what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 32 RSS Feed

Files Date: 2007-07-10

chilkat-multi.txt
Posted Jul 10, 2007
Authored by shinnai | Site shinnai.altervista.org

Chilkat Zip ActiveX component version 12.4 multiple insecure methods exploit.

tags | exploit, activex
SHA-256 | 23d0231520e381bda68cb57b4f94b01909cc5f5719e6d126cf99e63dbfbd2d06
neotracepro-overflow.txt
Posted Jul 10, 2007
Authored by nitr0us

NeoTracePro version 3.25 ActiveC TraceTarger() remote buffer overflow exploit.

tags | exploit, remote, overflow
SHA-256 | 11d3f30745554bc47b955ab0c7601ddc908689f79b7a829efcc671e96a905865
sapdb-seh.txt
Posted Jul 10, 2007
Authored by Heretic2

AP DB version 7.4 WebTools remote SEH overwrite exploit.

tags | exploit, remote
SHA-256 | f2a112f5e51a381667eec278a104f6f466ea2d7699473049500bd5a026741d85
aigaion-sql.txt
Posted Jul 10, 2007
Authored by Cody "CypherXero" Rester | Site cypherxero.net

Aigaion versions 1.3.3 and below suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | f477c1fa8a2e114029b99bdb32b4e04daf91e335c09d3b6bb2d7b210360b4821
avts10-passwd.txt
Posted Jul 10, 2007
Authored by Dj7xpl | Site Dj7xpl.2600.ir

AV Tutorial Script version 1.0 remote user password change exploit.

tags | exploit, remote
SHA-256 | cd8796f314db2631356ee6df43d15d829d84060a778e3ed6de9593bb0d621466
fgs17-sql.txt
Posted Jul 10, 2007
Authored by Xenduer77

FlashGameScript versions 1.7 and below suffer from a SQL injection vulnerability.

tags | exploit, sql injection
SHA-256 | d3f5d470f849e8d1d8f4220063aeeaa88e6b30d2efffefdd7442441bfb407d21
gss31-sql.txt
Posted Jul 10, 2007
Authored by Xenduer77

GameSiteScript versions 3.1 and below suffer from a SQL injection vulnerability.

tags | exploit, sql injection
SHA-256 | 01b9f2d34470726e0059c9669a7df64320d03423f82d52418460e00f5326b170
iDEFENSE Security Advisory 2007-07-09.2
Posted Jul 10, 2007
Authored by iDefense Labs, Sean Larsson | Site idefense.com

iDefense Security Advisory 07.09.07 - Remote exploitation of multiple integer overflow vulnerabilities in several of the image loader plug-ins included with distributions of 'The GIMP' allow attackers to crash The GIMP or potentially execute arbitrary code with the privileges of the user. iDefense has confirmed that version 2.2.15 of The GIMP is vulnerable on both Linux and Windows platforms. It is suspected that all previous versions of the GIMP are also affected.

tags | advisory, remote, overflow, arbitrary, vulnerability
systems | linux, windows
advisories | CVE-2006-4519
SHA-256 | 00db260f0059dca5f28a11f85c9a8750fe40b83b8a95462ae5862095e4114d96
EEYE-Java.txt
Posted Jul 10, 2007
Authored by Daniel Soeder | Site eeye.com

eEye Digital Security has discovered a stack buffer overflow in Java WebStart, a utility installed with Java Runtime Environment for the purpose of managing the download of Java applications. By opening a malicious JNLP file, a user's system may be compromised by arbitrary code within the file, which executes with the privileges of that user. Systems affected are Java Runtime Environment 6 update 1 and below and Java Runtime Environment 5 update 11 and below.

tags | advisory, java, overflow, arbitrary
SHA-256 | 4634c67fe886c62ca9877c8e797c11203f134b24b6f4f56bbd706b71a5db40d7
iDEFENSE Security Advisory 2007-07-09.1
Posted Jul 10, 2007
Authored by iDefense Labs, Mario Ballano | Site idefense.com

iDefense Security Advisory 07.09.07 - Local exploitation of an input validation vulnerability within the NPF.SYS device driver of WinPcap allows attackers to execute arbitrary code in kernel context. The vulnerability specifically exists due to insufficient input validation when handling the Interrupt Request Packet (Irp) parameters passed to IOCTL 9031 (BIOCGSTATS). By passing carefully chosen parameters to this IOCTL, an attacker can overwrite arbitrary kernel memory. iDefense has confirmed the existence of this vulnerability in version 4.0 of WinPcap as included in Wireshark 0.99.5. The version of NPF.SYS tested was 4.0.0.755. Older versions are suspected to be vulnerable.

tags | advisory, arbitrary, kernel, local
SHA-256 | 46e2bfe73ac2f8cddb383c6eb203c2af59b776d93221bddaf74a00d1d638a46c
Debian Linux Security Advisory 1332-1
Posted Jul 10, 2007
Authored by Debian | Site debian.org

Debian Security Advisory 1332-1 - Several remote vulnerabilities have been discovered in the VideoLan multimedia player and streamer, which may lead to the execution of arbitrary code.

tags | advisory, remote, arbitrary, vulnerability
systems | linux, debian
advisories | CVE-2007-3316, CVE-2007-3467
SHA-256 | 0c2b7b9e21cf08d6a887da90ba62a1e7e907fb77e892fe7c0aca8ee401405292
Mozilla Firefox wyciwyg:// Psuedo-URI Advisory
Posted Jul 10, 2007
Authored by Michal Zalewski | Site lcamtuf.coredump.cx

A vulnerability exists in how Mozilla Firefox handles internal wyciwyg:// pseudo-URIs.

tags | advisory
SHA-256 | 93f02ea123437363186523aeae7e0ca0e0d453814f6ae1c66ad755016eaf7b78
codeigniter-multi.txt
Posted Jul 10, 2007
Authored by Lukasz Pilorz

CodeIgniter versions below SVN 28.06.2007 suffer from directory traversal and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 9c844f45f780673c7009cc92946fc378cba3a9fbd7112b32708978958096e5fd
alph-0.23.tar.gz
Posted Jul 10, 2007
Authored by Corcalciuc V. Horia | Site sourceforge.net

alph implements and analyzes historical and traditional ciphers and codes, such as polyalphabetic, substitutional, and mixed employing human-reconstructable algorithms. It provides a pipe filter interface in order to encrypt and decrypt block text to achieve transparency. The program is meant to be used in conjunction with external programs that transfer data, resulting in transparent encryption or decryption of information. The program can thus be used as a mail filter, IRC filter, IM filter, and so on.

Changes: Added warning for possibly irreversible cyphers. Added scramble function. Cleaned up source a bit. Updated manpage.
tags | encryption
SHA-256 | 046b5a882ad4beed71f1f3887a92c6c5cd8e1f94b273d94c22e571b53a63ba09
phpcomet-rfi.txt
Posted Jul 10, 2007
Authored by o_0p

The PHP Comet-Server application may suffer from a remote file inclusion vulnerability.

tags | exploit, remote, php, code execution, file inclusion
SHA-256 | 3cfb90496a5cc27853237bc1398d79b98d471afd586bfbe548fdc72d215b15e8
apache_modjk_overflow.rb.txt
Posted Jul 10, 2007
Authored by Nicob

Metasploit module for the buffer overflow vulnerability in Apache mod_jk version 1.2.20. Written to work on Win23.

tags | exploit, overflow
advisories | CVE-2007-0774
SHA-256 | efe145dee4b7080b59ab059e6c8b9dd4a32fc76e8f62346dc54be9192176437f
0x82-apache-mod_jk.c
Posted Jul 10, 2007
Authored by Xpl017Elz | Site x82.inetcop.org

Apache Tomcat Connector mod_jk version 1.2.19 remote buffer overflow exploit for Fedora Core 5,6 (exec-shield).

tags | exploit, remote, overflow
systems | linux, fedora
SHA-256 | 24366bcf5fd939402e2136ae4afaf302d0e97d8a5f9ab0e2664a94791726f33e
apachemodjk-overflow.txt
Posted Jul 10, 2007
Authored by eliteboy

Apache mod_jk versions 1.2.19 and 1.2.20 remote buffer overflow exploit that binds a shell to TCP port 5555. Written for SUSE Enterprise Linux and FreeBSD.

tags | exploit, remote, overflow, shell, tcp
systems | linux, freebsd, suse
SHA-256 | 4343e34adf3fa71ca9c9be78dc3cb878faf1fd6762925f141c3657a3379e0462
Debian Linux Security Advisory 1331-1
Posted Jul 10, 2007
Authored by Debian | Site debian.org

Debian Security Advisory 1331-1 - Several remote vulnerabilities have been discovered in PHP, a server-side, HTML-embedded scripting language, which may lead to the execution of arbitrary code. Stefan Esser discovered HTTP response splitting vulnerabilities in the session extension. This only affects Debian 3.1 (Sarge). Stefan Esser discovered that an integer overflow in memory allocation routines allows the bypass of memory limit restrictions. This only affects Debian 3.1 (Sarge) on 64 bit architectures. It was discovered that a buffer overflow in the xmlrpc extension allows the execution of arbitrary code.

tags | advisory, remote, web, overflow, arbitrary, php, vulnerability
systems | linux, debian
advisories | CVE-2006-0207, CVE-2006-4486, CVE-2007-1864
SHA-256 | 1fce4b0b46bc0da44b8af40e54073c49f088b0f0cecd1ec997ffa0a91147d009
Debian Linux Security Advisory 1330-1
Posted Jul 10, 2007
Authored by Debian | Site debian.org

Debian Security Advisory 1330-1 - Several remote vulnerabilities have been discovered in PHP, a server-side, HTML-embedded scripting language, which may lead to the execution of arbitrary code. Stefan Esser discovered that a buffer overflow in the zip extension allows the execution of arbitrary code. It was discovered that a buffer overflow in the xmlrpc extension allows the execution of arbitrary code.

tags | advisory, remote, overflow, arbitrary, php, vulnerability
systems | linux, debian
advisories | CVE-2007-1864, CVE-2007-1399
SHA-256 | 2f61278426160afc3394bc0eabb02afcc1f4c2d9133820a6b516d03fd3299f52
adv-2-mid.txt
Posted Jul 10, 2007
Authored by Pepepistola

YouTube suffers from a cross site request forgery arbitrary code injection vulnerability.

tags | advisory, arbitrary, csrf
SHA-256 | 8c63475befd9faa726379b0d0186378755a4451f827d67ce1223839aa48a9eb0
Secunia Security Advisory 25938
Posted Jul 10, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for php5. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
systems | linux, debian
SHA-256 | b460db20e99b9ec168ff80909c4df472d49bdb121f2e02c2842535902c479369
Secunia Security Advisory 25945
Posted Jul 10, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for php4. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks, cause a DoS (Denial of Service), and potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability, xss
systems | linux, debian
SHA-256 | ca7197328318c1e7e509f374580f6c5d92ff114dba81265050f3161279dacd66
Secunia Security Advisory 25955
Posted Jul 10, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Zhongling Wen has reported a vulnerability in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, kernel
systems | linux
SHA-256 | 2813c63e47f6aea41f45094eda100bffe292f3433684cb0699f677dae3d09a47
Secunia Security Advisory 25960
Posted Jul 10, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Xenduer77 has reported a vulnerability in FlashGameScript, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 916c2decb24e6f8c236f087ab7f5c93cf04e2de5a53aca4ee5fd0ca3a887b4e9
Page 1 of 2
Back12Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close