what you don't know can hurt you
Showing 1 - 25 of 63 RSS Feed

Files Date: 2006-10-17

freebsd-scheduler-dos.c
Posted Oct 17, 2006
Authored by Knud Erik Hojgaard

FreeBSD sched_setscheduler() local denial of service exploit.

tags | exploit, denial of service, local
systems | freebsd
MD5 | f67ccaf23adcbbce0ec9bbdf0ab658b4
freebsd-ptrace-dos.c
Posted Oct 17, 2006
Authored by Knud Erik Hojgaard

FreeBSD 5.4 and 6.0 ptrace DoS exploit.

tags | exploit
systems | freebsd
MD5 | e874ca23f483121af19ba03d820b0850
nv_exploit.c
Posted Oct 17, 2006
Authored by Rapid7 | Site rapid7.com

NVIDIA Binary Graphics Driver For Linux buffer overflow POC exploit.

tags | exploit, overflow
systems | linux
MD5 | d19c9accb40d294f03e333dcd4d0db7d
Rapid7 Security Advisory 25
Posted Oct 17, 2006
Authored by Rapid7 | Site rapid7.com

Rapid7 Advisory R7-0025: Buffer Overflow in NVIDIA Binary Graphics Driver For Linux - The NVIDIA Binary Graphics Driver for Linux is vulnerable to a buffer overflow that allows an attacker to run arbitrary code as root. This bug can be exploited both locally or remotely (via a remote X client or an X client which visits a malicious web page). A working proof-of-concept root exploit is included with this advisory.

tags | advisory, remote, web, overflow, arbitrary, root
systems | linux
MD5 | 6860ab12211a9c8728dd9c2012ba6b61
Debian Linux Security Advisory 1166-2
Posted Oct 17, 2006
Authored by Debian | Site debian.org

Debian Security Advisory 1166-2: This update to DSA-1166 adds the architectures which were missing from the previous advisory.

tags | advisory
systems | linux, debian
MD5 | e4b65091f2f66dbfbb243bcda6421619
Debian Linux Security Advisory 1166-2
Posted Oct 17, 2006
Authored by Debian | Site debian.org

Debian Security Advisory 1166-2: This update to DSA-1166 adds the architectures which were missing from the previous advisory. Luigi Auriemma discovered a buffer overflow in the loading component of cheesetracker, a sound module tracking program, which could allow a maliciously constructed input file to execute arbitrary code.

tags | advisory, overflow, arbitrary
systems | linux, debian
MD5 | 26cd39203f6c3745096a6a71f7a2bef8
Ubuntu Security Notice 365-1
Posted Oct 17, 2006
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 365-1: libksba vulnerability: A parsing failure was discovered in the handling of X.509 certificates that contained extra trailing data. Malformed or malicious certificates could cause services using libksba to crash, potentially creating denial of service.

tags | advisory, denial of service
systems | linux, ubuntu
MD5 | e51908d22244a17ce414247c7eb662a0
Ubuntu Security Notice 364-1
Posted Oct 17, 2006
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 364-1: xinit vulnerability - A race condition existed that would allow other local users to see error messages generated during another user's X session. This could allow potentially sensitive information to be leaked.

tags | advisory, local
systems | linux, ubuntu
MD5 | 20b0b4dd21ff09a80da325618840deed
Gentoo Linux Security Advisory 200610-4
Posted Oct 17, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200610-04 - A number of vulnerabilities have been found and fixed in Seamonkey. For details please consult the references below. Versions less than 1.0.5 are affected.

tags | advisory, vulnerability
systems | linux, gentoo
MD5 | 799a31b63cdee0e6d7ca261f09bf5890
CMScontenido-path.txt
Posted Oct 17, 2006
Authored by CvIr.System

CMS contenido allows an attacker to view database include files, thus exposing sensitive information.

tags | exploit
MD5 | a3f1b71ed47b79e796a44a960d23223a
PHProjekt5.1.1.txt
Posted Oct 17, 2006
Authored by Sp1deR_NeT

PHProjekt 5.1.1 and prior suffers from a remote file inclusion vulnerability in specialdays.php.

tags | exploit, remote, php, file inclusion
MD5 | 1aaa9a4d35d8a710f490942240a540b2
CMScontenido.txt
Posted Oct 17, 2006
Authored by CvIr.System

CMS contenido suffers from a remote file inclusion vulnerability in dbfs.php and front_content.php.

tags | exploit, remote, php, file inclusion
MD5 | a44510d9257fd4aa7da5816bf7a33a64
Download-Engine-1.4.2-2.txt
Posted Oct 17, 2006
Authored by KorsaN

Download-Engine v1.4.2 suffers from several remote file inclusion vulnerabilities in spaw_control.class.php and spaw_control.config.php.

tags | exploit, remote, php, vulnerability, file inclusion
MD5 | 273c36543de86ad961b0a03c3d8e6b77
PacSec-cgi.pm.txt
Posted Oct 17, 2006
Authored by Dragos Ruiu | Site pacsec.jp

PacSec Hype Security Team - Param injection in CGI.pm and inheritors allows SQL injection and manipulation of data bypassing many perl web form validators.

tags | advisory, web, cgi, perl, sql injection
MD5 | aa821f7deecb86fa3e684d7e5ca1e288
RamaCMS-adodb.txt
Posted Oct 17, 2006
Authored by Le CoPrA

RamaCMS suffers from a remote file inclusion vulnerability in adodb.inc.php

tags | exploit, remote, php, file inclusion
MD5 | b322d9bcf541b47c62518620ad9c533d
mcnasvc.exe-dos.txt
Posted Oct 17, 2006
Authored by JAAScois | Site jaascois.com

Mcafee Network Agent (mcnasvc.exe) Remote DoS exploit.

tags | exploit, remote, denial of service
MD5 | 869e75b7340160d0e40293af36c550ea
kml-kmz.txt
Posted Oct 17, 2006
Authored by JAAScois | Site jaascois.com

Google Earth (kml & kmz files) buffer overflow exploit

tags | exploit, overflow
MD5 | f87cac82ec1efa77126597d2ab99a335
Mayhemic Labs Security Advisory 2006.2
Posted Oct 17, 2006
Authored by Mayhemic Labs Security, Mayhemic Labs | Site mayhemiclabs.com

yhemic Labs MHL-2006-002 Public Advisory: Call-Center-Software Versions 0.93 and below are vulnerable to multiple SQL injection attacks and XSS under certain conditions, along with privilege escalation.

tags | advisory, sql injection
MD5 | e5c34cecf5c5685b127cad41fca524ec
ToshibaBluetooth.txt
Posted Oct 17, 2006
Authored by SecureWorks | Site secureworks.com

A flaw exists in the Toshiba Bluetooth wireless device driver, used by multiple vendors, that allows a remote attacker within wireless range of a Bluetooth device to perform a denial-of-service (DoS) attack or execute arbitrary code at the highest privilege level.

tags | advisory, remote, arbitrary
MD5 | fad621a07a97a0c306d0fcec263fccc3
MS06-060.txt
Posted Oct 17, 2006
Authored by McAfee Avert Labs Security Advisory | Site mcafee.com

MS06-060 Microsoft Word Memmove Code Execution: An integer bug (stack overflow) exists in the Microsoft Word file format. The file format allows a attacker to create a malicious Microsoft Word document that when opened, will execute arbitrary code.

tags | advisory, overflow, arbitrary, code execution
MD5 | ab3a2355d865a607b1d69417a96bf189
zenphoto1.0.2.txt
Posted Oct 17, 2006
Authored by Raphael Huck | Site zone14.free.fr

zenphoto 1.0.2 and prior suffer from cross site scripting as well as full path disclosure vulnerabilities.

tags | exploit, vulnerability, xss
MD5 | 2c236905fa8f82749f50f988be6af5d6
SmartyValidate-2.8.txt
Posted Oct 17, 2006
Authored by Sp1deR_NeT | Site sp1der-n3t.com

SmartyValidate-2.8 suffers from a remote file inclusion vulnerability in SmartyValidate.class.php.

tags | exploit, remote, php, file inclusion
MD5 | d658cd588d67bfe9dbce62af52f06304
Osprey.txt
Posted Oct 17, 2006
Authored by Drago84

Osprey suffers from a remote file inclusion vulnerability in GetRecord.php.

tags | exploit, remote, php, file inclusion
MD5 | 6536d16fc3dd70e8cc1399e99b3755cc
savane-1.0.3.txt
Posted Oct 17, 2006
Authored by Drago84

Savane-1.0.3 suffers from a remote file inclusion vulnerability in project_home.php.

tags | exploit, remote, php, file inclusion
MD5 | f8300208fcfec9abf49ace9f5fec66ca
CommunityPortals-1.0.txt
Posted Oct 17, 2006
Authored by Ashiyane Corporation | Site Ashiyane.ir

CommunityPortals versions 1.0 and prior remote file inclusion exploit.

tags | exploit, remote, file inclusion
MD5 | 5e25ad3406e7d45e9eb5334ad53db935
Page 1 of 3
Back123Next

File Archive:

November 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    28 Files
  • 2
    Nov 2nd
    1 Files
  • 3
    Nov 3rd
    1 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    19 Files
  • 6
    Nov 6th
    65 Files
  • 7
    Nov 7th
    22 Files
  • 8
    Nov 8th
    18 Files
  • 9
    Nov 9th
    1 Files
  • 10
    Nov 10th
    1 Files
  • 11
    Nov 11th
    11 Files
  • 12
    Nov 12th
    65 Files
  • 13
    Nov 13th
    27 Files
  • 14
    Nov 14th
    22 Files
  • 15
    Nov 15th
    18 Files
  • 16
    Nov 16th
    1 Files
  • 17
    Nov 17th
    3 Files
  • 18
    Nov 18th
    22 Files
  • 19
    Nov 19th
    17 Files
  • 20
    Nov 20th
    15 Files
  • 21
    Nov 21st
    1 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close