1bd8bf88d4f41
hobbit42.txt
Posted Jul 2, 2006
Authored by Henrik Stoerner

All versions under the 4.2 release of Hobbit prior to 2006-Jun-30 suffer from a flaw where the logfetch utility can be used to read any file on the filesystem.

tags | advisory
SHA-256 | 337360288f55afa7c676f60c1cb2467173030b6f20a3ccbf046e251a50a5a76f
mysmileSQL.txt
Posted Jul 2, 2006
Authored by CrAzY CrAcKeR

My Smiles is susceptible to SQL injection attacks in browse.php.

tags | exploit, php, sql injection
SHA-256 | 1f648174d723882e2804b9e4516029d5353cd6d9f53f5e4e5843792f66481715
moduleSQL.txt
Posted Jul 2, 2006
Authored by CrAzY CrAcKeR

Module's Name 'Classifieds' remote SQL injection exploit.

tags | exploit, remote, sql injection
SHA-256 | fe654a4096b3d5c27457cfb8548e9ce90cef7ddc7cac306c68ab17af26a4297e
CDJSQL.txt
Posted Jul 2, 2006
Authored by CrAzY CrAcKeR

CDJ version NITKID 2.0 is susceptible to a SQL injection vulnerability.

tags | exploit, sql injection
SHA-256 | 854076fcf47e3c1475043c150f50c85fa7e0cc0b4caa782e31701a4803dc17a4
MyNewsGroupsSQL.txt
Posted Jul 2, 2006
Authored by CrAzY CrAcKeR

MyNewsGroups version 0.6 is susceptible to SQL injection attacks in tree.php.

tags | exploit, php, sql injection
SHA-256 | 90f8e2310bd5e23ba3067c62f1cef68d368e7d5199416156cbe7ab25be724325
FreeHostSQL.txt
Posted Jul 2, 2006
Authored by CrAzY CrAcKeR

FreeHost software is susceptible to SQL injection attacks in misc.php and news.php.

tags | exploit, php, sql injection
SHA-256 | 72a40e124a0fcc2f1ce08eebf0fb905e4261f1d682699d1dee00eeb268c18df8
Zero Day Initiative Advisory 06-020
Posted Jul 2, 2006
Authored by ATmaCA, Tipping Point | Site zerodayinitiative.com

Apple iTunes suffers from an integer overflow vulnerability when performing AAC file parsing.

tags | advisory, overflow
systems | apple
advisories | CVE-2006-1467
SHA-256 | 939b55f9122be19112fc571d7e4c12deeb6e8017369be0fdeeeb87957b641efa
Page 1 of 3
Back123Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close