exploit the possibilities
Showing 1 - 25 of 68 RSS Feed

Files Date: 2008-06-05

Secunia Security Advisory 30538
Posted Jun 5, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sun has acknowledged a vulnerability in Solaris, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise a vulnerable system.

tags | advisory, denial of service
systems | solaris
MD5 | 3dee6f4b200be4e41bfc1458ab6a2c0a
Secunia Security Advisory 30555
Posted Jun 5, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Asterisk Addons, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | 939433c3bd8a7738602c4b9a6232f107
f5firepass-xss.txt
Posted Jun 5, 2008
Authored by nnposter

F5 FirePass suffers from a cross site scripting vulnerability in relation to content inspection management. The vulnerability has been identified in version 6.0.2, hotfix 3. However, other versions may be also affected.

tags | exploit, xss
MD5 | 07aa0a1c0fd4a91a93006d9f5d181bb1
Secunia Security Advisory 30540
Posted Jun 5, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - CWH Underground has reported some vulnerabilities in PHP Address Book, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks.

tags | advisory, php, vulnerability, xss, sql injection
MD5 | 4dcd298e9792e1e6054cee4c33451cfb
iDEFENSE Security Advisory 2008-06-04.4
Posted Jun 5, 2008
Authored by iDefense Labs | Site idefense.com

iDefense Security Advisory 06.04.08 - Local exploitation of an untrusted library path vulnerability in multiple products distributed by VMware Inc. could allow an attacker to execute arbitrary code with root privileges. The Linux version of VMware products include a program called 'vmware-authd', which is installed set-uid root. When this program is executed, it reads configuration options from the executing user's VMware configuration file. One such option allows the user to specify the directory in which to look for shared library modules needed by the program. By loading a specially crafted library, an attacker can execute arbitrary code with elevated privileges. iDefense confirmed the existence of this vulnerability in the following VMware products: VMware Workstation 6.0.2.59824 for Linux, VMware GSX Server 3.2.1.14497 for Linux, and VMware ESX Server 3.0.1.32039.

tags | advisory, arbitrary, local, root
systems | linux
advisories | CVE-2008-0967
MD5 | 2a3b23e6378730d10e8b9d874a596767
HP Security Bulletin 2007-14.28
Posted Jun 5, 2008
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin - A potential security vulnerability has been identified in HP StorageWorks Storage Mirroring (SWSM) Software. This vulnerability could allow remote execution of arbitrary code.

tags | advisory, remote, arbitrary
advisories | CVE-2008-1661
MD5 | 3e262456cd9e5f8e9270efb1d24b9d02
samtodo-xss.txt
Posted Jun 5, 2008
Authored by SmOk3 | Site davidsopas.com

SamTodo version 1.1 suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 9a88ea5d0c7ebe2f0d7eb60f0b2fc161
Secunia Security Advisory 30461
Posted Jun 5, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - His0k4 has discovered a vulnerability in the Simple Shop Galore component for Joomla!, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
MD5 | 914777ab6975c42e3a63bb63a0504239
Secunia Security Advisory 30543
Posted Jun 5, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for samba. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | linux, suse
MD5 | 81e20699086ea74d5485263fec9ec402
Secunia Security Advisory 30545
Posted Jun 5, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in Sun Service Tag, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
MD5 | a63b1b5ca4a830f38a557d7a291f59b2
Secunia Security Advisory 30551
Posted Jun 5, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Slash, which can be exploited by malicious users to conduct SQL injection attacks and by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss, sql injection
MD5 | 9ed3162deca1d8a580580c958db34994
linksyswrh54g-dos.txt
Posted Jun 5, 2008
Authored by dubingyao

The Cisco Linksys router WRH54G httpd suffers from a denial of service vulnerability that does not require authentication. Proof of concept included.

tags | exploit, denial of service, proof of concept
systems | cisco
MD5 | 5a011e1f9f1b4a9a9436026bdce8a15d
blackicebidib-download.txt
Posted Jun 5, 2008
Authored by shinnai | Site shinnai.altervista.org

Black Ice Software Inc. Barcode SDK arbitrary file download and memory corruption exploit that makes use of BIDIB.ocx version 10.9.3.0.

tags | exploit, arbitrary
MD5 | 33ee700c1987b6dff72cc5ce4b304d80
blackicebitiff2-overflow.txt
Posted Jun 5, 2008
Authored by shinnai | Site shinnai.altervista.org

Black Ice Software Inc. Barcode SDK remote buffer overflow exploit that makes use of BITiff.ocx version 10.9.3.0. Second version of this exploit.

tags | exploit, remote, overflow
MD5 | a7404af59641dc13adf53f8ba2600473
blackicebitiff-overflow.txt
Posted Jun 5, 2008
Authored by shinnai | Site shinnai.altervista.org

Black Ice Software Inc. Barcode SDK remote buffer overflow exploit that makes use of BITiff.ocx version 10.9.3.0.

tags | exploit, remote, overflow
MD5 | 89e802d2016a3462e805de5f7c86a968
joomladate-sql.txt
Posted Jun 5, 2008
Authored by His0k4

The Joomla JoomlaDate component suffers from a SQL injection vulnerability.

tags | exploit, sql injection
MD5 | ab8ad660a232224445c009b2a8e5471e
asterisksip-dos.txt
Posted Jun 5, 2008
Authored by Armando Oliveira

Asterisk remote crash exploit that makes use of the SIP channel driver when run in pedantic mode.

tags | exploit, remote, denial of service
MD5 | 1c312f6fe209dc9959730ad9b4829bca
psys-sql.txt
Posted Jun 5, 2008
Authored by h0yt3r

pSys version 0.7.0.a suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 42bb6e981f6f308503a46f5734c0b1b0
powerphlogger-sql.txt
Posted Jun 5, 2008
Authored by MustLive

Power Phlogger version 2.2.5 suffers from a SQL injection vulnerability.

tags | exploit, sql injection
MD5 | cbd53e00b654fd4065a6356ec1462ee3
joomlasimple-sql.txt
Posted Jun 5, 2008
Authored by His0k4

The Joomla simpleshop component versions 3.4 and below suffer from a SQL injection vulnerability.

tags | exploit, sql injection
MD5 | f5d41946754579a45ab719e45fd8294e
426bb-sqlxss.txt
Posted Jun 5, 2008
Authored by CWH Underground | Site citecclub.org

427BB version 2.3.1 suffers from SQL injection and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, sql injection
MD5 | 39ae5243472c6a1c2df7ce37b5e84be1
e107echat-sql.txt
Posted Jun 5, 2008
Authored by hadihadi | Site virangar.org

The e107 eChat Menu plugin suffers from a blind SQL injection vulnerability.

tags | exploit, sql injection
MD5 | e6a10dd8d667c696408b215727519fe2
akamai-downloadmanager.txt
Posted Jun 5, 2008
Authored by cocoruder | Site ruder.cdut.net

A parameter injection vulnerability exists in Akamai Download Manager. By exploiting this vulnerability, the remote attacker can make the users to download arbitrary file, and save it to arbitrary location while they are visiting a vicious web page. It means an attacker who successfully exploits this vulnerability can run arbitrary code on the affected system. Akamai Download Manager ActiveX control version 2.2.3.5 is affected.

tags | advisory, remote, web, arbitrary, activex
advisories | CVE-2008-1770
MD5 | 972939a7a53ae8769b81b22a6fa4dffc
AST-2008-009.txt
Posted Jun 5, 2008
Authored by Tzafrir Cohen | Site asterisk.org

Asterisk Project Security Advisory - The ooh323 channel driver provided in Asterisk Addons used a TCP connection to pass commands internally. The payload of these packets included addresses of memory which were to be freed after the command was processed. By sending arbitrary data to the listening TCP socket, one could cause an almost certain crash since the command handler would attempt to free invalid memory. This problem was made worse by the fact that the listening TCP socket was bound to whatever IP address was specified by the "bindaddr" option in ooh323.conf.

tags | advisory, arbitrary, tcp
advisories | CVE-2008-2543
MD5 | 08de5b8e2e15b1b9e7da7a41667b223e
CAID-scmgw.txt
Posted Jun 5, 2008
Authored by Sebastian Apelt, Cody Pierce | Site www3.ca.com

CA Secure Content Manager contains multiple vulnerabilities in the HTTP Gateway service that can allow a remote attacker to cause a denial of service condition or execute arbitrary code.

tags | advisory, remote, web, denial of service, arbitrary, vulnerability
MD5 | 8ec4ecb144db690c89a16b3fe908a140
Page 1 of 3
Back123Next

File Archive:

August 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    3 Files
  • 2
    Aug 2nd
    2 Files
  • 3
    Aug 3rd
    32 Files
  • 4
    Aug 4th
    22 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    19 Files
  • 7
    Aug 7th
    6 Files
  • 8
    Aug 8th
    1 Files
  • 9
    Aug 9th
    2 Files
  • 10
    Aug 10th
    27 Files
  • 11
    Aug 11th
    11 Files
  • 12
    Aug 12th
    11 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close