exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 921 RSS Feed

Files Date: 2006-08-01 to 2006-08-31

phpEcard.txt
Posted Aug 30, 2006
Authored by LeAk

PHPECard versions 2.1.4 and below suffer from a remote file inclusion vulnerability in functions.php.

tags | exploit, remote, php, file inclusion
SHA-256 | 6d9e27b11a3c56f57bff35f85ddd6080fa6b0ad9b0ebaaded8a37530c60bc221
streamripper-2.txt
Posted Aug 30, 2006
Authored by Expanders

Streamripper versions 1.61.25 and below HTTP header parsing buffer overflow exploit.

tags | exploit, web, overflow
SHA-256 | a01cbeda0ca3af143a437e3f105f122b5ca65dd6fed028ccf124d6b599630770
streamripper-1.txt
Posted Aug 30, 2006
Authored by psylocn

Streamripper versions 1.61.25 and below HTTP header parsing buffer overflow exploit.

tags | exploit, web, overflow
SHA-256 | 7440e6a91bcded4295a4c50ace3d3c38748846ddf5dae87b1eeb2f796fecdb4e
forkbomb.c
Posted Aug 30, 2006
Authored by Kris Katterjohn

forkbomb shellcode in 7 bytes for Linux x86.

tags | x86, shellcode
systems | linux
SHA-256 | 23440b94b9450f9c5365058d3cfcab1a10dbca22563358fd62e4d5e5d0527475
exit.c
Posted Aug 30, 2006
Authored by Kris Katterjohn

exit() shellcode in 5 bytes for Linux x86.

tags | x86, shellcode
systems | linux
SHA-256 | 76576c3d47bad32ea98c4335a7cbff570702b9346536243936ca480160416806
portailPHP215.txt
Posted Aug 30, 2006
Authored by XORON

Portail PHP mod_phpalbum version 2.15 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, php, file inclusion
SHA-256 | 33fc4c651cdac8ce82ac464c4fc4ef7b21c19708694adccc0459b24a5cd72d8b
CYBSEC-MSDHCP.txt
Posted Aug 30, 2006
Authored by Mariano Nunez Di Croce | Site cybsec.com

CYBSEC Security Advisory - A remote buffer overflow vulnerability has been identified in Microsoft Windows DHCP-Client Service. Affected products include Microsoft Windows 2000 SP4 and below, Microsoft Windows XP SP2 and below, and Microsoft Windows 2003 SP1 and below.

tags | advisory, remote, overflow
systems | windows
SHA-256 | 8272a8546f4126084dc45255ec9b3853da45de6ef9b21be144a6b6b8450aad68
Debian Linux Security Advisory 1161-1
Posted Aug 30, 2006
Authored by Debian | Site debian.org

Debian Security Advisory 1161-1 - Several security related problems have been discovered in Mozilla and derived products like Mozilla Firefox.

tags | advisory
systems | linux, debian
advisories | CVE-2006-3805, CVE-2006-3806, CVE-2006-3807, CVE-2006-3808, CVE-2006-3809, CVE-2006-3811
SHA-256 | f7ab4b5f1233399b5b1b18806a7f4b42c8b5aa932b148f2b3198a7f90e992de9
dupoll31.txt
Posted Aug 30, 2006
Authored by BoZKuRTSeRDaR

DUPoll version 3.1 suffers from a direct database download flaw.

tags | exploit
SHA-256 | 7fbedcd8adf34eb6128cf1dfa090cfdb841678947048166f064cff17b132aa6a
JSASP110.txt
Posted Aug 30, 2006
Authored by s3rv3r_hack3r | Site hackerz.ir

JS ASP Faq Manager version 1.10 suffers from a SQL injection flaw.

tags | exploit, sql injection, asp
SHA-256 | 617517b888c6ede31fdbd0187d9b7ce79694a321412c61bea683e423bac86771
b2evolution18.txt
Posted Aug 30, 2006
Authored by Root3r_H3ll | Site Www.PersainFox.com

b2evolution versions 1.8 and below suffer from a remote file inclusion vulnerability.

tags | exploit, remote, file inclusion
SHA-256 | 973b391753d8d7bc9981181ba0bffd682514daeb8011bd88f987cbbb3838539e
linkscaffe30.txt
Posted Aug 30, 2006
Authored by HoangYenXinhDep | Site vnsecurity.com

The admin1953.php file included in LinksCaffe version 3.0 allows for direct access giving an attacker full administrative privileges.

tags | exploit, php
SHA-256 | 240cbbbde655ba594f56dcfe2c5733dc3ff3c9ab647a203bcf9ad913eb14fa16
Mandriva Linux Security Advisory 2006.155
Posted Aug 29, 2006
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory MDKSA-2006-155 - Multiple buffer overflows in ImageMagick before 6.2.9 allow user-assisted attackers to execute arbitrary code via crafted XCF images. Multiple integer overflows in ImageMagick before 6.2.9 allows user-assisted attackers to execute arbitrary code via crafted Sun bitmap images that trigger heap-based buffer overflows. An integer overflow in the ReadSGIImage function in sgi.c in ImageMagick before 6.2.9 allows user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via large bytes_per_pixel, columns, and rows values, which trigger a heap-based buffer overflow.

tags | advisory, denial of service, overflow, arbitrary
systems | linux, mandriva
advisories | CVE-2006-3743, CVE-2006-3744, CVE-2006-4144
SHA-256 | 17ea48c30ae262993a867073c259c4ec7c7c700fdadae830130ae4309c554f4c
Gentoo Linux Security Advisory 200608-28
Posted Aug 29, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200608-28 - The sscanf() PHP function contains an array boundary error that can be exploited to dereference a null pointer. This can possibly allow the bypass of the safe mode protection by executing arbitrary code. Versions less than 5.1.4-r6 are affected.

tags | advisory, arbitrary, php
systems | linux, gentoo
SHA-256 | cccbe3afd18c7d863de2d5ac6ae3036834ad166c626106dba2a8fcf0470a4f0b
Gentoo Linux Security Advisory 200608-27
Posted Aug 29, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200608-27 - In November 2005, Zone-H Research reported a boundary error in the ktools library in the VGETSTRING() macro of kkstrtext.h, which may cause a buffer overflow via an overly long input string. Versions less than 3.4.0-r1 are affected.

tags | advisory, overflow
systems | linux, gentoo
SHA-256 | 0e764a0a471a253079be6c1c295bc8726abd6b28b81677211dba782958f13438
Gentoo Linux Security Advisory 200608-26
Posted Aug 29, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200608-26 - The following vulnerabilities have been discovered in Wireshark. Firstly, if the IPsec ESP parser is used it is susceptible to off-by-one errors, this parser is disabled by default; secondly, the SCSI dissector is vulnerable to an unspecified crash; and finally, the Q.2931 dissector of the SSCOP payload may use all the available memory if a port range is configured. By default, no port ranges are configured. Versions less than 0.99.3 are affected.

tags | advisory, vulnerability
systems | linux, gentoo
SHA-256 | 0572c83b05e151adf70e50709ae881d02c15e77c2c8c3d9d1d7d1eee48bb4af5
ISR-ibm-eGatherer.tar.gz
Posted Aug 29, 2006
Authored by Francisco Amato | Site infobyte.com.ar

This Metasploit module exploits a code execution vulnerability in the IBM eGatherer ActiveX buffer overflow.

tags | exploit, overflow, code execution, activex
advisories | CVE-2006-4221
SHA-256 | 6280365f18cd390c0a7ec483822ae21f3d8ac6a2a269541e0bb334fa7e54938e
hlstatsXSS.txt
Posted Aug 29, 2006
Authored by kefka

HLStats version 1.34 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | a63c979b78eb39b37d1ac30865f8a51828daf62b4e7c17f60122c5610af6fde8
Debian Linux Security Advisory 1160-1
Posted Aug 29, 2006
Authored by Debian | Site debian.org

Debian Security Advisory 1160-1 - Several security related problems have been discovered in Mozilla and derived products.

tags | advisory
systems | linux, debian
advisories | CVE-2006-2779, CVE-2006-3805, CVE-2006-3806, CVE-2006-3807, CVE-2006-3808, CVE-2006-3809, CVE-2006-3810
SHA-256 | fc3a5dd2574ba1ca4a9b000ea22fd04724ecd0339c2252f98f22547fae94f2a1
Mandriva Linux Security Advisory 2006.154
Posted Aug 29, 2006
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory MDKSA-2006-154 - The libXm library in LessTif versions 0.95.0 and earlier allows local users to gain privileges via the DEBUG_FILE environment variable, which is used to create world-writable files when libXm is run from a setuid program.

tags | advisory, local
systems | linux, mandriva
advisories | CVE-2006-4124
SHA-256 | fcd62e9b6c19b5611928bdffa7ac17685229cc986efaddb82685d7f16727d734
Mandriva Linux Security Advisory 2006.153
Posted Aug 29, 2006
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory MDKSA-2006-153 - A stack-based buffer overflow in messages.c in the GNU as (gas) assembler in Free Software Foundation GNU Binutils before 20050721 allows attackers to execute arbitrary code via a .c file with crafted inline assembly code. A buffer overflow in getsym in tekhex.c in libbfd in Free Software Foundation GNU Binutils before 20060423, as used by GNU strings, allows context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a file with a crafted Tektronix Hex Format record in which the length character is not a valid hexadecimal character.

tags | advisory, denial of service, overflow, arbitrary
systems | linux, mandriva
advisories | CVE-2005-4807, CVE-2006-2362
SHA-256 | 20bae66b913b708c81f4d4d713ab9094b1a1cd129693db985f0f4ac8827cbe5c
SYMSA-2006-09.txt
Posted Aug 29, 2006
Authored by Oliver Karow | Site symantec.com

Symantec Security Advisory - A connection from a SAP-DB/MaxDB WebDBM Client to the DBM Server causes a buffer overflow when the given database name is too large. This can result in the execution of arbitrary code in the context of the database server. Affected version is SAP-DB/MaxDB 7.6.00.22.

tags | advisory, overflow, arbitrary
advisories | CVE-2006-4305
SHA-256 | f252047e0f68c231dc50e1773e17de6610f34d7f5aae0c80053dedb4165a40e1
Secunia Security Advisory 21561
Posted Aug 29, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered some vulnerabilities in CJ Tag Board, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
SHA-256 | 6924ab6d73ba9dd6c89c24eb74e6243a40c3055aab513b8e2c640e3f87e5edd7
Secunia Security Advisory 21634
Posted Aug 29, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for mozilla. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting attacks and potentially compromise a user's system.

tags | advisory, vulnerability, xss
systems | linux, debian
SHA-256 | 783321879be5b45c78347b04b695cc8497d1a26a4f636334b26f43b128aaa55b
Secunia Security Advisory 21635
Posted Aug 29, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - kefka has discovered a vulnerability in HLstats, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 687b9d79c1c77f6f613aad496d23513b0ab51ee4bb0aa367322c5205398bc2de
Page 2 of 37
Back12345Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close