what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 55 RSS Feed

Files Date: 2006-11-07 to 2006-11-08

major_rls32.txt
Posted Nov 7, 2006
Authored by David "Aesthetico" Vieira-Kurz | Site majorsecurity.de

phpComasy CMS versions 0.7.9 pre and below suffer from multiple cross site scripting issues.

tags | advisory, xss
SHA-256 | c678493d4996d14d7be9b48b55c16d03412f61b7c102493618177735ff5be26c
Gentoo Linux Security Advisory 200611-2
Posted Nov 7, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200611-02 - An integer overflow flaw has been found in the pixmap handling of Qt. Versions less than 4.1.4-r2 are affected.

tags | advisory, overflow
systems | linux, gentoo
SHA-256 | 811400c1386615c0242a53472abf4f7ed07a1e7467b6597704efea66877c81bd
VULNDISCO_META_FREE.tar.gz
Posted Nov 7, 2006
Authored by Evgeny Legerov | Site gleg.net

This VulnDisco Packet for Metasploit 2.7 has the following zero day exploits: vd_ldapinfo.pm - [0day] Query info from LDAP server, vd_xlink.pm - [0day] Omni-NFS Enterprise remote exploit, vd_openldap.pm - [0day] OpenLDAP denial of service exploit.

tags | exploit, remote, denial of service
SHA-256 | bf1ddad6f404b81910e06f6d100945a2cbfe7b3a7306053e77c44e423bfaf932
cidstats.txt
Posted Nov 7, 2006
Authored by Mahmood_ali

@cid stats version 2.3 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, file inclusion
SHA-256 | 2818aa304b15a3953e303690b5f8a60299a2fab84aa133ba1f1cc40baf1cde82
scarf.txt
Posted Nov 7, 2006
Authored by navairum

The SCARF system from a person at Stanford suffers from a failure to verify administrative access.

tags | exploit
SHA-256 | a2937cb5802f5f7ccd02769e8a7d461c76c6dfd46d760a66afbf8f14e49dc234
paypalXSScorry.txt
Posted Nov 7, 2006
Authored by CorryL | Site x0n3-h4ck.org

PayPal.com suffered from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 22d98d91409ede316d23ed907459afbc3116834d535af7e20e9bc825d40944de
ag231-rfi.txt
Posted Nov 7, 2006
Authored by BrokeN-ProXy

Advanced Guestbook version 2.3.1 suffers from a remote file inclusion vulnerability in Admin.php.

tags | exploit, remote, php, code execution, file inclusion
SHA-256 | 209fc6296bd2a108ab00b092d8563b64da3177da09da3b2d37fe71372110095c
hotmail_xss.txt
Posted Nov 7, 2006
Authored by Cheng Peng Su

Hotmail and Windows Live Mail suffer from a cross site scripting vulnerability.

tags | exploit, xss
systems | windows
SHA-256 | 5f48c2896446171c4769baad66e13e1b448d7f013d714a10ee529ea29207362d
mwchat-rfi.txt
Posted Nov 7, 2006
Authored by Mr.3FReeT

MWChat Pro version 7.0 is susceptible to a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 2f0692f9cdb1efd9b4d135f166cfaf926a22b8d0f15b285fee674cef72be8b3e
Armorize-ADV-2006-0009.txt
Posted Nov 7, 2006
Authored by Armorize | Site armorize.com

Armorize Technologies Security Advisory Armorize-ADV-2006-0009 - ZendFramework Preview version 0.2.0 is susceptible to a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 634d1ab8583771f7d0e0dc023fd1f7060ae1ef993418123e8af64ad518c89d8b
Secunia Security Advisory 22697
Posted Nov 7, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Hyper NIKKI System, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 03cd0fb4da8f82ce605b6414b570e358c1c57580dc83b93e8c29cc4d5caf86f4
Secunia Security Advisory 22702
Posted Nov 7, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - LMH has reported a vulnerability in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, kernel, local
systems | linux
SHA-256 | 669e1b7a39a73d04f340c3f76b14c801e32070684d779e750d441f39f93c5d44
Secunia Security Advisory 22729
Posted Nov 7, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SlimTim10 has reported some vulnerabilities in Creasito E-Commerce Content Manager, which can be exploited by malicious people to bypass certain security restriction.

tags | advisory, vulnerability
SHA-256 | 5129b3077b843f24381af70e139cd56398239b9fed43e2365aae68f8b547c673
SinFP-2.04-1.tar.gz
Posted Nov 7, 2006
Authored by GomoR | Site gomor.org

SinFP is a new approach to OS fingerprinting, which bypasses limitations that nmap has. It only requires one open TCP port, sends only fully standard TCP packets, and limits the number of tests to 2 or 3.

Changes: Update from Net::Packet 3.00 to 3.01. Net::SinFP updated to 2.04. New signatures (sinfp-20061101.db).
tags | tool, scanner, tcp
systems | unix
SHA-256 | 1369b428d4cce63274879980954dcc11f87c7f42167155c8cb8327a0832eb682
pikt-1.18.2.tar.gz
Posted Nov 7, 2006
Authored by Robert Osterlund | Site pikt.org

PIKT is a cross-platform, multi-functional toolkit for monitoring systems, reporting and fixing problems, security management, and updating system configurations. PIKT comprises an embedded scripting language with unique, labor-saving features. Binaries available here.

Changes: Minor bug fix release.
tags | tool
systems | unix
SHA-256 | a6c35e1c0cb59a0e8b1336b2bb3d01a3a6182bada0c16ed93fd98b805f410f01
Fwknop Port Knocking Utility
Posted Nov 7, 2006
Authored by Michael Rash | Site cipherdyne.org

fwknop implements an authorization scheme that requires only a single encrypted packet to communicate various pieces of information, including desired access through a Netfilter policy and/or specific commands to execute on the target system. The main application of this program is to protect services such as SSH with an additional layer of security in order to make the exploitation of vulnerabilities much more difficult. The authorization server works by passively monitoring authorization packets via libpcap.

Changes: Various bug fixes and some enhanced validation.
tags | tool, scanner, vulnerability
systems | unix
SHA-256 | ff771ee9498fde005fdae01e8fe2f1a0ea0658aed9248a72ad4d0ad91be23dc0
linux33.txt
Posted Nov 7, 2006
Authored by hophet

33 byte execve(/bin/sh) linux/86-64 shellcode.

tags | shellcode
systems | linux
SHA-256 | b215b1814e47e43730a926339987e2eef24065326742a8373fb28dc8f0420d22
httpget.c
Posted Nov 7, 2006
Authored by Izik

This shellcode allows you to download an ELF executable straight off a standard HTTP server and launch it. It will be saved locally to a filename called 'A' in the current directory. linux/x86 and 111 bytes.

tags | web, x86, shellcode
systems | linux
SHA-256 | 4a909ca87606bf57f755b2c8322fb4fa6ee45728619e7f9d3db8fc7ea441cce8
gen_httpreq.c
Posted Nov 7, 2006
Authored by Izik

Small utility designed for generating HTTP/1.x requests for shellcodes.

tags | web, shellcode
SHA-256 | 1c5e4b2c58884668e99c7345778c7905c9db49401533dd861cc9e4d916255aa3
efsStream.txt
Posted Nov 7, 2006
Authored by Greg Linares

EFS Easy Address Book web server versions 1.2 and below remote file stream exploit.

tags | exploit, remote, web
SHA-256 | d4914cf7bc4dd032087a23c8e5cc6f15f2b3d5407d2fb1331b5ae13379345bb4
XHNB-Novell-eDirectory_remote_bof.c
Posted Nov 7, 2006
Authored by Expanders, Manuel Santamarina Suarez

Novell eDirectory versions 9.0 and below DHost remote buffer overflow exploit.

tags | exploit, remote, overflow
SHA-256 | 1acfa7a13ca13f316e5a4c8f1d11e2f197cda1019616c5dc3401e0d70f57d958
easyFilePwn.txt
Posted Nov 7, 2006
Authored by Greg Linares

Easy File Sharing Web Server version 4 remote information stealing exploit.

tags | exploit, remote, web
SHA-256 | 42057b99e0d7bd1d1a5e5921f9a6ebd7d935abd7b44d1fbc81a317569e084cbb
privatewire.pm.txt
Posted Nov 7, 2006
Authored by Michael Thumann

This Metasploit module exploits a buffer overflow in the ADMCREG.EXE used in the PrivateWire Online Registration Facility version 3.7.

tags | exploit, overflow
SHA-256 | a5ec652464b0f067411e97ad1d8e3280db7564bcfd84b1c5fde1f0ead9835c19
novelleDir88.pl.txt
Posted Nov 7, 2006
Authored by Manuel Santamarina Suarez

Novell eDirectory 8.8 NDS server remote stack overflow exploit.

tags | exploit, remote, overflow
SHA-256 | e13f49ce4c2215c79089e171a73e05cce1ddb0e13f341bc663e386832f5d8667
iwarePro.txt
Posted Nov 7, 2006
Authored by nuffsaid

iWare Pro versions 5.0.4 and below suffer from a remote code execution vulnerability in chat_panel.php.

tags | exploit, remote, php, code execution
SHA-256 | 4ea3d795c83c5b9d7ef944a32e2123eadcea880804a62298d5a74cbbce57b5c2
Page 2 of 3
Back123Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    17 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close