exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 85 RSS Feed

Files Date: 2007-12-24

ngreptut.txt
Posted Dec 24, 2007
Authored by d3hydr8 | Site darkc0de.com

Simple network grep (ngrep) tutorial that gives a basic overview of some use cases.

tags | paper
SHA-256 | 2b5a065b1aac5ad05948cabff3c5cc1b1043255788c734c9b4c046199bfae1c4
tikiwikicms-xss.txt
Posted Dec 24, 2007
Authored by Mesut Timur | Site h-labs.org

Tikiwiki CMS version 1.9.8.3 suffers from a cross site scripting vulnerability.

tags | advisory, xss
SHA-256 | 1227b711cae8023df7619be4ef52c37f5d03eed00136597fe8aebc53fde942b4
Secunia Security Advisory 28182
Posted Dec 24, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - niekt0_at_hysteria.sk has reported a vulnerability in SiteScape Forum, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 9cb45aae0e9b943b5acb8153364026f6922d822dfa77a8a80be154af921e911b
Secunia Security Advisory 28212
Posted Dec 24, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sun has acknowledged some vulnerabilities in Apache for Solaris, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and by malicious people to conduct cross-site scripting attacks.

tags | advisory, denial of service, local, vulnerability, xss
systems | solaris
SHA-256 | 17738b713bab0c3b9c2d2456e04f0c8f4ac45fb40c5e79ef90674bf4d3e6cb0c
php525-bypass.txt
Posted Dec 24, 2007
Authored by AmnPardaz Security Research Team | Site bugreport.ir

PHP versions 5.2.5 and below safe mode bypass exploit.

tags | exploit, php, bypass
SHA-256 | fdc758a026bc08aff9873aa2683cce0db13ad1eb638972a85832b2d0c4170ae3
tikiwiki-traverse.txt
Posted Dec 24, 2007
Authored by Jesus Olmos Gonzalez

The Tikiwiki CMS has a vulnerability that allows an attacker to get the first 1000 bytes from an arbitrary file through the tiki-listmovies.php script.

tags | exploit, arbitrary, php, file inclusion
SHA-256 | c5dec4df826c950a9c132ae47977fa8e7beb6ae4e962420270fa9eb27e09c5b1
installshield-overflow.txt
Posted Dec 24, 2007
Authored by Elazar Broad

The InstallShield Update Server Web Agent version 5.1.100.47363 suffers from a buffer overflow vulnerability.

tags | exploit, web, overflow
SHA-256 | f2a952b237a03fa22d1db234fdff1e79a973065a81e1a06a4ec30976067cdec3
CVE-2007-5342.txt
Posted Dec 24, 2007
Authored by Delian Krustev | Site tomcat.apache.org

The JULI logging component in Tomcat versions 5.5.9 through 5.5.25 and versions 6.0.0 to 6.0.15 allows web applications to provide their own logging configurations. The default security policy does not restrict this configuration and allows an untrusted web application to add files or overwrite existing files where the Tomcat process has the necessary file permissions to do so.

tags | advisory, web
advisories | CVE-2007-5342
SHA-256 | 66606f1673de22575c8893d54b52647fdb228feb8f44f542c4a94d96aaa28b7d
pdflib-overflows.txt
Posted Dec 24, 2007
Authored by poplix | Site px.dynalias.org

pdflib, a library used for generating PDFs on the fly, suffers from multiple buffer overflow vulnerabilities due to the use of strcpy().

tags | advisory, overflow, vulnerability
SHA-256 | cc8dcb150298922e6a2a292f9c663f4dbff95dc657c445fc35cdee5ee09e6763
dokeos-xss.txt
Posted Dec 24, 2007
Authored by DoZ | Site hackerscenter.com

Dokeos versions 1.8.4 and below suffer from cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 7c509aa4046bab571b2585be9a532089d7c402d8b8b5f267abcc7b4539a5e857
myblogcms-rfi.txt
Posted Dec 24, 2007
Authored by Beenu Arora

MyBlog CMS suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | db266e7145691d2b5e52ce4dff2b477b487913ad13c07f6c518c945691920035
Secunia Security Advisory 28202
Posted Dec 24, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Janek Vind has reported some vulnerabilities in CuteNews, which can be exploited by malicious people to disclose sensitive information.

tags | advisory, vulnerability
SHA-256 | 1b435b5e8168e91133729476ca43b8e211aa8b31708c4e3893fd7f0af532d816
Secunia Security Advisory 28168
Posted Dec 24, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for autofs. This fixes a vulnerability, which can be exploited by malicious, local users to bypass certain security restrictions.

tags | advisory, local
systems | linux, fedora
SHA-256 | 926b31fcae0ec439f768ba99e3f1d1de8d050ebb311d78370b6bda3aa8ffb57f
Secunia Security Advisory 28198
Posted Dec 24, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - root at hanicker.it has reported a vulnerability in the MRBS Module for Moodle, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, root, sql injection
SHA-256 | 6030ce44bd2500aff2ff3a562f1c648b511057c39642653f8db6edf393a0521a
Secunia Security Advisory 28213
Posted Dec 24, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for flash-player. This fixes some vulnerabilities, where one vulnerability has an unknown impact and others can be exploited by malicious, local users to gain escalated privileges and by malicious people to bypass certain security restrictions, conduct cross-site scripting and HTTP request splitting attacks, disclose sensitive information, cause a Denial of Service (DoS), or to potentially compromise a user's system.

tags | advisory, web, denial of service, local, vulnerability, xss
systems | linux, suse
SHA-256 | ce99bc469dca1f7d436a1849cb2cf1854679bb2c55e125b6503bc6d2361e6ca1
Secunia Security Advisory 28207
Posted Dec 24, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for wireshark. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | linux, fedora
SHA-256 | d4a42e61c400e088f930c95366ef1286c299be535f474c6701f873e3c73637db
Secunia Security Advisory 28208
Posted Dec 24, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Luigi Auriemma has discovered a vulnerability in WinUAE, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 73c2d6925040504c19c987a57390f6b073f190d88260d5c9f0c566709e2ca25d
Secunia Security Advisory 28224
Posted Dec 24, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sun has acknowledged some vulnerabilities in Apache for Solaris, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and by malicious people to conduct cross-site scripting attacks.

tags | advisory, denial of service, local, vulnerability, xss
systems | solaris
SHA-256 | 3368c45c12150b8f989bde1b8b6d868ab56f2ebe34650f53b66dec7794e5eb4e
aim-bypass.txt
Posted Dec 24, 2007
Authored by Michael Evanchik | Site MichaelEvanchik.com

AOL Instant Messenger is still susceptible to bypass vulnerabilities.

tags | advisory, vulnerability, bypass
SHA-256 | 721b5b23ee157fba37dbb415019ee72fc4053c534d75d6df22b8469decd9ddbc
aol-xss.txt
Posted Dec 24, 2007
Authored by Michael Evanchik | Site MichaelEvanchik.com

AOL is still susceptible to cross site scripting vulnerabilities.

tags | advisory, vulnerability, xss
SHA-256 | 0ce3c3b131ba7bd2452606dc8522766ec23c7776be835e442d36dd727c507bbf
gwcheck.c
Posted Dec 24, 2007
Authored by poplix | Site px.dynalias.org

gwcheck is a simple program that checks if a host in an ethernet network is a gateway to Internet.

tags | tool, scanner
systems | unix
SHA-256 | bbd330c1df80d2586e3ecb1e5671a1a0b3aef4ffd54dd4ef27c45ffaaa50491c
zoomprayer.tgz
Posted Dec 24, 2007
Authored by Luigi Auriemma | Site aluigi.org

Demonstration exploit for Zoom Player versions 6.00 beta 2 and below which suffer from a unicode related buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | 6c48e05b732e31195bf1539370368e91fb58e550e205b27884f105a84df52ce1
zoomprayer.txt
Posted Dec 24, 2007
Authored by Luigi Auriemma | Site aluigi.org

Zoom Player versions 6.00 beta 2 and below suffer from a unicode related buffer overflow vulnerability.

tags | advisory, overflow
SHA-256 | 61e8eb89fa9b401f3e0c9496b07ea14ca0ed1b6ebecb10d3e1cc3ae4396fecf5
adaimage-traverse.txt
Posted Dec 24, 2007
Authored by Luigi Auriemma | Site aluigi.org

Ada Image Server (ImgSvr) versions 0.6.21 and below suffer from a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | 48741fd326a47ba1aaa2e02b25501b48f25dc0ee2b47ce210f96067d58e0761f
vlcboffs.zip
Posted Dec 24, 2007
Authored by Luigi Auriemma | Site aluigi.org

Proof of concept code that demonstrates format string and buffer overflow vulnerabilities in VideoLAN (VLC) versions 0.8.6d and below.

tags | exploit, overflow, vulnerability, proof of concept
SHA-256 | 5da2ec5c6efbe60b8ac911ba7107bc4289510155866663123a52ce84ff8a4380
Page 1 of 4
Back1234Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close