Exploit the possiblities
Showing 1 - 25 of 719 RSS Feed

Files Date: 2006-12-01 to 2006-12-31

begincrack.txt
Posted Dec 30, 2006

Beginning cracking of Window's software and software protection on x86 systems.

tags | paper, x86
MD5 | b7d0773a3a2c91bcc98c3bcd11500539
maviportal-xss.txt
Posted Dec 30, 2006
Authored by Starext

MaviPortal suffers from a cross site scripting flaw in credits.php.

tags | exploit, php, xss
MD5 | 2a48b3d8f70a8d9d7e58263fe9873255
ldu-sql.txt
Posted Dec 30, 2006
Authored by Starext

Land Down Under versions 8.x and below suffer from a SQL injection vulnerability in journal.php.

tags | exploit, php, sql injection
MD5 | e10fbbe3af6d09cff1e42e79286fd66b
Secunia Security Advisory 23529
Posted Dec 30, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue with an unknown impact has been reported in Linux Kernel.

tags | advisory, kernel
systems | linux
MD5 | 74ebfb721473884a2cba92d435a0b779
oracle10g-xss.txt
Posted Dec 30, 2006
Authored by Pham Duc Hai

Oracle Portal 10g suffers from a cross site scripting flaw.

tags | exploit, xss
MD5 | 2e6c23c79863514c850e24aa0d7961e0
mobilelib-xss.txt
Posted Dec 30, 2006
Authored by viP HaCKEr

Mobilelib Gold version 2 suffers from cross site scripting flaws.

tags | exploit, xss
MD5 | b47f4024d02851ee389a028674f1d039
plash_1.17.orig.tar.gz
Posted Dec 29, 2006
Authored by Mark Seaborn | Site plash.beasts.org

Plash is a sandbox for running GNU/Linux programs with minimum privileges. It is suitable for running both command line and GUI programs. It can dynamically grant Gtk-based GUI applications access rights to individual files that you want to open or edit. This happens transparently through the Open/Save file chooser dialog box, by replacing GtkFileChooserDialog. Plash virtualizes the file namespace and provides per-process/per-sandbox namespaces. It can grant processes read-only or read-write access to specific files and directories, mapped at any point in the filesystem namespace. It does not require modifications to the Linux kernel.

Changes: Various updates and fixes.
tags | tool, kernel
systems | linux, unix
MD5 | abad752e8af24a8c71042f5823680f3d
durian-302-exec.txt
Posted Dec 29, 2006
Authored by rgod | Site retrogod.altervista.org

Durian Web Application Server version 3.02 freeware for Win32 buffer overflow exploit.

tags | exploit, web, overflow
systems | windows
MD5 | 5a7c86eaf6e251faf74f46874fecad5b
durian-302-dos.txt
Posted Dec 29, 2006
Authored by rgod | Site retrogod.altervista.org

Durian Web Application Server version 3.02 freeware for Win32 denial of service exploit.

tags | exploit, web, denial of service
systems | windows
MD5 | 32b8b9c70e200ffead7e3caefab879d5
Debian Linux Security Advisory 1244-1
Posted Dec 29, 2006
Authored by Debian | Site debian.org

Debian Security Advisory 1244-1 - It was discovered that the Xine multimedia library performs insufficient sanitizing of Real streams, which might lead to the execution of arbitrary code through a buffer overflow.

tags | advisory, overflow, arbitrary
systems | linux, debian
advisories | CVE-2006-6172
MD5 | 3fedb8c23a2485d0c89bc919c7b67173
openser110-sms.txt
Posted Dec 29, 2006
Authored by sapheal

A memory corruption condition has been discovered in the OpenSER SMS handling module. Versions 1.1.0 and below are affected.

tags | advisory
MD5 | 8e2a1f660b9c7df50a7eb7f27c5351d9
openser110-osp.txt
Posted Dec 29, 2006
Authored by sapheal

A buffer overflow vulnerability has been discovered in the OpenSER OSP module. Versions 1.1.0 and below are affected.

tags | advisory, overflow
MD5 | dcd43ab83eac464b5ea8a682cc328df4
limboCMS-rfi.txt
Posted Dec 29, 2006
Authored by XORON

The Limbo CMS event module suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
MD5 | 7bcbd878335f7313831cb3d75e5e1ec8
Secunia Security Advisory 23465
Posted Dec 29, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Takagi Hiroshi has reported a vulnerability in tDiary, which can be exploited by malicious people to compromise vulnerable systems.

tags | advisory
MD5 | 28caba4761a3139cde589af7f9c5a6ca
Secunia Security Advisory 23491
Posted Dec 29, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ruben Santamarta has discovered a vulnerability in Microsoft Windows, which can be exploited by malicious, local users to gain knowledge of sensitive information.

tags | advisory, local
systems | windows
MD5 | 2917570b65613ab89fe6e94eb7f7ea90
Secunia Security Advisory 23500
Posted Dec 29, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - hack2prison has reported a vulnerability in AlstraSoft Web Host Directory, which can be exploited by malicious people to disclose certain sensitive information.

tags | advisory, web
MD5 | 9c22e54e4adf59d33890e5c3773ac109
Secunia Security Advisory 23504
Posted Dec 29, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for squirrelmail. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting and script insertion attacks.

tags | advisory, vulnerability, xss
systems | linux, debian
MD5 | 8555277683f57a89662508a685c249d7
Secunia Security Advisory 23528
Posted Dec 29, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - rgod has discovered three vulnerabilities in Cacti, which can be exploited by malicious people to bypass certain security restrictions, manipulate data and compromise vulnerable systems.

tags | advisory, vulnerability
MD5 | 00023c98ccb9e1ecdb0d5a738b648010
Secunia Security Advisory 23545
Posted Dec 29, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for MozillaFirefox and MozillaThunderbird. This fixes some vulnerabilities, which can be exploited by malicious people to gain knowledge of certain information, conduct cross-site scripting attacks and potentially compromise a user's system.

tags | advisory, vulnerability, xss
systems | linux, suse
MD5 | 164a1fd742b44af941bdf4684cca60da
Secunia Security Advisory 23563
Posted Dec 29, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Joomla!, where some have unknown impacts and one can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
MD5 | 9006c1272f816d7de3bc2450c5a3ed12
Secunia Security Advisory 23567
Posted Dec 29, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for xine-lib. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | linux, debian
MD5 | 07ed22c56e49b503cb31c8c0fe1eb07f
Secunia Security Advisory 23569
Posted Dec 29, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - shinnai has discovered a vulnerability in AIDeX, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | ec1fd7b4529e95c17d23c7fa4cf3d244
Secunia Security Advisory 23571
Posted Dec 29, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - ajann has reported two vulnerabilities in While You Were Out and In / Out Board, which can be exploited by malicious people to bypass certain security restrictions and manipulate data.

tags | advisory, vulnerability
MD5 | d2e91bfc6522b82afdf1cd46ac99ffc3
Secunia Security Advisory 23573
Posted Dec 29, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - ajann has reported a vulnerability in ASPTicker, which can be exploited by malicious people to conduct SQL Injection attacks.

tags | advisory, sql injection
MD5 | 1db9580c8942ae4cc1d7557e62cac552
Secunia Security Advisory 23574
Posted Dec 29, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Kacper has discovered a vulnerability in WebText CMS, which can be exploited by malicious users to compromise a vulnerable system.

tags | advisory
MD5 | 171532ebb30f99c408fb0fbef033fa0a
Page 1 of 29
Back12345Next

File Archive:

December 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    15 Files
  • 2
    Dec 2nd
    2 Files
  • 3
    Dec 3rd
    1 Files
  • 4
    Dec 4th
    15 Files
  • 5
    Dec 5th
    15 Files
  • 6
    Dec 6th
    18 Files
  • 7
    Dec 7th
    17 Files
  • 8
    Dec 8th
    15 Files
  • 9
    Dec 9th
    13 Files
  • 10
    Dec 10th
    4 Files
  • 11
    Dec 11th
    41 Files
  • 12
    Dec 12th
    44 Files
  • 13
    Dec 13th
    25 Files
  • 14
    Dec 14th
    10 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close