exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files Date: 2008-01-06

Debian Linux Security Advisory 1450-1
Posted Jan 6, 2008
Authored by Debian | Site debian.org

Debian Security Advisory 1450-1 - It was discovered that util-linux, Miscellaneous system utilities, did not drop privileged users and groups in the correct order in the mount and umount commands. This could potentially allow a local user to gain additional privileges.

tags | advisory, local
systems | linux, debian
advisories | CVE-2007-5191
SHA-256 | 4734fc3adec246db57dff268bd354db2f13d0fcb4816a74542256e9fba9110ac
ruby-nmapparser-0.2.1.tgz
Posted Jan 6, 2008
Authored by Kris Katterjohn | Site rubynmap.sourceforge.net

This library provides a Ruby interface to Nmap's scan data. It can run Nmap and parse its XML output directly from the scan, parse a file containing the XML data from a separate scan, or parse a string of XML data from a scan. This information is presented in an easy to use fashion for storing and manipulating.

Changes: Bug fix release.
tags | tool, nmap, ruby
systems | unix
SHA-256 | 45aed780b003524f9dc083fdc67c4f13c902f0e6b7fea3e8c1892f4d60174938
clipshare26-passwd.txt
Posted Jan 6, 2008
Authored by Pr0metheuS

ClipShare version 2.6 remote user password change exploit.

tags | exploit, remote
SHA-256 | 72fa72b8b818fabbf7fd6f6c78388eb5d678876f780abe2decea471788392ef0
snetworks-rfi.txt
Posted Jan 6, 2008
Authored by Crackers_Child

SNetworks PHP Classifieds version 5.0 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, php, code execution, file inclusion
SHA-256 | 817f408a892e870e8332ddd7fc6487a11d79e25ef5fad8e73d8132b18cffd60a
tribisur-sql.txt
Posted Jan 6, 2008
Authored by x0kster

Tribisur versions 2.0 and below remote SQL injection exploit.

tags | exploit, remote, sql injection
SHA-256 | 878cce10a4def497a0f3d1a4c22c3f0d02214ce1a22a7667ce0bc2305a0a76e8
Debian Linux Security Advisory 1449-1
Posted Jan 6, 2008
Authored by Debian | Site debian.org

Debian Security Advisory 1449-1 - It was discovered that loop-aes-utils, tools for mounting and manipulating filesystems, didn't drop privileged users and groups in the correct order in the mount and umount commands. This could potentially allow a local user to gain additional privileges.

tags | advisory, local
systems | linux, debian
advisories | CVE-2007-5191
SHA-256 | 7ba837b3c03fe2093d868d969cfff17ad96234f1fbca2104edfba253113b86c4
coolplayer217-overflow.txt
Posted Jan 6, 2008
Authored by Trancek

CoolPlayer version 2.17 .m3u playlist stack overflow exploit that binds a shell to port 4444.

tags | exploit, overflow, shell
SHA-256 | cdff2e6770f455d03ba6e2c1262138e8142d7ae62186f141fcebc62cbbaf9f93
Debian Linux Security Advisory 1448-1
Posted Jan 6, 2008
Authored by Debian | Site debian.org

Debian Security Advisory 1448-1 - It was discovered that eggdrop, an advanced IRC robot, was vulnerable to a buffer overflow which could result in a remote user executing arbitrary code.

tags | advisory, remote, overflow, arbitrary
systems | linux, debian
advisories | CVE-2007-2807
SHA-256 | 97aca53b322c05c06cbb10f2526f36402b98cd7ff32c7120ab194ab5111a5068
openssh_backdoor.patch.txt
Posted Jan 6, 2008
Authored by Andrea Montanari

OpenSSH patch tested with versions 4.2p1 and 4.7p1 that allows for a hidden user to login with root permissions.

tags | root, patch
systems | unix
SHA-256 | 66a2fdc785f48b49192a9914e91513352963513dcdde7b456dccf8dc0ad3e725
ipb217-xsssql.txt
Posted Jan 6, 2008
Authored by Eugene Minaev | Site itdefence.ru

Invision Power Board version 2.1.7 suffers from cross site scripting and SQL injection vulnerabilities.

tags | exploit, vulnerability, xss, sql injection
SHA-256 | 0f3e90fbbd4992ce6f7537f6aaf508d48434d3246f13f3ab1d5715b661bed087
date_me.c
Posted Jan 6, 2008
Authored by l0om | Site excluded.org

This code searches for Google Calendar accounts which exist and are not password protected.

tags | tool, scanner
systems | unix
SHA-256 | 3151bb236822f342ed070d2d4b6ddae739cbb33cf4ba0c9777a56abb9f7bb51b
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close