exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 70 RSS Feed

Files Date: 2008-05-19 to 2008-05-20

smeego-lfi.txt
Posted May 19, 2008
Authored by 0in | Site dark-coders.4rh.eu

Smeego version 1.0 local file inclusion exploit. Written in Python.

tags | exploit, local, python, file inclusion
SHA-256 | 1fae885c56c949e133d6410a059153f825e4fff19016c3ef6c38d964599e4e97
fichive-sql.txt
Posted May 19, 2008
Authored by His0k4

FicHive version 1.0 remote blind SQL injection exploit.

tags | exploit, remote, sql injection
SHA-256 | 1aed39560b08f9d3743b84c2ca7d0ad3400e5a7c5d0e020b0618554114b0d3ef
how2asp-sql.txt
Posted May 19, 2008
Authored by CWH Underground | Site citecclub.org

How2ASP.net Webboard versions 4.1 and below suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 85431c6a61b45dfe183a7f8fe49e27479cca88d6d14404e14503572b2c145245
Mandriva Linux Security Advisory 2008-102
Posted May 19, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - Will Drewry of the Google Security Team reported several vulnerabilities in how libvorbis processed audio data. An attacker could create a carefully crafted OGG audio file in such a way that it would cause an application linked to libvorbis to crash or possibly execute arbitrary code when opened.

tags | advisory, arbitrary, vulnerability
systems | linux, mandriva
advisories | CVE-2008-1419, CVE-2008-1420, CVE-2008-1423
SHA-256 | b2632b2204fce079d6ef4e025581166e3b43e6874925cba60843d3d81c1b7fd8
Mandriva Linux Security Advisory 2008-101
Posted May 19, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - Several vulnerabilities were discovered in rdesktop, a Remote Desktop Protocol client. An integer underflow vulnerability allowed attackers to cause a denial of service (crash) and possibly execute arbitrary code with the privileges of the logged-in user. A buffer overflow vulnerability allowed attackers to execute arbitrary code with the privileges of the logged-in user. An integer signedness vulnerability allowed attackers to execute arbitrary code with the privileges of the logged-in user. In order for these vulnerabilities to be exploited, an attacker must persuade a targeted user to connect to a malicious RDP server.

tags | advisory, remote, denial of service, overflow, arbitrary, vulnerability, protocol
systems | linux, mandriva
advisories | CVE-2008-1801, CVE-2008-1802, CVE-2008-1803
SHA-256 | db35b2491ffc6bcc8072e207eafd14eb6687885e6bd7c7e75eee998a45940f2f
Technical Cyber Security Alert 2008-137A
Posted May 19, 2008
Authored by US-CERT | Site us-cert.gov

Technical Cyber Security Alert TA08-137A - A vulnerability in the OpenSSL package included with the Debian GNU/Linux operating system and its derivatives may cause weak cryptographic keys to be generated. Any package that uses the affected version of SSL could be vulnerable.

tags | advisory
systems | linux, debian
SHA-256 | 9cb01cb5a94c75104bd23f3309553d75e3d039e62caa2cd5c2bcb330ec6e539b
Debian Linux Security Advisory 1576-2
Posted May 19, 2008
Authored by Debian | Site debian.org

Debian Security Advisory 1576-2 - Matt Zimmerman discovered that entries in ~/.ssh/authorized_keys with options (such as "no-port-forwarding" or forced commands) were ignored by the new ssh-vulnkey tool introduced in openssh 1:4.3p2-9etch1 (see DSA 1576-1). This could cause some compromised keys not to be listed in ssh-vulnkey's output.

tags | advisory
systems | linux, debian
advisories | CVE-2008-0166
SHA-256 | 9a08d757026ded7307f939be069d89b9021ed7b39ce0e38b14bb5e3807dd48bc
ttyrpld-2.51.tar.bz2
Posted May 19, 2008
Authored by Jan Engelhardt | Site ttyrpld.sourceforge.net

ttyrpld is a kernel-based TTY shell, screen, and key logger for Linux, FreeBSD/PCBSD, and OpenBSD. It has a real-time log analyzer. It supports any TTY type (vc (console), BSD/Unix98 pty (xterm/SSH), serial, ISDN, USB, etc.).

Changes: Updated rpldhk and rpldev for Linux 2.6.25, OpenBSD 4.3, FreeBSD 7.0, NetBSD 4.0.
tags | shell, kernel, system logging
systems | linux, unix, freebsd, bsd, openbsd
SHA-256 | 4b9b90de7c1d69a2f4d96746a4d0f23e149a8885e20aee818a08c0b655f21fe4
wrmeeting-disclose.txt
Posted May 19, 2008
Authored by Cr@zy_King

WR-Meeting version 1.0 suffers from a local file disclosure vulnerability.

tags | exploit, local, info disclosure
SHA-256 | 00a2a013d572c3d8b2503177cc7e1628cccd2c16b5a820f25fc85428c8e361e9
zomplog-disclose.txt
Posted May 19, 2008
Authored by Stack-Terrorist | Site v4-team.com

Zomplog versions 3.8.2 and below suffer from a file disclosure vulnerability in force_download.php.

tags | exploit, php, info disclosure
SHA-256 | 7a7d85f5bcf11c89b225116486c9f7b574ca5eae1ce84905164f20ccd185b9f5
archangelweblog-sql.txt
Posted May 19, 2008
Authored by Stack-Terrorist | Site v4-team.com

Archangel Weblog version 0.90.02 remote SQL injection exploit.

tags | exploit, remote, sql injection
SHA-256 | 484e07f609fee67f07b5122d7cf6232b3229024fcffd22e7acf39cf6d89ca4c8
zomplog-admin.txt
Posted May 19, 2008
Authored by ArxWolf | Site webxakep.net

Zomplog versions 3.8.2 and below arbitrary add administrator exploit that takes advantage of newuser.php.

tags | exploit, arbitrary, php, add administrator
SHA-256 | c6601fc9621b9463f309bc800f3ea1d990f06d77d7e3305cb5f7fdb921cab011
stanwebcms-sql.txt
Posted May 19, 2008
Authored by JosS | Site spanish-hackers.com

StanWeb.CMS remote SQL injection exploit that takes advantage of default.asp.

tags | exploit, remote, sql injection, asp
SHA-256 | 03e3865b79584f2101617ae3227dd81b75d15db288870e2b617ade30c65db467
debianssh-ruby.txt
Posted May 19, 2008
Authored by L4teral

Debian SSH exploit that uses the OpenSSL predictable PRNG vulnerability. Written in Ruby.

tags | exploit, ruby
systems | linux, debian
SHA-256 | 203717acd81fc26f3a8c0466e6998a240b7b607d92250032e9d4b7187ed2b2cb
Secunia Security Advisory 29842
Posted May 19, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some security issues have been discovered in Blender, which can be exploited by malicious, local users to disclose potentially sensitive information and perform certain actions with escalated privileges.

tags | advisory, local
SHA-256 | a0c344cc8a1f6fdf710978ec76e4393b0a907a24a0c8fb747af30a72ab164e7b
Secunia Security Advisory 30088
Posted May 19, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in GForge, which can be exploited by malicious, local users to perform certain actions with escalated privileges.

tags | advisory, local
SHA-256 | 92576df9f42b87c7c6f4ba03e7e23b70d535e93569e24a8b27b1ced4c93aed1d
Secunia Security Advisory 30179
Posted May 19, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for openoffice and openoffice-bin. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
systems | linux, gentoo
SHA-256 | 9700ad34e72018784ee418a62904d448bd8ef0ded3c2b03b9e66d1451d3c75ef
Secunia Security Advisory 30196
Posted May 19, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - cyb3r-1st has reported a vulnerability in Model Search, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | ed1367fa0ee2b16502b7fb6e80808377b43680b28687c4997a970862b67992f1
Secunia Security Advisory 30201
Posted May 19, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been discovered in Kostenloses Linkmanagementscript, which can be exploited by malicious people to conduct SQL injection attacks, disclose sensitive information, and to compromise a vulnerable system.

tags | advisory, vulnerability, sql injection
SHA-256 | 41d81d677631bd65a9f7cae061e285456304c54816ad8f31a13e88b90c5609c8
Secunia Security Advisory 30212
Posted May 19, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Saime has discovered a vulnerability in the BLOG Engine plugin for e107, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 880d4263344556ddc3d530932bb5432af59ff9f1425205a934b3693be8959c29
Secunia Security Advisory 30213
Posted May 19, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - t0pP8uZz has reported a vulnerability in AJ Classifieds 2008, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 91cc7aed9481b699df92ca74e94d39994bb1ddd745a709672a46d73035596a68
Secunia Security Advisory 30215
Posted May 19, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - t0pP8uZz has reported a vulnerability in AJ Article, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | d523f3652cf586949fda6987cee36ebe0fdeb52fd31ebbaf9e950229faf1cc99
Secunia Security Advisory 30240
Posted May 19, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Cisco Unified Presence, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | cisco
SHA-256 | 9f4fe3bcc8d3cd3eb5455da72aec270eff1a57f4aa32dfff82aee4d5a2427cdb
Secunia Security Advisory 30241
Posted May 19, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in the Linux kernel, which can be exploited by malicious, local users to bypass certain security restrictions and by malicious people to potentially cause a DoS (Denial of Service).

tags | advisory, denial of service, kernel, local, vulnerability
systems | linux
SHA-256 | 051f691b9fa4ffd2e0a226aa66d9743396d7e9c8e79e0a8d7da2ac20c8f61330
Secunia Security Advisory 30248
Posted May 19, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for rdesktop. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
systems | linux, fedora
SHA-256 | bccb03d0b97c740a0562c594728abc515600573a8122f65bc386f6efc94477bd
Page 2 of 3
Back123Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close