exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 94 RSS Feed

Files Date: 2005-06-01 to 2005-06-02

ZH2005-12SA.txt
Posted Jun 1, 2005
Authored by snkenjoi

phpBB Auction module version 1.2m suffers from a SQL injection vulnerability.

tags | advisory, sql injection
SHA-256 | c795fedacb95b4e3a28134fb0a24bf694c85c044f4193534fbcc7182bdd94779
pm.c
Posted Jun 1, 2005
Authored by c0d3r

PMsoftware miniature HTTP server remote stack overflow exploit.

tags | exploit, remote, web, overflow
SHA-256 | 9525ff54f4bce796e7a507b8bf3f2f24b8bf70434b720199a4b7d4e40cca4562
netmailsharpro.txt
Posted Jun 1, 2005
Authored by Dr. Insane

Netmailshar 4.0 (Build 15) directory traversal and user enumeration exploit.

tags | exploit
SHA-256 | 52cbfce163e380cfe2d16daca8dcc0d9d49a78abc847d7fed42838566979d9ef
ASA-055.txt
Posted Jun 1, 2005
Site securescience.net

PHPROJEKT 4.2 Chatroom is vulnerable to Cross-Site Scripting (XSS) attacks allowing a broadcast attack to users in the chatroom.

tags | advisory, xss
SHA-256 | 924c24da845df4c0ceb5a3948b17ff81ec7c79bb09b72fb4da784f4f20a07a14
waraxe-2005-SA042.txt
Posted Jun 1, 2005
Authored by Janek Vind aka waraxe | Site waraxe.us

Coppermine Photo Gallery 1.3.2 suffers from multiple SQL injection vulnerabilities.

tags | exploit, vulnerability, sql injection
SHA-256 | dffcd6ac14b44ebb73b028fa0dc6fb6228b85e86bf5a48cfe1e6b89d3ae54462
HOD-icmp-attacks-poc.c
Posted Jun 1, 2005
Authored by houseofdabus

A denial of service vulnerability exists that could allow an attacker to send a specially crafted Internet Control Message Protocol (ICMP) message to an affected system. An attacker who successfully exploited this vulnerability could cause the affected system to reset existing TCP connections, reduce the throughput in existing TCP connections, or consume large amounts of CPU and memory resources. This exploit affects various Cisco, AIX, and Windows versions.

tags | exploit, denial of service, tcp, protocol
systems | cisco, windows, aix
advisories | CVE-2004-0790, CVE-2004-0791, CVE-2004-1060
SHA-256 | c38bf63263b456c9b7c004c4c24fa3d01dfd91eac3ac084536fbdffe4d081a45
duportal2.txt
Posted Jun 1, 2005
Authored by Diabolic Crab | Site hackerscenter.com

DUportal 3.1.2 suffers from numerous SQL injection flaws.

tags | exploit, sql injection
SHA-256 | 8ff5cf542f2fde8de91d5e43f21fe46d56ea3cef30968cbfe7b65b49548c95a0
duportal1.txt
Posted Jun 1, 2005
Authored by Diabolic Crab | Site hackerscenter.com

DUportal Pro 3.4 suffers from numerous SQL injection flaws.

tags | exploit, sql injection
SHA-256 | 0ceb255a466ca99c8145750bf06caf07186f80f6b1af41055ddc26d93912196f
bx-xp.c
Posted Jun 1, 2005
Authored by GroundZero

BitchX local exploit that only works if it is setuid locally. Made for version BitchX-1.0c20cvs.

tags | exploit, local
SHA-256 | eeff5f898f93c27e4210e9dc3757a1670f06bc8cbe6499faeb33a3cf9cc43d53
ie6fire.txt
Posted Jun 1, 2005
Authored by bitlance winter

Local file disclosure flaw that affects both Firefox and IE6. Sample exploitation provided.

tags | exploit, local
SHA-256 | 7a9d672c68d19b5548033ad4ebe63b121c36d3aebaed302b433c1118bf7650e2
Gentoo Linux Security Advisory 200504-19
Posted Jun 1, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200504-19 - Heap overflows have been found in the code handling RealMedia RTSP and Microsoft Media Services streams over TCP (MMST). Versions less than 1.0_pre6-r4 are affected.

tags | advisory, overflow, tcp
systems | linux, gentoo
SHA-256 | 9c210f39c70c4af2a86566d59cbc0461e1c2b3ad20eedb16521f65098d8bf10d
real-ram-adv.txt
Posted Jun 1, 2005
Authored by Piotr Bania

RealNetworks RealPlayer, RealOne Player, and Helix Player all suffer from a remote heap overflow that allows for remote code execution.

tags | advisory, remote, overflow, code execution
SHA-256 | f5dfc6020b55f720a8cbcc1e223a699e696def7db5ae15407dbb1fa62bf5b52f
deslo.txt
Posted Jun 1, 2005
Authored by Adam Baldwin

Neslo Desktop Rover suffers from a remote denial of service vulnerability.

tags | advisory, remote, denial of service
SHA-256 | a60e6aaf17789932c5057f3a7942283c9a1bb3e4836d0c355a8b98aa268c362a
egroupware100007.txt
Posted Jun 1, 2005
Authored by James Bercegay | Site gulftech.org

eGroupewar versions below 1.0.0.007 suffer from multiple cross site scripting and SQL injection vulnerabilities.

tags | exploit, vulnerability, xss, sql injection
SHA-256 | 17b0c9fae94df3b9ba7e1a7b70639e656620493755d4ff5de56650d241cc96c8
azbb1007d.txt
Posted Jun 1, 2005
Authored by James Bercegay | Site gulftech.org

AZBB versions 1.0.07d and below suffer from arbitrary file deletion and enumeration flaws.

tags | advisory, arbitrary
SHA-256 | 6306c8d12777015f47460895fa5507cfd12177435797106e750bf523bbff3697
ret-onto-ret_en.txt
Posted Jun 1, 2005
Authored by Clad Strife, Xdream Blue

Whitepaper discussing how Linux 2.6.x vsyscalls may be used as powerful attack vectors.

tags | paper
systems | linux
SHA-256 | b406a9c21a431bb2fc0c47ac6bb5111954aaf9f872651dfaa10e0e4884893849
annuaire.txt
Posted Jun 1, 2005
Authored by jaguar | Site jaguar.wulab.com

annuaire netref version 4.2 is susceptible to a remote command execution flaw.

tags | exploit, remote
SHA-256 | e5bbb9d2b62449c51f0599f113e3cd34afe9beab0a052bd9eef867c2f7d76b01
ecomSQL.txt
Posted Jun 1, 2005
Authored by c0d3r

Ecommerce-Carts EcommPro versions 3 and below suffer from a SQL injection attack that allows for login bypass.

tags | exploit, sql injection
SHA-256 | d11701c28fd50e9b869cfbe9e48729c69bbcbb9ce5292f2d6c775337082e0457
shoutbox302.txt
Posted Jun 1, 2005
Authored by CorryL | Site x0n3-h4ck.org

Shoutbox SCRIPT versions 3.0.2 and below suffer from a remote retrieval flaw that allows for the grabbing of an administrator's MD5 hash and their username.

tags | exploit, remote
SHA-256 | c842a3fc2bdd4a19441502e17c25a603e831b4a4310fbce61bf631805f0fd703
ubbprintthread.txt
Posted Jun 1, 2005
Authored by Axl, HLL

UBB printthread.php is susceptible to a SQL injection attack.

tags | exploit, php, sql injection
SHA-256 | 926a7b3ef4e890765c8d552d4e159104eeefe7ca0c1cd19600d58bbcfcaaa017
MS05-021-PoC.pl
Posted Jun 1, 2005
Authored by Evgeny Pinchuk

MS05-021 Exchange X-LINK2STATE exploit that makes use of a heap overflow in SvrAppendReceivedChunk function which is located in xlsasink.dll.

tags | exploit, overflow
SHA-256 | 02975744297487606f18172eef11cfb3c711a1ccadc13c5fc69f15560aa634ee
GM015-IE.txt
Posted Jun 1, 2005
Site greymagic.com

GreyMagic Security Advisory GM#015-IE - Windows Explorer fails to filter dangerous data in links used in the webview on Windows.

tags | advisory
systems | windows
SHA-256 | b0e0113b63d7852efda22daf6fc544646e9787e6e936b0d0a0ea9c9fbbfd7063
dsa-712.txt
Posted Jun 1, 2005
Site security.debian.org

Debian Security Advisory DSA 712-1 - Tim Dijkstra discovered a problem during the upgrade of geneweb, a genealogy software with web interface. The maintainer scripts automatically converted files without checking their permissions and content, which could lead to the modification of arbitrary files.

tags | advisory, web, arbitrary
systems | linux, debian
advisories | CVE-2005-0391
SHA-256 | 9a0eca1814872b0a7fcc4dbe92282fa4c5686c5a69ec0ae85a69f55eca060887
apexec.txt
Posted Jun 1, 2005
Authored by msdarkflyer

apexec.pl suffers from a directory traversal flaw.

tags | exploit
SHA-256 | 5b767ab2f10cf9dfd9b0e426317221a95c123387b2fcb54fe415e1ce4e2de5ad
Gentoo Linux Security Advisory 200504-18
Posted Jun 1, 2005
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200504-18 - New Mozilla Firefox and Mozilla Suite releases fix new security vulnerabilities, including memory disclosure and various ways of executing JavaScript code with elevated privileges. Versions less than 1.0.3 are affected.

tags | advisory, javascript, vulnerability
systems | linux, gentoo
advisories | CVE-2005-0989
SHA-256 | 3304fb9c0dd2ac34c28c8a52fa2aebb4d38b78bb11517ce76c83bb77926d2156
Page 3 of 4
Back1234Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close