exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 5 of 5 RSS Feed

Files from Sarid Harper

Email addresssaridski at yahoo.dk
First Active2006-12-06
Last Active2011-07-24
File Expert For Android 3.1.2 Directory Traversal
Posted Jul 24, 2011
Authored by Sarid Harper

File Expert for Android version 3.1.2 suffers from a directory traversal vulnerability in the path parameter.

tags | exploit
SHA-256 | 3829a9b9675237d1b1d12772914ecec2d7fcc8a91935ab80132df77ec4b5301a
File Expert For Android 3.0.5 File Deletion
Posted Jul 24, 2011
Authored by Sarid Harper

File Expert for Android suffers from a vulnerability where users can delete files outside of the FTP root. Versions 3.0.4 and 3.0.5 are confirmed vulnerable.

tags | exploit, root
SHA-256 | 19ed342c2f1a2503f578c4b78445d5a29de40f82cc0d68e20e71ea6a6630f88b
CSIS Advisory - Outlook Denial Of Service
Posted Dec 1, 2010
Authored by Sarid Harper

Microsoft Outlook 2007 suffers from an email file attachment denial of service vulnerability.

tags | advisory, denial of service
SHA-256 | 5ff440e06d3826b5ad64b771f85361f08fc18abc456122bf32184c64955ed1b7
OpenX 2.6.3 SQL Injection / LFI / XSS / XSRF
Posted Jan 28, 2009
Authored by Sarid Harper | Site secunia.com

OpenX version 2.6.3 suffers from cross site scripting, cross site request forgery, local file inclusion, and remote SQL injection vulnerabilities. The solution offered is to use another product. Hah.

tags | advisory, remote, local, vulnerability, xss, sql injection, file inclusion, csrf
SHA-256 | 42c6c9bc13964e5415f296903b724c867197d31ddd9be7ca83c3509e5eb6bfa9
fish.zip
Posted Dec 6, 2006
Authored by Sarid Harper | Site return-index.com

FISH is a free file integrity tool that creates a file signature database (default db.xml) for the file types (ie. exe, dll, sys) specified in the configuration file (config.xml). This signature database is then fed to the FISH (sigdb in the config) at a later date to check for the presence of new, deleted and altered files. A brief summary is written to the console and a report (default report.xml) is created, highlighting changes.

tags | tool, integrity
SHA-256 | 67fabcb396b4141f8b2802bce355899c0dd23bd152dfabdb94073250099f2f4c
Page 1 of 1
Back1Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    28 Files
  • 16
    Jul 16th
    6 Files
  • 17
    Jul 17th
    34 Files
  • 18
    Jul 18th
    6 Files
  • 19
    Jul 19th
    34 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    19 Files
  • 23
    Jul 23rd
    17 Files
  • 24
    Jul 24th
    47 Files
  • 25
    Jul 25th
    31 Files
  • 26
    Jul 26th
    13 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    27 Files
  • 30
    Jul 30th
    49 Files
  • 31
    Jul 31st
    29 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close