Exploit the possiblities
Showing 1 - 25 of 774 RSS Feed

Files Date: 2008-08-01 to 2008-08-31

webid-sql.txt
Posted Aug 30, 2008
Authored by Fisher762

WeBid version 0.5.4 suffers from SQL injection and cascading style sheet editing vulnerabilities.

tags | exploit, vulnerability, sql injection
MD5 | 335cef97e7354fd8b02fb9e3f927c68d
myphpnuke-sqlxss.txt
Posted Aug 30, 2008
Authored by MustLive

myPHPNuke versions below 1.8.8_8rc2 suffer from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
MD5 | c4538c573fd2f683930218f2e7e36064
wordstag-sql.txt
Posted Aug 30, 2008
Authored by Hussin X | Site tryag.cc

Words Tag Script version 1.2 suffers from a SQL injection vulnerability.

tags | exploit, sql injection
MD5 | 22e3f522816cf3404917fdc26c9a4635
webdirscript-sql.txt
Posted Aug 30, 2008
Authored by Hussin X | Site tryag.cc

Web Directory Script version 1.5.3 suffers from a SQL injection vulnerability.

tags | exploit, web, sql injection
MD5 | 79368d862335903a7e309c5f4da8c602
brim-sqlxss.txt
Posted Aug 30, 2008
Authored by Fisher762

Brim version 2.0.0 suffers from remote SQL injection and cross site scripting vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
MD5 | f1327883034190b13e571ff582d8936f
friendly-readwrite.txt
Posted Aug 30, 2008
Authored by spdr

Friendly Technologies read/write register/read files exploit.

tags | exploit
MD5 | d61b3427133c88dc3f1060f4c457bea6
phpemlak-sql.txt
Posted Aug 29, 2008
Authored by Hussin X | Site tryag.cc

Full PHP Emlak Script suffers from a remote SQL injection vulnerability in landsee.php.

tags | exploit, remote, php, sql injection
MD5 | 0d78a18e819716d1f441a5ad3024be3e
scip-dreambox.txt
Posted Aug 29, 2008
Authored by Marc Ruef | Site scip.ch

An input validation error within the web interface of Dreambox model DM500C allows for a denial of service condition.

tags | advisory, web, denial of service
MD5 | 249afecfcb2122f8d5df9de75eb67421
logmein-activex.txt
Posted Aug 29, 2008
Authored by Yag Kohha

LogMeIn remote access utility Active-X memory consumption denial of service exploit.

tags | exploit, remote, denial of service, activex
MD5 | e12c30e8f96bf5c07afba2181139dc26
najdisi-overflow.txt
Posted Aug 29, 2008
Authored by shinnai | Site shinnai.altervista.org

Najdi.si Toolbar Active-X remote buffer overflow proof of concept exploit.

tags | exploit, remote, overflow, activex, proof of concept
MD5 | 4a245592d331db41db8244311ef61d31
ipb235-multi.txt
Posted Aug 29, 2008
Authored by DarkFig

Invision Power Board versions 2.3.5 and below remote exploit that brute forces, attempts IDS evasion, and more.

tags | exploit, remote
MD5 | a4f25aaae79e8aa14fd8d1ea7af1c1d9
hoagie_snoop.c
Posted Aug 29, 2008
Authored by Andi | Site void.at

Sun Solaris 8/9/10 and OpenSolaris versions below snv_96 snoop utility remote exploit.

tags | exploit, remote
systems | solaris
MD5 | 808193e9a074d86648b31609b4886635
Secunia Security Advisory 31632
Posted Aug 29, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - shinnai has reported some vulnerabilities in Ultra Office Control, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
MD5 | 223ceb42a6950cee86de55bdf831977a
Secunia Security Advisory 31670
Posted Aug 29, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for libtiff. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system.

tags | advisory, denial of service, vulnerability
systems | linux, redhat
MD5 | 480e38cc56634bf47a673162603a0e7d
Zero Day Initiative Advisory 08-054
Posted Aug 29, 2008
Authored by Tipping Point | Site zerodayinitiative.com

A vulnerability allows remote attackers to execute arbitrary code on systems with vulnerable installations of messaging applications that make use of the libpurple library. User interaction is not required to exploit this vulnerability. The specific flaw exists in the implementation of the MSN protocol, specifically the handling of SLP messages. The function msn_slplink_process_msg() fails to properly validate an offset value specified in the SLP packet. By providing a specific value, an attacker can overflow a heap buffer resulting in arbitrary code execution.

tags | advisory, remote, overflow, arbitrary, code execution, protocol
advisories | CVE-2008-2927
MD5 | d76ab9bcd5ffc3e70e7f81027f487560
Mandriva Linux Security Advisory 2008-181
Posted Aug 29, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - Two denial of service vulnerabilities were discovered in the ipsec-tools racoon daemon, which could allow a remote attacker to cause it to consume all available memory. The updated packages have been patched to prevent these issues.

tags | advisory, remote, denial of service, vulnerability
systems | linux, mandriva
advisories | CVE-2008-3651, CVE-2008-3652
MD5 | 2d7f6108eed9a9dc420bf8b8ca56cdb7
kisgearth-0.01f.tar.bz2
Posted Aug 29, 2008
Authored by Richard Sammet | Site e-axe.mytty.org

Kisgearth is a small perl script that gives you the ability to convert your Kismet xml logfiles to GoogleEarth kml files. You can apply a lot of filters and use sorting/ordering functions in order to get the best results.

tags | tool, perl, wireless
MD5 | b90a6b1724452a768c81af392dcff196
firefox301-exec.txt
Posted Aug 29, 2008
Authored by Beenu Arora | Site beenuarora.com

Firefox version 3.0.1 (final release) suffers from an unspecified remote code execution vulnerability.

tags | advisory, remote, code execution
MD5 | e5305be99ab1f77ca6497f785fd1274e
OpenSSH-4.4p1-backdoored.tar.gz
Posted Aug 29, 2008
Authored by Balla

OpenSSH version 4.4p1 backdoor that logs all incoming and outgoing logins and password via the client and the daemon, adds a magic password for sshd, store passwords to an encrypted logfile, and disables logging if the magic password is used. Based on the Aion 3.8p1 patch.

tags | encryption
MD5 | 192f15fe0fcea062231c3f66884c8f81
dotproject-sqlxss.txt
Posted Aug 29, 2008
Authored by C1c4Tr1Z | Site lowsec.org

dotProject version 2.1.2 suffers from cross site scripting and SQL injection vulnerabilities.

tags | exploit, vulnerability, xss, sql injection
MD5 | 1b9c35808b2257054fb9d7ccb5a78d0c
Lynis Auditing Tool 1.2.0
Posted Aug 29, 2008
Authored by Michael Boelen | Site cisofy.com

Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems.

Changes: Multiple new tests added, various support added, and various changes.
tags | tool, scanner
systems | unix
MD5 | 7b66c5c9f4febd9441c0cc63ded8c345
HP Security Bulletin 2008-01.18
Posted Aug 29, 2008
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin - A potential security vulnerability has been identified with HP-UX running Apache. These vulnerabilities could be exploited remotely resulting in Cross Site Scripting (XSS) or Denial of Service (DoS).

tags | advisory, denial of service, vulnerability, xss
systems | hpux
advisories | CVE-2007-4465, CVE-2008-2168, CVE-2008-2364
MD5 | 50243815f59ecafcedf99163c1ad9ff7
sara-7.8.1.tgz
Posted Aug 29, 2008
Authored by Advanced Research Corporation | Site www-arc.com

Security Auditor's Research Assistant (SARA) is a security analysis tool based on the SATAN model. It is updated twice a month to address the latest threats. Checks for common old holes, backdoors, trust relationships, default cgi, common logins, open shares, and much more.

Changes: Various changes and additions.
tags | tool, cgi, scanner
systems | unix
MD5 | 8127e08b1ff85620eb093c95e357543b
mercadolibre-xssrfi.txt
Posted Aug 29, 2008
Authored by Ivan Sanchez | Site nullcode.com.ar

Mercadolibre.com suffers from cross site scripting and remote javascript insertion vulnerabilities.

tags | exploit, remote, javascript, vulnerability, code execution, xss, file inclusion
MD5 | 26ab2008a67c3c1880359d16155ec80f
strongSwan IPsec / IKEv1 / IKEv2 Implementation For Linux
Posted Aug 29, 2008
Authored by Andreas Steffen | Site strongswan.org

strongSwan is a complete IPsec and IKEv1 implementation for Linux 2.4 and 2.6 kernels. It interoperates with most other IPsec-based VPN products. It is a descendant of the discontinued FreeS/WAN project. The focus of the strongSwan project is on strong authentication mechanisms using X.509 public key certificates and optional secure storage of private keys on smartcards through a standardized PKCS#11 interface. A unique feature is the use of X.509 attribute certificates to implement advanced access control schemes based on group memberships.

Changes: A NetworkManager plugin allows GUI-based configuration of road-warrior clients in a simple way. A new EAP-GTC plugin implements draft-sheffer-ikev2-gtc-00.txt and allows username/password authentication against any PAM service on the gateway. Various other fixes and additions.
tags | kernel, encryption
systems | linux
MD5 | 918fa35839013b14bd4b972853aeedb4
Page 1 of 31
Back12345Next

File Archive:

December 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    15 Files
  • 2
    Dec 2nd
    2 Files
  • 3
    Dec 3rd
    1 Files
  • 4
    Dec 4th
    15 Files
  • 5
    Dec 5th
    15 Files
  • 6
    Dec 6th
    18 Files
  • 7
    Dec 7th
    17 Files
  • 8
    Dec 8th
    15 Files
  • 9
    Dec 9th
    13 Files
  • 10
    Dec 10th
    4 Files
  • 11
    Dec 11th
    41 Files
  • 12
    Dec 12th
    44 Files
  • 13
    Dec 13th
    25 Files
  • 14
    Dec 14th
    10 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close