exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 84 RSS Feed

Files Date: 2006-08-18 to 2006-08-19

HackingFeeds.pdf
Posted Aug 18, 2006
Authored by Robert Auger | Site spidynamics.com

Feed Injection in Web 2.0: Hacking RSS and Atom Feed Implementations.

tags | paper, web
SHA-256 | 64c0d6bb5d20b7e80d61e3b01e950b386ab4f342fb3fd98a58f74c5a526861fa
phpPrintAnalyzer.txt
Posted Aug 18, 2006
Authored by Sh3ll | Site sh3ll.ir

phpPrintAnalyzer version 1.1 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, file inclusion
SHA-256 | d43cbe2771c421b971cd38e22a372d9d57492d47f451434feb09190d0fe092d1
visualevents11.txt
Posted Aug 18, 2006
Authored by XORON

Visual Events Calendar version 1.1 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, file inclusion
SHA-256 | 75020592805d639afcf8daabad884969a7d69dc0a7f4ff6d09b6d939de288fbf
msxss.txt
Posted Aug 18, 2006
Authored by Thomas Pollet

support.microsoft.com suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | dd667967abd9313f5e3ed103fbf17192ad8233dd97ee552d4f3dfb4ad5b94d0b
Gentoo Linux Security Advisory 200608-12
Posted Aug 18, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200608-12 - x11vnc includes vulnerable LibVNCServer code, which fails to properly validate protocol types effectively letting users decide what protocol to use, such as Type 1 - None (GLSA-200608-05). x11vnc will accept this security type, even if it is not offered by the server. Versions less than 0.8.1 are affected.

tags | advisory, protocol
systems | linux, gentoo
SHA-256 | bd8ba8a189b20cd9adb8ba1bebf430d0937e96dd6c6c3ed235a4ddef5186e0d8
TSRT-06-05.txt
Posted Aug 18, 2006
Site zerodayinitiative.com

A vulnerability allows remote attackers to execute arbitrary code on systems with affected installations of the Computer Associates eTrust AntiVirus WebScan ActiveX component that suffers from an automatic update code execution flaw.

tags | advisory, remote, arbitrary, code execution, activex
advisories | CVE-2006-3976, CVE-2006-3977
SHA-256 | f059d93f3e5fdefd00dc26cc0db8c68bc420bd854835abe3cfc406b1c793be6d
TSRT-06-06.txt
Posted Aug 18, 2006
Site zerodayinitiative.com

A vulnerability allows remote attackers to execute arbitrary code on systems with affected installations of the Computer Associates eTrust AntiVirus WebScan ActiveX component that suffers from a buffer overflow.

tags | advisory, remote, overflow, arbitrary, activex
advisories | CVE-2006-3975
SHA-256 | 07917638c533a36330de4bce9a9ce32bb7fe9f296e1363730c32cbfc1dd88239
Debian Linux Security Advisory 1144-1
Posted Aug 18, 2006
Authored by Debian | Site debian.org

Debian Security Advisory 1144-1 - It was discovered that one of the utilities shipped with chmlib, a library for dealing with Microsoft CHM files, performs insufficient sanitizing of filenames, which might lead to directory traversal.

tags | advisory
systems | linux, debian
advisories | CVE-2006-3178
SHA-256 | 969507f75e16d0da21789dfbed22209563931bf4f4b5e5390322bd35654969e1
virualWar.txt
Posted Aug 18, 2006
Authored by AG-Spider

Virtual War version 1.5.0 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, file inclusion
SHA-256 | 16ac36c876bb77f7e36d94be5d825adbe8a9b77aeabb7d2db84cdfed3ae489ae
sapidCMS.txt
Posted Aug 18, 2006
Authored by Simo64 | Site morx.org

SAPID CMS version 123 RC3 suffers from remote file inclusion vulnerabilities. Full exploit provided.

tags | exploit, remote, vulnerability, file inclusion
SHA-256 | a1d65b8c50c6523f4fa371f407a7d84f02f90653bfa135df4cecfbe994f8d604
deluxeBBflaws.txt
Posted Aug 18, 2006
Authored by Attila Gerendi

DeluxeBB version 1.08 suffers from cross site scripting, cookie manipulation, and login bypass flaws.

tags | advisory, xss
SHA-256 | a90b0f09b50e6261b3f81346a06391f4cf2cdae02c2728dbedce86c8e640613f
securityXSS.txt
Posted Aug 18, 2006
Authored by Thomas Pollet

Multiple security vendors suffers from cross site scripting flaws.

tags | exploit, xss
SHA-256 | 96d0c64dfd30a00e049471937e63b6119124db5ddbe2e457afcc2490e8d8cb7e
Echo Security Advisory 2006.44
Posted Aug 18, 2006
Authored by Echo Security, M.Hasran Addahroni | Site advisories.echo.or.id

PHP Simple Shop versions 2.0 and below suffer from a remote file inclusion vulnerability.

tags | exploit, remote, php, file inclusion
SHA-256 | eada1e3cd13b3b7d455c2f79ef604cf54cf267a1166b8527072560bd17ef0723
simplog093.txt
Posted Aug 18, 2006
Site darkend.org

Simplog versions less than or equal to 0.9.3 suffer from a cross site scripting flaw.

tags | advisory, xss
SHA-256 | eb59ea468bd182569b858e442883b4232152491074a825e3802783973dfd12c5
Gentoo Linux Security Advisory 200608-11
Posted Aug 18, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200608-11 - A vulnerability in both Webmin and Usermin has been discovered by Kenny Chen, wherein simplify_path is called before the HTML is decoded. Versions less than 1.290 are affected.

tags | advisory
systems | linux, gentoo
SHA-256 | be68c05e8366abbcff2de4a9138e4bbb917e867697384003edd894134766b7f5
Gentoo Linux Security Advisory 200608-10
Posted Aug 18, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200608-10 - Some input is not properly sanitized before being used in a SQL statement in the underlying PostgreSQL database. Versions less than 7.6.86 are affected.

tags | advisory
systems | linux, gentoo
SHA-256 | 501cd5ab722f988bd1d47c5ceea6361b6ad0fb7149a0b32cb3b46c0b7992e834
dconnx.zip
Posted Aug 18, 2006
Authored by Luigi Auriemma | Site aluigi.org

Exploit that demonstrates a buffer overflow, null pointer, and various format string bugs in DConnect Daemon versions 0.7.0 and below and CVS versions 30 and below.

tags | exploit, overflow
SHA-256 | 8807c8d003b4964eba00b9529d772a87aebf2d8b4bca9e47c984ee1ec93e4d25
dconnx.txt
Posted Aug 18, 2006
Authored by Luigi Auriemma | Site aluigi.org

DConnect Daemon versions 0.7.0 and below and CVS versions 30 and below suffer from buffer overflow, null pointer, and various format string bugs.

tags | advisory, overflow
SHA-256 | bc1a9d4bd9c0889527376f1fa4d9277d7ede8899b4991e7509e1ea91740c54af
Gentoo Linux Security Advisory 200608-9
Posted Aug 18, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200608-09 - Jean-David Maillefer discovered a format string vulnerability in time.cc where MySQL fails to properly handle specially formatted user input to the date_format function. Versions less than 4.1.21 are affected.

tags | advisory
systems | linux, gentoo
SHA-256 | 6344f2da964060a6e18fa95d6b8e182a416b4bc8bd795360b5923dac85fc2ff8
sicherheit_286.txt
Posted Aug 18, 2006
Authored by Philipp Niedziela

NEWSolved Lite version 1.9.2 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, file inclusion
SHA-256 | b94a714b01a7cac1aed3f4ba2fbf9267c804bdbcd12f5d54a261aa7e0f9fa7d4
blur6ex03.txt
Posted Aug 18, 2006
Site darkend.org

blur6ex version 0.3 suffers from a HTML injection flaw.

tags | advisory
SHA-256 | 2e07514470e415c80b672d7cf47d1242dddc90108bd5bae4e4ab3b6e55836ec5
solpot-adv-05.txt
Posted Aug 18, 2006
Authored by Solpot | Site solpotcrew.org

phpCC Beta 4.2 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, file inclusion
SHA-256 | 04358395d6d195b7f65dd10195a39266a05467cf4c2f9987d605c495c1179095
iecrash.tgz
Posted Aug 18, 2006
Authored by Thomas Pollet

Microsoft Internet Explorer crashes when refreshing an iframe containing an XML file with an XSL stylesheet. Examples included.

tags | exploit
SHA-256 | c0242fec458aaa2953e6e16ba6372c74d06d4d072a0658dd873e8f6d90a2a1f1
XennoBB.txt
Posted Aug 18, 2006
Authored by Chris Boulton | Site surfionline.com

XennoBB versions 2.1.0 and below suffer from a SQL injection vulnerability.

tags | exploit, sql injection
SHA-256 | 78cf7e1f6805b827d327c4cb9c119d296866947d5f4537d04f32eea461442b65
brush.txt
Posted Aug 18, 2006
Authored by cyanid-E

WMF proof of concept denial of service exploit that causes a page fault in gdi32!CreateBrushIndirect().

tags | exploit, denial of service, proof of concept
SHA-256 | 3b40e56f7809997dadb47ad015a0ce575eb383b0d5aa6029a11f363e13fa5818
Page 2 of 4
Back1234Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    0 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close