exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 56 RSS Feed

Files Date: 2007-07-07

phptraffica143-bypass.txt
Posted Jul 7, 2007
Authored by CorryL

phpTrafficA versions 1.4.3 and below suffer from an administrative bypass vulnerability via cookie manipulation.

tags | exploit, bypass
SHA-256 | d83f507525ff57f2c8d002bf6a8aaf48f7647088f2218c1ada710cf6111f6c4c
leventveysi-sql.txt
Posted Jul 7, 2007
Authored by GeFORC3

Levent Veysi Portal version 1.0 suffers from a SQL injection vulnerability.

tags | exploit, sql injection
SHA-256 | ead62478072412c5b3fde04a63926e16f1296361a9e156fc47c6108223253c9a
Gentoo Linux Security Advisory 200707-5
Posted Jul 7, 2007
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200707-05 - The pam_login.cgi file does not properly sanitize user input before sending it back as output to the user. Versions less than 1.350 are affected.

tags | advisory, cgi
systems | linux, gentoo
advisories | CVE-2007-3156
SHA-256 | 3688c006f0c957da63cde4a75c077010127132236dd5b7f19475488ae22b772b
Debian Linux Security Advisory 1329-1
Posted Jul 7, 2007
Authored by Debian | Site debian.org

Debian Security Advisory 1329-1 - Steve Kemp from the Debian Security Audit project discovered that gfax, a GHOME frontend for fax programs, uses temporary files in an unsafe manner which may be exploited to execute arbitrary commands with the privileges of the root user.

tags | advisory, arbitrary, root
systems | linux, debian
advisories | CVE-2007-2839
SHA-256 | 384f0ae4375d9b997e90777838071eb64d7a500b881c44d4f42b8eb21d118a7d
NGS-sapdb-stack.txt
Posted Jul 7, 2007
Authored by Mark Litchfield | Site ngssoftware.com

The SAP DB suffers from a web server stack overflow.

tags | advisory, web, overflow
SHA-256 | 0749c32ef0d9c060f3d5e24c3f8a13e4ffa2c55ae533dcc7bbbf4b19e62ae074
NGS-icm-dos.txt
Posted Jul 7, 2007
Authored by Mark Litchfield | Site ngssoftware.com

The SAP Internet Communication Manager suffers from a denial of service vulnerability.

tags | advisory, denial of service
SHA-256 | 3854d1251268dac04e302b6d8b502a6a84ac55220bf172bc4ddff70550560b3b
NGS-sapmes-heap.txt
Posted Jul 7, 2007
Authored by Mark Litchfield | Site ngssoftware.com

The SAP Message Server suffers from a heap overflow vulnerability.

tags | exploit, overflow
SHA-256 | f0067ae9b255a470a410cce57416f08c6a0878c3437509ae1415b1141910ec3c
NGS-sapigs-xssheap.txt
Posted Jul 7, 2007
Authored by Mark Litchfield | Site ngssoftware.com

The SAP Internet Graphics Server suffers from a cross site scripting vulnerability and a heap overflow vulnerability.

tags | exploit, overflow, xss
SHA-256 | 765df3e3026044a65328944f7a4494ae170aee42c1789d8a3707eb8de4989b7f
Netragard Security Advisory 2007-06-28
Posted Jul 7, 2007
Authored by Adriel T. Desautels, Netragard | Site netragard.com

Netragard, L.L.C Advisory - Maia Mailguard versions 1.0.2 and below suffers from file read and directory traversal vulnerabilities that allow for remote code execution. Details provided.

tags | exploit, remote, vulnerability, code execution
SHA-256 | d36bb22c015e1a08a2926bcf374d2972835a70bfa94c4a09681029459a05bf6f
wppass-redirect.txt
Posted Jul 7, 2007
Authored by Nick Coblentz | Site securityps.com

The wp-pass.php script in WordPress version 2.2.1 suffers from a redirection vulnerability.

tags | exploit, php
SHA-256 | 34164951dd23e1069f68094fadeec29d745e2538bc48b15d93bb496e84a202d3
NGS-enjoysap-stack.txt
Posted Jul 7, 2007
Authored by Mark Litchfield | Site ngssoftware.com

EnjoySAP, the SAP GUI for Windows, suffers from a stack overflow vulnerability.

tags | exploit, overflow
systems | windows
SHA-256 | 64f5aa6fc4f12c13f5c5d24b6cdf2e92f8451f609f253bb3d31c002dfc2f0b5a
NGS-enjoysap-heap.txt
Posted Jul 7, 2007
Authored by Mark Litchfield | Site ngssoftware.com

EnjoySAP, the SAP GUI for Windows, suffers from a heap overflow vulnerability.

tags | exploit, overflow
systems | windows
SHA-256 | 142ff655dae0e4a77bdd173861a8fb4488b208319a8efec9fcfa5526c6ac2e33
hpdig-savetofile.txt
Posted Jul 7, 2007
Authored by shinnai | Site shinnai.altervista.org

HP Digital Imaging SaveToFile() exploit that makes use of hpqvwocx.dll version 2.1.0.556.

tags | exploit
SHA-256 | 519a153cd814e8ce4e771489fdb8a9f24917a8c1a442d42f2e6167e6f4eb4083
virc-oday.txt
Posted Jul 7, 2007
Authored by Krystian Kloskowski

ViRC version 2.0 JOIN response remote SEH overwrite exploit. Tested on Visual IRC 2.0 / 2k SP4 Polish. Executes calc.exe.

tags | exploit, remote
SHA-256 | c6782288f12a3ccf5a191e0a8e8953d94108243ace96aad60878b3fe1aadaddc
limesurvey-rfi.txt
Posted Jul 7, 2007
Authored by Pr0T3cT10n | Site kamikaz-team.com

LimeSurvey version 1.49RC2 suffers from multiple remote file inclusion vulnerabilities.

tags | exploit, remote, vulnerability, code execution, file inclusion
SHA-256 | 51d842cd8da86eacce25f7828320067a54e955d51a7b6262bf52b54f641b7b26
emeeting-sql.txt
Posted Jul 7, 2007
Authored by t0pp8uzz, xprog

eMeeting Online Dating Software version 5.2 suffers from multiple SQL injection vulnerabilities.

tags | exploit, vulnerability, sql injection
SHA-256 | 3ff19a997cc03a0f32c44c8e576b8206d19e244e3310555b5017731ab2035347
phpvid-sql.txt
Posted Jul 7, 2007
Authored by t0pp8uzz, xprog

phpVID version 0.9.9 suffers from a SQL injection vulnerability in categories_type.php.

tags | exploit, php, sql injection
SHA-256 | 8c718c95f22ff9a4963a19a87445935d13b2ba36e74bdfeecd39d528de5c7f56
Secunia Security Advisory 25967
Posted Jul 7, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for gfax. This fixes a security issue, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | linux, debian
SHA-256 | 4ef7e380196956412ba865954027996cef20ca9150711a171af49f5a91d83ea1
Secunia Security Advisory 25951
Posted Jul 7, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Adriel T. Desautels has reported vulnerabilities in Maia Mailguard, which can be exploited by malicious people to disclose sensitive information.

tags | advisory, vulnerability
SHA-256 | 89e3158234537b2f3b2586d87cb0943043f50ca33daeb7936617d34846cb6136
Secunia Security Advisory 25958
Posted Jul 7, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for evolution and evolution-data-server. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | linux, suse
SHA-256 | 3ffc596be3f96722134382c472cc104a882c8881084a353ab504d8dbfc1a07db
zencart-fixation.txt
Posted Jul 7, 2007
Authored by Tomaz Bratusa | Site teamintell.com

Zen Cart version 1.3.7 suffers from a session fixation issue in its backend administration interface.

tags | advisory
SHA-256 | fae3f42542ed29ac868326931bdf3ef90eeb0aabcad895da2c149314f711fd29
HP Security Bulletin 2007-14.4
Posted Jul 7, 2007
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin - A potential security vulnerability has been identified with an ActiveX control in HP Instant Support - Driver Check running on Microsoft Windows. The vulnerability could be remotely exploited to allow unauthorized access to the system.

tags | advisory, activex
systems | windows
SHA-256 | befafdc28f5bd586ab4c0b3bfa8345334f223db7f05311683b52d599109f84d1
asteridex-exec.txt
Posted Jul 7, 2007
Authored by Carl Livitt

AsteriDex versions 3.0 and below suffer from a remote code execution vulnerability in callboth.php. Full exploit provided.

tags | exploit, remote, php, code execution
SHA-256 | 794379780fb3e3988a39c423bf0d884ff440774220df9bdf836c25beaaf1e46d
vrnews-bypass.txt
Posted Jul 7, 2007
Authored by R4M!

VRNews version 1.x suffers from a remote permission bypass vulnerability in admin.php.

tags | exploit, remote, php, bypass
SHA-256 | 07adecd4f4b1b6b14974c442bff909582be7c6dc4f0544072adf1c1a899ebe35
smspasswd-0.1.tgz
Posted Jul 7, 2007
Authored by Ed Blanchfield | Site e-things.org

smspasswd provides two factor authentication via cell phone short message service (SMS). It currently supports LDAP and RADIUS two factor authentication for users with cell (mobile) phones.

tags | tool, wireless
SHA-256 | eee812fd97d3a11a5d25f879958e58ea64259a386b6c425fced7634b4a6c81e9
Page 1 of 3
Back123Next

File Archive:

December 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    2 Files
  • 2
    Dec 2nd
    12 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close