exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 19 of 19 RSS Feed

Files Date: 2007-11-05

Debian Linux Security Advisory 1398-1
Posted Nov 5, 2007
Authored by Debian | Site debian.org

Debian Security Advisory 1398-1 - Bernhard Mueller of SEC Consult has discovered a format string vulnerability in perdition, an IMAP proxy. This vulnerability could allow an unauthenticated remote user to run arbitrary code on the perdition server by providing a specially formatted IMAP tag.

tags | advisory, remote, arbitrary, imap
systems | linux, debian
advisories | CVE-2007-5740
SHA-256 | b2e7d0509d10f17dca7867a19745607a162fe881eee3488ad70255b084407640
SQLMAP - Automatic SQL Injection Tool
Posted Nov 5, 2007
Authored by Bernardo Damele, Daniele Bellucci | Site sqlmap.org

sqlmap is an automatic blind SQL injection tool, developed in python, capable to perform an active database management system fingerprint, enumerate entire remote databases and much more. The aim of this project is to implement a fully functional database management system tool which takes advantages of web application programming security flaws which lead to SQL injection vulnerabilities.

Changes: Added support for Oracle database management system. Extended inband SQL injection functionality. Added some support and a fuzzer. Many other changes, see the changelog.
tags | remote, web, vulnerability, sql injection, python
systems | unix
SHA-256 | 4c1c491de3c1ba151bbb4e0d7c5b72b4445beca08eab802281cc7bcc7be7555e
jbcexplorer-exec.txt
Posted Nov 5, 2007
Authored by DarkFig

JBC Explorer versions 7.20 RC 1 and below remote code execution exploit.

tags | exploit, remote, code execution
SHA-256 | 46de6bd53fd7a60db18f6a9b5c51986f8f8b09cc72b77bc7f269e2b543ec77f3
sip-fraud.txt
Posted Nov 5, 2007
Authored by Radu State, Humberto J. Abdelnur, Olivier Festor

SIP digest access authentication relay-attack for toll fraud.

tags | exploit
SHA-256 | ca104a5ef7c3ae9a777acdbf17be3e4db54266bec27c9beeaaf57be66696e2c5
skalinks-csrf.txt
Posted Nov 5, 2007
Authored by Vincy

Skalinks versions 1.5 and below cross site request forgery add administrator exploit.

tags | exploit, csrf
SHA-256 | 19b9cf57c717b306fdddcc74be518b8085693f8c11af949c14d4939c790f169f
sfshoutbox-inject.txt
Posted Nov 5, 2007
Authored by SkyOut | Site core-security.net

SF-Shoutbox versions 1.2.1 through 1.4 suffer from HTML and Javascript injection vulnerabilities.

tags | exploit, javascript, vulnerability
SHA-256 | 3682505c261933683ad05bfabf7699d37214068b442461d5ebda147a28fca400
Debian Linux Security Advisory 1397-1
Posted Nov 5, 2007
Authored by Debian | Site debian.org

Debian Security Advisory 1397-1 - An integer overflow in the BigInteger data type implementation has been discovered in the free .NET runtime Mono.

tags | advisory, overflow
systems | linux, debian
advisories | CVE-2007-5197
SHA-256 | 1cdb7afd8bac5546613f19a9bee37755c6c52aba6fe90875ef46787e8394f350
tork-0.22.tar.gz
Posted Nov 5, 2007
Authored by robhogan | Site tork.sf.net

TorK is a Tor Controller for KDE. It allows you to configure, run, and update Tor. It also allows you to view the Tor network and choose how you would like to interact with the it.

Changes: Security and bug fixes.
tags | tool, peer2peer
SHA-256 | 8d9496a7882c61c9d051e510c87411c166ab4fc1f0050ce10560f46567baa3d5
Secunia Security Advisory 27472
Posted Nov 5, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in IBM Tivoli Service Desk, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory
SHA-256 | f50d8d2acd6e97574a41fc4f1926ff11ed4e01d52c7b654bbe92f19838354e27
Secunia Security Advisory 27488
Posted Nov 5, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in Symantec AntiVirus for Macintosh and Norton AntiVirus for Macintosh, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
SHA-256 | 547310d4d9965fcae407a1e550661df531b96d23c745dc888c6b3388225712b1
Secunia Security Advisory 27508
Posted Nov 5, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Drake Wilson has reported a vulnerability in GNU Emacs, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 2e443000a85b71d9a8327204dc3b487b5d7c5474150d77e523b49e2216b00a46
myway-xss.txt
Posted Nov 5, 2007
Authored by Tosser

The My Way Search engine at myway.com is susceptible to cross site scripting attacks.

tags | exploit, xss
SHA-256 | dcce42ef0c5c22fd69d8446614b6407c4846b05fa9a3ec7add498c3706f712c8
phphelpdesk-lfisql.txt
Posted Nov 5, 2007
Authored by Joseph Giron

phphelpdesk version 0.6.16 appears susceptible to local file inclusion and SQL injection vulnerabilities.

tags | exploit, local, vulnerability, sql injection, file inclusion
SHA-256 | 56578f21493c286ca9fcb747814d2b3e346abf843244b752598e0d0860a8e195
syndeocms-rfi.txt
Posted Nov 5, 2007
Authored by mdx | Site by-mdx.com

syndeoCMS version 2.5.01 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 9d55bf3f07451009fa9906878a8b2c407576e99f33e7327b07a33aae50dc4bfe
vortex-rfi.txt
Posted Nov 5, 2007
Authored by ShAy6oOoN

Vortex Portal version 1.0.42 suffers from remote file inclusion vulnerabilities.

tags | exploit, remote, vulnerability, code execution, file inclusion
SHA-256 | e2dcf17d5be6134b1489a7cf48393e8eb9e0bcf6b4687e584d2e4160b4bf40f5
nuboard-rfi.txt
Posted Nov 5, 2007
Authored by GolD_M | Site tryag.cc

nuBoard version 0.5 suffers from a remote file inclusion vulnerability in index.php.

tags | exploit, remote, php, code execution, file inclusion
SHA-256 | a43f47bca15cdcc3aba8ae430e12675ad8ea06877fb63576b911e0cd6302b416
scwiki-rfi.txt
Posted Nov 5, 2007
Authored by GolD_M | Site tryag.cc

scWiki version 1.0 Beta 2 suffers from a remote file inclusion vulnerability in common.php.

tags | exploit, remote, php, code execution, file inclusion
SHA-256 | b41028316f6e097aedb968f71fdf050d9c8ebc2e0f2b9de2d4bd327135b2b16d
quickdirty-lfi.txt
Posted Nov 5, 2007
Authored by GolD_M | Site tryag.cc

Quick and Dirty Blog version 0.4 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 35adfbf0c184cd4d36678c0e1adbfe1f9def372491e2e621b0eea3ab6f2dc007
guppy-rfilfi.txt
Posted Nov 5, 2007
Authored by irk4z

GuppY version 4.6.3 suffers from remote and local file inclusion vulnerabilities.

tags | exploit, remote, local, vulnerability, code execution, file inclusion
SHA-256 | 4ad6a16d2f4f51b5cbae4f60288ac4084fcd9f3220269c8c909fe10ca4a73c63
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    0 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close