exploit the possibilities
Showing 51 - 75 of 115 RSS Feed

Files Date: 2006-10-20 to 2006-10-21

maintain-3.0.0-RC2.txt
Posted Oct 20, 2006
Authored by ErNe

maintain-3.0.0-RC2 suffers from remote file inclusion in example6.php.

tags | exploit, remote, php, file inclusion
MD5 | 84eb359d57bf2e3b4552d60f417d8246
Bugzilla-multiple.txt
Posted Oct 20, 2006
Site bugzilla.org

Security Advisory for Bugzilla 2.18.5, 2.20.2, 2.22, and 2.23.2: This advisory covers six security issues that have recently been fixed in the Bugzilla code.

tags | advisory
MD5 | 79040ad91bd42ebe730fd28aea31b4d3
PHPForge3b2.txt
Posted Oct 20, 2006
Authored by Mahmood_ali

PHP Forge 3b2 suffers from a remote file inclusion vulnerability in inc.php.

tags | exploit, remote, php, file inclusion
MD5 | 96f21f41548ce9c6288d3fe884570795
patchlodel-0.7.3.txt
Posted Oct 20, 2006

patchlodel-0.7.3 suffers from a remote file inclusion vulnerability in calcul-page.php.

tags | exploit, remote, php, file inclusion
MD5 | e41b30d442dcd72ae3709b516eb78242
Kmail-1.9.1.txt
Posted Oct 20, 2006
Authored by nnp | Site silenthack.co.uk

kmail 1.9.1 table/frameset DOS proof of concept.

tags | exploit, proof of concept
MD5 | 734625a1724e90eb9dbad29db74ad770
objectpackager.txt
Posted Oct 20, 2006
Authored by seejay.11

Deatils on spoofing the security dialog in Windows object packager.

tags | advisory, spoof
systems | windows
MD5 | 712469e63518bb27375a3f1737002e8e
Jinzora2.6.txt
Posted Oct 20, 2006
Authored by ErNe

Jinzora 2.6 and prior suffer from a remote file inclusion vulnerability in mt.php.

tags | exploit, remote, php, file inclusion
MD5 | 27a380ee8c19b62819209a41330ccb16
EXlor1.0.txt
Posted Oct 20, 2006
Authored by Mahmood_ali

EXlor 1.0 suffers from a remote file inclusion vulnerability in /fonctions/template.php

tags | exploit, remote, php, file inclusion
MD5 | 5c4071a36db560496251a2b0f5b03030
gg_bf.c
Posted Oct 20, 2006
Authored by Aleksander Ambrozkiewicz

A small C program that can brute force gadu-gadu accounts starting from a given number and using a hardcoded list of passwords.

tags | cracker
MD5 | ec833ea3c4bbea02fa7687f23f821c0a
Armorize-ADV-2006-0005.txt
Posted Oct 20, 2006
Authored by Armorize | Site armorize.com

Armorize-ADV-2006-0005 discloses multiple cross-site scripting vulnerabilities that are found in Gcontact, which is a Web based address book written in Ajax/PHP offering multi-user, multi-contacts (email,phone,icq,msn,...) & multi-address for each person, birthday reminder by email, mailing-list management, Excel export, etc.

tags | advisory, web, php, vulnerability, xss
MD5 | 872cee9929c7a8de21cbecd0789861f8
Armorize-ADV-2006-0003.txt
Posted Oct 20, 2006
Authored by Armorize | Site armorize.com

Armorize-ADV-2006-0003 discloses multiple cross-site scripting vulnerabilities that are found in Zen Cart, which is a PHP +e-commerce shopping program and is Built on a foundation of OScommerce GPL code. It provides an easy-to-setup and run +online store.

tags | advisory, php, vulnerability, xss
MD5 | 174ed55295ff0776d902e7c9ebbcd67c
Armorize-ADV-2006-0003.txt
Posted Oct 20, 2006
Authored by Armorize | Site armorize.com

Armorize-ADV-2006-0003 discloses multiple cross-site scripting vulnerabilities that are found in Zen Cart, which is a PHP e-commerce shopping program and is Built on a foundation of OScommerce GPL code. It provides an easy-to-setup and run online store.

tags | advisory, php, vulnerability, xss
MD5 | 3f431164425f059247d2ce46ba3fda1c
alexGuestbook.txt
Posted Oct 20, 2006
Authored by Mohandko

@lex Guestbook suffers from a remote file inclusion vulnerability in Mxconf.php.

tags | exploit, remote, php, file inclusion
MD5 | deea74a96e6380dd5316f195e4dd1e07
osTicket.txt
Posted Oct 20, 2006
Authored by rUnViRuS | Site sec-area.com

osTicket suffers from a remote file inclusion vulnerability in open_form.php.

tags | exploit, remote, php, file inclusion
MD5 | d039ce30efcdec9cd6420c8a613c16bf
konqueror3.5-latest.txt
Posted Oct 20, 2006
Authored by Georgi Guninski

POC for a possible integer overflow bug in konqueror 3.5-latest.

tags | exploit, overflow
MD5 | d416235d5866272fc1f83da95f771775
SYMSA-2006-010.txt
Posted Oct 20, 2006
Authored by Derek Callaway | Site symantec.com

Symantec Vulnerability Research SYMSA-2006-010: The web server under IronWebMail employs a simple macro language for evaluating pathname references. A loss of confidentiality occurs as a result of faulty pathname evaluation, causing unauthenticated access violation.

tags | advisory, web
MD5 | f80924ec3229b0f9565314e62d85fa43
raptor_libnspr
Posted Oct 20, 2006
Authored by Marco Ivaldi | Site 0xdeadbeef.info

raptor_libnspr - Solaris 10 libnspr oldschool local root exploit. Exploits the design error vulnerability in NSPR.

tags | exploit, local, root
systems | solaris
advisories | CVE-2006-4842
MD5 | 9de41a358bf1c1b092c82f43d9033503
iDEFENSE Security Advisory 2006-10-13.t
Posted Oct 20, 2006
Authored by iDefense Labs | Site idefense.com

iDefense Security Advisory 10.13.06 - Remote exploitation of a format string vulnerability in the mod_tcl module for the Apache httpd v2.x could allow attackers to execute arbitrary code in the context of the httpd.

tags | advisory, remote, arbitrary
MD5 | a98acf4b15148b8483385b4d7bcd4496
ISOI-2007-cfp.txt
Posted Oct 20, 2006
Site isotf.org

The second Internet Security Operations and Intelligence (ISOI) DA workshop will take place on the 25th and 26th of January, 2007. It will be hosted by the Microsoft Corporation, in Redmond WA. An after-party dinner will be hosted by Trendmicro. The call for papers is now open to the public. The main subject of interest is vulnerabilities and 0day exploits used in the wild. Secondary subjects are DDoS, phishing and general botnet subjects.

tags | paper, vulnerability, conference
MD5 | bdfe7ad396060a16c8d17192e80910aa
ocs-1.1.3.txt
Posted Oct 20, 2006
Authored by k1tk4t | Site newhack.org

Open Conference Systems 1.1.3 and prior suffer from a remote file inclusion vulnerability in theme.inc.php and footer.inc.php.

tags | exploit, remote, php, file inclusion
MD5 | 7a2f5cd4770aed3b8862149800b1ec2e
TorrentFluxstartpop.txt
Posted Oct 20, 2006
Authored by Steven Roddis | Site stevenroddis.com.au

Input passed to the "torrent" field of a GET Request is not properly sanitized before being used. This can be exploited to insert arbitrary HTML and script code, which will be executed in an users browser session in context of an affected site if a user clicks on a malicious link.

tags | advisory, arbitrary
MD5 | bc70ff8669ac93b519ab2f6795bc3e5a
wyd.tar.gz
Posted Oct 20, 2006
Authored by Max Moser | Site remote-exploit.org

Wyd is a tool for password profiling. The general idea is to personalize or profile the available data about a "target" person or system and generate a wordlist of possible passwords/passphrases out of available information. Instead of just using the command 'strings' to extract all the printable characters out of all type of files, we wanted to eliminate as much false-positives as possible. The goal was to exclude as much "unusable" data as possible to get an effective list of possible passwords/passphrases. It is very effective to get reasonable passwords from websites or filesystems.

tags | cracker
MD5 | 095b8d59a5171c2ec28e32483b98e48a
DRM-mem.txt
Posted Oct 20, 2006
Authored by Joxean Koret

POC for a memory corruption vulnerability in the "drmstor.dll" library which is part of the DRM (Digital Rights Management) software supplied with MS Windows.

tags | exploit
systems | windows
MD5 | e6feb257a8e8de6824faeddaddfd1c26
wlandecrypter-0.4.tar.gz
Posted Oct 20, 2006
Authored by nilp0inter | Site rusoblanco.com

Wlandecrypter is a password generator for certain ADSL WIFI routers provided by Telefonica of Spain. Essid named WLAN_XX when XX are two hexadecimal digits.

tags | tool, wireless
MD5 | 5225ec5f9170755dc61d9d74b2eb6207
airflood-0.1.tar.gz
Posted Oct 20, 2006
Authored by nilp0inter | Site rusoblanco.com

Airflood is a modification of aireplay that allows for a DOS in in the AP. This program fills the table of clients of the AP with random MACs doing impossible new connections. Useful external "MAC filter" function can allow only the "attacker" to connect to the AP

tags | tool, wireless
MD5 | c18b1f667c8e3c187803964aaa561a67
Page 3 of 5
Back12345Next

File Archive:

April 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    60 Files
  • 2
    Apr 2nd
    20 Files
  • 3
    Apr 3rd
    10 Files
  • 4
    Apr 4th
    0 Files
  • 5
    Apr 5th
    0 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    0 Files
  • 9
    Apr 9th
    0 Files
  • 10
    Apr 10th
    0 Files
  • 11
    Apr 11th
    0 Files
  • 12
    Apr 12th
    0 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    0 Files
  • 16
    Apr 16th
    0 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close