exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 50 RSS Feed

Files Date: 2007-05-30 to 2007-05-31

navboard260-exec.txt
Posted May 30, 2007
Authored by Dj7xpl | Site Dj7xpl.2600.ir

NavBoard version 2.6.0 remote code execution exploit.

tags | exploit, remote, code execution
SHA-256 | d3bddb1ef1269c02ed7550c96e90d98c361648ebd2ebf4574bb697d762190f11
wdse20-db.txt
Posted May 30, 2007
Authored by Titanichacker | Site hack-teach.org

Web Directory / Search Engine version 2.0 suffers from a direct database download vulnerability.

tags | exploit, web
SHA-256 | 1cd093c1762c0046a49ccfa2ec5cda30891844921a44dda3908c8340a541b2bc
n.runs-SA-2007.009.txt
Posted May 30, 2007
Authored by Sergio Alvarez | Site nruns.com

A remotely exploitable vulnerability has been found in the file parsing engine of ALWIL avast! antivirus software versions prior to 4.7.700 when parsing .SIS files.

tags | advisory
SHA-256 | 2313fed88bcebca1435d3bf9ba6d323db34b780284f88572119fd79452425bd2
leadtoolsocr-dos.txt
Posted May 30, 2007
Authored by shinnai | Site shinnai.altervista.org

LeadTools Raster OCR document object library memory corruption exploit.

tags | exploit, denial of service
SHA-256 | 5b1e0f751b7858f676f42235590d25859642cb1134b8f99b424fb9f275c53c82
leadtools-dos.txt
Posted May 30, 2007
Authored by shinnai | Site shinnai.altervista.org

LeadTools Raster ISIS Object LTRIS14e.DLL version 14.5.0.44 remote buffer overflow exploit.

tags | exploit, remote, denial of service, overflow
SHA-256 | fe8b792a1e891192c66c7e4825a7528916a0b6a11a6627efe04b0e4d2ebd9a62
edraw-dos.txt
Posted May 30, 2007
Authored by shinnai | Site shinnai.altervista.org

EDraw Office Viewer component (edrawofficeviewer.ocx version 4.0.5.20) denial of service exploit.

tags | exploit, denial of service
SHA-256 | 64c39b059868109c395136a99bfecc1dc37e9dcf1edb57374a232027d67a9697
pam_usb-0.4.1.tar.gz
Posted May 30, 2007
Authored by Andrea Luzzardi | Site sig11.org

pam_usb is a PAM module that enables authentication using a USB storage device through DSA private/public keys. It can also work with floppy disks, CD-ROMs, or any kind of mountable device.

Changes: Fixed a security issue related to OpenSSH authentication. Fixed the quiet option (now it is really quiet). Support for devices without vendor/model information.
systems | linux
SHA-256 | 1c3efbb41ff6d97db6b9ac18664d36ca3b11689156be76baf0382e09aa94ea04
strongSwan IPsec / IKEv1 / IKEv2 Implementation For Linux
Posted May 30, 2007
Authored by Andreas Steffen | Site strongswan.org

strongSwan is a complete IPsec and IKEv1 implementation for Linux 2.4 and 2.6 kernels. It interoperates with most other IPsec-based VPN products. It is a descendant of the discontinued FreeS/WAN project. The focus of the strongSwan project is on strong authentication mechanisms using X.509 public key certificates and optional secure storage of private keys on smartcards through a standardized PKCS#11 interface. A unique feature is the use of X.509 attribute certificates to implement advanced access control schemes based on group memberships.

Changes: IKEv2 peer configuration selection now can be based on a given certification authority using the rightca= statement. IKEv2 authentication based on RSA signatures now can handle multiple certificates issued for a given peer ID. This allows a smooth transition in the case of a peer certificate renewal. Various other tweaks and modifications.
tags | kernel, encryption
systems | linux
SHA-256 | 3eae9ca2de63e253284852c44ec65a42752e592be7e77d29b2fe502bb9428eb5
advchk-2.00.tar.gz
Posted May 30, 2007
Authored by Stephan Schmieder | Site advchk.unixgu.ru

Advchk (Advisory Check) reads security advisories so you do not have to. Advchk gathers security advisories using RSS feeds, compares them to a list of known services, and alerts you if you are vulnerable. Since adding hosts and services by hand would be quite a boring task, advchk leverages nmap for automatic service and version discovery.

systems | unix
SHA-256 | 186f0d224f55d01c322c57d5b1a2a031e46c197c0159c26148058abbd1c22230
TOR Virtual Network Tunneling Tool 0.1.2.14
Posted May 30, 2007
Authored by Roger Dingledine | Site tor.eff.org

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).

Changes: Various changes.
tags | tool, remote, local, peer2peer
SHA-256 | bc23e6f826f1f736e9d5e56ba79195099882aef2029a63dd667915bc1eb836a6
gtp-xss.txt
Posted May 30, 2007
Authored by Vagrant | Site e-hack.org

GTP 3G suffers from a cross site scripting vulnerability in mods.php.

tags | exploit, php, xss
SHA-256 | 80fcfdf27538c58452a9804d41f56c2121815607a35b82693cc00739806c197b
Ubuntu Security Notice 464-1
Posted May 30, 2007
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 464-1 - Multiple vulnerabilities have been patched against in the Linux kernel. Philipp Richter discovered that the AppleTalk protocol handler did not sufficiently verify the length of packets. By sending a crafted AppleTalk packet, a remote attacker could exploit this to crash the kernel. Gabriel Campana discovered that the do_ipv6_setsockopt() function did not sufficiently verify option values for IPV6_RTHDR. A local attacker could exploit this to trigger a kernel crash. A Denial of Service vulnerability was discovered in the nfnetlink_log() netfilter function. A remote attacker could exploit this to trigger a kernel crash. The connection tracking module for IPv6 did not properly handle the status field when reassembling fragmented packets, so that the final packet always had the 'established' state. A remote attacker could exploit this to bypass intended firewall rules. Masayuki Nakagawa discovered an error in the flowlabel handling of IPv6 network sockets. A local attacker could exploit this to crash the kernel. The do_dccp_getsockopt() function did not sufficiently verify the optlen argument. A local attacker could exploit this to read kernel memory (which might expose sensitive data) or cause a kernel crash. This only affects Ubuntu 7.04. The IPv4 and DECnet network protocol handlers incorrectly declared an array variable so that it became smaller than intended. By sending crafted packets over a netlink socket, a local attacker could exploit this to crash the kernel.

tags | advisory, remote, denial of service, kernel, local, vulnerability, protocol
systems | linux, ubuntu
advisories | CVE-2007-1357, CVE-2007-1388, CVE-2007-1496, CVE-2007-1497, CVE-2007-1592, CVE-2007-1730, CVE-2007-2172
SHA-256 | 5ce50556e7095fc936bee41e30d6ea94c9ff6bd833408e463221176b94a11444
iDEFENSE Security Advisory 2007-05-24.1
Posted May 30, 2007
Authored by iDefense Labs | Site idefense.com

iDefense Security Advisory 05.24.07 - Local exploitation of a privilege escalation vulnerability in Apple Computer Inc.'s Mac OS X pppd could allow an attacker to gain root privileges. The vulnerability exists due to insufficient access validation when processing the "plugin" command line option. The application does not properly verify that the requesting user has root privileges and allows any user to load plug-ins. When checking to see if the executing user has root privileges, a check is made to see if the stdin file descriptor is owned by root. Passing this check is trivial and allows the attacker to load arbitrary plug-ins resulting in arbitrary code execution with root privileges. iDefense has confirmed the existence of this vulnerability in version 10.4.8 of Mac OS X. Other versions may also be affected.

tags | advisory, arbitrary, local, root, code execution
systems | apple, osx
advisories | CVE-2007-0752
SHA-256 | 634bba22f8a207551b2f6e77a3f4f876eb75758fd2276f366d53faf2a799b3d4
ie6dart-overflow.txt
Posted May 30, 2007
Authored by rgod | Site retrogod.altervista.org

Internet Explorer 6 / Dart Communications PowerTCP Service Control (DartService.dll version 3.1.3.3) remote buffer overflow exploit.

tags | exploit, remote, overflow
SHA-256 | dee10e75708f6d6aba27cce67511ebfa236444258c5d8453e823251677745ebd
Debian Linux Security Advisory 1297-1
Posted May 30, 2007
Authored by Debian | Site debian.org

Debian Security Advisory 1297-1 - Bernhard R. Link discovered that the CVS browsing interface of Gforge, a collaborative development tool, performs insufficient escaping of URLs, which allows the execution of arbitrary shell commands with the privileges of the www-data user.

tags | advisory, arbitrary, shell
systems | linux, debian
advisories | CVE-2007-0246
SHA-256 | 45ab5403d0eafdc6db0f802dd07bd4297ec136f7c5aee171cc4d7f4b748a3193
cmgs-plain.txt
Posted May 30, 2007
Authored by Mike Iacovacci

A serious security flaw is present in Credant Mobile Guardian Shield for Windows versions 5.2.1.105 and prior. Several instances of the users Windows Domain name, Domain username, and password are stored in plain text within the memory (RAM) of the mobile device. This risk is compounded by the fact that the Windows paging file is not encrypted per default settings. The unencrypted paging file would likely contain the plain text Windows Domain credentials as well.

tags | advisory
systems | windows
SHA-256 | 4ba07238377e61b952cbd51c2fd985569222c22f0b7ef03e19498b13296cb2a0
n.runs-SA-2007.008.txt
Posted May 30, 2007
Authored by Sergio Alvarez | Site nruns.com

A remotely exploitable vulnerability has been found in the file parsing engine of ALWIL avast! antivirus software versions prior to 4.7.700.

tags | advisory
SHA-256 | 56fbe28fc027be7f11fbf2a6b92d601f549857871e3238f353f07a3ff36d352d
wiys10-xss.txt
Posted May 30, 2007
Authored by Vagrant

WIYS version 1.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | fdda265f9c7a581d51333e07dab011b966ba6f2469d8f122914ba59bd1bbf406
OpenPKG Security Advisory 2007.18
Posted May 30, 2007
Authored by OpenPKG Foundation | Site openpkg.com

OpenPKG Security Advisory - A vulnerability caused by an integer signedness error was found by Victor Stinner in the font rendering library Freetype, versions up to and including 2.3.4. The vulnerability might allow remote attackers to execute arbitrary code via a specially crafted TrueType Font (TTF) file with a negative "n_points" value, which leads to an integer overflow and heap-based buffer overflow.

tags | advisory, remote, overflow, arbitrary
advisories | CVE-2007-2754
SHA-256 | 20e3597f4528c3bf943c842d2c4a790a8846089007afb586832a34877de6bcb1
webrute.pl.txt
Posted May 30, 2007
Authored by matrix killer

Script that will perform test queries to check for the existence of files in a webroot.

tags | tool, scanner
systems | unix
SHA-256 | c8be207d45fef0ba6ed8b95d81fe2e2afe59313cace686c44a99afe37363cbf4
skype.pl.txt
Posted May 30, 2007
Authored by matrix killer

Simple Skype password cracker written in Perl.

tags | tool, scanner, perl
systems | unix
SHA-256 | 93375516e003779e0ae962ac7fa61e9e4a247f89cee30c4743b1f8d768ee3d68
g00gle_advanced.txt
Posted May 30, 2007
Authored by matrix killer

Simple tool to grab results from Google and stick them in a file. Has a feature to restrict by domain.

tags | tool, scanner
systems | unix
SHA-256 | 57dc189500c14bbce4e8eeb05b395c90b095135b46b473dd691271aa63115529
g00gle.txt
Posted May 30, 2007
Authored by matrix killer

Simple tool to grab results from Google and stick the links in a file.

tags | tool, scanner
systems | unix
SHA-256 | 7ff2cac119f1b31580a740c5284ccf8857ea72824b1719d50d69e1e8ccf5d1e9
Mandriva Linux Security Advisory 2007.104
Posted May 30, 2007
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - A number of bugs were discovered in the NDR parsing support in Samba that is used to decode MS-RPC requests. A remote attacker could send a carefully crafted request that would cause a heap overflow, possibly leading to the ability to execute arbitrary code on the server. A remote authenticated user could trigger a flaw where unescaped user input parameters were being passed as arguments to /bin/sh. Finally, on Samba 3.0.23d and higher, when Samba translated SID to/from name using the Samba local list of user and group accounts, a logic error in smbd's internal security stack could result in a transition to the root user id rather than the non-root user.

tags | advisory, remote, overflow, arbitrary, local, root
systems | linux, mandriva
advisories | CVE-2007-2446, CVE-2007-2447, CVE-2007-2444
SHA-256 | 86de3c706857ded99d56047efb47ebe3e745af47ea791c8e0aae3aed6d2adbc6
Mandriva Linux Security Advisory 2007.109
Posted May 30, 2007
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - Buffer overflow in the gdImageStringFTEx function in gdft.c in the GD Graphics Library 2.0.33 and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted string with a JIS encoded font. Tetex 3.x uses an embedded copy of the gd source and may also be affected by this issue. A buffer overflow in the open_sty function for makeindex in Tetex could allow user-assisted remote attackers to overwrite files and possibly execute arbitrary code via a long filename.

tags | advisory, remote, denial of service, overflow, arbitrary
systems | linux, mandriva
advisories | CVE-2007-0455, CVE-2007-0650
SHA-256 | 09ea777e2263077052ec7d39b6ca87039f3fa15d2bd7cc692d25712c6cdfb3c5
Page 2 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close