Exploit the possiblities
Showing 1 - 22 of 22 RSS Feed

Files Date: 2008-08-29

phpemlak-sql.txt
Posted Aug 29, 2008
Authored by Hussin X | Site tryag.cc

Full PHP Emlak Script suffers from a remote SQL injection vulnerability in landsee.php.

tags | exploit, remote, php, sql injection
MD5 | 0d78a18e819716d1f441a5ad3024be3e
scip-dreambox.txt
Posted Aug 29, 2008
Authored by Marc Ruef | Site scip.ch

An input validation error within the web interface of Dreambox model DM500C allows for a denial of service condition.

tags | advisory, web, denial of service
MD5 | 249afecfcb2122f8d5df9de75eb67421
logmein-activex.txt
Posted Aug 29, 2008
Authored by Yag Kohha

LogMeIn remote access utility Active-X memory consumption denial of service exploit.

tags | exploit, remote, denial of service, activex
MD5 | e12c30e8f96bf5c07afba2181139dc26
najdisi-overflow.txt
Posted Aug 29, 2008
Authored by shinnai | Site shinnai.altervista.org

Najdi.si Toolbar Active-X remote buffer overflow proof of concept exploit.

tags | exploit, remote, overflow, activex, proof of concept
MD5 | 4a245592d331db41db8244311ef61d31
ipb235-multi.txt
Posted Aug 29, 2008
Authored by DarkFig

Invision Power Board versions 2.3.5 and below remote exploit that brute forces, attempts IDS evasion, and more.

tags | exploit, remote
MD5 | a4f25aaae79e8aa14fd8d1ea7af1c1d9
hoagie_snoop.c
Posted Aug 29, 2008
Authored by Andi | Site void.at

Sun Solaris 8/9/10 and OpenSolaris versions below snv_96 snoop utility remote exploit.

tags | exploit, remote
systems | solaris
MD5 | 808193e9a074d86648b31609b4886635
Secunia Security Advisory 31632
Posted Aug 29, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - shinnai has reported some vulnerabilities in Ultra Office Control, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
MD5 | 223ceb42a6950cee86de55bdf831977a
Secunia Security Advisory 31670
Posted Aug 29, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for libtiff. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system.

tags | advisory, denial of service, vulnerability
systems | linux, redhat
MD5 | 480e38cc56634bf47a673162603a0e7d
Zero Day Initiative Advisory 08-054
Posted Aug 29, 2008
Authored by Tipping Point | Site zerodayinitiative.com

A vulnerability allows remote attackers to execute arbitrary code on systems with vulnerable installations of messaging applications that make use of the libpurple library. User interaction is not required to exploit this vulnerability. The specific flaw exists in the implementation of the MSN protocol, specifically the handling of SLP messages. The function msn_slplink_process_msg() fails to properly validate an offset value specified in the SLP packet. By providing a specific value, an attacker can overflow a heap buffer resulting in arbitrary code execution.

tags | advisory, remote, overflow, arbitrary, code execution, protocol
advisories | CVE-2008-2927
MD5 | d76ab9bcd5ffc3e70e7f81027f487560
Mandriva Linux Security Advisory 2008-181
Posted Aug 29, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - Two denial of service vulnerabilities were discovered in the ipsec-tools racoon daemon, which could allow a remote attacker to cause it to consume all available memory. The updated packages have been patched to prevent these issues.

tags | advisory, remote, denial of service, vulnerability
systems | linux, mandriva
advisories | CVE-2008-3651, CVE-2008-3652
MD5 | 2d7f6108eed9a9dc420bf8b8ca56cdb7
kisgearth-0.01f.tar.bz2
Posted Aug 29, 2008
Authored by Richard Sammet | Site e-axe.mytty.org

Kisgearth is a small perl script that gives you the ability to convert your Kismet xml logfiles to GoogleEarth kml files. You can apply a lot of filters and use sorting/ordering functions in order to get the best results.

tags | tool, perl, wireless
MD5 | b90a6b1724452a768c81af392dcff196
firefox301-exec.txt
Posted Aug 29, 2008
Authored by Beenu Arora | Site beenuarora.com

Firefox version 3.0.1 (final release) suffers from an unspecified remote code execution vulnerability.

tags | advisory, remote, code execution
MD5 | e5305be99ab1f77ca6497f785fd1274e
OpenSSH-4.4p1-backdoored.tar.gz
Posted Aug 29, 2008
Authored by Balla

OpenSSH version 4.4p1 backdoor that logs all incoming and outgoing logins and password via the client and the daemon, adds a magic password for sshd, store passwords to an encrypted logfile, and disables logging if the magic password is used. Based on the Aion 3.8p1 patch.

tags | encryption
MD5 | 192f15fe0fcea062231c3f66884c8f81
dotproject-sqlxss.txt
Posted Aug 29, 2008
Authored by C1c4Tr1Z | Site lowsec.org

dotProject version 2.1.2 suffers from cross site scripting and SQL injection vulnerabilities.

tags | exploit, vulnerability, xss, sql injection
MD5 | 1b9c35808b2257054fb9d7ccb5a78d0c
Lynis Auditing Tool 1.2.0
Posted Aug 29, 2008
Authored by Michael Boelen | Site cisofy.com

Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems.

Changes: Multiple new tests added, various support added, and various changes.
tags | tool, scanner
systems | unix
MD5 | 7b66c5c9f4febd9441c0cc63ded8c345
HP Security Bulletin 2008-01.18
Posted Aug 29, 2008
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin - A potential security vulnerability has been identified with HP-UX running Apache. These vulnerabilities could be exploited remotely resulting in Cross Site Scripting (XSS) or Denial of Service (DoS).

tags | advisory, denial of service, vulnerability, xss
systems | hpux
advisories | CVE-2007-4465, CVE-2008-2168, CVE-2008-2364
MD5 | 50243815f59ecafcedf99163c1ad9ff7
sara-7.8.1.tgz
Posted Aug 29, 2008
Authored by Advanced Research Corporation | Site www-arc.com

Security Auditor's Research Assistant (SARA) is a security analysis tool based on the SATAN model. It is updated twice a month to address the latest threats. Checks for common old holes, backdoors, trust relationships, default cgi, common logins, open shares, and much more.

Changes: Various changes and additions.
tags | tool, cgi, scanner
systems | unix
MD5 | 8127e08b1ff85620eb093c95e357543b
mercadolibre-xssrfi.txt
Posted Aug 29, 2008
Authored by Ivan Sanchez | Site nullcode.com.ar

Mercadolibre.com suffers from cross site scripting and remote javascript insertion vulnerabilities.

tags | exploit, remote, javascript, vulnerability, code execution, xss, file inclusion
MD5 | 26ab2008a67c3c1880359d16155ec80f
strongSwan IPsec / IKEv1 / IKEv2 Implementation For Linux
Posted Aug 29, 2008
Authored by Andreas Steffen | Site strongswan.org

strongSwan is a complete IPsec and IKEv1 implementation for Linux 2.4 and 2.6 kernels. It interoperates with most other IPsec-based VPN products. It is a descendant of the discontinued FreeS/WAN project. The focus of the strongSwan project is on strong authentication mechanisms using X.509 public key certificates and optional secure storage of private keys on smartcards through a standardized PKCS#11 interface. A unique feature is the use of X.509 attribute certificates to implement advanced access control schemes based on group memberships.

Changes: A NetworkManager plugin allows GUI-based configuration of road-warrior clients in a simple way. A new EAP-GTC plugin implements draft-sheffer-ikev2-gtc-00.txt and allows username/password authentication against any PAM service on the gateway. Various other fixes and additions.
tags | kernel, encryption
systems | linux
MD5 | 918fa35839013b14bd4b972853aeedb4
friendly-exec.txt
Posted Aug 29, 2008
Authored by spdr

Friendly Technologies Active-X related remote command execution exploit that leverages fwRemoteCfg.dll.

tags | exploit, remote, activex
MD5 | 4ca334d8cb11512389b2598b255c2e16
friendly-fwremotecfg.txt
Posted Aug 29, 2008
Authored by spdr

Friendly Technologies Active-X remote buffer overflow exploit that leverages fwRemoteCfg.dll.

tags | exploit, remote, overflow, activex
MD5 | 89e10b34b9b9cc0ea532944e20fc1f6f
acoustica-overflow.txt
Posted Aug 29, 2008
Authored by koshi

Acoustica Mixcraft versions 4.2 Build 98 and below mx4 file local buffer overflow exploit.

tags | exploit, overflow, local
MD5 | 88d4635a1cb1ff5e03e8fe080c837dd4
Page 1 of 1
Back1Next

File Archive:

November 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    22 Files
  • 2
    Nov 2nd
    28 Files
  • 3
    Nov 3rd
    10 Files
  • 4
    Nov 4th
    1 Files
  • 5
    Nov 5th
    5 Files
  • 6
    Nov 6th
    15 Files
  • 7
    Nov 7th
    15 Files
  • 8
    Nov 8th
    13 Files
  • 9
    Nov 9th
    9 Files
  • 10
    Nov 10th
    9 Files
  • 11
    Nov 11th
    3 Files
  • 12
    Nov 12th
    2 Files
  • 13
    Nov 13th
    15 Files
  • 14
    Nov 14th
    17 Files
  • 15
    Nov 15th
    19 Files
  • 16
    Nov 16th
    15 Files
  • 17
    Nov 17th
    19 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close