exploit the possibilities
Showing 1 - 25 of 85 RSS Feed

Files Date: 2007-12-24

ngreptut.txt
Posted Dec 24, 2007
Authored by d3hydr8 | Site darkc0de.com

Simple network grep (ngrep) tutorial that gives a basic overview of some use cases.

tags | paper
MD5 | 094f7c35c7872b9e2ffe74ef2b0b9eda
tikiwikicms-xss.txt
Posted Dec 24, 2007
Authored by Mesut Timur | Site h-labs.org

Tikiwiki CMS version 1.9.8.3 suffers from a cross site scripting vulnerability.

tags | advisory, xss
MD5 | f522cdaed92eebabcaa2574c25f382d6
Secunia Security Advisory 28182
Posted Dec 24, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - niekt0_at_hysteria.sk has reported a vulnerability in SiteScape Forum, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | 7f5e53f9a1dd843796a67681520b11fe
Secunia Security Advisory 28212
Posted Dec 24, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sun has acknowledged some vulnerabilities in Apache for Solaris, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and by malicious people to conduct cross-site scripting attacks.

tags | advisory, denial of service, local, vulnerability, xss
systems | solaris
MD5 | 05c8a282b0afa3dce2707565b51654c7
php525-bypass.txt
Posted Dec 24, 2007
Authored by AmnPardaz Security Research Team | Site bugreport.ir

PHP versions 5.2.5 and below safe mode bypass exploit.

tags | exploit, php, bypass
MD5 | 6da5416ce9764f3c5e38f0e3d4a9da53
tikiwiki-traverse.txt
Posted Dec 24, 2007
Authored by Jesus Olmos Gonzalez

The Tikiwiki CMS has a vulnerability that allows an attacker to get the first 1000 bytes from an arbitrary file through the tiki-listmovies.php script.

tags | exploit, arbitrary, php, file inclusion
MD5 | 5eee6c20979ac907f14a5250773f0b54
installshield-overflow.txt
Posted Dec 24, 2007
Authored by Elazar Broad

The InstallShield Update Server Web Agent version 5.1.100.47363 suffers from a buffer overflow vulnerability.

tags | exploit, web, overflow
MD5 | e0335db789d1c451693533c992dc9082
CVE-2007-5342.txt
Posted Dec 24, 2007
Authored by Delian Krustev | Site tomcat.apache.org

The JULI logging component in Tomcat versions 5.5.9 through 5.5.25 and versions 6.0.0 to 6.0.15 allows web applications to provide their own logging configurations. The default security policy does not restrict this configuration and allows an untrusted web application to add files or overwrite existing files where the Tomcat process has the necessary file permissions to do so.

tags | advisory, web
advisories | CVE-2007-5342
MD5 | d65c8164c8b1fe46229d21171c404d82
pdflib-overflows.txt
Posted Dec 24, 2007
Authored by poplix | Site px.dynalias.org

pdflib, a library used for generating PDFs on the fly, suffers from multiple buffer overflow vulnerabilities due to the use of strcpy().

tags | advisory, overflow, vulnerability
MD5 | 5b5319a4404f4f00c7533d2437c848fa
dokeos-xss.txt
Posted Dec 24, 2007
Authored by DoZ | Site hackerscenter.com

Dokeos versions 1.8.4 and below suffer from cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
MD5 | cc5bf98f465124be2202a2bdf2034846
myblogcms-rfi.txt
Posted Dec 24, 2007
Authored by Beenu Arora

MyBlog CMS suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
MD5 | 36f41deef654c72db92896e627ab18c6
Secunia Security Advisory 28202
Posted Dec 24, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Janek Vind has reported some vulnerabilities in CuteNews, which can be exploited by malicious people to disclose sensitive information.

tags | advisory, vulnerability
MD5 | eae2a70feac87419c504bcd4c9efbee0
Secunia Security Advisory 28168
Posted Dec 24, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for autofs. This fixes a vulnerability, which can be exploited by malicious, local users to bypass certain security restrictions.

tags | advisory, local
systems | linux, fedora
MD5 | b91cdcd7a86cc8149093d1e88ed3f349
Secunia Security Advisory 28198
Posted Dec 24, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - root at hanicker.it has reported a vulnerability in the MRBS Module for Moodle, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, root, sql injection
MD5 | f0fb873badc98fdfbc5162249d4153d7
Secunia Security Advisory 28213
Posted Dec 24, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for flash-player. This fixes some vulnerabilities, where one vulnerability has an unknown impact and others can be exploited by malicious, local users to gain escalated privileges and by malicious people to bypass certain security restrictions, conduct cross-site scripting and HTTP request splitting attacks, disclose sensitive information, cause a Denial of Service (DoS), or to potentially compromise a user's system.

tags | advisory, web, denial of service, local, vulnerability, xss
systems | linux, suse
MD5 | 8794475d80a2a6486a7a52cd280afa51
Secunia Security Advisory 28207
Posted Dec 24, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for wireshark. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | linux, fedora
MD5 | c1e8a4123018191b4fc643cbdeae690f
Secunia Security Advisory 28208
Posted Dec 24, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Luigi Auriemma has discovered a vulnerability in WinUAE, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | 5955f1c3342bd261b59274ad8e537a93
Secunia Security Advisory 28224
Posted Dec 24, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sun has acknowledged some vulnerabilities in Apache for Solaris, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and by malicious people to conduct cross-site scripting attacks.

tags | advisory, denial of service, local, vulnerability, xss
systems | solaris
MD5 | bb32d1d2c0151d8d4f8c504da2af776c
aim-bypass.txt
Posted Dec 24, 2007
Authored by Michael Evanchik | Site MichaelEvanchik.com

AOL Instant Messenger is still susceptible to bypass vulnerabilities.

tags | advisory, vulnerability, bypass
MD5 | 6e07a7d3dad92e6edb0f83dbaf853779
aol-xss.txt
Posted Dec 24, 2007
Authored by Michael Evanchik | Site MichaelEvanchik.com

AOL is still susceptible to cross site scripting vulnerabilities.

tags | advisory, vulnerability, xss
MD5 | f95024c74e60771ed90f54823facff7a
gwcheck.c
Posted Dec 24, 2007
Authored by poplix | Site px.dynalias.org

gwcheck is a simple program that checks if a host in an ethernet network is a gateway to Internet.

tags | tool, scanner
systems | unix
MD5 | 3699f58b2676bf33886816024d7eda4d
zoomprayer.tgz
Posted Dec 24, 2007
Authored by Luigi Auriemma | Site aluigi.org

Demonstration exploit for Zoom Player versions 6.00 beta 2 and below which suffer from a unicode related buffer overflow vulnerability.

tags | exploit, overflow
MD5 | cb173ed8790a016fa5d479a61d179912
zoomprayer.txt
Posted Dec 24, 2007
Authored by Luigi Auriemma | Site aluigi.org

Zoom Player versions 6.00 beta 2 and below suffer from a unicode related buffer overflow vulnerability.

tags | advisory, overflow
MD5 | 2702f61a218bbd385e2e5237529fdfd8
adaimage-traverse.txt
Posted Dec 24, 2007
Authored by Luigi Auriemma | Site aluigi.org

Ada Image Server (ImgSvr) versions 0.6.21 and below suffer from a directory traversal vulnerability.

tags | exploit, file inclusion
MD5 | bf2c2031179d84f12653aab888a0d126
vlcboffs.zip
Posted Dec 24, 2007
Authored by Luigi Auriemma | Site aluigi.org

Proof of concept code that demonstrates format string and buffer overflow vulnerabilities in VideoLAN (VLC) versions 0.8.6d and below.

tags | exploit, overflow, vulnerability, proof of concept
MD5 | b7908e112e7acaa892b7c5240ba41697
Page 1 of 4
Back1234Next

File Archive:

August 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    3 Files
  • 2
    Aug 2nd
    2 Files
  • 3
    Aug 3rd
    32 Files
  • 4
    Aug 4th
    22 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    19 Files
  • 7
    Aug 7th
    6 Files
  • 8
    Aug 8th
    1 Files
  • 9
    Aug 9th
    2 Files
  • 10
    Aug 10th
    27 Files
  • 11
    Aug 11th
    11 Files
  • 12
    Aug 12th
    11 Files
  • 13
    Aug 13th
    17 Files
  • 14
    Aug 14th
    7 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close