exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 92 RSS Feed

Files Date: 2006-10-09 to 2006-10-10

Secunia Security Advisory 22323
Posted Oct 9, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in Sun Solaris, which can be exploited by malicious, local users to gain access to system information.

tags | advisory, local
systems | solaris
SHA-256 | cdb3e78fdd145a9ecf275ba473c32606022be23cc5ff82b1df6e21ba5d11d481
Secunia Security Advisory 22324
Posted Oct 9, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in OpenBSD's systrace, which can be exploited by malicious, local users to gain knowledge of potentially sensitive information, cause a DoS (Denial of Service) and gain escalated privileges.

tags | advisory, denial of service, local
systems | openbsd
SHA-256 | 17dcd3cbac943338a3f2352bf11125db86fa309e18d2e1cb94ab2a4e8e6a8981
Secunia Security Advisory 22325
Posted Oct 9, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sun has acknowledged a vulnerability in Sun Secure Global Desktop Software, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | c988364c76a8ace76dd85f73734ef8b765a01bc95ea9659da40166bc68892230
Secunia Security Advisory 22326
Posted Oct 9, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Linksys WRT54GXv2, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | aae1d189f5544c24dbd5db9fad498fd73e7c074c3e56ce1bf11e81395fedc1b8
Secunia Security Advisory 22330
Posted Oct 9, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - OpenBSD has issued an update for OpenSSL. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
systems | openbsd
SHA-256 | 47d695bff09c0614c94de250826315eadb1877d83385169f3429aa5e74066dd9
wifitap-0.4.0.tgz
Posted Oct 9, 2006
Authored by Cedric Blancher | Site sid.rstack.org

Wifitap is a proof of concept for communication over WiFi networks using traffic injection. It basically allows one to communicate over an open or WEP 802.11 network without being associated, thus bypassing any AP side restriction such as MAC address filtering or station isolation.

Changes: Updated documentation, various additions including a move to Scapy 1.0.4.74.
tags | tool, proof of concept, wireless
SHA-256 | 5029b4b80e66844e6109ee9840e70a90e453bd4e5169d9e903eaef599d15162e
NamedPipes.zip
Posted Oct 9, 2006
Authored by Andres Tarasco | Site 514.es

This tool allows you to impersonate user credentials (with namedpipes) and execute a shell. One of the best features of this tool is that it includes some new attack vectors (payload generator with -t parameter) to force network users to connect to a remote host (desktop.ini, html code, lnk files, url files,pps,) so smbrelay can also be used.

tags | remote, shell
SHA-256 | 9346dee563fb29b2b3df7d23637e8761553627b823a55102ab2f1771384d41cb
TokenExecution.zip
Posted Oct 9, 2006
Authored by Andres Tarasco | Site 514.es

This tool is able to duplicate all Tokens stored in the system by calling NtQuerySystemInformation(). Duplicated Tokens allow users with local Administrator rights to execute code with credentials of every user that is logged on to the system locally or over network. Default mode only extracts tokens from the lsass process.

tags | local
SHA-256 | 1a0435ffe70c05e1ac855b72e2791c48ef936b97e049469b6101088dd1cb7a06
ProcessInjector.zip
Posted Oct 9, 2006
Authored by Andres Tarasco | Site 514.es

This tool enumerates all processes and threads running and shows their Token owner information. Users with SE_DEBUG_NAME privilege should be able to inject code on a local process and execute code with their privileges. This could be useful to obtain an interactive shell (at port 8080) when an user session is locked.

tags | shell, local
SHA-256 | 1ac149ac191a602c8eba43f12c04a137a7aacdf4f3d5eb3938a05335167236e8
phplive31-rfi.txt
Posted Oct 9, 2006
Authored by Paisterist | Site neosecurityteam.net

PHP Live! versions 3.1 and below suffer from a remote file inclusion vulnerability.

tags | exploit, remote, php, code execution, file inclusion
SHA-256 | 0732b452553cd8bc6ccb911f21c7170c0a9e296112f489ff2cb9bac72d6a5ab6
Debian Linux Security Advisory 1192-1
Posted Oct 9, 2006
Authored by Debian | Site debian.org

Debian Security Advisory 1192-1 - Several security related problems have been discovered in Mozilla and derived products.

tags | advisory
systems | linux, debian
advisories | CVE-2006-2788, CVE-2006-4340, CVE-2006-4565, CVE-2006-4566, CVE-2006-4568, CVE-2006-4570, CVE-2006-4571
SHA-256 | 6693795a88195e5098e778b54549535c75e36dc792a805d3a854d8805ff0d5d6
DNSBruteforce.tar.gz
Posted Oct 9, 2006
Site revhosts.org

DNS brute forcing utility that can query 2000 domains in 9 seconds.

tags | cracker
SHA-256 | 7cbacc7bdd8d516ad1652127af80f30f961a50e0f8812695af8d14d033224271
Mandriva Linux Security Advisory 2006.180
Posted Oct 9, 2006
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory MDKSA-2006-180 - An integer overflow was discovered in the PHP memory handling routines. If a script can cause memory allocation based on untrusted user data, a remote attacker sending a carefully crafted request could execute arbitrary code as the 'apache' user.

tags | advisory, remote, overflow, arbitrary, php
systems | linux, mandriva
advisories | CVE-2006-4812
SHA-256 | 56a439b70277686da9d281f585573b7cc0c87c57558e12fe96f91523df7c3487
TSRT-06-12.txt
Posted Oct 9, 2006
Authored by Pedram Amini | Site tippingpoint.com

A vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Computer Associates ARCserver Backup. Authentication is not required exploit this vulnerability and both the client and server are affected. The problem specifically exists within the handling of long messages received over the Mailslot named 'CheyenneDS'. As no explicit MaxMessageSize is supplied in the call to CreateMailslot, an attacker can cause an exploitable stack-based buffer overflow.

tags | advisory, remote, overflow, arbitrary
advisories | CVE-2006-5142
SHA-256 | c63b9f680348a05a9c714b24b61cca1344e26cdd1b743becb2ce05d8cbabd78d
TSRT-06-11.txt
Posted Oct 9, 2006
Authored by Pedram Amini | Site tippingpoint.com

A vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Computer Associates BrightStor ARCserve Backup, Enterprise Backup, Server Protection Suite and Business Protection Suite. Authentication is not required to exploit this vulnerability and both client and servers are affected. The problem specifically exists within DBASVR.exe, the Backup Agent RPC Server. This service exposes a number of vulnerable RPC routines through a TCP endpoint with ID 88435ee0-861a-11ce-b86b-00001b27f656 on port 6071. The most trivial of the exposed vulnerabilities results in an exploitable stack overflow.

tags | advisory, remote, overflow, arbitrary, tcp, vulnerability
advisories | CVE-2006-5143
SHA-256 | 6db0cdce65e6bfa48946db5e30be84d72faec9442b55e745fae38640005bc4f1
Zero Day Initiative Advisory 06-031
Posted Oct 9, 2006
Authored by Tipping Point, livesploit.com | Site zerodayinitiative.com

A vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Computer Associates BrightStor ARCserve Backup, Enterprise Backup, Server Protection Suite and Business Protection Suite. Authentication is not required to exploit this vulnerability. The problem specifically exists within ASCORE.dll, a DLL used by the Message Engine RPC server. This service exposes a heap overflow vulnerability through RPC opcode 43 (0x2b) and a stack overflow vulnerability through RPC opcode 45 (0x2d) on TCP port 6503 endpoint with ID dc246bf0-7a7a-11ce-9f88-00805fe43838. The flaws are exposed when passing long strings as the second parameter to either opcode.

tags | advisory, remote, overflow, arbitrary, tcp
advisories | CVE-2006-5143
SHA-256 | ea191ab2469d6979936d4e1c4ede0baacc4f8cc992c6904ef215ec00b53759c7
cpanel108x.txt
Posted Oct 9, 2006
Authored by Clint Torrez

Local root exploit for cPanel versions 10.8.x and below.

tags | exploit, local, root
SHA-256 | 676c7c242f8e6e79024b49f9a9c1e5874b1ffba6d53e8aafc1f2ddb5c0c39116
excploit.c
Posted Oct 9, 2006
Authored by Kevin Finisterre, xmath

Mac OS X versions 10.4.7 and below Mach Exception handling local exploit.

tags | exploit, local
systems | apple, osx
advisories | CVE-2006-4392
SHA-256 | 0b61b584f7131fa9bf13b6a2ffa8d69159c44addda8cc54bd4d2758903136439
shttpd134.txt
Posted Oct 9, 2006
Authored by skOd

SHTTPD version 1.34 POST remote buffer overflow exploit.

tags | exploit, remote, overflow
SHA-256 | ca1cf2510803a6946eae8037fbc3e637e666e569bf0bd96bf147f19c639d7daf
mcafee.pm.txt
Posted Oct 9, 2006
Authored by H D Moore, muts, xbxice | Site metasploit.com

This metasploit module is a stack overflow exploit for McAfee ePolicy Orchestrator 3.5.0 and ProtectionPilot 1.1.0. Tested on Windows 2000 SP4 and Windows 2003 SP1.

tags | exploit, overflow
systems | windows
SHA-256 | c5d4374afb7d02fcb71a301406cf46a7b08856e8634b8c4b455323de754bcf69
elf-infection.txt
Posted Oct 9, 2006
Authored by jolmos

Infecting ELF binaries to gain local root.

tags | exploit, local, root
SHA-256 | ddbff7dec2b42a5c6f2a6392277bd7b695ef9ef374ad2f4856babe17083ef0d0
4images-sql.txt
Posted Oct 9, 2006
Authored by disfigure, h3llfyr3, Synsta

4images version 1.7.x remote SQL injection exploit that makes use of search.php.

tags | exploit, remote, php, sql injection
SHA-256 | 6db99fcecfa73077e89efeb5cf3e0ff0757d23d69ed47abf1f66980a4175ab6f
phpmynews14-rfi.txt
Posted Oct 9, 2006
Authored by XORON

PHPMyNews versions 1.4 and below suffer from a remote file inclusion vulnerability in cfg_include_dir.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 7799c3399905dd56feb864137a35dac46b37af89284e1e2c4ec94a7b5d982cee
ciamosCMS096b-rfi.txt
Posted Oct 9, 2006
Authored by Kacper | Site rahim.webd.pl

Ciamos CMS versions 0.9.6b and below remote file inclusion exploit that makes use of config.php.

tags | exploit, remote, php, code execution, file inclusion
SHA-256 | 43323c3e6e5aea4a011f064243a2cb40a423b9c2354b0b4212a3e2340c31f5e0
freenews11-rfi.txt
Posted Oct 9, 2006
Authored by XORON

Freenews versions 1.1 and below suffer from a remote file inclusion vulnerability in moteur.php.

tags | exploit, remote, php, code execution, file inclusion
SHA-256 | 92781bea197ef4aae3d543c8e3a9c3828675150edc851d89fb6cc33f9d59cb15
Page 2 of 4
Back1234Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close