exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 104 RSS Feed

Files Date: 2007-01-13

mint-sql.txt
Posted Jan 13, 2007
Authored by chernobile | Site cyber-sabotage.org

Mint Haber Sistemi version 2.7 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 59487127d95a5373d137684b91c611a5664a83a4d927fb006a74f6618b05bfb1
raise.c
Posted Jan 13, 2007
Authored by erasmus

Microsoft Vista NTRaiseHardError privilege escalation exploit.

tags | exploit
SHA-256 | d6bf5b3179cf3fc170a222405d417273d5ed6e2ace592811b1097e73a401392c
berlios.meta.txt
Posted Jan 13, 2007
Authored by Enseirb

This Metasploit module exploits a format string vulnerability in the Berlios GPSD server. This vulnerability was discovered by Kevin Finisterre.

tags | exploit
SHA-256 | 402a9fad7ed01ebd5d37f83abeb35909f2e896f1fba750a9c3ef9832f3426f70
filecopa.meta.txt
Posted Jan 13, 2007
Authored by acaro

This Metasploit module exploits the buffer overflow found in the LIST command in fileCOPA FTP server pre 18 Jul 2006 version discovered by www.appsec.ch.

tags | exploit, overflow
SHA-256 | f25a8a610606ce2536b71ee4fa08f1f50550ae6904323d8724939d02e5fb2960
navicopa.meta.txt
Posted Jan 13, 2007
Authored by acaro

This Metasploit module exploits a classical stack overflow in Navicopa Web Server 2.01 version. Credit to h07 for the discovery of this vulnerability. This is a port to the original h07 c code.

tags | exploit, web, overflow
SHA-256 | b7044add722392d88e706c99af870a67fcd52afc19b6a4d1270d7a0308aaaaed
arcserve.py.txt
Posted Jan 13, 2007
Authored by Winny Thomas

CA BrightStor ARCserver tapeeng.exe remote buffer overflow exploit for Windows 2000 that binds a shell to port 4443.

tags | exploit, remote, overflow, shell
systems | windows
SHA-256 | 55a4cbc6b2c99480c96018ead1f53c77828c32fe522cf290e8d6af97e97deb49
quicktime.py.txt
Posted Jan 13, 2007
Authored by Winny Thomas

Apple Quicktime buffer overflow exploit for Windows 2000 that makes use of the rtsp URL Handler vulnerability. The qtl file created binds a shell to port 4444.

tags | exploit, overflow, shell
systems | windows, apple
SHA-256 | 8668be442ac4578cbed1084e63009713cd92e994d70f4d374f3b519c655904a9
Mandriva Linux Security Advisory 2007.009
Posted Jan 13, 2007
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - KsIRC 1.3.12 allows remote attackers to cause a denial of service (crash) via a long PRIVMSG string when connecting to an Internet Relay Chat (IRC) server, which causes an assertion failure and results in a NULL pointer dereference.

tags | advisory, remote, denial of service
systems | linux, mandriva
advisories | CVE-2006-6811
SHA-256 | 972005eb98cf4aeb7bad16b564a697ebd65c7f31c55ac95c64d6c87097857c0f
Mandriva Linux Security Advisory 2007.008
Posted Jan 13, 2007
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - A vulnerability in the RPC library in Kerberos 1.4.x and 1.5.x as used in the kadmind administration daemon calls an uninitialized function pointer in freed memory, which could allow a remote attacker to cause a Denial of Service and possibly execute arbitrary code via unspecified vectors.

tags | advisory, remote, denial of service, arbitrary
systems | linux, mandriva
advisories | CVE-2006-6143
SHA-256 | 699eadf06107b013881e40f59f8a3d015127c5a77af5ca495b05c155650a55a3
wmfdos.txt
Posted Jan 13, 2007
Authored by cyanid-E

WMF proof of concept denial of service exploit.

tags | exploit, denial of service, proof of concept
SHA-256 | 01eb36fd3efa0db479fddf89490ffde8d0ac689ea814163c3555851aedbe573b
Mandriva Linux Security Advisory 2007.007
Posted Jan 13, 2007
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - A vulnerability in the NVIDIA Xorg driver was discovered by Derek Abdine who found that it did not correctly verify the size of buffers used to render text glyphs, resulting in a crash of the server when displaying very long strings of text. If a user was tricked into viewing a specially crafted series of glyphs, this flaw could be exploited to run arbitrary code with root privileges.

tags | advisory, arbitrary, root
systems | linux, mandriva
advisories | CVE-2006-5379
SHA-256 | eb28a9746eaf813126f1c03596064c89e878831d32e80fde7e8967986bb68d0c
DMA-2007-0109a.txt
Posted Jan 13, 2007
Authored by Kevin Finisterre | Site digitalmunition.com

Finder is affected by a memory corruption vulnerability, which leads to an exploitable denial of service condition and potential arbitrary code execution, that can be triggered by DMG images.

tags | advisory, denial of service, arbitrary, code execution
SHA-256 | 238bec1ecee79fefb9639412113e7fdbb037de09b513fba37017e218ba87e114
DMA-2007-0107a.txt
Posted Jan 13, 2007
Authored by Kevin Finisterre | Site digitalmunition.com

OmbiWeb version 5.51 suffers from a format string vulnerability.

tags | advisory
SHA-256 | a78831973f24a948d49ed59403543dddce63a381877be9ae52dfb7e565dfb568
jshop13-rfi.txt
Posted Jan 13, 2007
Authored by irvian

Jshop Server version 1.3 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | ad1157db1933f6e6bb79e89ee230ae5f3e018e5c213358054f0532c62ee90e24
eiq-dos.txt
Posted Jan 13, 2007
Authored by Ethan Hunt

Remote exploitation of a null pointer dereference exception allows for remote attackers to crash the EIQ Network Security Analyzer DataCollector service. Proof of concept code included.

tags | exploit, remote, denial of service, proof of concept
SHA-256 | c0b59ba8423b52c53bb5d71af4b0a0a7949088f8c0b4de25895ca990ce8a071d
Gentoo Linux Security Advisory 200701-4
Posted Jan 13, 2007
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200701-04 - An anonymous researcher found evidence of memory corruption in the way SeaMonkey handles certain types of SVG comment DOM nodes. Georgi Guninski and David Bienvenu discovered buffer overflows in the processing of long Content-Type: and long non-ASCII MIME email headers. Additionally, Frederik Reiss discovered a heap-based buffer overflow in the conversion of a CSS cursor. Several other issues with memory corruption were also fixed. SeaMonkey also contains less severe vulnerabilities involving JavaScript and Java. Versions less than 1.0.7 are affected.

tags | advisory, overflow, javascript, vulnerability
systems | linux, gentoo
SHA-256 | 082334a0641de1d8e3cc244adadd26fbea6629bbd1f039e1db1e73d5b6d68e27
Mandriva Linux Security Advisory 2007.006
Posted Jan 13, 2007
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - Several integer overflows were discovered in the OpenOffice.org WMF file processor. An attacker could create a carefully crafted WMF file that would cause OpenOffice.org to execute arbitrary code when opened.

tags | advisory, overflow, arbitrary
systems | linux, mandriva
advisories | CVE-2006-5870
SHA-256 | 54359cc62b41d21d5b71d1c55ece91127f3286ca5b2dcb06734bad15295ced42
Cisco Security Advisory 20070110-dlsw
Posted Jan 13, 2007
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - A vulnerability exists in the Data-link Switching (DLSw) feature in Cisco IOS where an invalid value in a DLSw message could result in a reload of the DLSw device. Successful exploitation of this vulnerability requires that an attacker be able to establish a DLSw connection to the device.

tags | advisory
systems | cisco
SHA-256 | 342ad9d3d6170bd8a57aad58dd19f3780725ed7124f24f35074d1ef705132a67
Cisco Security Advisory 20070110-jtapi
Posted Jan 13, 2007
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - Cisco Unified Contact Center Enterprise, Cisco Unified Contact Center Hosted, Cisco IP Contact Center Enterprise, and Cisco IP Contact Center Hosted editions are affected by a vulnerability that may result in the restart of JTapi Gateway process. Until this process restarts, no new connections can be processed. Existing connections will continue to work.

tags | advisory
systems | cisco
SHA-256 | a1d2288259123655afc91c0ee0f9ef156b1fd0a36d56e1deab154b7af1c068a2
OpenPKG Security Advisory 2007.6
Posted Jan 13, 2007
Authored by OpenPKG Foundation | Site openpkg.com

OpenPKG Security Advisory - According to vendor security advisories, two security issues exist in the Kerberos network authentication system implementation MIT Kerberos. First, the RPC library could call an uninitialized function pointer, which created a security vulnerability for kadmind(8). Second, the GSS-API "mechglue" layer could fail to initialize some output pointers, causing callers to attempt to free uninitialized pointers. This caused another security vulnerability in kadmind(8).

tags | advisory
advisories | CVE-2006-6143, CVE-2006-6144
SHA-256 | 18eb84638a0aa1af34b0b1cdc4873ec6ac8264aa88bdd3cd284bf7eb213a80c4
adobe-acrobat-adv.txt
Posted Jan 13, 2007
Authored by Piotr Bania | Site piotrbania.com

Adobe Reader versions 7.0.8 and below suffer from a remote heap memory corruption vulnerability.

tags | advisory, remote
advisories | CVE-2006-5857
SHA-256 | 7fefcb2fb637ae16fe9ea6a212555de6f4a6f5f1f3c7d0e4153b45c993094fcb
iDEFENSE Security Advisory 2007-01-09.7
Posted Jan 13, 2007
Authored by iDefense Labs, Inge Henriksen | Site idefense.com

iDefense Security Advisory - Remote exploitation of an input validation vulnerability in Adobe Systems Inc.'s Macromedia ColdFusion MX 7 may allow an attacker to view file contents on the server. The vulnerability specifically exists in that URL encoded filenames will be decoded by the IIS process and then again by the ColdFusion process. By supplying a URL containing a double encoded null byte and an extension handled by ColdFusion, such as '.cfm', it is possible to view the contents of any file which is not interpreted by ColdFusion. iDefense has confirmed this vulnerability exists in Adobe Macromedia ColdFusion MX 7.0.2, with all available fixes, running on Microsoft IIS vulnerable.

tags | advisory, remote
advisories | CVE-2006-5858
SHA-256 | 4eb93328aca8b7d23af5ba4e80ae002d8aabb5f92bb543f0ae7df03430243dd3
cscart133-rfi.txt
Posted Jan 13, 2007
Authored by irvian

CS-Cart version 1.3.3 suffers from a remote file inclusion vulnerability in install.php.

tags | exploit, remote, php, code execution, file inclusion
SHA-256 | 9047d43072e61744a358148010164b35d657c38c31561230ae63be09516c61a6
sazcart-rfi.txt
Posted Jan 13, 2007
Authored by IbnuSina

sazcart version 1.5 suffers from a remote file inclusion vulnerability in cart.php.

tags | exploit, remote, php, code execution, file inclusion
SHA-256 | 9da684b1ee8cd2f7546e9cac540694704e884836bac8d47806509bca8736c88f
Technical Cyber Security Alert 2007-9B
Posted Jan 13, 2007
Authored by US-CERT | Site us-cert.gov

Technical Cyber Security Alert - The MIT Kerberos administration daemon contains two vulnerabilities that may allow a remote, unauthenticated attacker to execute arbitrary code.

tags | advisory, remote, arbitrary, vulnerability
SHA-256 | 30f9aeab9d8c4b630599687ec2112c6087b51807c82237c59322bc676f0ec774
Page 1 of 5
Back12345Next

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    25 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close