exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 5 of 5 RSS Feed

Files from Sarid Harper

Email addresssaridski at yahoo.dk
First Active2006-12-06
Last Active2011-07-24
File Expert For Android 3.1.2 Directory Traversal
Posted Jul 24, 2011
Authored by Sarid Harper

File Expert for Android version 3.1.2 suffers from a directory traversal vulnerability in the path parameter.

tags | exploit
SHA-256 | 3829a9b9675237d1b1d12772914ecec2d7fcc8a91935ab80132df77ec4b5301a
File Expert For Android 3.0.5 File Deletion
Posted Jul 24, 2011
Authored by Sarid Harper

File Expert for Android suffers from a vulnerability where users can delete files outside of the FTP root. Versions 3.0.4 and 3.0.5 are confirmed vulnerable.

tags | exploit, root
SHA-256 | 19ed342c2f1a2503f578c4b78445d5a29de40f82cc0d68e20e71ea6a6630f88b
CSIS Advisory - Outlook Denial Of Service
Posted Dec 1, 2010
Authored by Sarid Harper

Microsoft Outlook 2007 suffers from an email file attachment denial of service vulnerability.

tags | advisory, denial of service
SHA-256 | 5ff440e06d3826b5ad64b771f85361f08fc18abc456122bf32184c64955ed1b7
OpenX 2.6.3 SQL Injection / LFI / XSS / XSRF
Posted Jan 28, 2009
Authored by Sarid Harper | Site secunia.com

OpenX version 2.6.3 suffers from cross site scripting, cross site request forgery, local file inclusion, and remote SQL injection vulnerabilities. The solution offered is to use another product. Hah.

tags | advisory, remote, local, vulnerability, xss, sql injection, file inclusion, csrf
SHA-256 | 42c6c9bc13964e5415f296903b724c867197d31ddd9be7ca83c3509e5eb6bfa9
fish.zip
Posted Dec 6, 2006
Authored by Sarid Harper | Site return-index.com

FISH is a free file integrity tool that creates a file signature database (default db.xml) for the file types (ie. exe, dll, sys) specified in the configuration file (config.xml). This signature database is then fed to the FISH (sigdb in the config) at a later date to check for the presence of new, deleted and altered files. A brief summary is written to the console and a report (default report.xml) is created, highlighting changes.

tags | tool, integrity
SHA-256 | 67fabcb396b4141f8b2802bce355899c0dd23bd152dfabdb94073250099f2f4c
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close