exploit the possibilities
Showing 1 - 25 of 84 RSS Feed

Files Date: 2007-04-17

propecia2.c
Posted Apr 17, 2007
Authored by John Martinelli from ISRD.com | Site redlevel.org

A hack of propecia.c to include class A domain scanning and banner grabbing.

tags | tool, scanner
systems | unix
MD5 | 3097ef1a5c7f4319fe9efcdabb1263e1
phpnuke-bypass-sql.txt
Posted Apr 17, 2007
Authored by Aleksandar aka sale83

PHP-Nuke versions 8.0.0.3.3b and below suffer from a flaw that allows the SQL injection protection to be bypassed thus allowing for attacks. Details provided.

tags | exploit, php, sql injection, bypass
MD5 | 6928b5bfa2f7257b5246640c3360611a
netsprint-exec.txt
Posted Apr 17, 2007
Authored by sapheal

Netsprint Toolbar version 1.1 suffers from a buffer overrun vulnerability.

tags | advisory, overflow
MD5 | 2ae740719c2b81e7db1a73aa004b36d6
iDEFENSE Security Advisory 2007-04-16.2
Posted Apr 17, 2007
Authored by iDefense Labs, McSlibin | Site idefense.com

iDefense Security Advisory 04.16.07 - Remote exploitation of a buffer overflow vulnerability in Akamai Technologies, Inc's Download Manager ActiveX Control could allow an attacker to execute arbitrary code within the security context of the targeted user. iDefense has confirmed the existence of this vulnerability within version 2.2.0.5 of Akamai Technologies Inc's DownloadManagerV2.ocx. All older versions are suspected to be vulnerable.

tags | advisory, remote, overflow, arbitrary, activex
advisories | CVE-2007-1891
MD5 | c84a7094094da11cbde394fb5d68e9d3
Mandriva Linux Security Advisory 2007.086
Posted Apr 17, 2007
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - A flaw was discovered in how CUPS handled SSL negotiation that could allow a remote attacker capable of connecting to the CUPS daemon to cause a DoS to other CUPS users.

tags | advisory, remote
systems | linux, mandriva
advisories | CVE-2007-0720
MD5 | eacc9aaf506e8f243a6cf84adeb1cbe7
Gentoo Linux Security Advisory 200704-12
Posted Apr 17, 2007
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200704-12 - John Heasman of NGSSoftware has discovered a stack-based buffer overflow in the StarCalc parser and an input validation error when processing metacharacters in a link. Also OpenOffice.Org includes code from libwpd making it vulnerable to heap-based overflows when converting WordPerfect document tables (GLSA 200704-07). Versions less than 2.1.0-r1 are affected.

tags | advisory, overflow
systems | linux, gentoo
advisories | CVE-2007-0002, CVE-2007-0238, CVE-2007-0239
MD5 | 808ac7bd7870bd34227ed9c74e8c24ec
Mandriva Linux Security Advisory 2007.085
Posted Apr 17, 2007
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - A memory leak in freeRADIUS 1.1.5 and earlier allows remote attackers to cause a denial of service (memory consumption) via a large number of EAP-TTLS tunnel connections using malformed Diameter format attributes, which causes the authentication request to be rejected but does not reclaim VALUE_PAIR data structures.

tags | advisory, remote, denial of service, memory leak
systems | linux, mandriva
advisories | CVE-2007-2028
MD5 | ca5b8b1d8286850c8478cdfa66b19dda
Mandriva Linux Security Advisory 2007.084
Posted Apr 17, 2007
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - The ipsec-tools package prior to version 0.6.7 allows remote attackers to cause a Denial of Service (tunnel crash) via crafted DELTE and NOTIFY messages.

tags | advisory, remote, denial of service
systems | linux, mandriva
advisories | CVE-2007-1841
MD5 | 50244c14b7e61065a25cf150c68bee6c
ATSA-2007-001.txt
Posted Apr 17, 2007
Authored by iDefense, FortiNet | Site akamai.com

Akamai Technologies Security Advisory 2007-0001 - Two security vulnerabilities have been discovered in the ActiveX version of Akamai Download Manager. For successful exploitation, both vulnerabilities require the user to visit a malicious URL, triggering a stack-based buffer overflow that allows the attacker to execute arbitrary code within the context of the victim.

tags | advisory, overflow, arbitrary, vulnerability, activex
advisories | CVE-2007-1891, CVE-2007-1892
MD5 | c35d99f51e62cd01b32e771ab6142984
wabbit-xss.txt
Posted Apr 17, 2007
Authored by the_Edit0r | Site xmors-security.com

Wabbit PHP Gallery version 0.9 suffers from a cross site scripting vulnerability.

tags | exploit, php, xss
MD5 | cebd42b369f67c7ac72a1e5d6cc6c66c
Gentoo Linux Security Advisory 200704-11
Posted Apr 17, 2007
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200704-11 - During an internal audit, Raphael Marichez of the Gentoo Linux Security Team found that Vixie Cron has weak permissions set on Gentoo, allowing for a local user to create hard links to system and users cron files, while a st_nlink check in database.c will generate a superfluous error. Versions less than 4.1-r10 are affected.

tags | advisory, local
systems | linux, gentoo
advisories | CVE-2007-1856
MD5 | a43e77a55d5756dddb7cd414526044d5
ivan-rfi.txt
Posted Apr 17, 2007
Authored by SekoMirza

Ivan Gallery Script version 0.1 remote file inclusion exploit.

tags | exploit, remote, code execution, file inclusion
MD5 | d3561bc6d5a17086c2e530fd547f8b93
iDEFENSE Security Advisory 2007-04-16.1
Posted Apr 17, 2007
Authored by iDefense Labs | Site idefense.com

iDefense Security Advisory 04.16.07 - Remote exploitation of a buffer overflow vulnerability in Clam AntiVirus' ClamAV allows attackers to execute arbitrary code with the privileges of the affected process. The vulnerability exists within the cab_unstore() function in libclamav, the library used by clamd to scan various file types. A 32-bit signed integer is taken from the packet and compared against the sizeof() the destination buffer. However, the sizeof() return value is improperly casted to a signed integer. By supplying a negative value, an attacker can pass cause the comparison to succeed. This eventually leads to an exploitable stack-based buffer overflow. iDefense has confirmed the existence of this vulnerability in ClamAV in versions 0.90rc3 through 0.90.1.

tags | advisory, remote, overflow, arbitrary
advisories | CVE-2007-1997
MD5 | c651a7e917f03cee3ad31c1a26299810
dns-poison.txt
Posted Apr 17, 2007
Authored by Makoto Shiotsuki

Whitepaper discussing Windows DNS cache poisoning by forwarder DNS spoofing.

tags | paper, spoof
systems | windows
MD5 | 6e95d4e60558e072e418b4036af71e0a
myblog098-exec.txt
Posted Apr 17, 2007
Authored by BlackHawk | Site itablackhawk.altervista.org

MyBlog versions 0.9.8 and below remote command execution exploit.

tags | exploit, remote
MD5 | d430553f8df212421565fc4248e432e9
action-rfi.txt
Posted Apr 17, 2007
Authored by SekoMirza

ActionPoll PhpOpenChat version 1.1.0 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
MD5 | c9e0a1d87538e129910cd419d0b71143
major_rls45.txt
Posted Apr 17, 2007
Authored by David "Aesthetico" Vieira-Kurz | Site majorsecurity.de

oe2edit CMS suffers from cross site scripting and cookie manipulation vulnerabilities.

tags | advisory, vulnerability, xss
MD5 | 15f09e8a2f7efe6e974bb9cc644005cb
msdns_zonename.rb.txt
Posted Apr 17, 2007
Authored by H D Moore | Site metasploit.com

This Metasploit module exploits a stack overflow in the RPC interface of the Microsoft DNS service. The vulnerability is triggered when a long zone name is supplied that contains escaped characters. This exploit will NOT work on Windows 2003 SP1 or SP2 if hardware DEP is enabled.

tags | exploit, overflow
systems | windows
advisories | CVE-2007-1748
MD5 | 5eaf4ad4892980ab9394b2204f8b0a6f
Secunia Security Advisory 24826
Posted Apr 17, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Mandriva has issued an update for ipsec-tools. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, mandriva
MD5 | e89889c8e42cc5607f91d26d925c1fdb
Secunia Security Advisory 24859
Posted Apr 17, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for inkscape. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
systems | linux, gentoo
MD5 | bf78fc87788efe1edebb4a4ee45ceadc
Secunia Security Advisory 24882
Posted Apr 17, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in MailBee WebMail Pro, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
MD5 | a834b6ca6b74d75644cd84a1cfe65740
Secunia Security Advisory 24890
Posted Apr 17, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Alkomandoz Hacker has reported a vulnerability in StoreFront for Gallery, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | 2fc48afa4662f732baea30092ad3b9e8
Secunia Security Advisory 24895
Posted Apr 17, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Mandriva has issued an update for cups. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, mandriva
MD5 | 194ade703371900b9c44c05da6b4f8e8
Secunia Security Advisory 24900
Posted Apr 17, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Akamai Download Manager ActiveX control, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability, activex
MD5 | efa4e1def7e41edc07e0a57a902bfa01
Secunia Security Advisory 24901
Posted Apr 17, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - rPath has issued an update for the kernel. This fixes some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service), disclose potentially sensitive information, gain escalated privileges, and by malicious people to cause a DoS.

tags | advisory, denial of service, kernel, local, vulnerability
MD5 | 6a1fad1d1f6d45400902a1868a08c7d8
Page 1 of 4
Back1234Next

File Archive:

September 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    14 Files
  • 2
    Sep 2nd
    19 Files
  • 3
    Sep 3rd
    9 Files
  • 4
    Sep 4th
    1 Files
  • 5
    Sep 5th
    2 Files
  • 6
    Sep 6th
    3 Files
  • 7
    Sep 7th
    12 Files
  • 8
    Sep 8th
    22 Files
  • 9
    Sep 9th
    17 Files
  • 10
    Sep 10th
    19 Files
  • 11
    Sep 11th
    3 Files
  • 12
    Sep 12th
    2 Files
  • 13
    Sep 13th
    15 Files
  • 14
    Sep 14th
    16 Files
  • 15
    Sep 15th
    15 Files
  • 16
    Sep 16th
    7 Files
  • 17
    Sep 17th
    13 Files
  • 18
    Sep 18th
    2 Files
  • 19
    Sep 19th
    2 Files
  • 20
    Sep 20th
    14 Files
  • 21
    Sep 21st
    20 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close