exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 36 RSS Feed

Files Date: 2007-06-11 to 2007-06-12

NDSA20070524.txt
Posted Jun 11, 2007
Authored by Tim Brown | Site nth-dimension.org.uk

Nth Dimension Security Advisory (NDSA20070524) - The JFFNMS application has high risk issues with its authentication mechanism. These can lead to SQL injection allowing authentication bypass and Javascript injection. There is also a potential backdoor although this is unlikely to be exploitable. The JFFNMS application has default PHP scripts which can lead to information disclosure as an unauthenticated user.

tags | advisory, php, javascript, sql injection, info disclosure
SHA-256 | 474819ff3749ac56f3c7f1d1b13919e237c6efaf980c43a4b2095a7bf984b293
Debian Linux Security Advisory 1302-1
Posted Jun 11, 2007
Authored by Debian | Site debian.org

Debian Security Advisory 1302-1 - A problem was discovered with freetype, a FreeTyp2 font engine, which could allow the execution of arbitrary code via an integer overflow in specially crafted TTF files.

tags | advisory, overflow, arbitrary
systems | linux, debian
advisories | CVE-2007-2754
SHA-256 | c124f95dee3404561bbca91bcb78c6545f445033ef06d0760d1d298d1f9b0e9e
Debian Linux Security Advisory 1303-1
Posted Jun 11, 2007
Authored by Debian | Site debian.org

Debian Security Advisory 1303-1 - Two problems were discovered with lighttpd, a fast webserver with minimal memory footprint, which could allow denial of service.

tags | advisory, denial of service
systems | linux, debian
advisories | CVE-2007-1870, CVE-2007-1869
SHA-256 | 0ab7791e45f6942413adf3f101cb17db0acca6a20be5010af9fce07305d933b0
lrcf-inject.txt
Posted Jun 11, 2007
Authored by CorryL

Link Request Contact Form version 3.4 suffers from a remote code injection vulnerability. Full exploit provided.

tags | exploit, remote
SHA-256 | 0423208100e20e1bcf2100f3deddf8c13824689edc37c5cec1338f65e81ec3a2
shop-xss.txt
Posted Jun 11, 2007
Authored by suckure

www.shopathometv.com suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | f368d71d30697ffc32353629ddbf49b1c971f709052af1887b4cc802189ddeb5
Debian Linux Security Advisory 1301-1
Posted Jun 11, 2007
Authored by Debian | Site debian.org

Debian Security Advisory 1301-1 - A buffer overflow has been identified in Gimp's SUNRAS plugin in versions prior to 2.2.15. This bug could allow an attacker to execute arbitrary code on the victim's computer by inducing the victim to open a specially crafted RAS file.

tags | advisory, overflow, arbitrary
systems | linux, debian
advisories | CVE-2007-2356
SHA-256 | 581128210fcc066baf5838993a98d3ad36f84fd413e7fd7ad8e6dedfb1d42aac
mybloggie-rfi.txt
Posted Jun 11, 2007
Authored by Yaser | Site ayyildiz.org

myBloggie version 2.1.5 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 07ccc6704aa43d2d3eed827d356f3028890fbb8638f13705d6e513a69a41d594
vsupportits-sql.txt
Posted Jun 11, 2007
Authored by rUnViRuS | Site sec-area.com

vSupport Integrated Ticket System version 3.x suffers from a SQL injection vulnerability.

tags | exploit, sql injection
SHA-256 | e0c6b4fa6c10b0e9150a0d0fbc3df86491f6957acf57e618654f9863d3254535
uidbind-lsm-0.4.tar.gz
Posted Jun 11, 2007
Authored by Roberto De Ioris

UidBind is a simple LSM module that restricts calls to the bind() function to the UID/GID defined in a configfs tree.

systems | linux
SHA-256 | e5d287f1aa4ef3760b2c7204dc3a3a5bcc53b538f48c31e8062ab09a988b8ae5
plash_1.18.orig.tar.gz
Posted Jun 11, 2007
Authored by Mark Seaborn | Site plash.beasts.org

Plash is a sandbox for running GNU/Linux programs with minimum privileges. It is suitable for running both command line and GUI programs. It can dynamically grant Gtk-based GUI applications access rights to individual files that you want to open or edit. This happens transparently through the Open/Save file chooser dialog box, by replacing GtkFileChooserDialog. Plash virtualizes the file namespace and provides per-process/per-sandbox namespaces. It can grant processes read-only or read-write access to specific files and directories, mapped at any point in the filesystem namespace. It does not require modifications to the Linux kernel.

Changes: Various updates and fixes.
tags | tool, kernel
systems | linux, unix
SHA-256 | fd864fe0e95c0090f68aa6796f289689e412a7d4b7753746aa3dba44dd5179b6
spybye-0.3.tar.gz
Posted Jun 11, 2007
Authored by Neils Provos | Site spybye.org

SpyBye is a tool to help web masters determine if their web pages are hosting browser exploits that can infect visiting users with malware. It functions as an HTTP proxy server and intercepts all browser requests. A few simple rules are used to determine if embedded links on your web page are harmless, unknown, or maybe even dangerous.

tags | web
SHA-256 | 00dd7df03c9a37e80854fa27e44eeaaa4a8c49fa3b0597b5e3b1b2a128669432
nuface-1.2.3.tar.gz
Posted Jun 11, 2007
Authored by Vincent Deffontaines | Site inl.fr

Nuface is a Web-based administration tool that generates Edenwall, NuFW, or simple Netfilter firewall rules. It features a high level abstraction on the security policy set by the administrator, and works internally on an XML data scheme. Its philosophy is to let you agglomerate subjects, resources, or protocols into meta-objects, and use those meta objects to generate ACLs, which are then interpreted as netfilter rules by Nupyf, the internal XML parser. This tool may easily be extended to support firewall implementations other than Netfilter.

Changes: Backported the functional test infrastructure from trunk. Fixed some bugs in Makefile. Fixed a bug in netfilter mark management when layer7 filter and authenticated firewall are both enabled.
tags | tool, web, firewall, protocol
systems | unix
SHA-256 | 686dfe5b1a37fed0cdaf11c9b06afb08eb23953aba7a8cfec4d0080267ddf904
bluediving-0.8.tgz
Posted Jun 11, 2007
Authored by Bastian Ballmann | Site sourceforge.net

Bluediving is a Bluetooth penetration testing suite. It implements attacks like Bluebug, BlueSnarf, BlueSnarf++, BlueSmack, and has features such as Bluetooth address spoofing.

Changes: Get device class and type. Automatically launch carwhisperer on headsets and carkits. Various other improvements.
tags | tool, spoof, rootkit
systems | unix
SHA-256 | 661d257a4a532d5843be1834534633586b7ffa70a367c685c61f7218fa4702c4
Ubuntu Security Notice 470-1
Posted Jun 11, 2007
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 470-1 - Ilja van Sprundel discovered that Bluetooth setsockopt calls could leak kernel memory contents via an uninitialized stack buffer. A local attacker could exploit this flaw to view sensitive kernel information. The GEODE-AES driver did not correctly initialize its encryption key. Any data encrypted using this type of device would be easily compromised. The random number generator was hashing a subset of the available entropy, leading to slightly less random numbers. Additionally, systems without an entropy source would be seeded with the same inputs at boot time, leading to a repeatable series of random numbers.

tags | advisory, kernel, local
systems | linux, ubuntu
advisories | CVE-2007-1353, CVE-2007-2451, CVE-2007-2453
SHA-256 | 56fd8733aa53edf71d49d69b80148108e0db8297790509014a675376ae98f632
Mandriva Linux Security Advisory 2007.118
Posted Jun 11, 2007
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - An integer overflow in the exif_data_load_data_entry function in exif-data.c in libexif before 0.6.14 allows user-assisted remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via crafted EXIF data.

tags | advisory, remote, denial of service, overflow, arbitrary
systems | linux, mandriva
advisories | CVE-2007-2645
SHA-256 | 2ad12f001910f1eeed0075ed45b9dc426c4a39fc7cc48f0d6baa9c71c605e5da
EEYE-Yahoo.txt
Posted Jun 11, 2007
Authored by Greg Linares | Site eeye.com

eEye Digital Security has discovered two critical vulnerabilities in ywcupl.dll (version 2.0.1.4) and ywcvwr.dll (version 2.0.1.4) included by default in all releases of Yahoo! Messenger 8.x.

tags | advisory, vulnerability
SHA-256 | d9613dbb76bafe2f5a875521f8e0028a1306fdcd3e8bbff5b802d3921f26ac89
iDEFENSE Security Advisory 2007-06-07.1
Posted Jun 11, 2007
Authored by iDefense Labs | Site idefense.com

iDefense Security Advisory 06.07.07 - Local exploitation of an information disclosure vulnerability within the Linux Kernel allows attackers to obtain sensitive information from kernel memory. This vulnerability specifically exists in the "cpuset_tasks_read" function. This function is responsible for supplying user-land processes with data when they read from the /dev/cpuset/tasks file. iDefense has confirmed the existence of this vulnerability in version 2.6.20 of the Linux Kernel as installed with Fedora CORE 6. It is suspected that previous versions, at least until 2.6.12, are also vulnerable.

tags | advisory, kernel, local, info disclosure
systems | linux, fedora
advisories | CVE-2007-2875
SHA-256 | 1cbddf9f964522b8a1b33ad47d06eb80d8a50c65a2cc77358d4192f28d785c29
packeteer-dos.txt
Posted Jun 11, 2007
Authored by nnposter

Packeteer PacketShaper is susceptible to a denial of service vulnerability in the web management interface. The vulnerability has been identified in version 7.3.0g2 and 7.5.0g1. However, other versions may be also affected.

tags | advisory, web, denial of service
SHA-256 | 8eb0c7a50e9fe070efa27590a9a7e409e0937a06053bf48cf3765d96c2b12418
zenturi-navig.txt
Posted Jun 11, 2007
Authored by shinnai | Site shinnai.altervista.org

Zenturi ProgramChecker ActiveX NavigateUrl() insecure method exploit.

tags | exploit, activex
SHA-256 | 35254749fd28f6a2693aef0eabd0b27a6c4c1296be47d7a503da51aa47ef14b2
zenturi-activex.txt
Posted Jun 11, 2007
Authored by shinnai | Site shinnai.altervista.org

Zenturi ProgramChecker ActiveX multiple insecure methods exploit.

tags | exploit, activex
SHA-256 | 3d2bb2b4608b3ea385b99b58c216d019d9a63e1c027b0182a209d23c60a204f7
mswin-anim.txt
Posted Jun 11, 2007
Authored by Ramon de C Valle | Site risesecurity.org

Microsoft Windows animated cursor stack overflow exploit with reverse shellcode.

tags | exploit, overflow, shellcode
systems | windows
SHA-256 | 1a4e222ee915a53deac41e525052a79fdeba491946f5b20afd80db953052b3e9
movieplay-overflow.txt
Posted Jun 11, 2007
Authored by n00b

MoviePlay version 4.76 .lst file local buffer overflow exploit.

tags | exploit, overflow, local
SHA-256 | 073fe06de4f05a3b5ac16d628283d6ef013f7acbf5fbeefe542cef041ff98f56
geometrix-sql.txt
Posted Jun 11, 2007
Authored by CyberGhost | Site aspspider.org

GeometriX Download Portal suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 9fd875076073e940e79aa72ce44e3fae81a45386d24ab15ca6ff7f448ebd8c89
prec-rfi.txt
Posted Jun 11, 2007
Authored by not sec group | Site notsec.com

PHP Real Estate Classifieds remote file inclusion exploit.

tags | exploit, remote, php, code execution, file inclusion
SHA-256 | d2492fd10b71b03c637156f1defc1aa00a9f5c2074c53727f4b612d68b27ee0a
evisioncms-exec.txt
Posted Jun 11, 2007
Authored by Silentz | Site w4ck1ng.com

e-Vision CMS versions 2.02 and below SQL injection and remote code execution exploit.

tags | exploit, remote, code execution, sql injection
SHA-256 | 44a6d74b42b1b22ed09a0e31927a7d22ebf5330e43998d4b31186a5050f7b484
Page 1 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close