exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 719 RSS Feed

Files Date: 2006-12-01 to 2006-12-31

cahierdetexte22-bypass.txt
Posted Dec 28, 2006
Authored by DarkFig

Cahier de texte version 2.2 suffers from a bypass vulnerability.

tags | advisory, bypass
SHA-256 | 5c0ac412956c7f1a0d4be57717ba940c21ce9a5f58403cd85761f560ef8485c1
timberwolf122-xss.txt
Posted Dec 28, 2006
Authored by CorryL | Site x0n3-h4ck.org

TimberWolf version 1.2.2 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 690e8122748e9708eed54484776dcbeeb8466f22e2e5029b43c8bf222e553cd8
chatwm10-sql.txt
Posted Dec 28, 2006
Authored by ShaFuck31

Chatwm version 1.0 suffers from a SQL injection vulnerability.

tags | exploit, sql injection
SHA-256 | e12ea2b532614f8a380683aecbb544184c62c797d8f5fd89ff591055509014bf
fishyshoop-vuln.txt
Posted Dec 28, 2006
Authored by James Gray

Fishyshoop Shopping Cart 0.930 Beta suffers from a vulnerability that allows arbitrary users to create accounts with administrator privileges.

tags | exploit, arbitrary
SHA-256 | 72259a1dceb8a7c1c1b0ea251c928cf53effde14ffa4f9ca67b13df956a34471
omp10-rfi.txt
Posted Dec 28, 2006
Authored by ShaFuck31

Okul Merkezi Portal version 1.0 suffers from a remote file inclusion flaw.

tags | exploit, remote, code execution, file inclusion
SHA-256 | a4c81baf6222f39d2a03f05460922f81b28cd58e561ad7aa7e77f4f3f964fe82
iDEFENSE Security Advisory 2006-12-23.2
Posted Dec 28, 2006
Authored by iDefense Labs | Site idefense.com

iDefense Security Advisory 12.23.06 - Remote exploitation of a Denial of Service vulnerability in Novell Netmail 3.52 could allow an authenticated attacker the ability to crash the imapd server. Novell NetMail can be made to crash by sending an APPEND command with a single '(' character as an argument. iDefense has confirmed the existence of this vulnerability in the IMAPD server of Novell NetMail 3.52d and 3.52e. Older versions are suspected to be vulnerable as well.

tags | advisory, remote, denial of service
SHA-256 | 993419e090fcab8b0b38b3eaa3b7e207bb7303f8e38a2cc1ba902bead629d5ed
iDEFENSE Security Advisory 2006-12-23.1
Posted Dec 28, 2006
Authored by iDefense Labs | Site idefense.com

iDefense Security Advisory 12.23.06 - Remote exploitation of a buffer overflow vulnerability in Novell Inc.'s NetMail IMAP daemon allows authenticated attackers to execute arbitrary code with the privileges of the underlying user. Once logged in, attackers can execute the "subscribe" command with an overly long argument string to overflow a stack based buffer. iDefense has confirmed the existence of the vulnerability in version 3.52d of Novell NetMail. It is suspected that earlier versions of NetMail are also affected.

tags | advisory, remote, overflow, arbitrary, imap
SHA-256 | b395e71ce934c1eb3e9eb3ce45641d8e614fcf4043a2403ccf7c2c8cc1b8b7e1
fi-xsssql.txt
Posted Dec 28, 2006
Authored by Linux_Drox

Future Internet suffers from cross site scripting and SQL injection vulnerabilities.

tags | exploit, vulnerability, xss, sql injection
SHA-256 | 23b3648d959a2432644b69686201d460dcc02c858994d6991d9ae318136b2e66
Zero Day Initiative Advisory 06-054
Posted Dec 27, 2006
Authored by Tipping Point | Site zerodayinitiative.com

A vulnerability allows remote attackers to execute arbitrary code on affected installations of Novell NetMail. Successful exploitation requires the attacker to successfully authenticate to the affected service. The specific flaw exists in the NetMail IMAP server's handling of the APPEND command. A lack of bounds checking on a specific parameter to this command can lead to a stack-based buffer overflow. This vulnerability can be exploited to execute arbitrary code. Novell NetMail 3.5.2 is affected.

tags | advisory, remote, overflow, arbitrary, imap
advisories | CVE-2006-6425
SHA-256 | d83fcb45bcf0511752fc543515acd50fb5294460571860e33791f4a4924a19b1
Zero Day Initiative Advisory 06-053
Posted Dec 27, 2006
Authored by Tipping Point | Site zerodayinitiative.com

A vulnerability allows remote attackers to execute arbitrary code on affected versions of Novell NetMail. Authentication is not required to exploit this vulnerability. The specific flaw exists in the NetMail IMAP service, imapd.exe. The service does not sufficiently validate user-input length values when literals are appended to IMAP verbs to specify a command continuation request. The memory allocated to store the additional data may be insufficient, leading to an exploitable heap-based buffer overflow. Novell NetMail 3.5.2 is affected.

tags | advisory, remote, overflow, arbitrary, imap
advisories | CVE-2006-6424
SHA-256 | 00ad158430d6267397d77d4a8855ec99e1348d084819e68e63f872d23a2fcd20
Zero Day Initiative Advisory 06-052
Posted Dec 27, 2006
Authored by Tipping Point | Site zerodayinitiative.com

A vulnerability allows remote attackers to execute arbitrary code on affected installations of Novell NetMail. Successful exploitation requires the attacker to successfully authenticate to the affected service. The specific flaw exists in NetMail's implementation of the Network Messaging Application Protocol (NMAP). The NMAP server lacks bounds checking on parameters supplied to the STOR command, which can lead to an exploitable buffer overflow. The vulnerable daemon, nmapd.exe, binds to TCP port 689. Novell NetMail 3.5.2 is affected.

tags | advisory, remote, overflow, arbitrary, tcp, protocol
advisories | CVE-2006-6424
SHA-256 | 4056879f41eafb341738b16f36fa861255cdb891a2b2c6a31272e521c3dd1f2f
kisgb-remote.txt
Posted Dec 27, 2006
Authored by zeus | Site diosdelared.com

Keep It Simple Guest Book version 5.0.0 suffers from remote file inclusion vulnerabilities.

tags | exploit, remote, vulnerability, file inclusion
SHA-256 | c627cff3eb5c559feb07dae01c335ab111cfb6454af87ed59eb8510cbb412b24
efkanforum10-sql.txt
Posted Dec 27, 2006

Efkan Forum version 1.0 suffers from a SQL injection vulnerability.ShaFuck31

tags | exploit, sql injection
SHA-256 | abf997c7e80ce8c1795252fe574e4a9ab059d19df0b7dac1b6e70ea94036e9a1
oracle-xss.txt
Posted Dec 27, 2006
Authored by putosoft softputo

Oracle Applications/Portal versions 9i and 10g suffer from cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 5b903f77def68bd3894d4ffe4af3835c54da78e7599fb0ef3aad439f57a5fd37
wbkdr.zip
Posted Dec 27, 2006
Authored by warl0ck | Site metaeye.org

wbkdr is a proof of concept WinAmp backdoor that makes use of the plugin interface. It spawns cmd.exe on port 24501. Archive password is set to p4ssw0rd. Use at your own risk.

tags | trojan, proof of concept
SHA-256 | fe41f3a09a95545baef7687f0d242178eb78bfd291f95131bd02ac398d747362
xtnew01-sqlxss.txt
Posted Dec 27, 2006
Authored by Mr_KaLiMaN

Xt-News version 0.1 suffers from cross site scripting and SQL injection vulnerabilities.

tags | exploit, vulnerability, xss, sql injection
SHA-256 | c79a86210fc91a389f13db530a4a2f177cb36fdc3e0bfc918fb30b9c4f6a8b12
sqid-0.2.tar.gz
Posted Dec 27, 2006
Authored by Metaeye SG | Site sqid.rubyforge.org

SQL injection digger is a command line program that looks for SQL injections and common errors in websites.

Changes: The use of google search SOAP API has been removed due to no more issuing of keys. Now it directly performs search over the web.
tags | tool, scanner, sql injection
systems | unix
SHA-256 | 4fe72effb2b5fe4a4e0a32f8eeddedee32c437bd740a3f932037e89848773791
untidy-beta1.tgz
Posted Dec 27, 2006
Authored by Andres Riancho | Site untidy.sourceforge.net

untidy is general purpose XML Fuzzer. It takes a string representation of a XML as input and generates a set of modified, potentially invalid, XMLs based on the input. It's released under GPL v2 and written in python.

tags | python, fuzzer
SHA-256 | 4e6d1c8a2c04fa8b84ff9712946037521667fcfc677d2c11efeaea0732184f3d
mb-ms.txt
Posted Dec 27, 2006
Authored by 3APA3A

Microsoft Windows XP/2003/Vista suffers from a memory corruption flaw.

tags | advisory
systems | windows
SHA-256 | 705bd57347d0e6a7a932a0cbc5376bb71bc6bb86572f00fc641439dee19e2f8e
OpenPKG Security Advisory 2006.40
Posted Dec 27, 2006
Authored by OpenPKG Foundation | Site openpkg.org

OpenPKG Security Advisory - As confirmed by the vendor, a Denial of Service (DoS) vulnerability exists in the programming language Ruby, versions before 1.8.5-p2.

tags | advisory, denial of service, ruby
advisories | CVE-2006-6303
SHA-256 | b21d0c433a93a826301e000c138a2d7578c7c9e437c3c15008d465d9d44ccda3
Secunia Security Advisory 23437
Posted Dec 27, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Novell NetMail, which can be exploited by malicious users to cause a DoS (Denial of Service) or compromise a vulnerable system and by malicious people to compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
SHA-256 | 303a7a813036490e6bc27961859127a26c88310b4ab03e79d00a09f9184f3769
Secunia Security Advisory 23444
Posted Dec 27, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fukumori has reported a vulnerability in a-blog, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | f700ca902e4bb852afdf9f5fcd05cdcc4519c51b26b61e88c5abca9cb663a34e
Secunia Security Advisory 23448
Posted Dec 27, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | windows
SHA-256 | fbf9951b091a5603cac45f89db5722e7a024756b614f5c3cfb9a4ed9ed16519d
Secunia Security Advisory 23450
Posted Dec 27, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - nuffsaid has discovered a vulnerability in PowerClan, which can be exploited by malicious people to compromise vulnerable systems.

tags | advisory
SHA-256 | 2819be4a4b81cd25d9bcdb04f6f83cdcb09ee07ddd6c30d9d890a0c142714543
Secunia Security Advisory 23452
Posted Dec 27, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Michael Meeks has reported a security issue in GConf, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
SHA-256 | bbbc59c831e3466b094f6a12cf5e3432a21224f679f22bafba45ae4cd0a64b7a
Page 3 of 29
Back12345Next

File Archive:

August 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    20 Files
  • 2
    Aug 2nd
    4 Files
  • 3
    Aug 3rd
    6 Files
  • 4
    Aug 4th
    55 Files
  • 5
    Aug 5th
    16 Files
  • 6
    Aug 6th
    0 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    13 Files
  • 9
    Aug 9th
    13 Files
  • 10
    Aug 10th
    34 Files
  • 11
    Aug 11th
    16 Files
  • 12
    Aug 12th
    5 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    25 Files
  • 16
    Aug 16th
    3 Files
  • 17
    Aug 17th
    6 Files
  • 18
    Aug 18th
    4 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close