exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 79 RSS Feed

Files Date: 2006-03-08 to 2006-03-09

runcms1xXSS.txt
Posted Mar 8, 2006
Authored by Roozbeh Afrasiabi | Site kapda.ir

Runcms version 1.x is susceptible to cross site scripting attacks in bigshow.php.

tags | exploit, php, xss
SHA-256 | 2dd1b86163b9bbba8736ffba9719fff071509e5ac0aa7760a2fbc2801b604b12
ipb-v2.1.5.txt
Posted Mar 8, 2006
Authored by Mr.SNAKE | Site lezr.com

Invision Power Board v2.1.5 suffers from SQL injection.

tags | exploit, sql injection
SHA-256 | 49ab1f56d1bf8c7118b2a21c7a36a280551c816be939058e1042cfb1adcaaab6
vbzoomv1.11.txt
Posted Mar 8, 2006
Authored by Mr.SNAKE | Site lezr.com

vbzoom v1.11 is vulnerable to SQL injection and XSS.

tags | exploit, sql injection
SHA-256 | 57256753d4c283d77078566a6995f41252311246b1678ffebb987072fd749b2d
hlbr-1.0.tar.gz
Posted Mar 8, 2006
Authored by Joao Eriberto Mota Filho, Andre Bertelli Araujo | Site hlbr.sourceforge.net

HLBR is an IPS (Intrusion Prevention System) that works directly at the layer 2 of the OSI model staying invisible from layer 3.

Changes: Version 1.0 now can detect malicious traffic using regular expressions.
tags | tool, intrusion detection
systems | unix
SHA-256 | 5417c91d612c82711522f2ce5a5d50bb6a5cbc4a8e26fa7c93527d70c9872ceb
Nmap-Parser-1.05.tar.gz
Posted Mar 8, 2006
Authored by Anthony G Persaud | Site npx.sourceforge.net

Nmap Parser is a Perl module that simplifies the process of developing scripts and collecting information from the XML nmap scan data, which can be obtained by using nmap's -oX switch or from the file handle of a pipe to an nmap process. It uses the XML twig library for parsing, and supports filters.

Changes: The main reason for this release is major speed improvements and reduction in memory usage.
tags | tool, perl, nmap
systems | unix
SHA-256 | 5979fa59078376ce752e9bd46fdc2b34b9a18199780412f5a3f257c82a31a759
ip-array_0.05.70.tar.gz
Posted Mar 8, 2006
Authored by AllKind | Site sourceforge.net

IP-Array is a Linux iptables Firewall script written in bash. It allows the creation of precise, stateful rules, while remaining easy to configure. IP-Array supports VPN, Traffic Shaping (creation of custom HTB and SFQ qdiscs, Classes, and Filters), multiple external interfaces, multiple LANs, multiple DMZs, NAT, logging, MAC address matching, packet marking, syslog logging, and various sysctl settings. It also includes some presets and autoconfig options for common needs like DNS, FTP, SMTP.

Changes: This release brings minor bugfixes, more code cleanup and some new configuration options, as well as some improved functionality in existing configuration options.
tags | bash
systems | linux, unix
SHA-256 | 2b5becff85c48a49e1a07f7aed151da43ff44327385296be6dfb545fbae71aad
aircrackng-0.1.tar.gz
Posted Mar 8, 2006
Site aircrack-ng.org

aircrack-ng is a set of tools for auditing wireless networks. It's an enhanced/reborn version of aircrack. It consists of airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), airdecap (decrypts WEP/WPA capture files), and some tools to handle capture files (merge, convert, etc.).

tags | tool, wireless
SHA-256 | 07a38b32af942cf0f79be4779eb64427a00187868b603305c36a40a15f98ff47
MacGyver.tar.gz
Posted Mar 8, 2006
Authored by init_null

MacGyver - a program to generate a random valid mac address. Written in c++.

tags | spoof
SHA-256 | 854ad3dd246e900aef43252647a2e46a90d132878af96a79ce95e6759b11672f
javaDoS.txt
Posted Mar 8, 2006
Authored by porkythepig

There is a vulnerability in the Internet Explorer java applet handling engine. It occurs while running the Sun Microsystems Java VM and is caused by improper HTML 'INPUT' control focus handling.

tags | advisory, java
SHA-256 | 7fc80c9a3057321503601fb3558a3314e44fb3cb052789ba63e99397266d1ddd
Ubuntu Security Notice 260-1
Posted Mar 8, 2006
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice USN-260-1 - Chris Moore discovered a buffer overflow in a particular class of lexicographical scanners generated by flex. This could be exploited to execute arbitrary code by processing specially crafted user-defined input to an application that uses a flex scanner for parsing.

tags | advisory, overflow, arbitrary
systems | linux, ubuntu
SHA-256 | d8c13fff328dbcb67a0de57506be5ee9f618095f20f4f00bd8d52f8aa3c8ba93
Debian Linux Security Advisory 986-1
Posted Mar 8, 2006
Authored by Debian | Site debian.org

Debian Security Advisory DSA 986-1 - Evgeny Legerov discovered several out-of-bounds memory accesses in the DER decoding component component of the Tiny ASN.1 Library, which is also present and used in GnuTLS, the GNU implementation for Transport Layer Security (TLS) 1.0 and Secure Sockets Layer (SSL) 3.0 protocols and which allows attackers to crash the DER decoder and possibly execute arbitrary code.

tags | advisory, arbitrary, protocol
systems | linux, debian
SHA-256 | b7b9770c4919be34a27afdc1cf6ca3378770e8830b20ff089edfd111ca3ec237
Debian Linux Security Advisory 987-1
Posted Mar 8, 2006
Authored by Debian | Site debian.org

Debian Security Advisory DSA 987-1 - Jim Meyering discovered several buffer overflows in GNU tar, which may lead to the execution of arbitrary code through specially crafted tar archives.

tags | advisory, overflow, arbitrary
systems | linux, debian
SHA-256 | 0853e9688ed991bc06ac72fdba71791a4444ed3938df39a6057524842aa2500e
gamepanel.txt
Posted Mar 8, 2006
Authored by retard, jim, sycko

Game-Panel versions 2.6.1 and below suffer from a cross site scripting flaw.

tags | exploit, xss
SHA-256 | 7be2cbd6a123c6bdaac72620d9b60783bce6740ecb5047c40d578716792f7381
Gentoo Linux Security Advisory 200603-5
Posted Mar 8, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200603-05 - Jean-Sebastien Guay-Leroux discovered a boundary error in the fullpath() function in misc.c when processing overly long file and directory names in ZOO archives. Versions less than 2.10-r1 are affected.

tags | advisory
systems | linux, gentoo
SHA-256 | 6020105dcb3dc347b589689609b724c4595035a9b2a03c1e80988937fd7dff6b
simplogsploit.txt
Posted Mar 8, 2006
Authored by retard, jim

Simplog versions 1.0.2 and below suffer from cross site scripting and directory traversal attacks.

tags | exploit, xss
SHA-256 | d31d9346d8ed8351831d3faa7cf144d9dce1479beacb790a04ad0fd4d6017f91
Gentoo Linux Security Advisory 200603-4
Posted Mar 8, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200603-04 - Steve Kemp discovered two format string errors in IMAP Proxy. Versions less than 1.2.4 are affected.

tags | advisory, imap
systems | linux, gentoo
SHA-256 | 06d047194cf51621b38b4bb6b9190fdd105f7eba08bfd7d880a903cc6091b3ec
wbb234XSS.txt
Posted Mar 8, 2006
Authored by r57shell

WBB version 2.3.4 suffers from a typical cross site scripting flaw.

tags | exploit, xss
SHA-256 | 0474108a80ff3577d3b0f88f92a023586a88fb00e126e502326b033e8b1a8cdb
Gentoo Linux Security Advisory 200603-3
Posted Mar 8, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200603-03 - MPlayer makes use of the FFmpeg library, which is vulnerable to a heap overflow in the avcodec_default_get_buffer() function discovered by Simon Kilvington (see GLSA 200601-06). Furthermore, AFI Security Research discovered two integer overflows in ASF file format decoding, in the new_demux_packet() function from libmpdemux/demuxer.h and the demux_asf_read_packet() function from libmpdemux/demux_asf.c. Versions less than 1.0.20060217 are affected.

tags | advisory, overflow
systems | linux, gentoo
SHA-256 | b1d4fe9aa96c7675f6c34626bbf03d7d4373c9b72061e715d385164b57a41f70
Gentoo Linux Security Advisory 200603-2
Posted Mar 8, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200603-02 - CSTeX, teTex, and pTeX include XPdf code to handle PDF files. This XPdf code is vulnerable to several heap overflows (GLSA 200512-08) as well as several buffer and integer overflows discovered by Chris Evans (CESA-2005-003). Versions less than 2.0.2-r8 are affected.

tags | advisory, overflow
systems | linux, gentoo
SHA-256 | ebb549da6088d46a31aac60c334ce4a544cff0647de2ed1757c407db5ccbbea0
Gentoo Linux Security Advisory 200603-1
Posted Mar 8, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200603-01 - Patrik Karlsson reported that WordPress 1.5.2 makes use of an insufficiently filtered User Agent string in SQL queries related to comments posting. This vulnerability was already fixed in the 2.0-series of WordPress. Versions less than or equal to 1.5.2 are affected.

tags | advisory
systems | linux, gentoo
SHA-256 | 0d0830a3320d82f93eb4e89da5977d76313228407464a4fde6e3cb7b4dd016a0
TotalECommerceSQL.txt
Posted Mar 8, 2006
Authored by Mustafa Can Bjorn | Site nukedx.com

TotalECommerce versions 1.0 and below suffer from SQL injection flaws.

tags | exploit, sql injection
SHA-256 | dabc458869743449861b988a62604a28567faff3f82003a3fade5576abc40754
advisory-277.txt
Posted Mar 8, 2006
Authored by Roozbeh Afrasiabi, imei addmimistrator | Site kapda.ir

CuteNews version 1.4.1 is susceptible to cross site scripting attacks.

tags | advisory, xss
SHA-256 | 31d53fdcb05a3ca200a0930c433a38e1acae92216a8e8a3e237f7c63babee278
adv_pixelpost.txt
Posted Mar 8, 2006
Authored by Paisterist, Knightmare | Site neosecurityteam.net

Pixel Post versions 1.4.3 and 1.5 beta1 have been found susceptible to SQL injection and cross site scripting attacks.

tags | exploit, xss, sql injection
SHA-256 | 380878565a9c6bdabddd71ab710ce332a7eb9c1947b4866d464de3d52a1c8c38
EV0085.txt
Posted Mar 8, 2006
Authored by Aliaksandr Hartsuyeu | Site evuln.com

Easy Forum version 2.5 is susceptible to cross site scripting attacks.

tags | exploit, xss
advisories | CVE-2006-0877
SHA-256 | 2528a10db4d0e57daa651ace1b7150286851c7ea5c9eb12323f0f66b33533f2e
php_stats_0191_adv.txt
Posted Mar 8, 2006
Authored by rgod | Site retrogod.altervista.org

PHP-Stats versions 0.1.9.1 and below suffer from remote directory traversal, SQL injection, and command execution flaws.

tags | exploit, remote, php, sql injection
SHA-256 | 5e1bb3d424f9a3bfb779ba437927c5754cc6e55f28507e15a6b60e3aa1950db1
Page 2 of 4
Back1234Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close