what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 29 RSS Feed

Files Date: 2007-08-28

postcast-overflow.txt
Posted Aug 28, 2007
Authored by rgod | Site retrogod.altervista.org

Postcast Server Pro version 3.0.61 and Quiksoft EasyMail emsmtp.dll version 6.0.1 buffer overflow exploit.

tags | exploit, overflow
SHA-256 | f12f44542d5b9709753549c601a5b50b87a129fd6937e95d3680f3629394c1e8
acg-sql.txt
Posted Aug 28, 2007
Authored by SmOk3

ACG News version 1.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | c5c7ef648ad7aff56d735a79900d294098fd4cf8716435631c0671deb8c19439
microcms-sql.txt
Posted Aug 28, 2007
Authored by IHTeam | Site notsec.com

Micro CMS version 3.5 suffers from a remote SQL injection vulnerability in revert-content.php.

tags | exploit, remote, php, sql injection
SHA-256 | c29d3299c76a688d56a44f0befb8be133a6472bdffbdcfef90f51baefdf48ed0
Secunia Security Advisory 26622
Posted Aug 28, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - shinnai has discovered two vulnerabilities in the nvUtility.Utility ActiveX control, which can be exploited by malicious people to manipulate data or compromise a user's system.

tags | advisory, vulnerability, activex
SHA-256 | af9c9bf4c75088b5fcd204ce63f89a0ecb3ffbe922eefc988d3b1a1cf37612c2
Secunia Security Advisory 26633
Posted Aug 28, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - s0cratex has discovered a vulnerability in Moon Gallery, which can be exploited by malicious users to compromise a vulnerable system.

tags | advisory
SHA-256 | 7e51e58d059c4217f084bd58c74344d114acb66f026f6b2c6a3baabc8c12fdb6
Secunia Security Advisory 26630
Posted Aug 28, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in Entrust Entelligence Security Provider (ESP), which can lead to untrusted certificates misleadingly being displayed as trustworthy.

tags | advisory
SHA-256 | 6cfe1e7bfdfc1a629e96b736f07951e106ecee18ffc2f19de78eae00955e71f7
bitchx-heap.txt
Posted Aug 28, 2007
Authored by bannedit | Site blacksecurity.org

BitchX version 1.1 Final remote heap overflow exploit that binds a TCP shell to port 4444.

tags | exploit, remote, overflow, shell, tcp
SHA-256 | 3199f543fb31d066f849b9da09c089cd39b2ca2d158a738330f4a690bbcad49e
xampp-local.txt
Posted Aug 28, 2007
Authored by Inphex

XAMPP for Windows version 1.6.3a local privilege escalation exploit.

tags | exploit, local
systems | windows
SHA-256 | 7bbe09bc29693e23ad84e997b786b5f1d89258d041e55ade78a3748ec7c5530a
wbb2-sql.txt
Posted Aug 28, 2007
Authored by D4m14n | Site damians-world.dl.am

WBB2-Addon for Acrotxt version 1 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | f442e1c2c054c484b5da7ed68111da9b979690ee3f75578da75767a985bd3704
arcadem-sql.txt
Posted Aug 28, 2007
Authored by SmOk3

Arcadem version 2.01 suffers from remote SQL injection and file inclusion vulnerabilities.

tags | exploit, remote, vulnerability, sql injection, file inclusion
SHA-256 | 95bef4c284ea7e2f7fbdbfd2b9755872c341937083868117f0b5a7e8996e0516
someryc-rfi.txt
Posted Aug 28, 2007
Authored by Katatafish

SomeryC version 0.2.4 and below suffer from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | c5e5c8b658ce213eb0a5de1599539fc9028a79a14201a044ff04feb737e07d71
nvr-deletexml-method.txt
Posted Aug 28, 2007
Authored by shinnai | Site shinnai.altervista.org

NVR SP2 version 2.0 DeleteXMLFile() insecure method exploit that makes use of nvUtility.dll version 1.0.14.0.

tags | exploit
SHA-256 | ee60cdcc66044ad1e08e967309cd8c1215e81c57f288c1c934e6c7da3662fd04
nvr-savexml-method.txt
Posted Aug 28, 2007
Authored by shinnai | Site shinnai.altervista.org

NVR SP2 version 2.0 SaveXMLFile() insecure method exploit that makes use of nvUtility.dll version 1.0.14.0.

tags | exploit
SHA-256 | 211a90b75ff3d02104813072f2680bdd216efff3a2181914c5853a6996c25804
nvr-settext-dos.txt
Posted Aug 28, 2007
Authored by shinnai | Site shinnai.altervista.org

NVR SP2 version 2.0 SetText() remote buffer overflow denial of service exploit that makes use of nvUnifiedControl.dll version 1.1.45.0.

tags | exploit, remote, denial of service, overflow
SHA-256 | 4c01514f37877e710120c38015e7bb620bcaa65f923cd79b5f88c40f82670edb
tactical.pdf
Posted Aug 28, 2007
Authored by Alex Hernandez | Site sybsecurity.com

Whitepaper called Tactical Exploitation and Response Over Solaris Sparc 5.8/5.9 systems.

tags | paper
systems | solaris
SHA-256 | 6608bd953c5fb32d95cbbe74636f7a82f56e28a44f64441079dd58df993f8107
HP Security Bulletin 2007-14.42
Posted Aug 28, 2007
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin - A potential security vulnerability has been identified in HP-UX running the Ignite-UX or the DynRootDisk (DRD) get_system_info command. The vulnerable command can change system networking parameters without notification.

tags | advisory
systems | hpux
SHA-256 | 041a3e5dda67b559ee08a102029de059dc9713a18df9b6212d5abc6282e7324e
BIND 8 DNS Cache Poisoning Whitepaper
Posted Aug 28, 2007
Authored by Amit Klein | Site trusteer.com

The paper shows that BIND 8 DNS queries are predictable, allowing for cache poisoning attacks.

tags | paper
SHA-256 | bc6ae89b00e4483608728ec54c75abdcb5ec809af078ff38205099b0e7edc9b7
sunshop-sql.txt
Posted Aug 28, 2007
Authored by IFX

Sunshop version 4.0 blind SQL injection exploit.

tags | exploit, sql injection
SHA-256 | b3f9d9a3c29e2a3f96e795231d981c0b534340ab16b6339095e7d699febcf5b1
metagoofil-1.2.tar.gz
Posted Aug 28, 2007
Authored by Christian Martorella | Site edge-security.com

Metagoofil is an information gathering tool designed for extracting the Meta-Data of public documents (pdf,doc,xls,ppt,etc) available on target/victim websites. It will generate a html page with the results of the Meta-Data extracted, plus a list of potential usernames.

tags | tool, forensics
SHA-256 | 8c49c6d124ce306d5ac93abcae29b512208692a266434423eb044eb6fd0e59fd
eyeOS-checksum.txt
Posted Aug 28, 2007
Authored by Andrej Komarov

eyeOS suffers from a checksum predictability vulnerability.

tags | advisory
SHA-256 | 348ccc99d5251d7cefddff1daed5256ccdeba2daa94e1fb7f0480e4ff5850850
genealogy-xss.txt
Posted Aug 28, 2007
Authored by Josh Morin

Genealogy version 4.1 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 98d4f51db498190d6b90cab5315da9cb5321dcd2163f88f3ab309e77d7443afa
dynamic-xss.txt
Posted Aug 28, 2007
Authored by Josh Morin

Dynamic Picture Frame is susceptible to a cross site scripting vulnerability.

tags | advisory, xss
SHA-256 | 79b8a3051849e286eaffb09a83d677cfb4b938ba2d87fe6dc114d04914a3266b
interworx-xss.txt
Posted Aug 28, 2007
Authored by DoZ | Site hackerscenter.com

InterWorx-CP suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | ec5df45f2a04149b23fb6f238d237640013f38be26c3bdff3ec185d62a33a224
Secunia Security Advisory 26572
Posted Aug 28, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for mozilla-thunderbird. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
systems | linux, ubuntu
SHA-256 | 7dc5953c28121ea8f17a3305c650cb423eec336eefbdc8b6897a8ee0f431e29b
Secunia Security Advisory 26574
Posted Aug 28, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - David Sopas Ferreira has reported some vulnerabilities in Arcadem, which can be exploited by malicious people to conduct SQL injection attacks, disclose sensitive information, or compromise a vulnerable system.

tags | advisory, vulnerability, sql injection
SHA-256 | af6bdcab7181def13a3cbf57b2a6ca181fc4bec2e86577257c928bc48338744b
Page 1 of 2
Back12Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close