exploit the possibilities
Showing 1 - 19 of 19 RSS Feed

Files Date: 2008-01-12

tutorialcms102-sql.txt
Posted Jan 12, 2008
Authored by ka0x

TutorialCMS versions 1.02 and below suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 254acd198f93e66f9debe1e632ced97a
aspphotogal-sql.txt
Posted Jan 12, 2008
Authored by Ruben Ventura Pina | Site trew.icenetx.net

ASP Photo Gallery version 1.0 suffers from multiple SQL injection vulnerabilities.

tags | exploit, vulnerability, sql injection, asp
MD5 | 465b293f5373f1431adda4d8ca7eb933
agares-sql.txt
Posted Jan 12, 2008
Authored by ka0x

Agares PhpAutoVideo version 2.21 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 3567340117999a5f608a7c9ec5500e58
Mandriva Linux Security Advisory 2008-011
Posted Jan 12, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - rsync before 3.0.0pre6, when running a writable rsync daemon that is not using chroot, allows remote attackers to access restricted files via unknown vectors that cause rsync to create a symlink that points outside of the module's hierarchy. Unspecified vulnerability in rsync before 3.0.0pre6, when running a writable rsync daemon, allows remote attackers to bypass exclude, exclude_from, and filter and read or write hidden files via (1) symlink, (2) partial-dir, (3) backup-dir, and unspecified (4) dest options.

tags | advisory, remote
systems | linux, mandriva
advisories | CVE-2007-6199, CVE-2007-6200
MD5 | 6f2cfd48534e199dce8883b43461836d
Mandriva Linux Security Advisory 2008-010
Posted Jan 12, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - A denial of service flaw was discovered by the Google Security Team in the way libxml2 processes malformed XML content. This flaw could cause the application to stop responding.

tags | advisory, denial of service
systems | linux, mandriva
advisories | CVE-2007-6284
MD5 | 0ac803914998a47b135ab3740d0315ba
Mandriva Linux Security Advisory 2008-009
Posted Jan 12, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - The default behaviour of autofs 5 for the hosts map did not specify the nosuid and nodev mount options. This could allow a local user with control of a remote NFS server to create a setuid root executable on the exported filesystem of the remote NFS server. If this filesystem was mounted with the default hosts map, it would allow the user to obtain root privileges. Likewise, the same scenario would be available for local users able to create device files on the exported filesystem which could allow the user to gain access to important system devices. Because the default behaviour of autofs was to mount -hosts map entries with the dev and suid options enabled by default, autofs has been altered to always use nodev and nosuid by default. In order to have the old behaviour, the configuration must now explicitly set the dev and/or suid options.

tags | advisory, remote, local, root
systems | linux, mandriva
advisories | CVE-2007-5964, CVE-2007-6285
MD5 | f9d1f61a7e9c079463f7defadccd3a0d
Mandriva Linux Security Advisory 2008-008
Posted Jan 12, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - A ridiculous amount of vulnerabilities have been addressed in the Linux 2.6 kernel for Mandriva.

tags | advisory, kernel, vulnerability
systems | linux, mandriva
advisories | CVE-2007-3740, CVE-2007-4133, CVE-2007-4573, CVE-2007-4997, CVE-2007-5093, CVE-2007-5500, CVE-2006-6058, CVE-2007-6063
MD5 | 6981f616aa601a5ffceca2809f7d423b
moodleinstall-xss.txt
Posted Jan 12, 2008
Authored by Hanno Boeck | Site hboeck.de

Moodle versions below 1.8.4 suffer from a cross site scripting vulnerability in the installer code.

tags | exploit, xss
advisories | CVE-2008-0123
MD5 | 07101c5967bd57438fd39a130ed5c2eb
photokron-disclose.txt
Posted Jan 12, 2008
Authored by Pr0metheuS

PhotoKron versions 1.7 and below remote database disclosure exploit.

tags | exploit, remote, info disclosure
MD5 | a91daecd980f900cdac652075f23e9f1
0DayDB-bypass.txt
Posted Jan 12, 2008
Authored by Pr0metheuS

0DayDB version 2.3 remote admin bypass exploit.

tags | exploit, remote, bypass
MD5 | e9de546797aa02f1a974310c390a7f51
Secunia Security Advisory 28389
Posted Jan 12, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ricky Zhou has reported a vulnerability in WebEvent, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | 1d74300bff8fb5a85cf399cb634bb36d
Secunia Security Advisory 28392
Posted Jan 12, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Mambo, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | 899f7634ab6d0f7ba978838d2356a8a4
Secunia Security Advisory 28407
Posted Jan 12, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Oracle Siebel SimBuilder, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | 7bdfd5819bc621b1f81071bcc1469e22
Secunia Security Advisory 28418
Posted Jan 12, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the BUEditor module for Drupal, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
MD5 | 3f2e7cbb407f9ae2f96ffb692e823c58
Secunia Security Advisory 28430
Posted Jan 12, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in vBGallery, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | 7c4150b76f217642b91aa9eb727d2952
Secunia Security Advisory 28437
Posted Jan 12, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sun has acknowledged some vulnerabilities in Solaris, which can be exploited by malicious users to gain escalated privileges or to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | solaris
MD5 | 3f8a9f6e5ff11abb5d01c555795e84e3
Secunia Security Advisory 28440
Posted Jan 12, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Tivoli Storage Manager Express, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | 4e04945f94e7ccd56dce11f7da909173
Secunia Security Advisory 28441
Posted Jan 12, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for cups. This fixes some vulnerabilities, which can be exploited by malicious users or malicious people to cause a DoS (Denial of Service) or to potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
systems | linux, suse
MD5 | b49c11b91b9b5a586263cad5a5021c6b
Secunia Security Advisory 28445
Posted Jan 12, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for postgresql. This fixes some vulnerabilities, which can be exploited by malicious users to gain escalated privileges.

tags | advisory, vulnerability
systems | linux, redhat
MD5 | 6937e83a5fe198078a27858930158c02
Page 1 of 1
Back1Next

File Archive:

April 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    21 Files
  • 2
    Apr 2nd
    35 Files
  • 3
    Apr 3rd
    21 Files
  • 4
    Apr 4th
    16 Files
  • 5
    Apr 5th
    15 Files
  • 6
    Apr 6th
    1 Files
  • 7
    Apr 7th
    2 Files
  • 8
    Apr 8th
    23 Files
  • 9
    Apr 9th
    19 Files
  • 10
    Apr 10th
    15 Files
  • 11
    Apr 11th
    14 Files
  • 12
    Apr 12th
    11 Files
  • 13
    Apr 13th
    2 Files
  • 14
    Apr 14th
    5 Files
  • 15
    Apr 15th
    14 Files
  • 16
    Apr 16th
    19 Files
  • 17
    Apr 17th
    19 Files
  • 18
    Apr 18th
    8 Files
  • 19
    Apr 19th
    4 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close