exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 70 RSS Feed

Files Date: 2007-12-18 to 2007-12-19

radmind-1.11.0.tar.gz
Posted Dec 18, 2007
Site rsug.itd.umich.edu

radmind is a suite of Unix command-line tools and a server designed to remotely administer the file systems of multiple Unix machines. Radmind operates as a tripwire which is able to detect changes to any managed filesystem object, e.g. files, directories, links, etc. However, radmind goes further than just integrity checking: once a change is detected, radmind can optionally reverse the change.

Changes: Support added for exclude patterns. The default server port is now the IANA-registered 6222. Various other changes.
tags | tool, intrusion detection
systems | unix
SHA-256 | 0464f7fbe4cadf2e6a0436a8011ed2a328885970bc8a0d5964f897f8053a31a2
Secunia Security Advisory 28118
Posted Dec 18, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in syslog-ng, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | eb07055e12d4a30dc4a2fe898a674fcd90941222ff174e2a4175959452df598a
Secunia Security Advisory 28138
Posted Dec 18, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Peter

tags | advisory, xss
SHA-256 | 2807e35be1f76e627988cf66f39635e2418e2adf99c1fd50a5e6288ac9a93e26
mambo462-xss.txt
Posted Dec 18, 2007
Authored by Beenu Arora | Site darkc0de.com

Mambo version 4.6.2 suffers from cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | f6dc3edf5b7fa7cefd5202b252ec8aab54ee34d60a7ae79c37d3c9e8a0c463a5
phzine07.zip
Posted Dec 18, 2007
Authored by phearless | Site phearless.org

Phearless Serbian/Croatian Security Magazine Issue #07 - In this issue: Symbian OS EXE Applications, Theory of dissasembling, Alex Protector 1 beta2, Symbian OS Crackme 0x01, NULL Pointer bugs in Linux kernel, Windows kernel - keyboard independent - keylogger, Hiding Processes Using Windows Drivers, Exploitation chitchat.

tags | kernel
systems | linux, windows
SHA-256 | e9adfc7c678db387c73b81f31f2559a940c4b996cc5e42b8cffb568c4168f9d9
imesh-heap.txt
Posted Dec 18, 2007
Authored by rgod | Site retrogod.altervista.org

iMesh versions 7.1.0.x and below IMWebControl Class remote heap exploit that takes advantage of IMWeb.dll 7.0.0.x.

tags | exploit, remote
SHA-256 | bda7d1cdc934e1f0e4484e108927329c7550e60068d4168673d120bed0940cf7
SyScan08-CFP.txt
Posted Dec 18, 2007
Site syscan.org

SyScan 08 Call For Papers - The Symposium on Security for Asia Network aims to be a very different security conference from the rest of the security conferences that the information security community in Asia has come to be so familiar and frustrated with. SyScan is a non-product, non-vendor biased security conference. It is the aspiration of SyScan to congregate in Asia the best security experts in their various fields, to share their research, discovery and experience with all security enthusiasts in Asia.

tags | paper, conference
SHA-256 | 026b7f20af4e971c9400f7404218003f300d2ca7545f24a716883c740567108b
appian-dos.txt
Posted Dec 18, 2007
Authored by Chris Castaldo

The Appian Business Suite version 5.6 SP1 is vulnerable to a remote denial of service attack due to the way it handles packets on port 5400.

tags | advisory, remote, denial of service
SHA-256 | 1f76c468925aedc32d38a0fdccfc67624b22ef52612446a33b31e5cc5b433621
Secunia Security Advisory 28097
Posted Dec 18, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for autofs. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | linux, fedora
SHA-256 | e85da95e1e39977e8167f42402c3c25a64803945e7b26576fd41d71404b5e1ed
Secunia Security Advisory 28106
Posted Dec 18, 2007
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Flyspray, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | 30fe8118504ac96e0ebcc2205c464e930e5e53ad8eeccd54949d76222abdb7f1
Zero Day Initiative Advisory 07-079
Posted Dec 18, 2007
Authored by Tipping Point, Tenable Network Security | Site zerodayinitiative.com

A vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard HP-UX operating system. Authentication is not required to exploit this vulnerability. The specific flaw exists within the function sw_rpc_agent_init (opcode 0x04) defined in swagentd. Specific malformed arguments can cause function pointers to be overwritten and thereby result in arbitrary code execution. HP-UX version 11.11 is affected.

tags | advisory, remote, arbitrary, code execution
systems | hpux
advisories | CVE-2007-6195
SHA-256 | 1abafcb5cb1fcc5bbd807612d35e37e220db81abb0400e3292c7281a2cc6fb90
Zero Day Initiative Advisory 07-078
Posted Dec 18, 2007
Authored by Tipping Point | Site zerodayinitiative.com

A vulnerability allows attackers to execute arbitrary code on vulnerable installations of St. Bernard Open File Manager. Authentication is not required to exploit this vulnerability. The specific flaw resides in the Open File Manager service, ofmnt.exe, which listens by default on a random TCP port near 1000. The process blindly copies user-suppled data to a static heap buffer. By supplying an overly large amount of data, an attacker can overflow that buffer leading to arbitrary code execution in the context of the SYSTEM user. Open File Manager version 9.5 is affected.

tags | advisory, overflow, arbitrary, tcp, code execution
advisories | CVE-2007-6281
SHA-256 | 64ae02d00f58cfdda007a487a6a7df5708c57c0600a56093e907ea52016a4852
Zero Day Initiative Advisory 07-077
Posted Dec 18, 2007
Authored by Tipping Point, Eric DETOISIEN | Site zerodayinitiative.com

Vulnerabilities allow attackers to execute arbitrary code on vulnerable installations of Trend Micro ServerProtect. Authentication is not required to exploit these vulnerabilities. ServerProtect version 5.58 is affected.

tags | advisory, arbitrary, vulnerability
SHA-256 | 6ad2eeb8a167a376f36d22822c5d9585abd6c666dd64e97382620b09b3251985
appleupdate-exec.txt
Posted Dec 18, 2007
Authored by Moritz Jodeit

Apple Mac OS X Software Update suffers from a remote command execution vulnerability. Full Metasploit module included.

tags | exploit, remote
systems | apple, osx
advisories | CVE-2007-5863
SHA-256 | 1852939fa989f4ddf6144fb1874a746c14013a7706681e093ad78115be9ffd22
uber-upload.txt
Posted Dec 18, 2007
Authored by JosS | Site spanish-hackers.com

Uber Uploader versions 5.3.6 and below suffer from a remote file upload vulnerability.

tags | advisory, remote, file upload
SHA-256 | b6fdcb29513ea6a4a4faf2b21cd068e29a845194746c8b6132813b18d9ce48c3
surgemail-crash.txt
Posted Dec 18, 2007
Authored by rgod | Site retrogod.altervista.org

SurgeMail version 38k4 webmail Host header denial of service exploit.

tags | exploit, denial of service
SHA-256 | 49a73d329f08f1ae216aa0a1afcac1586fb07eb9337bcfd4563e094053c43add
raidhttpdudo.txt
Posted Dec 18, 2007
Authored by rgod | Site retrogod.altervista.org

RaidenHTTPD version 2.0.19 ulang command execution proof of concept exploit.

tags | exploit, proof of concept
SHA-256 | 673b614fe243897edcb2b2bdcbd71a1f52312222617148de6b1adb3a887a63ac
peercasthof.zip
Posted Dec 18, 2007
Authored by Luigi Auriemma | Site aluigi.org

Demonstration exploit for PeerCast versions 0.1217 and below which suffer from a heap overflow vulnerability.

tags | exploit, overflow
SHA-256 | 0b9f764854210167395cb576016f5581ea8c30f1c473288dee8c466e18c0f1f3
peercasthof.txt
Posted Dec 18, 2007
Authored by Luigi Auriemma | Site aluigi.org

PeerCast versions 0.1217 and below suffer from a heap overflow vulnerability.

tags | advisory, overflow
SHA-256 | b7e8b92014009079c464945496a557d99471ea50032928b5fef1806fbaef290b
jetaudio-overflow.txt
Posted Dec 18, 2007
Authored by SYS 49152

jetAudio version 7.0.5 COWON Media Center MP4 stack overflow exploit that spawns a shell on port 49152.

tags | exploit, overflow, shell
SHA-256 | 9966a3a61937c6205c492ff0838deb98091014de1060c911ebd623b8a2a26d2d
uhooker_v1.3.tgz
Posted Dec 18, 2007
Site oss.coresecurity.com

The Universal Hooker is a tool to intercept execution of programs. It enables the user to intercept calls to API calls inside DLLs, and also arbitrary addresses within the executable file in memory. The Universal Hooker tries to create very simple abstractions that allow a user of the tool to write hooks for different API and non-API functions using an interpreted language (python), without the need to compile anything, and with the possibility of changing the code that gets executed when the hooked function is called in run-time.

Changes: Several bug fixes.
tags | arbitrary, python
SHA-256 | ad86281fae764946fa8c1dc1ab5897782191ffbe6896063de3efe371de9371bc
ZSA-2007-029.txt
Posted Dec 18, 2007
Authored by Oriol Carreras | Site balabit.com

syslog-ng Open Source Edition versions below 2.0.6 and Premium Edition versions below 2.1.8 suffer from a denial of service vulnerability.

tags | advisory, denial of service
SHA-256 | 9621233c56ba9215cc1f498947ba24ca3cee28eb2becbd870b1a7eb6b1855480
openssh_4.6p1_trojan.tar.gz
Posted Dec 18, 2007
Authored by xi4oyu

This patch backdoors and logs credentials into /tmp/.X11-map-enGB for OpenSSH 4.6p1. It is an update to the incSTK_ssh_client_trojan.

tags | encryption
SHA-256 | 9f2909091cd02ea54266393bb947b6d0d6ed8c57886efd5197db154b5e3a4a5c
freewebshop-passwd.txt
Posted Dec 18, 2007
Authored by k1tk4t | Site newhack.org

FreeWebShop versions 2.2.7 and below remote admin password grabber exploit.

tags | exploit, remote
SHA-256 | d7d88ab38b5769de456c878d45893e4515fa013bdfcb5240adfbaf5ea40cf5aa
neuron-multi.txt
Posted Dec 18, 2007
Authored by virangar security team | Site virangar.org

neuron news version 1.0 suffers from SQL injection and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, sql injection
SHA-256 | 3d8d9aefae55f94833c7185845e366e2e62989acbf442d79e1d694b458ea2405
Page 1 of 3
Back123Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close