exploit the possibilities
Showing 1 - 25 of 88 RSS Feed

Files Date: 2007-02-13

Secunia Security Advisory 24143
Posted Feb 13, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for gd. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, fedora
MD5 | a4f1818c7a3d6ebd304c427df133eddb
Secunia Security Advisory 24120
Posted Feb 13, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - kcope has reported a vulnerability in Solaris, which can be exploited by malicious people to bypass certain security restrictions and gain access to a vulnerable system.

tags | advisory
systems | solaris
MD5 | 69002d5af8402b15fa8193e41a2397f4
year3000.txt
Posted Feb 13, 2007
Authored by 3APA3A | Site SecurityVulns.com

Microsoft Visual C++ version 8.0 suffers from a denial of service condition.

tags | advisory, denial of service
advisories | CVE-2007-0842
MD5 | e7cd012fa91b331495001e288706d9b7
AmbiguityInAjaxLockdownFramework.pdf
Posted Feb 13, 2007
Authored by Aditya K Sood | Site zeroknock.metaeye.org

Whitepaper entitled Ambiguity In Ajax Lockdown Framework - Unveiling Some Contradictory Facts.

tags | paper, web
MD5 | c72d1fdf0586fb064c35e73407382130
xssSplinder.txt
Posted Feb 13, 2007
Authored by phoby

www.splinder.com suffers from a cross site scripting flaw.

tags | exploit, xss
MD5 | 9e3df0e96769862da94658ff66dfad86
raditech-multiple.txt
Posted Feb 13, 2007
Authored by Pedro Alexander Garcia

Raditech's Portal Search suffers from URL redirection and cross site scripting flaws.

tags | exploit, xss
MD5 | e45af5ed58a3a10a2386a3abbba3e0f3
md5fuck.pl.txt
Posted Feb 13, 2007
Authored by Iman Karim | Site home.inf.fh-rhein-sieg.de

MD5 hash brute forcing utility.

MD5 | f562d64300a6d2baa9f0692e3d8f9d8f
mini-traverse.txt
Posted Feb 13, 2007
Authored by Daniel Nystrom, Fredrik Wessberg

Miniwebsvr version 0.0.6 appears to be susceptible to a one level directory traversal flaw.

tags | exploit, file inclusion
MD5 | 782d565e5e78814c9a75aeeaa184aaa2
jportal231-csrf.txt
Posted Feb 13, 2007
Authored by dzitu

JPortal version 2.3.1 is susceptible to a CSRF vulnerability.

tags | advisory, csrf
MD5 | 2d150cc7829330face96c8ded37ad550
firefox-file.txt
Posted Feb 13, 2007
Authored by Michal Zalewski | Site lcamtuf.coredump.cx

There is an interesting logic flaw in Mozilla Firefox web browser. The vulnerability allows the attacker to silently redirect focus of selected key press events to an otherwise protected file upload form field.

tags | advisory, web, file upload
MD5 | 42000d5f88fc6a835d6a4864a994494b
draft-larsen.tgz
Posted Feb 13, 2007
Authored by Fernando Gont, M. Larsen

Recently, awareness has been raised about a number of "blind" attacks that can be performed against the Transmission Control Protocol (TCP) and similar protocols. The consequences of these attacks range from throughput-reduction to broken connections or data corruption. These attacks rely on the attacker's ability to guess or know the four- tuple (Source Address, Destination Address, Source port, Destination Port) that identifies the transport protocol instance to be attacked. This document describes a simple and efficient method for random selection of the client port number, such that the possibility of an attacker guessing the exact value is reduced. While this is not a replacement for cryptographic methods, the described port number randomization algorithms provide improved security/obfuscation with very little effort and without any key management overhead. Both text and pdf formats of this paper are included.

tags | paper, tcp, protocol
MD5 | ea07aacce03e720b7693eb3d90822d48
prb-advisory-02-2007.txt
Posted Feb 13, 2007
Authored by Sebastian Wolfgarten | Site devtarget.org

PHP RRD Browser versions below 0.2.1 suffer from an arbitrary file disclosure vulnerability.

tags | exploit, arbitrary, php
MD5 | 2a5c47f78fecb79b94660ad6d8bb2310
OpenPKG Security Advisory 2007.9
Posted Feb 13, 2007
Authored by OpenPKG Foundation | Site openpkg.com

OpenPKG Security Advisory - According to a vendor security advisory, a vulnerability exists in the SessionPlugin extension of the Wiki engine TWiki, version up to and including 4.1.0. The vulnerability allows local users to cause TWiki to execute arbitrary Perl code with the privileges of the web server process by creating CGI session files on the local filesystem.

tags | advisory, web, arbitrary, local, cgi, perl
advisories | CVE-2007-0669
MD5 | bd35fb2c1d0a51753c89312576a4f3c5
phpmyvisites-xss.txt
Posted Feb 13, 2007
Authored by Nicob

phpMyVisites versions prior to 2.2 stable suffer from cross site scripting, HTTP response splitting, and local file inclusion flaws.

tags | exploit, web, local, xss, file inclusion
MD5 | 6f012fe5affef383f86b4e875c0e456a
qdig-xss.txt
Posted Feb 13, 2007
Authored by Andrea Purificato | Site rawlab.mindcreations.com

Qdig version 1.2.9.3 suffers from cross site scripting flaws.

tags | exploit, xss
MD5 | 1ad0a3f1175bcbce2eaafdeab783ed6e
jboss-xss.txt
Posted Feb 13, 2007
Authored by BLacK ZeRo

JBoss Portal appears susceptible to a cross site scripting flaw.

tags | exploit, xss
MD5 | c166dde21aa733de015fb4ba776e2f77
Ubuntu Security Notice 421-1
Posted Feb 13, 2007
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 421-1 - A flaw was discovered in MoinMoin's page name sanitizer which could lead to a cross-site scripting attack. By tricking a user into viewing a crafted MoinMoin page, an attacker could execute arbitrary JavaScript as the current MoinMoin user, possibly exposing the user's authentication information for the domain where MoinMoin was hosted.

tags | advisory, arbitrary, javascript, xss
systems | linux, ubuntu
advisories | CVE-2007-0857
MD5 | 44717443417d82dc96c24f9efbfc671c
utorrent16-heap.txt
Posted Feb 13, 2007
Authored by defsec | Site defacedsecurity.com

uTorrent version 1.6 remote heap overflow proof of concept exploit.

tags | exploit, remote, overflow, proof of concept
MD5 | 2da282d7e2221051aa39c5b56bf1abb3
solaris-ohday.txt
Posted Feb 13, 2007
Authored by Kingcope

SunOS 5.10/5.11 in.telnetd remote root exploit. This has to be the easiest remote root ever.. wait.. there was that other SunOS telnetd remote root.

tags | exploit, remote, root
systems | solaris
MD5 | caf667467ec98d3948bf347998699e70
ip3netaccess.txt
Posted Feb 13, 2007
Authored by Sebastian Wolfgarten

IP3 NetAccess versions below 4.1.9.6 suffer from a classic directory traversal flaw allowing for arbitrary file disclosure.

tags | exploit, arbitrary
MD5 | a7b9e3a200228856ffd3c4290438ded8
philboard-sql.txt
Posted Feb 13, 2007
Authored by XORON

Philboard versions 1.14 and below suffer from a SQL injection vulnerability in philboard_forum.asp.

tags | exploit, sql injection, asp
MD5 | c8ba039259be7d669ece41140711369b
Echo Security Advisory 2007.64
Posted Feb 13, 2007
Authored by y3dips, Echo Security | Site echo.or.id

Open-CMS Site Protection Plugin suffers from a remote file inclusion flaw.

tags | exploit, remote, file inclusion
MD5 | ce492393cbbc9fcfd2e17deba0c99f6a
comserv-xss.txt
Posted Feb 13, 2007
Authored by BLacK ZeRo

CommunityServer Commercial Edition suffers from a cross site scripting flaw.

tags | exploit, xss
MD5 | 0a8b10e857fd3e4b85243417164b312c
Mandriva Linux Security Advisory 2007.041
Posted Feb 13, 2007
Authored by Mandriva | Site mandriva.com

Mandriva Security Advisory - Vladimir Nadvornik discovered a buffer overflow in GraphicsMagick and ImageMagick allows user-assisted attackers to cause a denial of service and possibly execute execute arbitrary code via a PALM image that is not properly handled by the ReadPALMImage function in coders/palm.c.

tags | advisory, denial of service, overflow, arbitrary
systems | linux, mandriva
advisories | CVE-2007-0770
MD5 | 628ffe56a059bca2328160725c889212
FreeBSD-SA-07-02.bind.txt
Posted Feb 13, 2007
Site security.freebsd.org

FreeBSD Security Advisory - A remote attacker sending a type * (ANY) query to an authoritative DNS server for a DNSSEC signed zone can cause the named(8) daemon to exit, resulting in a Denial of Service.

tags | advisory, remote, denial of service
systems | freebsd
advisories | CVE-2007-0493, CVE-2007-0494
MD5 | 7dd0ce5e15ea2a438e64c71a1c893c96
Page 1 of 4
Back1234Next

File Archive:

April 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    21 Files
  • 2
    Apr 2nd
    35 Files
  • 3
    Apr 3rd
    21 Files
  • 4
    Apr 4th
    16 Files
  • 5
    Apr 5th
    15 Files
  • 6
    Apr 6th
    1 Files
  • 7
    Apr 7th
    2 Files
  • 8
    Apr 8th
    23 Files
  • 9
    Apr 9th
    19 Files
  • 10
    Apr 10th
    15 Files
  • 11
    Apr 11th
    14 Files
  • 12
    Apr 12th
    11 Files
  • 13
    Apr 13th
    2 Files
  • 14
    Apr 14th
    5 Files
  • 15
    Apr 15th
    14 Files
  • 16
    Apr 16th
    19 Files
  • 17
    Apr 17th
    19 Files
  • 18
    Apr 18th
    8 Files
  • 19
    Apr 19th
    4 Files
  • 20
    Apr 20th
    5 Files
  • 21
    Apr 21st
    1 Files
  • 22
    Apr 22nd
    10 Files
  • 23
    Apr 23rd
    22 Files
  • 24
    Apr 24th
    11 Files
  • 25
    Apr 25th
    10 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close