exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 35 RSS Feed

Files Date: 2008-12-05

aspticker-disclose.txt
Posted Dec 5, 2008
Authored by OffensiveTrack | Site offensivetrack.org

ASP Ticker suffers from a remote database disclosure vulnerability.

tags | exploit, remote, asp, info disclosure
SHA-256 | 65b2f98647dccd37b58a01c0592baf9c227fe603c392d74d119e9d12c540cc1c
aspportal-multiplesql.txt
Posted Dec 5, 2008
Authored by OffensiveTrack | Site offensivetrack.org

ASP Portal suffers from remote SQL injection vulnerabilities in classifieds.asp and Events.asp.

tags | exploit, remote, vulnerability, sql injection, asp
SHA-256 | f234d7ff78a777a36db818270ffbe933042ee6b0b5b2134289ca9da4f8766918
aspautodealer-sqldisclose.txt
Posted Dec 5, 2008
Authored by OffensiveTrack | Site offensivetrack.org

ASP AutoDealer suffers from remote SQL injection and database disclosure vulnerabilities.

tags | exploit, remote, vulnerability, sql injection, asp, info disclosure
SHA-256 | e9f42e38918ae74aae621c4aee64a1a0a650f0033587067f296733a9de60207d
nightfallpersonal-xssdisclose.txt
Posted Dec 5, 2008
Authored by OffensiveTrack | Site offensivetrack.org

NightFall Personal Diary version 1.0 suffers from cross site scripting and database disclosure vulnerabilities.

tags | exploit, vulnerability, xss, info disclosure
SHA-256 | 848adcaed07e340bfddac7da810ae04b633cb998eb470a7f98eb890ee5d6e59c
rankem-sqlbypass.txt
Posted Dec 5, 2008
Authored by OffensiveTrack | Site offensivetrack.org

RankEm suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection, bypass
SHA-256 | 8eeb54e1111ae82bf8f165d0e4944c4a9006c3458587f7b34422977d4c96b94b
rankem-sql.txt
Posted Dec 5, 2008
Authored by OffensiveTrack | Site offensivetrack.org

RankEm suffers from a remote SQL injection vulnerability in rankup.asp.

tags | exploit, remote, sql injection, asp
SHA-256 | c2c30aa270158bc738aa42390f5bbb39505e07ce349a80999384b357c46c6193
TOR Virtual Network Tunneling Tool 0.2.0.32
Posted Dec 5, 2008
Authored by Roger Dingledine | Site tor.eff.org

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).

Changes: Multiple security fixes. Major and minor bug fixes including a fix to a dos vulnerability.
tags | tool, remote, local, peer2peer
SHA-256 | 66669aa2cb74e7b0cf13db05472d88422f42c9c0129ce95ecd463aa123925d27
tizag-upload.txt
Posted Dec 5, 2008
Authored by ahmadbady

Tizag Countdown Creater version 3 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell, file upload
SHA-256 | 0b084c8918e058b620b4e91933a95f62a4313f916795435f1a86b79c8f6e4215
coldbbs-disclose.txt
Posted Dec 5, 2008
Authored by ahmadbady

Cold BBS suffers from a remote database disclosure vulnerability.

tags | exploit, remote, info disclosure
SHA-256 | f4433ba5966f2c3c07645a26cfd2a29ff930317644ad08c0a77157c63e4652d1
Technical Cyber Security Alert 2008-340A
Posted Dec 5, 2008
Authored by US-CERT | Site us-cert.gov

Technical Cyber Security Alert TA08-340A - Sun has released alerts to address multiple vulnerabilities affecting the Sun Java Runtime Environment. The most severe of these vulnerabilities could allow a remote attacker to execute arbitrary code.

tags | advisory, java, remote, arbitrary, vulnerability
SHA-256 | 50207ce9fa6dd5f34f06451dddf1035eb6c767f28c0d03b8e6d319a1e1aa4261
merlixteamworx-bypassdisclose.txt
Posted Dec 5, 2008
Authored by ZoRLu

Merlix Teamworx Serversuffers from an authentication bypass vulnerability using SQL injection and it also suffers from a database disclosure vulnerability.

tags | exploit, sql injection, bypass, info disclosure
SHA-256 | 456c148fa9176b5c26bc3d0a6aa43e86653b212a543553a8e869ede0651f9044
merlixeducate-bypassdisclose.txt
Posted Dec 5, 2008
Authored by ZoRLu

Merlix Educate Servert suffers from bypass and database disclosure vulnerabilities.

tags | exploit, vulnerability, bypass, info disclosure
SHA-256 | df7573b1604bd6b05df05324955043196459ece84cee4362d1b64500d2dc8fbb
mms-sql.txt
Posted Dec 5, 2008
Authored by ViRuS_HaCkErS | Site gaza-hacker.com

Multiple Membership Script version 2.5 suffers from a remote SQL injection vulnerability in sitepage.php.

tags | exploit, remote, php, sql injection
SHA-256 | 2d41421b411c2af1c666b2c58ca1e93f513e2e0088a6f0842e57fada84c24649
bncwi-lfi.txt
Posted Dec 5, 2008
Authored by dun

BNCwi versions 1.04 and below suffer from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 77d5ba52d96cb97bf75c21ca05acbfff990e9e02c2298f312b5ee0513cd3695f
gravitygtd-lfiexec.txt
Posted Dec 5, 2008
Authored by dun

Gravity GTD versions 0.4.5 and below suffers from local file inclusion and remote code execution vulnerabilities in rpc.php.

tags | exploit, remote, local, php, vulnerability, code execution, file inclusion
SHA-256 | 1559e4f9c2cc3a6c0c5006aa01fa2d00f94fc8d6bd2f4e1d8b0ff9c7af7249d0
linuxkernel-dos.txt
Posted Dec 5, 2008
Authored by Hugo Dias

A vulnerability exists in Linux kernel which can be exploited by malicious users to cause a denial of service. It seems that calling the svc_listen function in 'net/atm/svc.c' twice on the same socket will create unassigned PVC/SVC entries, despite returning EUNATCH.

tags | advisory, denial of service, kernel
systems | linux
advisories | CVE-2008-5079
SHA-256 | adfa5c559e0d80e9ce4f68e4e234058bd609e9168afe56ba9b1dc998f2ff848d
peid-overflow.txt
Posted Dec 5, 2008
Authored by SkD

PEiD versions 0.92 and below malformed PE file universal buffer overflow exploit.

tags | exploit, overflow
SHA-256 | a8e691f793e9f6d3a4279a8524df964648c000cd068a6834a3f85cd3f5c10617
nullftp-inject.txt
Posted Dec 5, 2008
Authored by Tan Chew Keong | Site vuln.sg

NULL FTP Server version 1.1.0.7 suffers from a SITE parameter command injection vulnerability.

tags | exploit
SHA-256 | 1220731bf2a3fe71b2edbc3ce418e4000dde3fbbe7e1f74bdc460f8757dc7773
Secunia Security Advisory 32995
Posted Dec 5, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - cOndemned has discovered some vulnerabilities in CcTiddly, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
SHA-256 | 9b1811049ee1f38abb3063f6b4eed8fe125ca493c466347206a97894a95c14da
Secunia Security Advisory 32992
Posted Dec 5, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - z0rlu has reported a vulnerability in Merlix Template Creature, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | d7e80a30cc8c2d53b5dc171f4a50a5e435780946c8f43b980c5eafb82ad2c5dc
Secunia Security Advisory 32993
Posted Dec 5, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - AlpHaNiX has discovered a vulnerability in User Engine Lite, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
SHA-256 | e7260b6748201b301c6b4572f271facf979403d94929f3e29ac260936db587ec
Secunia Security Advisory 32999
Posted Dec 5, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Tan Chew Keong has reported a vulnerability in Null FTP Server, which can be exploited by malicious users to compromise a vulnerable system.

tags | advisory
SHA-256 | e5ecc53c1bdd4ba5bf10b9abbdbdf3117c884fb37a7a813b838de6419538fdf8
Secunia Security Advisory 32994
Posted Dec 5, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - CWH Underground has discovered a vulnerability and a security issue in Webboard Street, which can be exploited by malicious people to conduct SQL injection attacks and disclose sensitive information.

tags | advisory, sql injection
SHA-256 | f90a9a460adce22269f50da3d798c5ba456a76f3c2938783e8a29735f041ca3f
Secunia Security Advisory 32989
Posted Dec 5, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Novell Netware, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | c07daa18fa3a2d2028b3abeedca6d3b83d01b3179af1a257752fa048ced60420
Mandriva Linux Security Advisory 2008-238
Posted Dec 5, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2008-238 - A buffer overflow was found by Russell O'Conner in the libsamplerate library versions prior to 0.1.4 that could possibly lead to the execution of arbitrary code via a specially crafted audio file. The updated packages have been patched to prevent this issue.

tags | advisory, overflow, arbitrary
systems | linux, mandriva
advisories | CVE-2008-5008
SHA-256 | 176628f97016bb666b45a4b94afa03cd013377537a7160fa9ebdf04ed6c8fcca
Page 1 of 2
Back12Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close