exploit the possibilities
Showing 1 - 25 of 47 RSS Feed

Files Date: 2009-03-06

SQL Fuzzing Script
Posted Mar 6, 2009
Authored by Stefan M.

SQL fuzzing tool that will find all table names, column names for specified table, mysql version, username of mysql, database, perform load_file() on sites vulnerable to SQL injection.

tags | sql injection, fuzzer
MD5 | f545c9abc582fb62d1235077cae79b8e
Whitepaper Called Amenizando Recusa de Servico Remota
Posted Mar 6, 2009
Authored by 6_Bl4ck9_f0x6

Whitepaper called Amenizando Recusa de Servico Remota. Written in Portuguese.

tags | paper
MD5 | 31459f93500629922b93139b3dafed7f
OneOrZero Helpdesk 1.6.5.7 Local File Inclusion
Posted Mar 6, 2009
Authored by dun

OneOrZero Helpdesk versions 1.6.5.7 and below suffer from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
MD5 | 345633f64fb0e19c4ac211508eac3b00
isiAJAX SQL Injection
Posted Mar 6, 2009
Authored by dun

isiAJAX version 1 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 8ee67900b0ee6be68cf13d2799259505
Apache Tomcat Cross Site Scripting
Posted Mar 6, 2009
Authored by Deniz Cevik | Site tomcat.apache.org

The calendar application for Apache Tomcat contains invalid HTML which renders the cross site scripting protection for the time parameter ineffective. An attacker can therefore perform an cross site scripting attack using the time attribute. Version affected include Tomcat 6.0.0 to 6.0.18, Tomcat 5.5.0 to 5.5.27, and Tomcat 4.1.0 to 4.1.39.

tags | exploit, xss
advisories | CVE-2009-0781
MD5 | 4e4b4059d442851979d1c803c67cdf2f
TinX CMS SQL Injection
Posted Mar 6, 2009
Authored by Dmitriy Evteev | Site securitylab.ru

TinX CMS versions prior to 3.5.1 suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
advisories | CVE-2009-0825
MD5 | 77d7bb46c58517ad10e4e6a0dadbd0fd
WarVOX Telephony Auditing Tool
Posted Mar 6, 2009
Authored by H D Moore | Site warvox.org

WarVOX is a suite of tools for exploring, classifying, and auditing telephone systems. Unlike normal wardialing tools, WarVOX works with the actual audio from each call and does not use a modem directly. This model allows WarVOX to find and classify a wide range of interesting lines, including modems, faxes, voice mail boxes, PBXs, loops, dial tones, IVRs, and forwarders. WarVOX provides the unique ability to classify all telephone lines in a given range, not just those connected to modems, allowing for a comprehensive audit of a telephone system.

tags | tool, telephony, wardialer
MD5 | f8bf41f8cb2fbd715292c61c58f845f2
WarVOX Telephony Auditing Tool Presentation
Posted Mar 6, 2009
Authored by H D Moore | Site warvox.org

Presentation going over WarVOX, the new tool released by H D Moore. WarVOX is a suite of tools for exploring, classifying, and auditing telephone systems.

tags | paper, telephony
MD5 | 9c5ca82a2df83b4f447616433562f6aa
Defcon CTF Organizer Submissions
Posted Mar 6, 2009
Authored by The Dark Tangent | Site defcon.org

The new Defcon Capture The Flag organizer submissions are in. Dark Tangent has requested that people read and comment on them.

tags | paper, conference
MD5 | cadf8918369c0953adc55fc4368c7e3f
Drupal XSS Password Changer
Posted Mar 6, 2009
Authored by Justin C. Klein Keane

Small write up regarding a cross site scripting vulnerability on Drupal version 5.15 being used for a password change attack. Attack script included.

tags | exploit, xss
MD5 | 179bf56e9daff7cd0266b6f1b4edf504
Secunia Security Advisory 34174
Posted Mar 6, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for firefox. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system.

tags | advisory, vulnerability
systems | linux, ubuntu
MD5 | 7293a85e30c5b864fc1a3330ca8d40bf
Secunia Security Advisory 34083
Posted Mar 6, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Avahi, which can be exploited by malicious people to potentially cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | 9f6ce45648321747222e530aed6bf4dc
Secunia Security Advisory 34106
Posted Mar 6, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for libpng. This fixes some vulnerabilities, which can be exploited malicious people to cause a DoS (Denial of Service), disclose potentially sensitive information, or potentially compromise an application using the library.

tags | advisory, denial of service, vulnerability
systems | linux, ubuntu
MD5 | 513ba0e399e028fa3f0bf51de29ced62
Secunia Security Advisory 34110
Posted Mar 6, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for firefox-3.0 and xulrunner-1.9. This fixes some vulnerabilities, which can be exploited by malicious people to conduct spoofing attacks, bypass certain security restrictions, disclose sensitive information, or compromise a user's system.

tags | advisory, spoof, vulnerability
systems | linux, ubuntu
MD5 | 3abc9b99f0bdb535dfd7ab61f88f7949
Secunia Security Advisory 34165
Posted Mar 6, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for curl. This fixes a security issue, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
systems | linux, fedora
MD5 | df700d9e175d0c457b51fe0af3b15412
Secunia Security Advisory 34147
Posted Mar 6, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for python-crypto. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, crypto, python
systems | linux, ubuntu
MD5 | 79924b8cfc923623aa5b0bbe3440b1ec
Secunia Security Advisory 34166
Posted Mar 6, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for wireshark. This fixes some vulnerabilities, which can be exploited by malicious people to potentially compromise a user's system.

tags | advisory, vulnerability
systems | linux, fedora
MD5 | 262979f9cb33d07cea00611691c06e86
Secunia Security Advisory 34168
Posted Mar 6, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for dkim-milter. This fixes a vulnerability, which can be exploited by malicious people to conduct DoS (Denial of Service) attacks.

tags | advisory, denial of service
systems | linux, fedora
MD5 | 5428d310675289347bfb6c5fcf7e75eb
Secunia Security Advisory 34167
Posted Mar 6, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for jhead. This fixes a security issue, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | linux, fedora
MD5 | 02e61949c3f08895376802537e191844
Secunia Security Advisory 34159
Posted Mar 6, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Search and Archive component for Joomla!, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
MD5 | 0f883db06af86482d3b7041c3403aff1
Secunia Security Advisory 34157
Posted Mar 6, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in OpenBSD, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
systems | openbsd
MD5 | 4d5a1b0cc681cd1c37d9524b38954551
UMI.CMS Cross Site Scripting
Posted Mar 6, 2009
Authored by Dmitriy Evteev | Site securitylab.ru

UMI.CMS versions prior to 2.7.1 build 10856 suffer from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 3dfd408beb924bf4169e500f731c2af2
Ubuntu Security Notice 728-3
Posted Mar 6, 2009
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice USN-728-3 - Jesse Ruderman and Gary Kwong discovered flaws in the browser engine. If a user were tricked into viewing a malicious website, a remote attacker could cause a denial of service or possibly execute arbitrary code with the privileges of the user invoking the program. Georgi Guninski discovered a flaw when Firefox performed a cross-domain redirect. An attacker could bypass the same-origin policy in Firefox by utilizing nsIRDFService and steal private data from users authenticated to the redirected website.

tags | advisory, remote, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2009-0772, CVE-2009-0774, CVE-2009-0776
MD5 | a82a37ad7f4c0558bc6c5a7845618b16
Ubuntu Security Notice 728-2
Posted Mar 6, 2009
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice USN-728-2 - Jesse Ruderman and Gary Kwong discovered flaws in the browser engine. If a user were tricked into viewing a malicious website, a remote attacker could cause a denial of service or possibly execute arbitrary code with the privileges of the user invoking the program. Georgi Guninski discovered a flaw when Firefox performed a cross-domain redirect. An attacker could bypass the same-origin policy in Firefox by utilizing nsIRDFService and steal private data from users authenticated to the redirected website.

tags | advisory, remote, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2009-0772, CVE-2009-0774, CVE-2009-0776
MD5 | ccca773356b5e301a7c6e718be286cdb
Ubuntu Security Notice 730-1
Posted Mar 6, 2009
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice USN-730-1 - A large amount of vulnerabilities in libpng have been addressed. These range from denial of service to remote code execution issues.

tags | advisory, remote, denial of service, vulnerability, code execution
systems | linux, ubuntu
advisories | CVE-2007-5268, CVE-2007-5269, CVE-2008-1382, CVE-2008-3964, CVE-2008-5907, CVE-2009-0040
MD5 | 1fca946060331888f2fd899bad007ec7
Page 1 of 2
Back12Next

File Archive:

December 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    18 Files
  • 2
    Dec 2nd
    11 Files
  • 3
    Dec 3rd
    23 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    13 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close