exploit the possibilities
Showing 1 - 25 of 50 RSS Feed

Files Date: 2008-11-19

Mandriva Linux Security Advisory 2008-220
Posted Nov 19, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2008-220-1 - Some vulnerabilities were discovered and corrected in the Linux 2.6 kernel. The issues include insecure misconfigurations, an integer overflow, and more.

tags | advisory, overflow, kernel, vulnerability
systems | linux, mandriva
advisories | CVE-2008-3272, CVE-2008-0598, CVE-2008-3275, CVE-2008-3525, CVE-2007-6716, CVE-2008-4210
MD5 | d32925083aefe39798a9b266a8cf683e
Mandriva Linux Security Advisory 2008-232
Posted Nov 19, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2008-232 - The ACL plugin in dovecot prior to version 1.1.4 treated negative access rights as though they were positive access rights, which allowed attackers to bypass intended access restrictions. The ACL plugin in dovecot prior to version 1.1.6 allowed attackers to bypass intended access restrictions by using the 'k' right to create unauthorized 'parent/child/child' mailboxes.

tags | advisory
systems | linux, mandriva
advisories | CVE-2008-4577, CVE-2008-4578
MD5 | 74d6e20e2de494366564f42bf606f8cb
Ubuntu Security Notice 674-1
Posted Nov 19, 2008
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice USN-674-1 - It was discovered that the hpssd tool of hplip did not validate privileges in the alert-mailing function. A local attacker could exploit this to gain privileges and send e-mail messages from the account of the hplip user. This update alters hplip behavior by preventing users from setting alerts and by moving alert configuration to a root-controlled /etc/hp/alerts.conf file. It was discovered that the hpssd tool of hplip did not correctly handle certain commands. A local attacker could use a specially crafted packet to crash hpssd, leading to a denial of service.

tags | advisory, denial of service, local, root
systems | linux, ubuntu
advisories | CVE-2008-2940, CVE-2008-2941
MD5 | 40785ad48c0633533c0dbc0debeac5a5
Debian Linux Security Advisory 1667-1
Posted Nov 19, 2008
Authored by Debian | Site debian.org

Debian Security Advisory 1667-1 - Several vulnerabilities have been discovered in the interpreter for the Python language.

tags | advisory, vulnerability, python
systems | linux, debian
advisories | CVE-2008-2315, CVE-2008-3142, CVE-2008-3143, CVE-2008-3144
MD5 | fdd93fd43d34cbb3a7fa480d18402fca
revsense-sql.txt
Posted Nov 19, 2008
Authored by d3b4g

RevSense suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
MD5 | 6aa053d65dd314b32171368e6bf84ae6
maurycms-upload.txt
Posted Nov 19, 2008
Authored by StAkeR

MauryCMS versions 0.53.2 and below remote shell upload exploit.

tags | exploit, remote, shell, file upload
MD5 | 63cc458d0d8e69152b1c8c27b36a2bf7
linksautomation-sql.txt
Posted Nov 19, 2008
Authored by d3v1l

LinksAutomation Script suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 0ff9ea758f37cbf93c812e824cb8af98
linksxs-sql.txt
Posted Nov 19, 2008
Authored by d3v1l

Linksxs Script suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 165976435e2cf54668de8896135ccc8e
ethiclinks-sql.txt
Posted Nov 19, 2008
Authored by d3v1l

Ethiclinks suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 840182c3b5760545c2554f36f44507c5
easyeditcms-sql.txt
Posted Nov 19, 2008
Authored by d3v1l

Easyedit CMS suffers from multiple remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
MD5 | ddd126108668940b95b0c3f58edc0366
msvista-overflow.txt
Posted Nov 19, 2008
Authored by Carson Hounshell, Marius Wachtler, Michael Burgbacher, Michael Craggs, Thomas Unterleitner | Site phion.com

The Microsoft Device IO Control wrapped by the iphlpapi.dll API shipping with Windows Vista 32 bit and 64 bit contains a possibly exploitable, buffer overflow corrupting kernel memory. Proof of concept test code included.

tags | exploit, overflow, kernel, proof of concept
systems | windows, vista
MD5 | 8d9062372b98a602f3a22fe236506963
mytopix-sql.txt
Posted Nov 19, 2008
Authored by cOndemned | Site condemned.r00t.la

MyTopix versions 1.3.0 and below remote SQL injection exploit.

tags | exploit, remote, sql injection
MD5 | 8e0559a875dc85728184e0a26a62eb96
punbb-lfi.txt
Posted Nov 19, 2008
Authored by StAkeR

PunBB (Private Messaging System versions 1.2.x) multiple local file inclusion exploit.

tags | exploit, local, file inclusion
MD5 | 4e17d4daf83b92da03922224ce17aa79
ProCheckUp Security Advisory 2008.9
Posted Nov 19, 2008
Authored by ProCheckUp, Richard Brain | Site procheckup.com

An unauthenticated file retrieval vulnerability exists on the Sun Java System Identity Manager.

tags | advisory, java
MD5 | 027955185dafd3359535c914e02f64fa
ProCheckUp Security Advisory 2007.40
Posted Nov 19, 2008
Authored by Adrian Pastor, ProCheckUp | Site procheckup.com

The 3Com AP 8760 suffers from authentication bypass, password leakage, and SNMP injection vulnerabilities. Details provided.

tags | exploit, vulnerability
MD5 | de90de2dfb7bb15c9207cdcfb1dc6b7e
ProCheckUp Security Advisory 2007.11
Posted Nov 19, 2008
Authored by Adrian Pastor, ProCheckUp, Jan Fry | Site procheckup.com

Sun Java System Identity suffers from a cross site request forgery vulnerability. Proof of concept code included.

tags | exploit, java, proof of concept, csrf
MD5 | 8a27d91e43fbb3bc2fb530f8741b2c77
secunia-streamripper.txt
Posted Nov 19, 2008
Authored by Stefan Cornelius | Site secunia.com

Secunia Research has discovered some vulnerabilities in Streamripper, which can be exploited by malicious people to compromise a user's system. Version 1.63.5 is affected.

tags | advisory, vulnerability
advisories | CVE-2008-4829
MD5 | 2a667b6f5ea4090920bfdfceb7fa6c61
tonline-multi.txt
Posted Nov 19, 2008
Authored by Stefan Kanthak

The T-Online software offered by Deutsche Telekom installs and includes the use of vulnerable DLLs.

tags | advisory
MD5 | 4f545cb45287d94079f395be11241a87
sudoers-shellcode.txt
Posted Nov 19, 2008
Authored by Rick

86 byte Linux/x86 edit /etc/sudoers for full access.

tags | x86, shellcode
systems | linux
MD5 | 75ac9ea204450e8db590b8f578f55103
alexarticle-upload.txt
Posted Nov 19, 2008
Authored by Batter

Alex Article-Engine version 1.3.0 suffers from a remote arbitrary file upload vulnerability.

tags | exploit, remote, arbitrary, file upload
MD5 | 8fa701b438aefcdc974a713bbb55d89a
alexnews-upload.txt
Posted Nov 19, 2008
Authored by Batter

Alex News-Engine version 1.5.1 suffers from a remote arbitrary file upload vulnerability.

tags | exploit, remote, arbitrary, file upload
MD5 | 71f4fe9cb8a232d39997f21b36f87ebf
pysumpas-0.2.0.tar.gz
Posted Nov 19, 2008
Authored by SoDak | Site sourceforge.net

PySumpas is a simple, graphical password generating utility. Using the Python Cryptography Toolkit and Damien Miller's py-bcrypt, it generates a hash or cipher from user input. The resulting output, in part or entirety, can be used as a secure password.

tags | encryption, python
MD5 | 9c1a5f0718d2f7566344fdd2ba118882
Secunia Security Advisory 32142
Posted Nov 19, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Dejan Levaja has discovered some vulnerabilities in MDaemon Server WorldClient, which can be exploited by malicious people to conduct script insertion attacks.

tags | advisory, vulnerability
MD5 | 808a16c2e5c311df469022b925edafbe
Secunia Security Advisory 32562
Posted Nov 19, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered some vulnerabilities in Streamripper, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
MD5 | 05e62db59f0c225de46d21250c343c34
Secunia Security Advisory 32739
Posted Nov 19, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Streber, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, vulnerability, csrf
MD5 | 102ba2d7d0c2e1966010b8f927c8ee9b
Page 1 of 2
Back12Next

File Archive:

December 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    1 Files
  • 2
    Dec 2nd
    16 Files
  • 3
    Dec 3rd
    17 Files
  • 4
    Dec 4th
    23 Files
  • 5
    Dec 5th
    11 Files
  • 6
    Dec 6th
    10 Files
  • 7
    Dec 7th
    1 Files
  • 8
    Dec 8th
    1 Files
  • 9
    Dec 9th
    15 Files
  • 10
    Dec 10th
    30 Files
  • 11
    Dec 11th
    8 Files
  • 12
    Dec 12th
    20 Files
  • 13
    Dec 13th
    6 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close