exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 17 of 17 RSS Feed

Files Date: 2008-07-22

Ubuntu Security Notice 627-1
Posted Jul 22, 2008
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 627-1 - Dan Kaminsky discovered weaknesses in the DNS protocol as implemented by Dnsmasq. A remote attacker could exploit this to spoof DNS entries and poison DNS caches. Among other things, this could lead to misdirected email and web traffic.

tags | advisory, remote, web, spoof, protocol
systems | linux, ubuntu
advisories | CVE-2008-1447
SHA-256 | cb404dc54429d950c1d1d7ecc6e18257623b69fed004179d6405f75cc94eea70
DSECRG-08-032.txt
Posted Jul 22, 2008
Authored by Digital Security Research Group | Site dsecrg.com

Claroline eLearning and eWorking Platform version 1.8.10 suffers from cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 8a6fd8d055c7b39b99b5e06c88f885a8a11ce9a0d9b35e02b9bac37f97aaf94d
Debian Linux Security Advisory 1613-1
Posted Jul 22, 2008
Authored by Debian | Site debian.org

Debian Security Advisory 1613-1 - Multiple vulnerabilities have been identified in libgd2, a library for programmatic graphics creation and manipulation. The Common Vulnerabilities and Exposures project identifies the following three issues:

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2007-3476, CVE-2007-3477, CVE-2007-3996, CVE-2007-2445
SHA-256 | 1ec400aa47c3df11688f737aeb1905ab1846b62ee1039d4e1efa0f452cf223c9
Mandriva Linux Security Advisory 2008-151
Posted Jul 22, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - A buffer overflow vulnerability in libxslt could be exploited via an XSL style sheet file with a long XLST transformation match condition, which could possibly lead to the execution of arbitrary code. The updated packages have been patched to correct this issue.

tags | advisory, overflow, arbitrary
systems | linux, mandriva
advisories | CVE-2008-1767
SHA-256 | d77255632167d8e079334e1ac6dc2207c1e4054933ef0bd049ea348c40534caf
Secunia Security Advisory 31125
Posted Jul 22, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Zoph, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, vulnerability, sql injection
SHA-256 | 47dd4f357d1a9f6d46fe1a92e294c1d727de6b19f8021f2ff99112bb41fd0331
Secunia Security Advisory 31136
Posted Jul 22, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for acroread. This fixes a security issue and a vulnerability, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to compromise a user's system.

tags | advisory, local
systems | linux, redhat
SHA-256 | e71a26a177bb392608dda0cb7bd35aced95debaa223795b1128b8eb998aad8aa
Secunia Security Advisory 31147
Posted Jul 22, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in phpScheduleIt, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | 73e607ceb74e96aa1e8d56904b9bf7d30eb283a3f7987b85ad474177efb3d0fc
Secunia Security Advisory 31162
Posted Jul 22, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Mr.SQL has reported a vulnerability in MojoAuto, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 135bfe759d7f6eaab1ec7d9352517a36cbe0bf382e394a7e574a1e7a29589b1d
Secunia Security Advisory 31169
Posted Jul 22, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - rPath has issued an update for bind. This fixes a vulnerability, which can be exploited by malicious people to poison the DNS cache.

tags | advisory
SHA-256 | e5e84cdef553d6b451118bbd300ff981c2ee00a0183b22b084f613093e9ee6c7
Secunia Security Advisory 31174
Posted Jul 22, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - CWH Underground has discovered some vulnerabilities in Def-Blog, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, vulnerability, sql injection
SHA-256 | 7a71b8cc90fc80b71bb5d26f1cc98b654fed550dfc30e9a7281846e6a25c66e5
Secunia Security Advisory 31192
Posted Jul 22, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Khashayar Fereidani has discovered some vulnerabilities in EasyE-Cards, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks.

tags | advisory, vulnerability, xss, sql injection
SHA-256 | 3a4d2790842f518a896eedbeee0168dd6635220395de33c3d84a25e62da4f572
GNU SIP Witch Telephony Server
Posted Jul 22, 2008
Authored by David Sugar | Site gnutelephony.org

GNU SIP Witch is a pure SIP-based office telephone call server that supports generic phone system features like call forwarding, hunt groups and call distribution, call coverage and ring groups, holding, and call transfer, as well as offering SIP specific capabilities such as presence and messaging. It supports secure telephone extensions for making calls over the Internet, and intercept/decrypt-free peer-to-peer audio and video extensions. It is not a SIP proxy, a multi-protocol telephone server, or an IP-PBX, and does not try to emulate Asterisk, FreeSWITCH, or Yate.

Changes: Introduction of cgi control interface, server state support and use of state.xml config to set state properties, and more.
tags | telephony, protocol
SHA-256 | 9a9b4b2231879cfe08831865d54b6c2c0b4dd0b7b48dff234e7966295d71c73a
pkd-1.0.tgz
Posted Jul 22, 2008
Authored by eric

ipt_pkd is an iptables extension implementing port knock detection. This project provides 3 parts: the kernel module ipt_pkd, the iptables user space module libipt_pkd.so, and a user space client knock program. For the knock packet, it uses a UDP packet sent to a random port that contains a SHA-256 of a timestamp, small header, random bytes, and a shared key. ipt_pkd checks the time window of the packet and does the SHA-256 to verify the packet. The shared key is never sent.

Changes: Support for 2.6.25 kernels, various additions and improvements.
tags | tool, kernel, udp, firewall
systems | linux
SHA-256 | b916e1e9b1aa5e336281e12310107a6a4b78a6bde277739bf28b965060f2df78
shopcartdx-sql.txt
Posted Jul 22, 2008
Authored by Cr@zy_King

ShopCartDx version 4.30 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | ce0f42243468c7e69336f7301ab5eb0135d96feb69b949855b5dc2ee8fd2f4ed
youtubeblog-rfisqlxss.txt
Posted Jul 22, 2008
Authored by unohope | Site chroot.org

YouTube Blog version 0.1 suffers from remote file inclusion, SQL injection, and cross site scripting vulnerabilities.

tags | exploit, remote, vulnerability, code execution, xss, sql injection, file inclusion
SHA-256 | a50e2f091599c999be8c97a2747599e63ccf5a3b8efd6f918620e97a81dcb80d
intellitamper-overflow.txt
Posted Jul 22, 2008
Authored by Guido Landi

IntelliTamper version 2.0.7 html parser remote buffer overflow exploit.

tags | exploit, remote, overflow
SHA-256 | ee4d8782a990f920991b6dd6b69efd2bb04c56e1b8a33d5b8fc628cb5e1c246e
modjk1219-overflow.txt
Posted Jul 22, 2008
Authored by unohope | Site chroot.org

Apache mod_jk version 1.2.19 remote buffer overflow exploit for win32.

tags | exploit, remote, overflow
systems | windows
SHA-256 | 52e6834ca38fee98b4404e27c3dfaee4c68b36555f1efbb823cce0f071cf1ab8
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close