what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 115 RSS Feed

Files Date: 2006-10-20 to 2006-10-21

maintain-3.0.0-RC2.txt
Posted Oct 20, 2006
Authored by ErNe

maintain-3.0.0-RC2 suffers from remote file inclusion in example6.php.

tags | exploit, remote, php, file inclusion
SHA-256 | 4bb51629aefcb73aaa6c17c6470cb351979e556055669955203c55f3dd2cc0c6
Bugzilla-multiple.txt
Posted Oct 20, 2006
Site bugzilla.org

Security Advisory for Bugzilla 2.18.5, 2.20.2, 2.22, and 2.23.2: This advisory covers six security issues that have recently been fixed in the Bugzilla code.

tags | advisory
SHA-256 | 4fee028c5a9a72d7c9ac4452a531f1b39e9680e9bba27265fc3a24d0fa91ecf0
PHPForge3b2.txt
Posted Oct 20, 2006
Authored by Mahmood_ali

PHP Forge 3b2 suffers from a remote file inclusion vulnerability in inc.php.

tags | exploit, remote, php, file inclusion
SHA-256 | ccdf758804c073ef26ea4456845129299445bdbe187e80e5f9b476b1a83c2f69
patchlodel-0.7.3.txt
Posted Oct 20, 2006

patchlodel-0.7.3 suffers from a remote file inclusion vulnerability in calcul-page.php.

tags | exploit, remote, php, file inclusion
SHA-256 | 453d857f333311cd436170375a141a6ac60d8d9875a4ea3dfe1f8999f97ff0e0
Kmail-1.9.1.txt
Posted Oct 20, 2006
Authored by nnp | Site silenthack.co.uk

kmail 1.9.1 table/frameset DOS proof of concept.

tags | exploit, proof of concept
SHA-256 | 667d336a0c82cde8a65570b60b3fb5af3cdfd0c23f4d0d6a7ba48819800ca3ec
objectpackager.txt
Posted Oct 20, 2006
Authored by seejay.11

Deatils on spoofing the security dialog in Windows object packager.

tags | advisory, spoof
systems | windows
SHA-256 | 7acc740ea36cdfd85ab1eb307e3a6424c784a540e5b69f7d48f55824ad0b6912
Jinzora2.6.txt
Posted Oct 20, 2006
Authored by ErNe

Jinzora 2.6 and prior suffer from a remote file inclusion vulnerability in mt.php.

tags | exploit, remote, php, file inclusion
SHA-256 | 8e4ef0fbbda7a1356a0d1656fb8d5c31c3dfa3b17ec3569a91d5396accb89967
EXlor1.0.txt
Posted Oct 20, 2006
Authored by Mahmood_ali

EXlor 1.0 suffers from a remote file inclusion vulnerability in /fonctions/template.php

tags | exploit, remote, php, file inclusion
SHA-256 | cd7d51d31ef0b5b84acc3d7f854532330ea35dc488499d5bf2e01710d9d4fb5a
gg_bf.c
Posted Oct 20, 2006
Authored by Aleksander Ambrozkiewicz

A small C program that can brute force gadu-gadu accounts starting from a given number and using a hardcoded list of passwords.

tags | cracker
SHA-256 | 048dcc6171b1c08f6132e372e9ac410d6b68d1e47402d1a2901c9bb8bf5528e7
Armorize-ADV-2006-0005.txt
Posted Oct 20, 2006
Authored by Armorize | Site armorize.com

Armorize-ADV-2006-0005 discloses multiple cross-site scripting vulnerabilities that are found in Gcontact, which is a Web based address book written in Ajax/PHP offering multi-user, multi-contacts (email,phone,icq,msn,...) & multi-address for each person, birthday reminder by email, mailing-list management, Excel export, etc.

tags | advisory, web, php, vulnerability, xss
SHA-256 | 8c00d8f70c2d466f2cb4980a4297d1bfbf34ffdf2e3ffa80be27b73a2ed5292f
Armorize-ADV-2006-0003.txt
Posted Oct 20, 2006
Authored by Armorize | Site armorize.com

Armorize-ADV-2006-0003 discloses multiple cross-site scripting vulnerabilities that are found in Zen Cart, which is a PHP +e-commerce shopping program and is Built on a foundation of OScommerce GPL code. It provides an easy-to-setup and run +online store.

tags | advisory, php, vulnerability, xss
SHA-256 | b5df486f27e52a1b4f91bc2b83b947e59cfddb83cebec8fca490934c31eed8aa
Armorize-ADV-2006-0003.txt
Posted Oct 20, 2006
Authored by Armorize | Site armorize.com

Armorize-ADV-2006-0003 discloses multiple cross-site scripting vulnerabilities that are found in Zen Cart, which is a PHP e-commerce shopping program and is Built on a foundation of OScommerce GPL code. It provides an easy-to-setup and run online store.

tags | advisory, php, vulnerability, xss
SHA-256 | b5df486f27e52a1b4f91bc2b83b947e59cfddb83cebec8fca490934c31eed8aa
alexGuestbook.txt
Posted Oct 20, 2006
Authored by Mohandko

@lex Guestbook suffers from a remote file inclusion vulnerability in Mxconf.php.

tags | exploit, remote, php, file inclusion
SHA-256 | ad345d07ac7c46a388bf07bc6ddeba5d4c6c366e729c56871766c33812205753
osTicket.txt
Posted Oct 20, 2006
Authored by rUnViRuS | Site sec-area.com

osTicket suffers from a remote file inclusion vulnerability in open_form.php.

tags | exploit, remote, php, file inclusion
SHA-256 | 1b18ab69688c4a3afdb93a47e347dffb7665bab00ce344e2be69bd2653e3ef5a
konqueror3.5-latest.txt
Posted Oct 20, 2006
Authored by Georgi Guninski

POC for a possible integer overflow bug in konqueror 3.5-latest.

tags | exploit, overflow
SHA-256 | 00263bb5a228545e88b8e05dee01534319248a7271970aec28977e1612e8fbe9
SYMSA-2006-010.txt
Posted Oct 20, 2006
Authored by Derek Callaway | Site symantec.com

Symantec Vulnerability Research SYMSA-2006-010: The web server under IronWebMail employs a simple macro language for evaluating pathname references. A loss of confidentiality occurs as a result of faulty pathname evaluation, causing unauthenticated access violation.

tags | advisory, web
SHA-256 | 70d347b30c2f24ca5298b306b53bddf54e9c34e14f16894f24b825724792f064
raptor_libnspr
Posted Oct 20, 2006
Authored by Marco Ivaldi | Site 0xdeadbeef.info

raptor_libnspr - Solaris 10 libnspr oldschool local root exploit. Exploits the design error vulnerability in NSPR.

tags | exploit, local, root
systems | solaris
advisories | CVE-2006-4842
SHA-256 | 4534f08fb4e5ebcc7329d2d59c1fbdfb5145398877594c9b4e82b067b081c76b
iDEFENSE Security Advisory 2006-10-13.t
Posted Oct 20, 2006
Authored by iDefense Labs | Site idefense.com

iDefense Security Advisory 10.13.06 - Remote exploitation of a format string vulnerability in the mod_tcl module for the Apache httpd v2.x could allow attackers to execute arbitrary code in the context of the httpd.

tags | advisory, remote, arbitrary
SHA-256 | aa822f011982ff0d3ccb3b5cfacc8f0a60f500d6df8113792a7954839f072cfc
ISOI-2007-cfp.txt
Posted Oct 20, 2006
Site isotf.org

The second Internet Security Operations and Intelligence (ISOI) DA workshop will take place on the 25th and 26th of January, 2007. It will be hosted by the Microsoft Corporation, in Redmond WA. An after-party dinner will be hosted by Trendmicro. The call for papers is now open to the public. The main subject of interest is vulnerabilities and 0day exploits used in the wild. Secondary subjects are DDoS, phishing and general botnet subjects.

tags | paper, vulnerability, conference
SHA-256 | 669e54de218bb16532988610c786ca340672bcaae385d66f0953e184c3db008e
ocs-1.1.3.txt
Posted Oct 20, 2006
Authored by k1tk4t | Site newhack.org

Open Conference Systems 1.1.3 and prior suffer from a remote file inclusion vulnerability in theme.inc.php and footer.inc.php.

tags | exploit, remote, php, file inclusion
SHA-256 | b134a8d617c8ccafcb8f467e5e15bc5172d2d1df2170e45acd32681f9cf23057
TorrentFluxstartpop.txt
Posted Oct 20, 2006
Authored by Steven Roddis | Site stevenroddis.com.au

Input passed to the "torrent" field of a GET Request is not properly sanitized before being used. This can be exploited to insert arbitrary HTML and script code, which will be executed in an users browser session in context of an affected site if a user clicks on a malicious link.

tags | advisory, arbitrary
SHA-256 | 6a6b34ce2afcfa0432decb731a485ffde68dda4a0bce0e1f03541dbea8424bcd
wyd.tar.gz
Posted Oct 20, 2006
Authored by Max Moser | Site remote-exploit.org

Wyd is a tool for password profiling. The general idea is to personalize or profile the available data about a "target" person or system and generate a wordlist of possible passwords/passphrases out of available information. Instead of just using the command 'strings' to extract all the printable characters out of all type of files, we wanted to eliminate as much false-positives as possible. The goal was to exclude as much "unusable" data as possible to get an effective list of possible passwords/passphrases. It is very effective to get reasonable passwords from websites or filesystems.

tags | cracker
SHA-256 | 3581d74785a5071ea404d0bbe59de4768ac89952f157729de10a21ab0abb2277
DRM-mem.txt
Posted Oct 20, 2006
Authored by Joxean Koret

POC for a memory corruption vulnerability in the "drmstor.dll" library which is part of the DRM (Digital Rights Management) software supplied with MS Windows.

tags | exploit
systems | windows
SHA-256 | 2cbde388cbdb99ce63dfa813a707d4b197d88ee064f57afa7715e9847ad592ea
wlandecrypter-0.4.tar.gz
Posted Oct 20, 2006
Authored by nilp0inter | Site rusoblanco.com

Wlandecrypter is a password generator for certain ADSL WIFI routers provided by Telefonica of Spain. Essid named WLAN_XX when XX are two hexadecimal digits.

tags | tool, wireless
SHA-256 | 43dc4ccd6f02b5fb1594641aa245b1db35ea43464e0a053cdecba88c1b4fe23b
airflood-0.1.tar.gz
Posted Oct 20, 2006
Authored by nilp0inter | Site rusoblanco.com

Airflood is a modification of aireplay that allows for a DOS in in the AP. This program fills the table of clients of the AP with random MACs doing impossible new connections. Useful external "MAC filter" function can allow only the "attacker" to connect to the AP

tags | tool, wireless
SHA-256 | 1206f824aaaaadcd2ba79d79f61bdfc0456a2aa4ee4834a27e36f30aa01f1424
Page 3 of 5
Back12345Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close