exploit the possibilities
Showing 1 - 25 of 63 RSS Feed

Files Date: 2008-08-01

phsblog-sql.txt
Posted Aug 1, 2008
Authored by cOndemned | Site condemned.r00t.la

phsBlog version 0.1.1 suffers from multiple remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
MD5 | 16f15cfe5d216d242233225083a78d8c
Secunia Security Advisory 31230
Posted Aug 1, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Chris Evans has reported some vulnerabilities in libxslt, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library.

tags | advisory, denial of service, vulnerability
MD5 | 4f9eb21daf5024c30464d9ea76e8be4b
Secunia Security Advisory 31317
Posted Aug 1, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for vlc. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | linux, gentoo
MD5 | c9b1e361475c4ff96f2ec96967833bd9
Secunia Security Advisory 31319
Posted Aug 1, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in CA ARCserve Backup for Laptops and Desktops, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system.

tags | advisory, denial of service
MD5 | 7f7c2dca2d52ad2fc3d52621cfe3dac5
Secunia Security Advisory 31320
Posted Aug 1, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for java-1.5.0-ibm. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, disclose sensitive information, or compromise a vulnerable system.

tags | advisory, java, vulnerability
systems | linux, redhat
MD5 | a1fa9de41ae307a54afe9bacb3109b2e
Secunia Security Advisory 31328
Posted Aug 1, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Avaya has acknowledged a vulnerability in Perl in Avaya Communication Manager, which can potentially be exploited by malicious people to compromise a vulnerable system.

tags | advisory, perl
MD5 | c2577feaedb5febecbb325f09f65a444
Secunia Security Advisory 31321
Posted Aug 1, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has acknowledged a vulnerability in RealPlayer, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | linux, redhat
MD5 | 24802aa35b9c198ff500e8847da877a4
Secunia Security Advisory 31322
Posted Aug 1, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for nfs-utils. This fixes a security issue, which can be exploited by malicious people to potentially bypass certain security restrictions.

tags | advisory
systems | linux, redhat
MD5 | 2dbc8622c9380aa12166e6b205141100
Secunia Security Advisory 31325
Posted Aug 1, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in MailEnable, which can be exploited by malicious users to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | eacf303e2f8bcc04dcdf9be844812605
Secunia Security Advisory 31298
Posted Aug 1, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - NoGe has discovered a vulnerability in LetterIt, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
MD5 | 7cbcb53ef41aa8f0fa7464da63d49599
Secunia Security Advisory 31302
Posted Aug 1, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - CraCkEr has reported a vulnerability in phpMyRealty (PMR), which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
MD5 | 7afd77eb6786e179f9e18ed16b1b4e81
Secunia Security Advisory 31310
Posted Aug 1, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for libxslt. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library.

tags | advisory, denial of service, vulnerability
systems | linux, debian
MD5 | f8e12d8cdf66cb0af2252af584639d21
Secunia Security Advisory 31326
Posted Aug 1, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Apple has issued a security update for Mac OS X, which fixes multiple vulnerabilities.

tags | advisory, vulnerability
systems | apple, osx
MD5 | 46b78e4e0520bebe50c885b193e5722c
Secunia Security Advisory 31331
Posted Aug 1, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for libxslt. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library.

tags | advisory, denial of service, vulnerability
systems | linux, redhat
MD5 | 2d87a556f94bd6ce11197f2f9b849d83
PuttyHijackV1.0.rar
Posted Aug 1, 2008
Authored by Brett Moore | Site insomniasec.com

PuttyHijack is a proof of concept tool that injects a dll into the Putty process to hijack an existing, or soon to be created, connection. This can be useful during penetration tests when a windows box that has been compromised is used to SSH/Telnet into other servers. The injected DLL installs some hooks and creates a socket for a callback connection that is then used for input/output redirection. It does not kill the current connection, and will cleanly uninject if the socket or process is stopped.

tags | exploit, proof of concept
systems | windows
MD5 | 03b47e35a515d93ba711dea00d84ba5d
Secunia Security Advisory 31306
Posted Aug 1, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for MozillaFirefox. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, disclose sensitive information, and compromise a vulnerable system.

tags | advisory, vulnerability
systems | linux, suse
MD5 | e5a801f4eb023092490eac5f5de7c927
Secunia Security Advisory 31313
Posted Aug 1, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Knud Erik H

tags | advisory, denial of service
MD5 | 4d14febb394d1af6502de33ee7c998bd
Mandriva Linux Security Advisory 2008-160
Posted Aug 1, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - Chris Evans of the Google Security Team found a vulnerability in the RC4 processing code in libxslt that did not properly handle corrupted key information. A remote attacker able to make an application linked against libxslt process malicious XML input could cause the application to crash or possibly execute arbitrary code with the privileges of the application in question. The updated packages have been patched to correct this issue.

tags | advisory, remote, arbitrary
systems | linux, mandriva
advisories | CVE-2008-2935
MD5 | 67580353b9a9d91c19f5d9e9b6a09747
iDEFENSE Security Advisory 2008-07-31.1
Posted Aug 1, 2008
Authored by iDefense Labs, Pariente Kobi | Site idefense.com

iDefense Security Advisory 07.31.08 - Remote exploitation of an integer overflow vulnerability in Apple Inc.'s Mac OS X could allow an attacker to execute arbitrary code with the privileges of the currently logged in user. This vulnerability exists due to the way PDF files containing Type 1 fonts are handled. When processing a font with an overly large length, integer overflow could occur. This issue leads to heap corruption which can allow for arbitrary code execution. iDefense has confirmed the existence of this vulnerability in Mac OS X version 10.5.2. Previous versions may also be affected.

tags | advisory, remote, overflow, arbitrary, code execution
systems | apple, osx
advisories | CVE-2008-2322
MD5 | 772937f408af6494ec81f8661b04c5fb
dns_mre-v1.0.tar.gz
Posted Aug 1, 2008
Authored by AR Samhuri | Site securebits.org

The DNS Multiple Race Exploiting Tool exploits an inherent bug in the implementation of DNS Cache. The result of this exploitation is cache poisoning/overwriting with new entries.

tags | exploit
advisories | CVE-2008-1447
MD5 | a080cf0d3d5faa5bc1351c55d9f43415
n.runs-SA-2008.005.txt
Posted Aug 1, 2008
Authored by Sergio Alvarez | Site nruns.com

A stack buffer overflow vulnerability exists in the CarbonCore framework from Apple, Inc.

tags | advisory, overflow
systems | apple
MD5 | 6aa8a2ebacfdc2d5dfd444fa7bad3fa3
ARP-Scan ARP Generation Tool 1.7
Posted Aug 1, 2008
Authored by Roy Hills | Site nta-monitor.com

arp-scan sends ARP (Address Resolution Protocol) queries to the specified targets, and displays any responses that are received. It allows any part of the outgoing ARP packets to be changed, allowing the behavior of targets to non-standard ARP packets to be examined. The IP address and hardware address of received packets are displayed, together with the vendor details. These details are obtained from the IEEE OUI and IAB listings, plus a few manual entries. It includes arp-fingerprint, which allows a system to be fingerprinted based on how it responds to non-standard ARP packets.

tags | tool, scanner, protocol
systems | unix
MD5 | a9927dba2b1dbdfd1c3b3bb09615fc14
estoreaff-sql.txt
Posted Aug 1, 2008
Authored by Mr.SQL | Site pal-hacker.com

eStoreAff version 0.1 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 4c2c15f1073d98b255067de51310b458
ipost-sql.txt
Posted Aug 1, 2008
Authored by Mr.SQL | Site pal-hacker.com

iPost version 1.0.1 from Scripts24 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 4095fb3836383626f97f836bc4779451
itgp-sql.txt
Posted Aug 1, 2008
Authored by Mr.SQL | Site pal-hacker.com

iTGP version 1.0.4 from Scripts24 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | fdd9e1ff7e80a5db8d81fd8aa2f1a11c
Page 1 of 3
Back123Next

File Archive:

April 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    60 Files
  • 2
    Apr 2nd
    20 Files
  • 3
    Apr 3rd
    8 Files
  • 4
    Apr 4th
    0 Files
  • 5
    Apr 5th
    0 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    0 Files
  • 9
    Apr 9th
    0 Files
  • 10
    Apr 10th
    0 Files
  • 11
    Apr 11th
    0 Files
  • 12
    Apr 12th
    0 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    0 Files
  • 16
    Apr 16th
    0 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close