what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 683 RSS Feed

Files Date: 2007-09-01 to 2007-09-30

lustigcms-rfi.txt
Posted Sep 28, 2007
Authored by GolD_M | Site tryag.cc

lustig.cms BETA version 2.5 suffers from a remote file inclusion vulnerability in forum.php.

tags | exploit, remote, php, code execution, file inclusion
SHA-256 | 1c5ce0430a7ee0d8823d612e455cf0d1f02aac4aad55020743d7ad457aca07e5
linux-syscall.txt
Posted Sep 28, 2007
Authored by Venglin, Wojciech Purczynski, Robert Swiecki, Pawel Pisarczyk | Site atm-lab.pl

Local root exploit for the x86_64 Linux kernel ia32syscall emulation bug.

tags | exploit, kernel, local, root
systems | linux
SHA-256 | 8d91a3219d851d8406ae0d6bc5f4d6d08474c37d42d187149534fafa463a0295
promise-root.txt
Posted Sep 28, 2007
Authored by Tor Houghton | Site bogus.net

The Promise NAS NS4300N web GUI allows an administrative user to change the root password.

tags | exploit, web, root
SHA-256 | 296acc5d1ca21ed112707b6bddc76675c50f0159dfb90a26d10bdc0466809919
openssl-offbyone.txt
Posted Sep 28, 2007
Authored by Moritz Jodeit

OpenSSL versions before 0.9.7m and 0.9.8e suffer from an off-by-one buffer overflow in SSL_get_shared_ciphers().

tags | advisory, overflow
SHA-256 | 14554756f6b961b55d3c66f67ef71356931c21b86d987c2959039bdbdf012665
waraxe-2007-SA058.txt
Posted Sep 28, 2007
Authored by Janek Vind aka waraxe | Site waraxe.us

NukeSentinel version 2.5.12 suffers from a critical SQL injection vulnerability.

tags | advisory, sql injection
SHA-256 | 8609aaa24647aa6d87049087ff33424aec448d0783a2661c0daf4ed2c1fddc9e
waraxe-2007-SA057.txt
Posted Sep 28, 2007
Authored by Janek Vind aka waraxe | Site waraxe.us

SiteX CMS is susceptible to an unauthorized file upload vulnerability.

tags | exploit, file upload
SHA-256 | f140776b42ea2d5cfcabf66ae5f0716bd312a92afebbe27bf5a4c4df5a2838a4
waraxe-2007-SA056.txt
Posted Sep 28, 2007
Authored by Janek Vind aka waraxe | Site waraxe.us

NukeSentinel version 2.5.11 suffers from another critical SQL injection vulnerability.

tags | advisory, sql injection
SHA-256 | 751572a1ba8344ba43dfda90368c4ff5c343d4c58e533eea361458d6dc46e8a5
waraxe-2007-SA055.txt
Posted Sep 28, 2007
Authored by Janek Vind aka waraxe | Site waraxe.us

SiteX CMS version 0.7.3 Beta is susceptible to a SQL injection vulnerability.

tags | advisory, sql injection
SHA-256 | af8c767f684397966c70f06cbee096e2f2b77708232e24509fb8f58e529c878f
cisco-sr-20070926-lb.txt
Posted Sep 28, 2007
Site cisco.com

Cisco Security Advisory - Cisco Catalyst 6500 and Cisco 7600 series devices use addresses from the 127.0.0.0/8 (loopback) range in the Ethernet Out-of-Band Channel (EOBC) for internal communication. Addresses from this range that are used in the EOBC on Cisco Catalyst 6500 and Cisco 7600 series devices are accessible from outside of the system. The Supervisor module, Multilayer Switch Feature Card (MSFC), or any other intelligent module may receive and process packets that are destined for the 127.0.0.0/8 network. An attacker can exploit this behavior to bypass existing access control lists that do not filter 127.0.0.0/8 address range; however, an exploit will not allow an attacker to bypass authentication or authorization. Valid authentication credentials are still required to access the module in question.

tags | advisory
systems | cisco
SHA-256 | d6651fc0cc8bf0819bf2d81153fe0bf85e0cb9c2ab0437f6f9fc89515635ec02
Secunia Security Advisory 26914
Posted Sep 27, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in CA BrightStor Hierarchical Storage Manager, which can be exploited by malicious people to conduct SQL injection attacks, cause a DoS (Denial of Service), or compromise a vulnerable system.

tags | advisory, denial of service, vulnerability, sql injection
SHA-256 | b461d1e5ecc771fdd90f59f243295e79fadf35bc18f4afefc0bdb4a01eda47cf
Secunia Security Advisory 26942
Posted Sep 27, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Tk, which can potentially be exploited by malicious people to compromise an application using the library.

tags | advisory
SHA-256 | 7f002ff61cb57432bfcb29358ef622285c571bc5c3a8b90f0345c43e285222b6
Secunia Security Advisory 26948
Posted Sep 27, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in F-Secure Anti-Virus, which can be exploited by malware to bypass the scanning functionality.

tags | advisory, virus
SHA-256 | de337fc1ad94451b2eb6fdbb7dbb4b9190386a76e98204c20d37af7e82a16978
Secunia Security Advisory 26950
Posted Sep 27, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Sun Solaris, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
systems | solaris
SHA-256 | 97fa56eaa7750e7d9c0334a48a1d2a38088b450494436af198d37bc1fbc72358
Secunia Security Advisory 26954
Posted Sep 27, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Janek Vind has reported a vulnerability in NukeSentinel, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 08938adc26314af660ce3f339b2ee5f12e35034810123632fb3996941338744f
Secunia Security Advisory 26957
Posted Sep 27, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - darkbunny91 has discovered a vulnerability in FlatNuke, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
SHA-256 | b0b1550286eb47292113702a8c793bc447e0f11bdefe1b1327387d0bfe42046b
Secunia Security Advisory 26966
Posted Sep 27, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - ka0x has reported a vulnerability in Novus, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | e1bc24b31078749269a778054bb85e1a3dedf26d1bee7147f6c2152765d4e523
Secunia Security Advisory 26984
Posted Sep 27, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Avaya has acknowledged a vulnerability in various Avaya products, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | ca80778767aa4a47eca7d79df63573293bfcafca4c65cdb1f1f4f91c4b935581
Secunia Security Advisory 26986
Posted Sep 27, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Joris van Rantwijk has reported a vulnerability in Xen, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
SHA-256 | 14574d403753aafab6106d8a71731c0d61c8accf15d897e3eba9bb1221a2640a
Secunia Security Advisory 26988
Posted Sep 27, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in Cisco Catalyst 6500 and Cisco 7600 series devices, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
systems | cisco
SHA-256 | a8e7b689ea5465eb9233edadb6e50456d150afe3e3f928b7c9c56ab627f6341d
Netspear-1.0.tgz
Posted Sep 27, 2007
Authored by The Finn

Netspear is a web based database backend for nmap. It comes with an nmap patch for 4.01 and 4.20 nmap written by esko and updated by The Finn. Netspear allows scan data to be inserted into a mysql database and hosts searched for by service, by daemon and by version of daemon. It also comes with a few reports about the data collected.

tags | tool, web, nmap
systems | unix
SHA-256 | a3fc42f79a82a02347751972276fd68ca5f6e1045e48bdefdc2ab35c28693553
CAID-hsmcmv.txt
Posted Sep 27, 2007
Authored by Ken Williams | Site www3.ca.com

Multiple vulnerabilities exist in the CsAgent service that can allow a remote attacker to execute arbitrary code or cause a denial of service condition. The first set of vulnerabilities, CVE-2007-5082, occur due to insufficient bounds checking in multiple CsAgent service commands. The second set of vulnerabilities, CVE-2007-5083, occur due to insufficient validation of integer values in multiple CsAgent service commands, which can lead to buffer overflow. The third set of vulnerabilities, CVE-2007-5084, occur due to insufficient validation of strings used in SQL statements in multiple CsAgent service commands.

tags | advisory, remote, denial of service, overflow, arbitrary, vulnerability
advisories | CVE-2007-5082, CVE-2007-5083, CVE-2007-5084
SHA-256 | 363a6e7d492038cdb02283292599822fec694fd384becbbaf92e0cbd416cee51
Debian Linux Security Advisory 1343-2
Posted Sep 27, 2007
Authored by Debian | Site debian.org

Debian Security Advisory 1343-2 - The Debian 4.0r1 release contains a file package with the same version number as the last security update (4.17-5etch2), potentially overriding it. This security advisory reissues DSA-1343-1 with a higher version number, to ensure that its changes remain in effect. The changes from Debian 4.0r1 (which fix a minor denial of service issue, CVE-2007-2026) are included as well.

tags | advisory, denial of service
systems | linux, debian
advisories | CVE-2007-2799, CVE-2007-2026
SHA-256 | ea0fc63b398d84b59eb9945442c58506846b3adab43f0bee2dba81453354abf6
novus-sql.txt
Posted Sep 27, 2007
Authored by ka0x

Novus version 1.0 suffers from a remote SQL injection vulnerability in notas.asp.

tags | exploit, remote, sql injection, asp
SHA-256 | 50a76b4ed1c9608d23df481ff0f1d9d4bb3cd589902cc023a86924d43fd7d685
softbiz-sql.txt
Posted Sep 27, 2007
Authored by IRCRASH | Site ircrash.com

Softbiz Classifieds PLUS suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 07fde2e11390bc86f1310e2f8a1f79bcd88673d1b2d3028fc14280dbc240b12f
fa113-rfi.tt
Posted Sep 27, 2007
Authored by kezzap66345

FrontAccounting version 1.13 suffers from remote file inclusion vulnerabilities.

tags | exploit, remote, vulnerability, code execution, file inclusion
SHA-256 | ce85cf5a956552aad728522d06b7fbaf888fc241607d0424c5c99ac80293f921
Page 2 of 28
Back12345Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close