exploit the possibilities
Showing 1 - 25 of 47 RSS Feed

Files Date: 2008-02-26

ezyedit-xss.txt
Posted Feb 26, 2008
Authored by cybermilitant | Site hacktime.org

ezyEdit 2007 is susceptible to cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
MD5 | 01204d9c5dc6055fd3e58aa9af2f8f1e
CVE-2008-0124-s9y.txt
Posted Feb 26, 2008
Authored by Hanno Boeck | Site hboeck.de

Serendipity (S9Y) is vulnerable to cross site scripting vulnerabilities.

tags | advisory, vulnerability, xss
advisories | CVE-2008-0124
MD5 | 85e03397b4a76fadb8bb598544eeabb0
nukeditadmin-sql.txt
Posted Feb 26, 2008
Authored by r3dm0v3 | Site r3dm0v3.persianblog.ir

Nukedit version 4.9.x remote create admin SQL injection exploit.

tags | exploit, remote, sql injection
MD5 | dadf6fde3e0b8263c3eb11bff2af6fb8
dbhcms-rfi.txt
Posted Feb 26, 2008
Authored by Ironfist | Site ironwarez.info

DBHcms versions 1.1.4 and below remote file inclusion exploit.

tags | exploit, remote, code execution, file inclusion
MD5 | 0621fb2b488bc3876d6072f9dc6c32f2
mininuke-sql.txt
Posted Feb 26, 2008
Authored by S@BUN | Site hackturkiye.com

MiniNuke version 2.1 suffers from a remote SQL injection vulnerability in members.asp.

tags | exploit, remote, sql injection, asp
MD5 | 71a0a7fa2cb923e7051a4b95822fb295
xnu-ipv6-ipcomp.c
Posted Feb 26, 2008
Authored by mu-b | Site digit-labs.org

Apple Mac OS X xnu versions 1228.3.13 and below ipv6-ipcomp remote kernel denial of service proof of concept exploit.

tags | exploit, remote, denial of service, kernel, proof of concept
systems | apple, osx
MD5 | d81eb122c53132981eba29d286edc696
rtpbreak-1.3.tgz
Posted Feb 26, 2008
Authored by Michele Dallachiesa | Site xenion.antifork.org

rtpBreak detects, reconstructs and analyzes any RTP [rfc1889] session through heuristics over the UDP network traffic. It works well with SIP, H.323, SCCP and any other signaling protocol. In particular, it does not require the presence of RTCP packets (voipong needs them) that are not always transmitted from the recent VoIP clients.

Changes: Added -w and -W options, improved output files, fixed some bugs, and improved documentation.
tags | tool, udp, sniffer, protocol
MD5 | 3a3458d99734907e1ae35390ff3cc9c1
Secunia Security Advisory 29096
Posted Feb 26, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Luigi Auriemma has discovered a vulnerability in SurgeFTP, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | ae3b5b3b21edc4f1bfc769fba461274c
Whitepaper-Hacking-jBoss-using-a-Browser.pdf
Posted Feb 26, 2008
Authored by Joerg Scheinert | Site nruns.com

Hacking A Default jBoss Installation Using A Browser. This paper is a brief how-to on hacking a default installation using the JMX-Console.

tags | paper
MD5 | 7eb87fd95c756ffe30ba6dc3a886a120
phpnukereportaj-sql.txt
Posted Feb 26, 2008
Authored by Lovebug

The PHP-Nuke module reportaj suffers from multiple SQL injection vulnerabilities.

tags | exploit, php, vulnerability, sql injection
MD5 | 829ef419aaf5fee1a4c6d1ac5915a9b8
trend-bypass.txt
Posted Feb 26, 2008
Authored by Danux

It appears possible to bypass OfficeScan AV from Trend Micro by increasing an executable's virtual and raw size.

tags | advisory, bypass
MD5 | 9aaf38bcf49f7f28ec60ebf249995798
Debian Linux Security Advisory 1509-1
Posted Feb 26, 2008
Authored by Debian | Site debian.org

Debian Security Advisory 1509-1 - Several vulnerabilities have been discovered in xpdf code that is embedded in koffice, an integrated office suite for KDE. These flaws could allow an attacker to execute arbitrary code by inducing the user to import a specially crafted PDF document.

tags | advisory, arbitrary, vulnerability
systems | linux, debian
advisories | CVE-2007-4352, CVE-2007-5392, CVE-2007-5393
MD5 | 24398930a6503c729ca0bb857c09e9c3
phpnukekose-sql.txt
Posted Feb 26, 2008
Authored by xcorpitx | Site Hayalet-hack.com

The PHP-Nuke module Kose_Yazilari suffers from a SQL injection vulnerability.

tags | exploit, php, sql injection
MD5 | 3856bd332be56895d290a44b539df9fb
dlink-overflow.txt
Posted Feb 26, 2008
Authored by rgod | Site retrogod.altervista.org

D-Link MPEG4 SHM Audio Control remote overflow exploit that makes use of VAPGDecoder.dll version 1.7.0.5.

tags | exploit, remote, overflow
MD5 | 03004cfc84f9d51667c6b4b2d6bf8b14
move-overflow.txt
Posted Feb 26, 2008
Authored by Elazar Broad

Move Networks Quantum Streaming Player control buffer overflow exploit that makes use of UploadLogs() and spawns calc.exe or a shell on tcp/4444.

tags | exploit, overflow, shell, tcp
MD5 | 494f4767652244ffb26389822b200a82
rising-insecure.txt
Posted Feb 26, 2008
Authored by John Smith | Site jsmith080220.googlepages.com

Rising Online Scanner insecure method vulnerability exploit that demonstrates remote code execution with calc.exe.

tags | exploit, remote, code execution
MD5 | e6e91437b5ce77fae8ed1212717c5b9f
ZoneMinder-1.23.2.tar.gz
Posted Feb 26, 2008
Authored by Philip Coombes | Site zoneminder.com

ZoneMinder is a suite of applications intended for use in video camera security applications, including theft prevention and child or family member monitoring. It supports capture, analysis, recording, and monitoring of video data coming from one or more cameras attached to a Linux system. It also features a user-friendly Web interface which allows viewing, archival, review, and deletion of images and movies captured by the cameras. The image analysis system is highly configurable, permitting retention of specific events, while eliminating false positives. ZoneMinder supports both directly connected and network cameras and is built around the definition of a set of individual 'zones' of varying sensitivity and functionality for each camera. This allows the elimination of regions which should be ignored or the definition of areas which will alarm if various thresholds are exceeded in conjunction with other zones. All management, control, and other functions are supported through the Web interface.

Changes: Mostly bug fixes with some feature additions.
tags | web
systems | linux
MD5 | 8f203786bbe14d3e31a18f9dace98113
Secunia Security Advisory 29104
Posted Feb 26, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for koffice. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
systems | linux, debian
MD5 | 3247d51216b7c1b8c58f25ed277d49bc
Secunia Security Advisory 29108
Posted Feb 26, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Elazar Broad has discovered a vulnerability in Move Media Player, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | 090f2add24c9b1825c8aa471e7011784
Secunia Security Advisory 29109
Posted Feb 26, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - John Smith has discovered a vulnerability in Rising Online Virus Scanner, which can be exploited by malicious people to compromise a user's system.

tags | advisory, virus
MD5 | b53cc6bfa7e240676a6e783adde0552c
Secunia Security Advisory 29115
Posted Feb 26, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for sword. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | linux, fedora
MD5 | 2b4e81416d65744e728fdec9e8d3f20a
Secunia Security Advisory 29117
Posted Feb 26, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gerardo Richarte has reported a vulnerability in VMware products, which can be exploited by malicious, local users or malicious applications to bypass certain security restrictions.

tags | advisory, local
MD5 | 9ce13a385e866c9a64f09eb89afe541a
Secunia Security Advisory 29129
Posted Feb 26, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in KVM, which can be exploited by malicious, local users to bypass certain security restrictions.

tags | advisory, local
MD5 | 9c076cf1fe1ae1e51128dab07386055c
Secunia Security Advisory 29065
Posted Feb 26, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for acroread. This fixes some vulnerabilities, some of which have unknown impacts, while others can be exploited by malicious people to conduct cross-site request forgery attacks, cause a DoS (Denial of Service), or compromise a user's system.

tags | advisory, denial of service, vulnerability, csrf
systems | linux, redhat
MD5 | 26f0f67e1aa47dc68f6a5c4a85d6858f
Secunia Security Advisory 29054
Posted Feb 26, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for alsa-driver. This fixes a vulnerability, which can be exploited by malicious, local users to disclose potentially sensitive information.

tags | advisory, local
systems | linux, debian
MD5 | 93359725516dd1279f5801bc7058ebdf
Page 1 of 2
Back12Next

File Archive:

April 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    21 Files
  • 2
    Apr 2nd
    35 Files
  • 3
    Apr 3rd
    21 Files
  • 4
    Apr 4th
    16 Files
  • 5
    Apr 5th
    15 Files
  • 6
    Apr 6th
    1 Files
  • 7
    Apr 7th
    2 Files
  • 8
    Apr 8th
    23 Files
  • 9
    Apr 9th
    19 Files
  • 10
    Apr 10th
    15 Files
  • 11
    Apr 11th
    14 Files
  • 12
    Apr 12th
    11 Files
  • 13
    Apr 13th
    2 Files
  • 14
    Apr 14th
    5 Files
  • 15
    Apr 15th
    14 Files
  • 16
    Apr 16th
    19 Files
  • 17
    Apr 17th
    19 Files
  • 18
    Apr 18th
    8 Files
  • 19
    Apr 19th
    4 Files
  • 20
    Apr 20th
    5 Files
  • 21
    Apr 21st
    1 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close