accept no compromises
Showing 1 - 25 of 56 RSS Feed

Files Date: 2008-10-09

Scapy Packet Manipulation Tool 2.0.0.10
Posted Oct 9, 2008
Authored by Philippe Biondi | Site secdev.org

Scapy is a powerful interactive packet manipulation tool, packet generator, network scanner, network discovery tool, and packet sniffer. It provides classes to interactively create packets or sets of packets, manipulate them, send them over the wire, sniff other packets from the wire, match answers and replies, and more. Interaction is provided by the Python interpreter, so Python programming structures can be used (such as variables, loops, and functions). Report modules are possible and easy to make. It is intended to do the same things as ttlscan, nmap, hping, queso, p0f, xprobe, arping, arp-sk, arpspoof, firewalk, irpas, tethereal, tcpdump, etc.

Changes: Various bug fixes and enhancements.
tags | tool, scanner, python
systems | unix
MD5 | 41834e40e531b1b51911e34dafb6049e
caarcserve-dos.txt
Posted Oct 9, 2008
Authored by Ken Williams | Site www3.ca.com

CA ARCserve Backup contains multiple vulnerabilities that can allow a remote attacker to cause a denial of service or possibly execute arbitrary code. CA has issued patches to address the vulnerabilities. The first vulnerability occurs due to insufficient validation of certain RPC call parameters by the message engine service. An attacker can exploit a directory traversal vulnerability to execute arbitrary commands. The second vulnerability occurs due to insufficient validation by the tape engine service. An attacker can make a request that will crash the service. The third vulnerability occurs due to insufficient validation by the database engine service. An attacker can make a request that will crash the service. The fourth vulnerability occurs due to insufficient validation of authentication credentials. An attacker can make a request that will crash multiple services. Note that these issues only affect the base product.

tags | advisory, remote, denial of service, arbitrary, vulnerability
advisories | CVE-2008-4397, CVE-2008-4398, CVE-2008-4399, CVE-2008-4400
MD5 | 3d3a5ef9e28febb30c8e338d187c076a
Gentoo Linux Security Advisory 200810-2
Posted Oct 9, 2008
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200810-02 - A search path vulnerability in Portage allows local attackers to execute commands with root privileges if emerge is called from untrusted directories. The Gentoo Security Team discovered that several ebuilds, such as sys-apps/portage, net-mail/fetchmail or app-editors/leo execute Python code using python -c, which includes the current working directory in Python's module search path. For several ebuild functions, Portage did not change the working directory from emerge's working directory. Versions less than 2.1.4.5 are affected.

tags | advisory, local, root, python
systems | linux, gentoo
advisories | CVE-2008-4394
MD5 | 8b3fc0142e706b0bc424bf0de635b50a
Secunia Security Advisory 32146
Posted Oct 9, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in ModSecurity, which potentially can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
MD5 | abd1059e032f9a1ae37d34a0954bfd14
scriptsezid-download.txt
Posted Oct 9, 2008
Authored by JosS | Site spanish-hackers.com

ScriptsEz Easy Image Downloader suffers from a local file download vulnerability.

tags | exploit, local
MD5 | 743858016ca8218a915bd9d56d6b4da7
scriptsezmhp-lfi.txt
Posted Oct 9, 2008
Authored by JosS | Site spanish-hackers.com

ScriptsEz Mini Hosting Panel suffers from a local file inclusion vulnerability in members.php.

tags | exploit, local, php, file inclusion
MD5 | 586f9b29aa86f65e1e1125e400fd21b7
metasploitSMB.pdf
Posted Oct 9, 2008
Authored by Beenu Arora | Site beenuarora.com

Whitepaper discussing how to exploit vulnerable SMB instances on Microsoft Windows XP using Metasploit.

tags | paper
systems | windows, xp
MD5 | f92ea60895c7f0b1166eb1fe380c08bb
stash103exp.txt
Posted Oct 9, 2008
Authored by Gnix | Site gnix.netsons.org

Stash version 1.0.3 user credential disclosure exploit that leverages a SQL injection vulnerability in admin/login.php.

tags | exploit, php, sql injection
MD5 | ff8f795d430ca06e630097a349e0ac3a
Secunia Security Advisory 32188
Posted Oct 9, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Avaya has acknowledged some vulnerabilities in various Avaya products, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
MD5 | 7d01ebca8ab62399cc822aa49119a0d5
Secunia Security Advisory 32159
Posted Oct 9, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities with unknown impacts have been reported in YaCy.

tags | advisory, vulnerability
MD5 | b51656083b4b46e90da34695fc0f3a19
Secunia Security Advisory 32186
Posted Oct 9, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Roee Hay has discovered a vulnerability in Graphviz, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | c52b81625230171dc7b895fde1bd9c23
Secunia Security Advisory 32195
Posted Oct 9, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in various modules for Drupal, which can be exploited by malicious people to bypass certain security restrictions or disclose sensitive information.

tags | advisory
MD5 | 8922717c0f8a600334586cd4894b614b
Secunia Security Advisory 32201
Posted Oct 9, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Drupal, which can be exploited by malicious users to bypass certain security restrictions.

tags | advisory, vulnerability
MD5 | e3106a478087242253fce1be072f70a2
mswingdi-poc.txt
Posted Oct 9, 2008
Authored by John Smith | Site jsmith080220.googlepages.com

Microsoft Windows GDI+ proof of concept exploit that takes advantage of the vulnerability listed in MS08-052.

tags | exploit, proof of concept
systems | windows
MD5 | ad71fd33c2f1ef5c1573277e5d716a91
cameralife-sqlxss.txt
Posted Oct 9, 2008
Authored by BackDoor

Cameralife version 2.6.2b4 suffers from SQL injection and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, sql injection
MD5 | 7fc958adf7d808e0b7ee46f1cfe75bab
HP Security Bulletin 2008-00.99
Posted Oct 9, 2008
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin - A potential security vulnerability has been identified with HP System Management

tags | advisory
advisories | CVE-2008-4411
MD5 | e41a3e41c12ed4aacb9e65ddbc1a2496
HP Security Bulletin 2008-00.46
Posted Oct 9, 2008
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin - A potential security vulnerability has been identified with HP OpenView Network Node Manager (OV NNM). The vulnerability could be exploited remotely to create a Denial of Service (DoS).

tags | advisory, denial of service
advisories | CVE-2008-3545
MD5 | 2c42be5796f5be939d3a7312bce7f855
aradcenter-sql.txt
Posted Oct 9, 2008
Authored by Hussin X | Site tryag.cc

Arad Center suffers from a remote SQL injection vulnerability in news.php.

tags | exploit, remote, php, sql injection
MD5 | f9ec882e862659af1eb95d8d7ba0cc81
persiantools-sql.txt
Posted Oct 9, 2008
Authored by Sakab

Persian Tools Gallery suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | d90998db611fdd856f5abd5cc286dd03
ProCheckUp Security Advisory 2007.31
Posted Oct 9, 2008
Authored by Adrian Pastor, ProCheckUp | Site procheckup.com

Remote SQL injection, cross site scripting, and user enumeration vulnerabilities exist in DPSnet Case Progress.

tags | exploit, remote, vulnerability, xss, sql injection
MD5 | 23b9151851dd72ce243438b8d000a287
fc2blog-xss.txt
Posted Oct 9, 2008
Authored by xisigr

FC2 BLOG suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 6b573496d3cfbd908d8216024d10e00e
joomlajoomtracker-sql.txt
Posted Oct 9, 2008
Authored by rsauron | Site darkc0de.com

The Joomla Joomtracker component version 1.01 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 9561d8d61b54eb371f55c76186d490c6
kusaba2-exec.txt
Posted Oct 9, 2008
Authored by Sausage

Kusaba versions 1.0.4 and below remote code execution exploit. Second version.

tags | exploit, remote, code execution
MD5 | 4cf7bafca57be8b7ce3419583eaeec1d
kusaba1-exec.txt
Posted Oct 9, 2008
Authored by Sausage

Kusaba versions 1.0.4 and below remote code execution exploit.

tags | exploit, remote, code execution
MD5 | 15c3428f6f9dfdfc5332f5bd47b586d9
gforge46-sql.txt
Posted Oct 9, 2008
Authored by beford

Gforge versions 4.6 rc1 and below suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 1f2e125fea2ee1b9c63fd8fa93b09db4
Page 1 of 3
Back123Next

File Archive:

October 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    15 Files
  • 2
    Oct 2nd
    16 Files
  • 3
    Oct 3rd
    15 Files
  • 4
    Oct 4th
    15 Files
  • 5
    Oct 5th
    11 Files
  • 6
    Oct 6th
    6 Files
  • 7
    Oct 7th
    2 Files
  • 8
    Oct 8th
    1 Files
  • 9
    Oct 9th
    13 Files
  • 10
    Oct 10th
    16 Files
  • 11
    Oct 11th
    15 Files
  • 12
    Oct 12th
    23 Files
  • 13
    Oct 13th
    13 Files
  • 14
    Oct 14th
    12 Files
  • 15
    Oct 15th
    2 Files
  • 16
    Oct 16th
    16 Files
  • 17
    Oct 17th
    16 Files
  • 18
    Oct 18th
    15 Files
  • 19
    Oct 19th
    10 Files
  • 20
    Oct 20th
    7 Files
  • 21
    Oct 21st
    4 Files
  • 22
    Oct 22nd
    2 Files
  • 23
    Oct 23rd
    10 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close