what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 67 of 67 RSS Feed

Files Date: 2006-02-13 to 2006-02-14

linpha_10_local.txt
Posted Feb 13, 2006
Authored by rgod | Site retrogod.altervista.org

Linpha versions 1.0 and below arbitrary local inclusion exploit.

tags | exploit, arbitrary, local
SHA-256 | a99d935091920b99bba35e23a5978d65aeeaa1c675c9f449008c5f536ec46d29
iDEFENSE Security Advisory 2006-02-10.t
Posted Feb 13, 2006
Authored by iDefense Labs, Sebastian Apelt | Site idefense.com

iDEFENSE Security Advisory 02.10.06 - Remote exploitation of a denial of service vulnerability in IBM Corp.'s Lotus Domino LDAP server allows attackers to crash the service, thereby preventing legitimate access. iDEFENSE is currently unaware of exploits for this vulnerability other than those maintained by iDEFENSE Labs. iDEFENSE has confirmed the existence of this vulnerability in Lotus Domino Server version 6.5.4. It is suspected that earlier versions of Lotus Domino Server are also affected.

tags | advisory, remote, denial of service
advisories | CVE-2005-2712
SHA-256 | c45653cf3886d3f477b01cb3a76974e40c800c7765026772b1b9d2302717805f
coarseknocking-0.0.5.tar.gz
Posted Feb 13, 2006
Authored by Andre Luiz Rodrigues Ferreira | Site coarseknocking.sourceforge.net

This is a simple implementation of Port Knocking techniques. It sniffs network packets looking for predetermined keys and executes commands to open and close ports on the firewall. In the client mode it injects packets with the key to server.

Changes: Added support to choose network interface. Added configuration tool.
tags | tool, scanner
systems | unix
SHA-256 | d30525b8efab91320506330f1c33d3a020d84c71556204537afb77e47a42439e
farsiNews.txt
Posted Feb 13, 2006
Authored by Hamid Ebadi | Site hamid.ir

FarsiNews versions 2.5 and below suffer from various local file inclusion and direct file access flaws.

tags | exploit, local, file inclusion
SHA-256 | b7aad0c8649aa284cee3be6cf8470a1dcae12846a409aea7e3a1ab8f077f4dd5
secunia-LotusNotesZIP.txt
Posted Feb 13, 2006
Authored by Tan Chew Keong | Site secunia.com

Secunia Research has discovered a vulnerability in Lotus Notes, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error in kvarcve.dll when constructing the full pathname of a compressed file to check for its existence before extracting it from a ZIP archive. This can be exploited to cause a stack-based buffer overflow. Successful exploitation allows execution of arbitrary code when the user extracts a compressed file with a long filename from within the Notes attachment viewer. Affected versions is Lotus Notes 6.5.4.

tags | advisory, overflow, arbitrary
advisories | CVE-2005-2618
SHA-256 | 29ad1e0fb254d307e5c210c27de6309dbcbeec3d980b62f37a53ae596b9a9d23
secunia-LotusNotesUUE.txt
Posted Feb 13, 2006
Authored by Tan Chew Keong | Site secunia.com

Secunia Research has discovered a vulnerability in Lotus Notes, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error in uudrdr.dll when handling an UUE file containing an encoded file with an overly long filename. This can be exploited to cause a stack-based buffer overflow. Successful exploitation allows execution of arbitrary code when a malicious UUE file is opened in the Notes attachment viewer. Affected versions are Lotus Notes 6.5.4 and Lotus Notes 7.0.

tags | advisory, overflow, arbitrary
advisories | CVE-2005-2618
SHA-256 | a512a74bf2eb5426a6ef1b0505c9c30d26592de02c1368592f882f68346bf269
secunia-LotusNotesTar.txt
Posted Feb 13, 2006
Authored by Carsten Eiram | Site secunia.com

Secunia Research has discovered a vulnerability in Lotus Notes, which potentially can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error in the TAR reader (tarrdr.dll) when extracting files from a TAR archive. This can be exploited to cause a stack-based buffer overflow via a TAR archive containing a file with a long filename. Successful exploitation allows execution of arbitrary code, but requires that the user views a malicious TAR archive and chooses to extracts a compressed file to a directory with a very long path (more than 220 bytes). Affected versions are Lotus Notes 6.5.4 and Lotus Notes 7.0.

tags | advisory, overflow, arbitrary
advisories | CVE-2005-2618
SHA-256 | 6005828ac70516cca59ccdd67b173d13de808ad823e9db5ee755b74356259601
secunia-LotusNotesOverflow.txt
Posted Feb 13, 2006
Authored by Carsten Eiram | Site secunia.com

Secunia Research has discovered two boundary condition vulnerabilities in Lotus Notes, which can be exploited by malicious people to compromise a user's system. Affected versions are Lotus Notes 6.5.4 and Lotus Notes 7.0.

tags | advisory, overflow, vulnerability
advisories | CVE-2005-2618
SHA-256 | 29f10a8be4d832d76d5eb82cfe358a7b3f93f0c6b5d02a8a2ab7c319b4d1c85b
secunia-LotusTraverse.txt
Posted Feb 13, 2006
Authored by Carsten Eiram, Tan Chew Keong | Site secunia.com

Secunia Research has discovered a vulnerability in Lotus Notes, which can be exploited by malicious people to bypass certain security restrictions. The vulnerability is caused due to directory traversal errors in kvarcve.dll when generating the preview of a compressed file from ZIP, UUE and TAR archives. This can be exploited to delete arbitrary files that are accessible to the Notes user. Affected versions are Lotus Notes 6.5.4 and Lotus Notes 7.0.

tags | advisory, arbitrary, file inclusion
advisories | CVE-2005-2619
SHA-256 | a9bc2a3a0141f79688e6b766ca98f395753401a2d0e8795deb887ac34da40f1f
secunia-LotusDomino.txt
Posted Feb 13, 2006
Authored by Jakob Balle, Tan Chew Keong | Site secunia.com

Secunia Research has discovered some vulnerabilities in Lotus Domino iNotes Client, which can be exploited by malicious people to conduct script insertion attacks. Affected versions include IBM Lotus Domino Web Access 7.x, IBM Lotus Domino Web Access (iNotes) 6.x, IBM Lotus Domino 6.x, and IBM Lotus Domino 7.x.

tags | advisory, web, vulnerability
SHA-256 | b55a4f37f4611abd8cbe649bb902701992e861abc861f2023115d74fa75039f7
HP Security Bulletin 2005-11.2
Posted Feb 13, 2006
Authored by Hewlett Packard, HP | Site hp.com

HP Security Bulletin - A potential security vulnerability has been identified in the SSL v2 implementation used in HP HTTP Server v5.9.6 that may allow a remote attacker to force the use of a weaker security protocol via a man-in-the-middle attack.

tags | advisory, remote, web, protocol
advisories | CVE-2005-2969
SHA-256 | f69e23aeee57b0c6e0d5713e0ba20ff5ad36eff854b594867f538e19d3734ce9
Debian Linux Security Advisory 967-1
Posted Feb 13, 2006
Authored by Debian | Site debian.org

Debian Security Advisory DSA 967-1 - Several security problems have been found in elog, an electonic logbook to manage notes. These include, but are not limited to, code executions flaws, directory traversal attacks, and format string vulnerabilities.

tags | advisory, vulnerability, code execution
systems | linux, debian
advisories | CVE-2006-4439, CVE-2006-0347, CVE-2006-0348, CVE-2006-0597, CVE-2006-0598, CVE-2006-0599, CVE-2006-0600
SHA-256 | c0f916f0bb78e6690cc7694abcb33897e7643e564f3bf7ee68e7da06ff8d32a1
cpaint202XSS.txt
Posted Feb 13, 2006
Site gulftech.org

CPAINT versions 2.0.2 and below suffer from a cross site scripting flaw.

tags | exploit, xss
SHA-256 | f3fc785fe63cf9e9bb47ba40e732137e215239fa11233117ee26c4e8becbd90d
fckeditor_22_xpl.html
Posted Feb 13, 2006
Authored by rgod | Site retrogod.altervista.org

Shell upload exploit for FCKEditor 2.0 versions 2.2 and below.

tags | exploit, shell
SHA-256 | 5e7078355d4f67d731b3a9361c3352265bec637ada59895ca8fe256bf1bc459a
runcms_13a_xpl.html
Posted Feb 13, 2006
Authored by rgod | Site retrogod.altervista.org

RunCMS versions 1.2 and below arbitrary remote inclusion exploit. Also allows for code execution on RunCMS versions 1.3a2 and below by making use of an upload flaw via FCKEditor.

tags | exploit, remote, arbitrary, code execution
SHA-256 | 947fb99ab2cc74c894480dbaf61007c4bce5d48c605fba87e6c86d16bbf2b0c4
EV0056.txt
Posted Feb 13, 2006
Authored by Aliaksandr Hartsuyeu

GuestBookHost version 2005.04.25 is susceptible to an authentication bypass flaw.

tags | exploit
advisories | CVE-2006-0542
SHA-256 | a62334c73fb17b2b98a13aa2a8a9996e29eddda44ae685468b31d76fb93a3ef8
EV0055.txt
Posted Feb 13, 2006
Authored by Aliaksandr Hartsuyeu

Unknown Domain Shoutbox version 2005.07.21 is susceptible to multiple SQL injection and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, sql injection
advisories | CVE-2006-0605, CVE-2006-0606
SHA-256 | 0b74193bedf56cbe07b50e411f725e91b591547c34613c0070209420ca51e721
Page 3 of 3
Back123Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close