exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 103 RSS Feed

Files Date: 2006-10-27

Coppermine1.4.9.txt
Posted Oct 27, 2006
Authored by disfigure | Site w4cking.com

Coppermine 1.4.9 suffers from a SQL injection vulnerability. POC included that grabs the admin hash.

tags | exploit, sql injection
SHA-256 | 233e110528f5e5c98147d2f55f76bdfe62ed681f6f00fa71343aa8937ac8d85d
phpLedAds2.0.txt
Posted Oct 27, 2006
Authored by Mahmood_ali

phpLedAds 2.0 suffers from multiple remote file inclusion vulnerabilities.

tags | exploit, remote, vulnerability, file inclusion
SHA-256 | 678775e57ffe6f1ba95259b927d3777ebc37be528c3b21419e1966f05f5a4aeb
PLS-Bannieres1.21.txt
Posted Oct 27, 2006
Authored by Mahmood_ali

PLS-Bannieres 1.21 suffers from a remote file inclusion vulnerability in bannieres.php.

tags | exploit, remote, php, file inclusion
SHA-256 | f86e43db359a3d1f036951826c4a4008f694f8a60a2ce04c54d78cad0d7633ed
MiniBILLv2006-10-10.txt
Posted Oct 27, 2006
Authored by XORON

MiniBILL v2006-10-10 suffers from a remote file inclusion vulnerability in config[page_dir].

tags | exploit, remote, file inclusion
SHA-256 | 4497c5bf28738f1a00117966132decb92c65d93f8ec2b5ad5550590bfe003645
Mayhemic Labs Security Advisory 2006.3
Posted Oct 27, 2006
Authored by Mayhemic Labs Security, Mayhemic Labs | Site mayhemiclabs.com

Mayhemic Labs Public Advisory MHL-2006-003: ezOnlineGallery Multiple Security Issues

tags | advisory
SHA-256 | 30fdafcfcadf320aad18e94bba8f672133b81ad609dc739913ce31b1fbb68248
ArticleBeach-2.0.txt
Posted Oct 27, 2006
Authored by Zeni Susanto

ArticleBeach Script versions 2.0 and prior suffer from a remote file inclusion vulnerability.

tags | exploit, remote, file inclusion
SHA-256 | 8466dccd2b2df63899cf1815a765f6d4d8df3651caebfb7eb9e042f70110682b
TextPattern-1.19.txt
Posted Oct 27, 2006
Authored by Zeni Susanto

TextPattern versions 1.19 and prior suffer from a remote file inclusion vulnerability.

tags | exploit, remote, file inclusion
SHA-256 | 22594dae7756eb0ada8fce7eadd80bff5a5bba808f5c94888d16a6767d9b63bd
iDEFENSE Security Advisory 2006-10-26.1
Posted Oct 27, 2006
Authored by iDefense Labs | Site idefense.com

iDefense Security Advisory 10.26.06 - Multiple Vendor wvWare LFO Count Integer Overflow Vulnerability

tags | advisory, overflow
SHA-256 | 8f68a8978984b0e3a5fe4be0692e8f18f211e7a2ad5bd97c2f7a27c96532b140
iDEFENSE Security Advisory 2006-10-26.2
Posted Oct 27, 2006
Authored by iDefense Labs | Site idefense.com

iDefense Security Advisory 10.26.06: Multiple Vendor wvWare LVL Count Integer Overflow Vulnerability

tags | advisory, overflow
SHA-256 | a15abfbcbe15b9bba54b79957b5fd2e640440079be1d05e1b450a95b561ef26a
SMFfgetsoff.txt
Posted Oct 27, 2006
Authored by Jose Carlos Norte

Simple machines forum (SMF) suffers from a vulnerability that allows a malicious user to render any topic unreadable by sending false information to the avatar size checking function.

tags | advisory
SHA-256 | 60fcdeb9b18f837d874922b5ebe66b0538ac7a86acf58ff9c56765280b9bb486
Cisco Security Advisory 20061025-csa
Posted Oct 27, 2006
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory ID: cisco-sa-20061025-csa - Cisco Security Agent for Linux Port Scan Denial of Service

tags | advisory, denial of service
systems | cisco, linux
SHA-256 | 78c609fbecba3ff660e0c83fb136f710dbbaa5cfd0bbb15aa68ccfa4d92ed9cd
kapda-61.txt
Posted Oct 27, 2006
Authored by trueend5 | Site kapda.ir

KAPDA Advisory #61: Multiple vulnerabilities in PacPoll versions 4.0 and prior.

tags | advisory, vulnerability
SHA-256 | 2fe05620e83e90181d68ccf81e1524097d606db200aeeebf09ada457a165ce14
OpenPKG Security Advisory 2006.26
Posted Oct 27, 2006
Authored by OpenPKG Foundation | Site openpkg.org

OpenPKG Security Advisory - OpenPKG-SA-2006.026: According to a vendor release announcement [0], a denial of service vulnerability exists in the virtual terminal application GNU screen [1], version 4.0.2 and earlier. The vulnerabilities exist in the handling of "UTF-8 combining characters" and allow user-assisted attackers to cause a Denial of Service (crash or hang of GNU screen) via certain UTF-8 character sequences.

tags | advisory, denial of service, vulnerability
SHA-256 | 3d1d7b3be9c6d2ccd5c51acc0f2c4f73714fb8ee5beedde2d14d7a6468e3b555
iDEFENSE Security Advisory 2006-10-25.1
Posted Oct 27, 2006
Authored by iDefense Labs | Site idefense.com

iDefense Security Advisory 10.25.06: AOL Nullsoft Winamp Ultravox Lyrics3 v2.00 tags Heap Overflow Vulnerability

tags | advisory, overflow
SHA-256 | 4e87b0d9e96132057329eb9052b503645abb32dba5ae1a5e2f663dac5f6bc9c8
iDEFENSE Security Advisory 2006-10-25.2
Posted Oct 27, 2006
Authored by iDefense Labs | Site idefense.com

iDefense Security Advisory 10.25.06: Remote exploitation of a heap-based buffer overflow vulnerability in the Ultravox protocol handler of AOL Corp.'s Nullsoft Winamp media player could allow an attacker to execute arbitrary code in the context of the currently logged in user.

tags | advisory, remote, overflow, arbitrary, protocol
SHA-256 | 504bcb865578c3fbff3bfaf2fba7d5a1cf655dfcf44253f3a1fc43781e47d40d
iDEFENSE Security Advisory 2006-10-25.3
Posted Oct 27, 2006
Authored by iDefense Labs | Site idefense.com

iDefense Security Advisory 10.25.06: America Online 9.0 Security Edition ships with an ActiveX control which is marked as safe for scripting and contains a buffer overflow vulnerability which allows for the arbitrary execution of code.

tags | advisory, overflow, arbitrary, activex
SHA-256 | a5023c957a2edcb61e500280df5b7eb3f11d62cbf1fc86ec2a18cc26a175cc42
iDEFENSE Security Advisory 2006-10-25.4
Posted Oct 27, 2006
Authored by iDefense Labs | Site idefense.com

iDefense Security Advisory 10.25.06: AOL YGPPDownload AddPictureNoAlbum ActiveX Control Heap Corruption Vulnerability

tags | advisory, activex
SHA-256 | bc6ad719bdb1a058e5459389cefc84c7df7e4a6edc8671dfda0ae37823b13e85
rPSA-2006-0198-1.txt
Posted Oct 27, 2006
Site rpath.com

rPath Security Advisory: 2006-0198-1: In previous versions of the screen package, the screen program had a bug which is known to make screen vulnerable to a minor denial of service attack in which the screen program would crash if presented with particular output. It is possible that this attack could also allow a user-complicit attacker to assume the privileges of the complicit user. The screen program is not setuid in rPath Linux, so any attack is limited to the complicit user.

tags | advisory, denial of service
systems | linux
SHA-256 | 9d6aa5849f0d951882c19d3c203f88b7b542c54aa21a1ef825a48ca850a0ca48
rPSA-2006-0195-2.txt
Posted Oct 27, 2006
Site rpath.com

rPath Security Advisory: 2006-0195-2: Previous versions of the qt-x11-free package include Qt libraries contain an integer overflow flaw that causes them not to properly bound pixmap image data. This may enable a user-complicit denial of service attack (application crash), or possibly unauthorized access via arbitrary code execution, in applications which use vulnerable versions of the Qt libraries.

tags | advisory, denial of service, overflow, arbitrary, code execution
SHA-256 | 0bfa2913fc97e3bfc7630e182f6e6aceb9c1e399a7194c1829a5a615d64446fc
Trustix Secure Linux Security Advisory 2006.59
Posted Oct 27, 2006
Authored by Trustix | Site http.trustix.org

Trustix Secure Linux Security Advisory #2006-0059: multiple vulnerabilities in postgresql.

tags | advisory, vulnerability
systems | linux
SHA-256 | 99d17aaa01752a5dfdc9b3630e376f955e2d374c7b81ff89b254c13476bba128
Zero Day Initiative Advisory 06-035
Posted Oct 27, 2006
Authored by Tipping Point | Site zerodayinitiative.com

ZDI-06-035: Novell eDirectory NDS Server Host Header Buffer Overflow Vulnerability: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell eDirectory. Authentication is not required to exploit this vulnerability.

tags | advisory, remote, overflow, arbitrary
SHA-256 | eb5bfb0ae83feb926f3181599a8d113b5099355c3075f37ccc39f9e96f9dd7db
Gentoo Linux Security Advisory 200610-13
Posted Oct 27, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200610-13 - Luigi Auriemma reported that the XM loader of Cheese Tracker contains a buffer overflow vulnerability in the loader_XM::load_intrument_internal() function from loaders/loader_xm.cpp. Versions less than 0.9.9-r1 are affected.

tags | advisory, overflow
systems | linux, gentoo
SHA-256 | 6836d8e6883b2d5667426d301fac2690e17ef78baea18bdf775a5cb8506f00f2
Mandriva Linux Security Advisory 2006.187
Posted Oct 27, 2006
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory MDKSA-2006-187: An integer overflow was discovered in the way that Qt handled pixmap images. This flaw could be exploited by a remote attacker in a malicious website that, when viewed by an individual using an application that uses Qt (like Konqueror), would cause it to crash or possibly execute arbitrary code with the privileges of the user.

tags | advisory, remote, overflow, arbitrary
systems | linux, mandriva
SHA-256 | 88cbe33bbc5f6a69752cb29e2e256cae7857261c5c3921cca8f4db01499eef28
Continuity-2006.txt
Posted Oct 27, 2006
Site continuity.org.uk

Continuity is a free security convention running from 1st to the 3rd December 2006 in Manchester, United Kingdom, open to anyone with a interest in computer security, hacking, phone phreaking, telephony, cryptography, internet security/privacy, urban exploration, social engineering and related subjects.

tags | paper
SHA-256 | 798e584f0c13af1679e17bd401cb2c4d419d7f51886215acd04279d8385f287a
0xf_ftpxq.c
Posted Oct 27, 2006
Authored by Federico Fazzi

0xf_ftpxq.c - FTPXQ Denial of service exploit.

tags | exploit, denial of service
SHA-256 | 17cffd597c28ed6f74c92fc0b1f188134a9142a7841dde1b098fb31dddcd101f
Page 1 of 5
Back12345Next

File Archive:

February 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    11 Files
  • 2
    Feb 2nd
    9 Files
  • 3
    Feb 3rd
    0 Files
  • 4
    Feb 4th
    0 Files
  • 5
    Feb 5th
    0 Files
  • 6
    Feb 6th
    0 Files
  • 7
    Feb 7th
    0 Files
  • 8
    Feb 8th
    0 Files
  • 9
    Feb 9th
    0 Files
  • 10
    Feb 10th
    0 Files
  • 11
    Feb 11th
    0 Files
  • 12
    Feb 12th
    0 Files
  • 13
    Feb 13th
    0 Files
  • 14
    Feb 14th
    0 Files
  • 15
    Feb 15th
    0 Files
  • 16
    Feb 16th
    0 Files
  • 17
    Feb 17th
    0 Files
  • 18
    Feb 18th
    0 Files
  • 19
    Feb 19th
    0 Files
  • 20
    Feb 20th
    0 Files
  • 21
    Feb 21st
    0 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close