exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 348 RSS Feed

Files Date: 2007-06-01 to 2007-06-30

CX-2007-04.txt
Posted Jun 29, 2007
Authored by Daniel Weber

Calyptix Security Advisory CX-2007-04 - Multiple versions of Check Point's Safe@Office UTM device are vulnerable to cross-site request forgery. The test firmware was version 7.0.39x, the latest available for the Safe@Office model. Cursory testing shows that prior version 5.0.82x was also vulnerable. Other Check Point products were not tested.

tags | advisory, csrf
SHA-256 | 5a7280c2e84db6499337852cb17b9d7dc4fa7639fe87c2d1243fd24daff9054a
MITKRB5-SA-2007-005.txt
Posted Jun 29, 2007
Site web.mit.edu

MIT krb5 Security Advisory 2007-005 - The MIT krb5 Kerberos administration daemon (kadmind) is vulnerable to a stack buffer overflow.

tags | advisory, overflow
advisories | CVE-2007-2798
SHA-256 | 5915f86c61c9564dc34aa5cb655f913b024147f3860c66cbc95b45eba5a08091
nipper-0.10.0.tgz
Posted Jun 29, 2007
Authored by Ian Ventura-Whiting | Site sourceforge.net

nipper is a Network Infrastructure Configuration Parser. nipper takes a network infrastructure device configuration, processes the file and details security-related issues with the configuration together with detailed recommendations. nipper was previous known as CiscoParse. nipper currently supports Cisco switches (IOS), Cisco Routers (IOS), Cisco Firewalls (PIX/ASA/FWSM) and Juniper NetScreen (ScreenOS). Output is in HTML, Latex, XML and Text. Encrypted passwords can be output to a John-the-Ripper file for strength testing.

Changes: This release introduces support for Cisco Content Service Switch (CSS) devices, massively enhances IOS support and includes all round improvements to the report output. This release also includes improved documentation. See the changelog for a full list of changes.
systems | cisco, juniper
SHA-256 | 38f1deb68991c9367d3f5af63c37929863c468ed1f7958e5e54d93151471ef60
hpdi-write.txt
Posted Jun 28, 2007
Authored by callAX | Site shellcode.com.ar

hpqxml.dll version 2.0.0.133 from the HP Photo Digital Imaging software package has a flaw that allows for arbitrary file overwrite on the underlying system.

tags | exploit, arbitrary
SHA-256 | d5ed8c3f7dc685ae2d44fdc333686f1a4233c2473a12d3a6228b16977266b09b
quickticket-lfi.txt
Posted Jun 28, 2007
Authored by Katatafish

QuickTicket version 1.2 suffers from a local file inclusion vulnerability in qti_checkname.php.

tags | exploit, local, php, file inclusion
SHA-256 | 71544a547a68d6a05fbf7e16cb9e1f8f5a8727924b0b7b3cc17fb1621087b31a
quicktalk-lfi.txt
Posted Jun 28, 2007
Authored by Katatafish

QuickTalk forum version 1.3 suffers from local file inclusion vulnerabilities.

tags | exploit, local, vulnerability, file inclusion
SHA-256 | 5068c4cd8d68ec79194cf3bcbbf8697e40574eeb0fa6c4127c8a3b865ccc8a07
sony-heap.txt
Posted Jun 28, 2007
Authored by str0ke | Site milw0rm.com

Sony Network Camera SNC-P5 version 1.0 ActiveX viewer heap overflow proof of concept denial of service exploit.

tags | exploit, denial of service, overflow, activex, proof of concept
SHA-256 | 2848e6b5ecb0750e5005ec474e44c950ef5b91decc2778a0e20de5d37482ca14
real-oveflow.txt
Posted Jun 28, 2007
Authored by axis | Site pha4nt0m.org

RealNetworks RealPlayer/Helix Player SMIL wallclock stack overflow proof of concept denial of service exploit.

tags | exploit, denial of service, overflow, proof of concept
SHA-256 | 68e14478e4f096f8efadeb0d94891a14ff8995292a98f99547bb534907b4ee37
tinyshell.txt
Posted Jun 28, 2007
Authored by czy | Site ph4nt0m.org

152 byte Win32 tiny download and exec shellcode.

tags | shellcode
systems | windows
SHA-256 | d853d553fc7f574925a19fb5152e8bdc2901115fffcf6c04f6b041fa3fb266d1
Cisco_IOS_Exploitation_Techniques.pdf
Posted Jun 28, 2007
Authored by Gyan Chawdhary | Site irmplc.com

It has been more than a year since Michael Lynn first demonstrated a reliable code execution exploit on Cisco IOS at Black Hat 2005. Although his presentation received a lot of media coverage in the security community, very little is known about the attack and the technical details surrounding the IOS check_heaps() vulnerability. This paper is a result of research carried out by IRM to analyze and understand the check_heaps() attack and its impact on similar embedded devices.

tags | paper, code execution
systems | cisco
SHA-256 | 40dd024bc2d874958a21e126057bd31b7ed7d0c86e440e3d7f7f5635a1c9819c
ISR-sqlget-1.0.0.tar.gz
Posted Jun 26, 2007
Authored by Francisco Amato | Site infobyte.com.ar

ISR-sqlget is a blind SQL injection tool developed in Perl. It supports 20 databases, has various evasions features, SSL and proxy support, and more.

tags | tool, scanner, perl, sql injection
systems | unix
SHA-256 | 4ac98124e44160901dbd4f0fd6e7b92ffa530dcbfcbc73d2f2122fe5549a1093
shellcode_generator.txt
Posted Jun 26, 2007
Authored by Kyle | Site freeshell.se

Simple shellcode generator written in Perl.

tags | perl, shellcode
SHA-256 | 03991e43ec5d4d5b8c519651b343e547584481d7614bcb0c1b8961c3ebb016be
Mandriva Linux Security Advisory 2007.135
Posted Jun 26, 2007
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - Multiple cross site scripting vulnerabilities were discovered in pam_login.cgi in webmin prior to version 1.350, which could allow a remote attacker to inject arbitrary web scripts or HTML.

tags | advisory, remote, web, arbitrary, cgi, vulnerability, xss
systems | linux, mandriva
advisories | CVE-2007-3156
SHA-256 | 1bbbe676ac186d3ae6bd66dd9d54848626a7c80788f138d68e26053c9496a365
Debian Linux Security Advisory 1320-1
Posted Jun 26, 2007
Authored by Debian | Site debian.org

Debian Security Advisory 1320-1 - Several remote vulnerabilities have been discovered in the Clam anti-virus toolkit. It was discovered that the OLE2 parser can be tricked into an infinite loop and memory exhaustion. It was discovered that the NsPack decompression code performed insufficient sanitizing on an internal length variable, resulting in a potential buffer overflow. It was discovered that temporary files were created with insecure permissions, resulting in information disclosure. It was discovered that the decompression code for RAR archives allows bypassing a scan of a RAR archive due to insufficient validity checks. It was discovered that the decompression code for RAR archives performs insufficient validation of header values, resulting in a buffer overflow.

tags | advisory, remote, overflow, vulnerability, virus, info disclosure
systems | linux, debian
advisories | CVE-2007-2650, CVE-2007-3023, CVE-2007-3024, CVE-2007-3122, CVE-2007-3123
SHA-256 | 62a4dcd169bebdf40e44a94dd161b10f047c7e6c91ce7107661336b7d9b5089d
Debian Linux Security Advisory 1319-1
Posted Jun 26, 2007
Authored by Debian | Site debian.org

Debian Security Advisory 1319-1 - Several remote vulnerabilities have been discovered in MaraDNS, a simple security-aware Domain Name Service server.

tags | advisory, remote, vulnerability
systems | linux, debian
advisories | CVE-2007-3114, CVE-2007-3115, CVE-2007-3116
SHA-256 | 402998143f0f2092d26bcd32bc571ec697568c6b823e5fe4dee1f4a8ef9c0560
Debian Linux Security Advisory 1318-1
Posted Jun 26, 2007
Authored by Debian | Site debian.org

Debian Security Advisory 1318-1 - Several remote vulnerabilities have been discovered in ekg, a console Gadu Gadu client.

tags | advisory, remote, vulnerability
systems | linux, debian
advisories | CVE-2005-2370, CVE-2005-2448, CVE-2007-1663, CVE-2007-1664, CVE-2007-1665
SHA-256 | 5c48b9b7359ae496f303d7bea1ef0aabd1f975e1ffc22adfcd9dd2c6442349fa
dsa-1317.txt
Posted Jun 26, 2007
Site debian.org

Debian Security Advisory 1317-1 - duskwave discovered that tinymux, a text-based multi-user virtual world server, performs insufficient boundary checks when working with user-supplied data, which might lead to the execution of arbitrary code.

tags | advisory, arbitrary
systems | linux, debian
advisories | CVE-2007-1655
SHA-256 | 3bf1bb01d6597bed9cfb800df13f7d338860554dbaed4e0091223f0bd87bb56c
VULWAR200706223.txt
Posted Jun 26, 2007
Authored by GoodFellas Security Research Team, Brian Mariani | Site goodfellas.shellcode.com.ar

BarCodeAx.dll version 4.9 ActiveX control is susceptible to a remote stack buffer overflow.

tags | advisory, remote, overflow, activex
SHA-256 | 5b8f251469b6b6ff16e87adec7af89f0e53ad8ce7a91fe3df07f6af3b97ab875
Ubuntu Security Notice 476-1
Posted Jun 26, 2007
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 476-1 - Fabio Massimo Di Nitto discovered that cman did not correctly validate the size of client messages. A local user could send a specially crafted message and execute arbitrary code with cluster manager privileges or crash the manager, leading to a denial of service.

tags | advisory, denial of service, arbitrary, local
systems | linux, ubuntu
SHA-256 | e83c4673488457a524361a3367db932545cc68725676633da10de545d14b93c5
orkut-mgmt.txt
Posted Jun 26, 2007
Authored by Susam Pal, Vipul Agarwal | Site susam.in

Orkut fails to expire or disable the session associated with the 'orkut_state' cookie when the user logs out or fails to authenticate himself during a session.

tags | advisory
SHA-256 | 3a90b01bdb461209a1a19adeb541b056df60200c9788a2bc7f1b48172b8ad24c
endonesia84-sql.txt
Posted Jun 26, 2007
Authored by laurent gaffie

eNdonesia version 8.4 suffers from a SQL injection vulnerability.

tags | exploit, sql injection
SHA-256 | 39adbd09c3de049026347d06dcda7c3dd848119e60eabdf6004f1b254c5c1ddd
CAID-Ingres.txt
Posted Jun 26, 2007
Authored by Ken Williams | Site www3.ca.com

Various CA products that embed Ingres products contain multiple vulnerabilities that can allow an attacker to potentially execute arbitrary code.

tags | advisory, arbitrary, vulnerability
advisories | CVE-2007-3336, CVE-2007-3337, CVE-2007-3338, CVE-2007-3334
SHA-256 | b9420a8daa8448c325330f47f53519fd6d8bf578d33c969e755fb2c28d048bb8
avaxswf-write.txt
Posted Jun 26, 2007
Authored by callAX | Site shellcode.com.ar

Avaxswf.dll, a library included in the Avax Vector ActiveX version 1.3 software package from the Company Civitech, has a flaw that allows for arbitrary file overwrite on the underlying system.

tags | exploit, arbitrary, activex
SHA-256 | 4ca55d3c8f70a52a5379bf51316724a294795bf8c806940932fe86568b7aca3a
NCTAudioEditor2.txt
Posted Jun 26, 2007
Authored by shinnai | Site shinnai.altervista.org

NCTAudioEditor2 ActiveX DLL NCTWMAFile2.dll version 2.6.2.157 exploit.

tags | exploit, activex
SHA-256 | 28a728208a8f4004c82fff2c6ff50e58377091a3c0e399bc41dfb3662e338c47
NCTAudioStudio2.txt
Posted Jun 26, 2007
Authored by shinnai | Site shinnai.altervista.org

NCTAudioStudio2 ActiveX DLL version 2.6.1.148 CreateFile() insecure method exploit.

tags | exploit, activex
SHA-256 | 641ca86b050b1f939e4516b7263fb460927024d0e291ff0eabbbbbf258573c45
Page 2 of 14
Back12345Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close