exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 1,045 RSS Feed

Files Date: 2006-11-01 to 2006-11-30

Secunia Security Advisory 23015
Posted Nov 29, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - rPath has issued an update for texinfo. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 420c9805eb6912bbafd7687afb66db7974f82347096d9985cfcbb145d871f84f
nufw-2.0.11.tar.gz
Posted Nov 29, 2006
Authored by regit | Site nufw.org

NuFW is a set of daemons that filters packets on a per-user basis. The gateway authorizes a packet depending on which remote user has sent it. On the client side, users have to run a client that sends authentication packets to the gateway. On the server side, the gateway associates user ids to packets, thus enabling the possibility to filter packets on a user basis. Furthermore, the server architecture is done to use external authentication source such as an LDAP server.

Changes: Fixes problems with the new Mac Intel and contains a whole new debian packaging system.
tags | tool, remote, firewall
systems | unix
SHA-256 | c0b71af4d2ec64471905d30d232280a58734adc007c3b1b1cb8026cd783bb2e6
tbear.tar.gz
Posted Nov 29, 2006
Authored by Josh D. | Site transec.org

Transient Bluetooth Environment Auditor includes an ncurses-based Bluetooth scanner (a bit similar to kismet), a Bluetooth DoS tool, and a Bluetooth hidden device locator.

tags | tool, wireless
SHA-256 | 9bcae88fc93eb6840341b1682f06fecb5a3503218620e15e7a6ba157691e27dd
Gentoo Linux Security Advisory 200611-22
Posted Nov 29, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200611-22 - Ingo H3 fails to properly escape shell metacharacters in procmail rules. Versions less than 1.1.2 are affected.

tags | advisory, shell
systems | linux, gentoo
SHA-256 | beb1c73b7b992fd2546c459fa2a97f874f61dc157643d494d37798bb50feb878
Gentoo Linux Security Advisory 200611-21
Posted Nov 29, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200611-21 - Kile fails to set the same permissions on backup files as on the original file. This is similar to CVE-2005-1920. Versions less than 1.9.2-r1 are affected.

tags | advisory
systems | linux, gentoo
SHA-256 | 9c12afa12a8dab17aca312906527e06803fc6c6529ab28579449cf3493220ecb
Debian Linux Security Advisory 1220-1
Posted Nov 29, 2006
Authored by Debian | Site debian.org

Debian Security Advisory 1220-1 - Brian May discovered that pstotext, a utility to extract plain text from Postscript and PDF files, performs insufficient quoting of file names, which allows execution of arbitrary shell commands.

tags | advisory, arbitrary, shell
systems | linux, debian
advisories | CVE-2006-5869
SHA-256 | 64ec0df7d0f4dfe700974edb25dd99297888b2f611ee7451f940d325b9c33f49
aimject-1.0.tar.gz
Posted Nov 29, 2006
Authored by Jon Oberheide | Site jon.oberheide.org

Aimject facilitates man-in-the-middle attacks against AOL Instant Messenger's OSCAR protocol via a simple GTK interface.

Changes: Build support and instructions for win32, win32 binaries/installers using NSIS, icmp redirection disabling, loads of fixes.
tags | tool, sniffer, protocol
SHA-256 | 48101949b13bb6ba02b0cc6cbe6f9c377d39e802481cf75c631befc73ee96b4c
NBTEnum33.zip
Posted Nov 29, 2006
Authored by Reed Arvin | Site reedarvin.thearvins.com

NetBIOS Enumeration Utility (NBTEnum) is a utility for Windows that can be used to enumerate NetBIOS information from one host or a range of hosts. The enumerated information includes the network transports, NetBIOS name, account lockout threshold, logged on users, local groups and users, global groups and users, and shares. If run under the context of a valid user account additional information is enumerated including operating system information, services, installed programs, Auto Admin Logon information and encrypted WinVNC/RealVNC passwords. This utility will also perform password checking with the use of a dictionary file. Runs on Windows NT 4.0/2000/XP/2003. PERL source included.

Changes: Bug fixes. Completely rewritten RestrictAnonymous bypass routine. Included source code for educational purposes.
tags | local, perl
systems | windows
SHA-256 | b45e9b8f0dfd57e2ccef45caba51ab4a9a17ce8fc9154b6a7eaae3fb6e43d23c
15061124.txt
Posted Nov 29, 2006
Authored by DarkFig

Cahier de texte version 2.0 remote SQL code execution exploit.

tags | exploit, remote, code execution
SHA-256 | 30a747b1f9476c5761a0d7df7fc3730fdfaa6d220cec8b7669f7361fd73f3d1f
black-dl-exec-SOLARIS.c
Posted Nov 29, 2006
Authored by Russell Sanford

278 byte shellcode for Solaris that downloads a binary named evil-dl from a host and saves it to /tmp/ff and then executes it.

tags | shellcode
systems | solaris
SHA-256 | bf7207f4db48a0b9dde6f35a1c6b899fc0c0213145bbf35b353cba491c4e83f3
rcsr.txt
Posted Nov 29, 2006
Authored by PAgVac

Full write up discussing password theft with Firefox using RCSR, aka Reverse Cross-Site Request attacks.

tags | paper
SHA-256 | ae4f7b381219369a7cde2ec73988e91a25e4193c848436f3362179131786ab74
aria-webhost.txt
Posted Nov 29, 2006
Site Aria-security.net

WebHost Manager version 3.1.0 suffers from cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 7c6830472aa995fe76c5296982b5a89d450c123c1ca6a1787136c2c9f8f6636c
aria-cpanel11beta.txt
Posted Nov 29, 2006
Site Aria-security.net

CPanel 11 Beta suffers from cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 37c0ec5c154b75739e01f107c8db1f5097b0d3287d7383606abc3880e9f057b1
aria-midicart.txt
Posted Nov 29, 2006
Site Aria-security.net

MidiCart ASP Shopping Cart suffers from a SQL injection vulnerability.

tags | exploit, sql injection, asp
SHA-256 | d3a56ae6b4de823925a16198e79beadfb509672fc92147013a67fc32e476da69
aria-asplistpics.txt
Posted Nov 29, 2006
Site Aria-security.net

ASP ListPics version 5.0 suffers from a SQL injection vulnerability.

tags | exploit, sql injection, asp
SHA-256 | 65a55b13eaeab07d49db1dcd2f3c0b2fed1066b8ec84e5b9bede42bdef02fc3d
Secunia Security Advisory 22850
Posted Nov 28, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Tim Baker has discovered a vulnerability in TikiWiki, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory
SHA-256 | cb3d43a6de9b27f5cff27d49013393c33da419a5ff8cd650c4663f1b6c916211
Secunia Security Advisory 23093
Posted Nov 28, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - LMH has reported a vulnerability in Fedora Core, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
systems | linux, fedora
SHA-256 | 41364a52003bbcf6bddc674e307ff3a61ee23ca2b720829c71c9b56056e381b5
Secunia Security Advisory 23100
Posted Nov 28, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for horde-ingo. This fixes a vulnerability, which can be exploited by malicious users to compromise a vulnerable system.

tags | advisory
systems | linux, gentoo
SHA-256 | 9c66e8225aa29bd3b6d7d8a4d9c321f18f4c902b94e0f80a0ff02e1b6551a6ba
Secunia Security Advisory 23113
Posted Nov 28, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Liu Qixu has discovered a vulnerability in 3CTftpSvc, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 9721d5dc85cc63ef89aebacad714cadd609edbeba08249735cc684fede74db06
Secunia Security Advisory 23122
Posted Nov 28, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - DarkFig has discovered two vulnerabilities in Cahier de Texte, which can be exploited by malicious people to disclose sensitive information.

tags | advisory, vulnerability
SHA-256 | b69c5aa26c0d48f4b2d7a513d6da1e89dc0beea221244a809606d12baaa52377
Secunia Security Advisory 23130
Posted Nov 28, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Al7ejaz HackerZ have discovered a vulnerability in mmgallery, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | c762797916770261b79dd1278aae6cc85e44e34d98e49ec0345b4b890f4f6a31
aria-inews.txt
Posted Nov 28, 2006
Site Aria-security.net

iNews News Manager suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | fc831a6ed2394145cda058cd8811051936f5daf31bbd4780d828b8bb4c0c74f3
aria-idms.txt
Posted Nov 28, 2006
Site Aria-security.net

iDMS Pro Image Gallery suffers from SQL injection and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, sql injection
SHA-256 | 60a7624280856308916d59ada0939353a2c12139f900b18afc1f4cb220318c62
aria-ultimate.txt
Posted Nov 28, 2006
Site Aria-security.net

Ultimate Survey Pro suffers from SQL injection vulnerabilities.

tags | exploit, vulnerability, sql injection
SHA-256 | 2e20e8994f27b2998e9967ca79b632e79adc7ad809c5df5e401f1b400344965a
nst-30.txt
Posted Nov 28, 2006
Authored by Paisterist | Site neosecurityteam.net

[N]eo [S]ecurity [T]eam [NST] - Advisory 30 - 2006-11-24: PHP-Nuke versions 7.9 and below suffer from a SQL injection vulnerability in the sid variable of the news module.

tags | exploit, php, sql injection
SHA-256 | e3809d07b16c1577f5be9e7bbf56fef5eb6f12fe8a4ea2c7ae14ba04527e3b90
Page 2 of 42
Back12345Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close