what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 104 RSS Feed

Files Date: 2007-01-13 to 2007-01-14

MOAB-09-01-2007.rb.txt
Posted Jan 13, 2007
Authored by LMH | Site projects.info-pull.com

Month of Apple Bugs - Exploit for a vulnerability in Finder. Finder is affected by a memory corruption vulnerability, which leads to an exploitable denial of service condition and potential arbitrary code execution, that can be triggered by DMG images. One of two exploits.

tags | exploit, denial of service, arbitrary, code execution
systems | apple
SHA-256 | b981e4326e87927ea14c54f445d1d8c91ca8bad5b3c606732b39860b492a641a
exploit-of-the-apes.rb.txt
Posted Jan 13, 2007
Authored by LMH, Johnny Pwnerseed | Site projects.info-pull.com

Month of Apple Bugs - Exploit for the Application Enhancer (APE), which is affected by a local privilege escalation vulnerability that allows local users to gain root privileges.

tags | exploit, local, root
systems | apple
SHA-256 | 022ab59da53042f4ad0dadf5efb09eb65b8d7f1c45cfc3279afa1c3afbd66fbf
MOAB-07-01-2007.html
Posted Jan 13, 2007
Authored by Kevin Finisterre, LMH | Site projects.info-pull.com

Month of Apple Bugs - This HTML file is an exploit for OmniWeb. OmniWeb is affected by a format string vulnerability in the handling of Javascript alert() function, which could allow remote arbitrary code execution.

tags | exploit, remote, arbitrary, javascript, code execution
systems | apple
SHA-256 | 297d0995c250f8cc72592389a406917ac1bf22428361bbff663a27278cf94085
MOAB-06-01-2007.pdf
Posted Jan 13, 2007
Authored by Kevin Finisterre, LMH | Site projects.info-pull.com

Month of Apple Bugs - Warning, this pdf is an exploit. The current PDF specification is affected by a design flaw, a rogue Pages entry or malicious catalog dictionary could cause a denial of service (memory corruption condition, memory leakage, etc) or potential arbitrary code execution in the reader application.

tags | exploit, denial of service, arbitrary, code execution, memory leak
systems | apple
SHA-256 | 7befba5152c7b30d54a97e3a52d7ff58a3858ea958dac2460153bce1334d0e22
MOAB-05-01-2007_cron.rb.txt
Posted Jan 13, 2007
Authored by Kevin Finisterre, LMH | Site projects.info-pull.com

Month of Apple Bugs - Exploit for a vulnerability in the handling of BOM files by the DiskManagement/diskutil that allows the setting of rogue permissions on the filesystem. This can be used to execute arbitrary code and escalate privileges. One of two exploits.

tags | exploit, arbitrary
systems | apple
SHA-256 | d23d1ffe7410fc22b798de3144cff78a0f519bb100421ea6abce589bef246321
MOAB-05-01-2007.rb.txt
Posted Jan 13, 2007
Authored by Kevin Finisterre, LMH | Site projects.info-pull.com

Month of Apple Bugs - Exploit for a vulnerability in the handling of BOM files by the DiskManagement/diskutil that allows the setting of rogue permissions on the filesystem. This can be used to execute arbitrary code and escalate privileges. One of two exploits.

tags | exploit, arbitrary
systems | apple
SHA-256 | 9ff09c4c31ae71fb68fb87e214f17eb7e955b0cbe68a242d876ba38452f4a223
gforge.txt
Posted Jan 13, 2007
Authored by Jose Ramon Palanco

GForce version 4.5.11 suffers from a cross site scripting vulnerability.

tags | advisory, xss
SHA-256 | 7c397cbc606e6d927b4205174cc6c2b7d0935c5310470ec09dbe783ee5343c04
critical_openbsd_communism.c
Posted Jan 13, 2007
Site critical.lt

Critical Security OpenBSD 3.x through 4.0 vga_ioctl() local root exploit.

tags | exploit, local, root
systems | openbsd
SHA-256 | 6645a5c0890cfe318350a5af352787dbb534dccd135c4f235e795d1ab85e7d87
Fwknop Port Knocking Utility
Posted Jan 13, 2007
Authored by Michael Rash | Site cipherdyne.org

fwknop implements an authorization scheme that requires only a single encrypted packet to communicate various pieces of information, including desired access through a Netfilter policy and/or specific commands to execute on the target system. The main application of this program is to protect services such as SSH with an additional layer of security in order to make the exploitation of vulnerabilities much more difficult. The authorization server works by passively monitoring authorization packets via libpcap.

Changes: Various updates and bug fixes.
tags | tool, scanner, vulnerability
systems | unix
SHA-256 | 7730b4cbc522502f2d12a5b895c6618321b649f03a6a1b3ab8ccc5ec191fc8c6
vr-11.0c.tar.gz
Posted Jan 13, 2007
Site visualware.com

VisualRoute is a traceroute tool which displays a map of the path to the destination server by looking up the geographical location of each traceroute hop. The network service provider is identified for each hop, and instant domain and network whois information enable quick problem or abuse reporting.

Changes: See changelog.
systems | unix
SHA-256 | c75ed4536af9bfec5f36acbb94d9366b7e267f2c059309c66b9424e61b53ab90
vdwgreport.pdf
Posted Jan 13, 2007
Site dhs.gov

The US Department of Homeland Security's "Vulnerability Disclosure Framework" document.

tags | paper
SHA-256 | 582fab10411195352c3c7c264ac43a5fe82a67a539153f9bcdae39edbe51c6f4
Debian Linux Security Advisory 1247-1
Posted Jan 13, 2007
Authored by Debian | Site debian.org

Debian Security Advisory 1247-1 - An off-by-one error leading to a heap-based buffer overflow has been identified in libapache-mod-auth-kerb, an Apache module for Kerberos authentication. The error could allow an attacker to trigger an application crash or potentially execute arbitrary code by sending a specially crafted kerberos message.

tags | advisory, overflow, arbitrary
systems | linux, debian
advisories | CVE-2006-5989
SHA-256 | c9a1f482592964f332005424fd001256d3c72cb2e867cc031624774cfbbc1bdc
Debian Linux Security Advisory 1246-1
Posted Jan 13, 2007
Authored by Debian | Site debian.org

Debian Security Advisory 1246-1 - John Heasman from Next Generation Security Software discovered a heap overflow in the handling of Windows Metafiles in OpenOffice.org, the free office suite, which could lead to a denial of service and potentially execution of arbitrary code.

tags | advisory, denial of service, overflow, arbitrary
systems | linux, windows, debian
advisories | CVE-2006-5870
SHA-256 | c6505f1b044f3845d4eda54bb6fb486963985da507663c1c77ffdc547b233f51
packeteer-overflow.txt
Posted Jan 13, 2007
Authored by kian.mohageri

Packeteer PacketWise version 8.x suffers from a buffer overflow vulnerability.

tags | advisory, overflow
SHA-256 | 21a38eb759ec8845f73b1ae7ba4e00f8b49c0fe1deaeef58a74f51fc51c5f061
mpsw-rfi.txt
Posted Jan 13, 2007
Authored by k1tk4t

The Magic Photo Storage website suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 1f1cacd6e29c1b8d3661d861dfa1fcf11b77247dc9ba0e9af1a5452c23673897
AD20070108.txt
Posted Jan 13, 2007
Authored by Sowhat | Site nevisnetworks.com

There is a DACL weakness that exists in the HP all-in-one products drivers, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
SHA-256 | 4cdf87116b8d9ee3c3f00f60c40288c8b169a7243a24ee7362d44092701f936f
tk53-advisory-1.txt
Posted Jan 13, 2007
Authored by Lolek, Roflek

CenterICQ contains support for LiveJournal (http://www.livejournal.com/), such as posting to your own blog, reading other blogs' RSS feeds, and other community-related functions, such as showing whether a user has added or removed your own users to/from the friend list, all via a unified HTTP interface provided by LiveJournal. The latter functionality is vulnerable to a buffer overflow and possible remote code execution. Affected versions range from 4.9.11 through 4.21.0. Proof of concept exploit included.

tags | exploit, remote, web, overflow, code execution, proof of concept
SHA-256 | b6dc98674cfbf8ff44212a63d67c5667ac485c8229d5b0f0f60c18e483be0ad0
camouflage-crack.txt
Posted Jan 13, 2007
Authored by NT Wako, NoPh0BiA

Camouflage version 1.2.1 suffers from a vulnerability that allows access to encrypted files.

tags | exploit
SHA-256 | 3616dff73eb9b4c3fa73c077a974cbf60252e6c3f0c60c687ef51d0956eff55a
RFIDIOt-0.1k.tgz
Posted Jan 13, 2007
Authored by Adam Laurie | Site rfidiot.org

RFIDIOt is a python library for exploring RFID devices. It currently drives a couple of RFID readers made by ACG, called the HF Dual ISO and the LFX. Includes sample programs to read/write tags and the beginnings of library routines to handle the data structures of specific tags like MIFARE(r).

Changes: Program Hitag2 to EM4x02 / Unique. Reset Hitag2 to default state (Frosch only). Read German passports. Various tidy-ups and improvements.
tags | tool, python, wireless
SHA-256 | 9beec004be0133e4f53e2256f580067810718d5277029a17fe8f20990b0b4502
geobb-rfi.txt
Posted Jan 13, 2007
Authored by ShaFuck31

GeoBB Georgian Bulletin Board suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | ad45fde38c33b04c12b8965c4f7ca67a60f4e0e39c4d961bc1ef0ae3ed56fa77
dayfox-rfi.txt
Posted Jan 13, 2007
Authored by ShaFuck31

Dayfox Blog suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 2a75968f7aefdb5c92527e2061fc91bb005406e41f530614ae277034fe5c754a
Debian Linux Security Advisory 1245-1
Posted Jan 13, 2007
Authored by Debian | Site debian.org

Debian Security Advisory 1245-1 - Martin Loewer discovered that the proftpd FTP daemon is vulnerable to denial of service if the addon module for Radius authentication is enabled.

tags | advisory, denial of service
systems | linux, debian
advisories | CVE-2005-4816
SHA-256 | 50fcc58bdb5e7e7fdd77b15acebd5b68c5c089cd4d7cb3553c68bfafab2f21cb
nunenews-rfi.txt
Posted Jan 13, 2007
Authored by XORON

NUNE News Script suffers from a remote file inclusion vulnerability in custom_admin_path.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 1d27dbbdd194900ae50fa7cd0e39c7b8bb6948f22ece57a1d400f8e2f0d39d56
uguestbook-mdb.txt
Posted Jan 13, 2007
Authored by beks

Uguestbook version 1.0 suffers from a remote password disclosure flaw.

tags | exploit, remote
SHA-256 | d52a22e994cf06287c3395daaa40cb1adfaaf4ba35796b648c44cd0523a8bd11
stego-crack.txt
Posted Jan 13, 2007
Authored by NT Wako, NoPh0BiA

Steganography version 1.7.1 and 1.8 suffer from a vulnerability that allows access to encrypted files.

tags | exploit
SHA-256 | 2866bc89f0024863497a19a2f5736883c6b6fa1e4738291d9918b88532f1aa4d
Page 3 of 5
Back12345Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close