exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 70 RSS Feed

Files Date: 2007-10-22 to 2007-10-23

acart-sqlxss.txt
Posted Oct 22, 2007
Authored by Outlaw | Site aria-security.net

A-Cart suffers from SQL injection and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, sql injection
SHA-256 | b88c9d2d5610ab94133985d2710736aabdc956242becc4ed51cd6e2b32d2d2cf
Debian Linux Security Advisory 1390-1
Posted Oct 22, 2007
Authored by Debian | Site debian.org

Debian Security Advisory 1390-1 - Hamid Ebadi has discovered a buffer overflow the intT1_Env_GetCompletePath routine in t1lib, a Type 1 font rasterizer library. This flaw could allow an attacker to crash and application using the t1lib shared libraries, and potentially execute arbitrary code within such an application's security context.

tags | advisory, overflow, arbitrary
systems | linux, debian
advisories | CVE-2007-4033
SHA-256 | f1f99de36dc124eb99855035833c588793e50108a12c7b05c2d25a455a80184f
w3af-beta5.tar.bz2
Posted Oct 22, 2007
Authored by Andres Riancho | Site w3af.sourceforge.net

w3af, is a Web Application Attack and Audit Framework. The framework and the plugins are fully written in python. Each plugin will add a functionality like cross site scripting detection or SQL injection exploitation.

Changes: This version implements some really interesting features like virtual daemons and w3afAgents.
tags | web, xss, sql injection, python
SHA-256 | 67d891aa6500e7df47db2f09f38d9e2c51954964e0f2cf5cf740433665379e95
pointroll-xss.txt
Posted Oct 22, 2007

Various websites including eBay, CNN, and Monster.com use a version of the advertising system Pointroll that leaves them susceptible to cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 4427207b323c5a81bfc34e201f949113171c4cf907a9767129df240e40066aff
NDSA20071016.txt
Posted Oct 22, 2007
Authored by Tim Brown | Site nth-dimension.org.uk

Nth Dimension Security Advisory (NDSA20071016) - The SiteBar application has single high risk issues with its translation module. It can can be made to retrieve any file to which the web server user has read access. The SiteBar application has multiple high risk issues with its translation module. It can be made to execute arbitrary code to gain remote access as the web server user typically nobody. The SiteBar application has multiple medium risk issues where it is vulnerable to Javascript injection within the requested URL. The SiteBar application has single medium risk issue where it is vulnerable to malicious redirects within the requested URL. Version 3.3.8 is affected.

tags | exploit, remote, web, arbitrary, javascript
advisories | CVE-2006-3320, CVE-2007-5492, CVE-2007-5491
SHA-256 | f9787ab6aeb07593ce7cda6de093a36855c1a84a926762bb230871ba4fa62bdb
curl-zlib.txt
Posted Oct 22, 2007
Authored by Stefan Kanthak

The Microsoft Windows binary of curl contains a vulnerable version of zlib.

tags | advisory
systems | windows
advisories | CVE-2005-2096
SHA-256 | 23ffc0004b9551d2eac301f99d76817eaf4fd4cb36162d70811e58df6ded7a07
bitdefend-zlib.txt
Posted Oct 22, 2007
Authored by Stefan Kanthak

The freeware version of Softwin's Bitdefender software contains a vulnerable version of zlib.

tags | advisory
SHA-256 | 8e49cc4ec5ada844916e219cdc6a719f8e49e6f776aa8674aa60f48ab56c3486
gsview-zlib.txt
Posted Oct 22, 2007
Authored by Stefan Kanthak

The Microsoft Windows binary GSV48W32.EXE of gsview contains a vulnerable version of zlib.

tags | advisory
systems | windows
advisories | CVE-2005-2096
SHA-256 | 4f5970a0b756c59df38bb2646529f1f975572ff3992b0be14d2bee4befb49e8c
secdrv-plugin_exploit_32bit.zip
Posted Oct 22, 2007
Authored by Ruben Santamarta | Site reversemode.com

Macrovision Safedisc secdrv.sys privilege escalation exploit for use with Kartoffel. Exploit Microsoft Windows XP SP2 and 2003.

tags | exploit
systems | windows
SHA-256 | d6d916e9ed801ae67787048fc759ceaab183f26a46e0550aaf9a5901c539b061
nortelcs-dos.txt
Posted Oct 22, 2007
Authored by Cyrill Brunschwiler | Site csnc.ch

The Nortel Communication Server 1000 is susceptible to a denial of service condition when flooded with packets.

tags | advisory, denial of service
SHA-256 | 3a1e612d60083c059d9753663e4abc70b615d2ef15c60154acdfb92999133c6a
ipphone-reauth.txt
Posted Oct 22, 2007
Authored by Daniel Stirnimann | Site csnc.ch

The Nortal UNIStim IP Phone signalization protocol is vulnerable against spoofed re-authentication messages.

tags | advisory, spoof, protocol
SHA-256 | ae2a7818f57204ac8d0a23e283013e74226689cf3f793a25d7f4c67a3e4e5699
ipphone-dos.txt
Posted Oct 22, 2007
Authored by Daniel Stirnimann | Site csnc.ch

The Nortel UNIStim IP Phone is susceptible to a remote denial of service attack when flooded.

tags | advisory, remote, denial of service
SHA-256 | 7a2e54f9bf1e9278e11d68163cdf787bfc5685d2297f2dc850ba093be662b2e7
ipphonesurveil-spoof.txt
Posted Oct 22, 2007
Authored by Daniel Stirnimann | Site csnc.ch

The Nortel UNIStim IP Phone appears to suffer from a spoofing vulnerability that allows for message interception.

tags | advisory, spoof
SHA-256 | 65392c715d8f5d5e32499a312b577546f7ad65f7876e976a35b1c5f4974aa06f
unistim-overflow.txt
Posted Oct 22, 2007
Authored by Cyrill Brunschwiler | Site csnc.ch

The UNIStim IP Softphone appears to suffer from a buffer overflow condition when flooded with data on the RTCP port.

tags | advisory, overflow
SHA-256 | 737767383a1c7d460e112d9f620f886c11febc5c5cf9f7ec719c6edfe4f954d1
webhack.txt
Posted Oct 22, 2007
Site webappsec.org

Latest additions to the Web Hacking Incidents Database (WHID) detailing major recent incidents.

tags | advisory, web
SHA-256 | 9ef7b26b0eddd38519c2953eb60af13bd895e1dfd5872fb67ca39a54c0ead65e
dotaware-beta.txt
Posted Oct 22, 2007
Authored by aware | Site awarenetwork.org

.aware electronic magazine Beta - Overground Hacking.

tags | magazine
SHA-256 | 5a4b07ba182e6b8446b49c6fd53fb1ed404063d5cb2466af0c5dcd2ede939da1
visolfi.txt
Posted Oct 22, 2007
Authored by d3hydr8 | Site darkcode.ath.cx

VISO apps are vulnerability to a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | b0c7ada4029056f644ab09494a67b9a8ece06f4d4a2aa46052aaf1fdb8921671
KN2.txt
Posted Oct 22, 2007
Authored by d3hydr8 | Site darkc0de.com

Knowledge Networking version 1.0.b suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | f3bf1ea47c84c56ec8f9fa85f609ffc8954025f621e208d23d7dadf5e8d925de
sphpblog-csrf.txt
Posted Oct 22, 2007
Authored by Demential | Site hackish.altervista.org

SimplePHPBlog version 0.4.9 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | e8ab4fdfb8230e314dd589d37c9d99da8638dd7af3c46f311583e4b55be805aa
openssl-0.9.8g.tar.gz
Posted Oct 22, 2007
Site openssl.org

OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide.

Changes: Various bug fixes.
tags | encryption, protocol
SHA-256 | 0e26886845de95716c9f1b9b75c0e06e9d4075d2bdc9e11504eaa5f7ee901cf0
Secunia Security Advisory 27177
Posted Oct 22, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in IBM DB2, which potentially can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system.

tags | advisory, denial of service
SHA-256 | b9c4cf6f0bdfc23fc719af48318e81ce4f181e64d9ade4df3efd3fb87c51a6cf
Secunia Security Advisory 27198
Posted Oct 22, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - JosS has discovered a vulnerability in WWWISIS, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
SHA-256 | c83fdae09b2cf39e863fc1d9790ca17f48ee0e41e9ae7084f1d2671f01671373
Secunia Security Advisory 27226
Posted Oct 22, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some security issues with unknown impact have been reported in Support Incident Tracker.

tags | advisory
SHA-256 | e75f40d838022c97beee352d501b5ccdaa63116cf33253c2caa44781fda720b4
Secunia Security Advisory 27243
Posted Oct 22, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Matthijs Kooijman has reported a weakness in Bacula, which can be exploited by malicious, local users to disclose potentially sensitive information.

tags | advisory, local
SHA-256 | 81a10fc4cc612fc53cb8b98391eb7a94900dc2e53697cfe8dc4a5201f3b5983d
Secunia Security Advisory 27266
Posted Oct 22, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for IBM Java. This fixes some vulnerabilities and a security issue, which can be exploited by malicious people to bypass certain security restrictions, cause a DoS (Denial of Service) or compromise a user's system.

tags | advisory, java, denial of service, vulnerability
systems | linux, suse
SHA-256 | 7350d476dcb2edacf5586ba7d9b0aa8869682cb0382ad96afe02d0b5f5c6e968
Page 2 of 3
Back123Next

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close