exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 32 RSS Feed

Files Date: 2008-06-20 to 2008-06-21

Secunia Security Advisory 30663
Posted Jun 20, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Tan Chew Keong has reported a vulnerability in WISE-FTP, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 2cc26a7077f94be3c15b76658daa4b7f55f02138e0567b52d2d03a7c7feb3893
diigo-xss.txt
Posted Jun 20, 2008
Authored by Ferruh Mavituna | Site ferruh.mavituna.com

Diigo Toolbar suffers from a global cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 21a323d1581282c52404d2bfe4aed45ed5fa7390089119deb2828f1987f77587
Secunia Security Advisory 30708
Posted Jun 20, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Tan Chew Keong has reported a vulnerability in Classic FTP, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 5b253b2babbb41c090b19072cc7133efef194c976e8ec3cb68bc78a83d66ac5b
secunia-xnview.txt
Posted Jun 20, 2008
Authored by Stefan Cornelius | Site secunia.com

Secunia Research has discovered a vulnerability in XnView, NConvert, and GFL SDK, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to a boundary error when processing the "format" keyword of Sun TAAC files. This can be exploited to cause a stack-based buffer overflow by e.g. tricking a user into viewing a specially crafted Sun TAAC file. Successful exploitation allows execution of arbitrary code. The vulnerability is confirmed in version 1.70 of XnView for Linux and FreeBSD, XnView 1.93.6 for Windows, GFL SDK 2.82, and NConvert 4.92. Other versions may also be affected.

tags | advisory, overflow, arbitrary
systems | linux, windows, freebsd
advisories | CVE-2008-2427
SHA-256 | 6d513fbba9ac630cb473e7094e4a5581a9466f3b53e85402becb12abda7c023e
Mandriva Linux Security Advisory 2008-117
Posted Jun 20, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - A flaw in fetchmail was discovered that allowed remote attackers to cause a denial of service (crash and persistent mail failure) via a malformed message with long headers. The crash only occurred when fetchmail was called in '-v -v' mode.

tags | advisory, remote, denial of service
systems | linux, mandriva
advisories | CVE-2008-2711
SHA-256 | 05c7b5e24c351d39bc41c007234a43dc6f5e1acd503ab7b1e453c1579e3d222b
wordpad-crash.tgz
Posted Jun 20, 2008
Authored by Ivan Sanchez | Site nullcode.com.ar

A vulnerability has been reported in Microsoft Word, which can be exploited by malicious people to compromise the system. The vulnerability is caused due to an unspecified error when opening and parsing the document. This can be exploited to corrupt memory via a specially crafted function in a Word document. Successful exploitation allows execution of arbitrary code. Demonstration .DOC file included.

tags | exploit, arbitrary
SHA-256 | 109329fdd6960ef2a999f04bf81f09954bc6ce089c304bd5aaa5838d4ec249a8
facebook-xss.txt
Posted Jun 20, 2008
Authored by Jouko Pynnonen | Site klikki.fi

The Facebook fb:silverlight FBML tag suffers from a persistent cross site scripting vulnerability.

tags | advisory, xss
SHA-256 | 12ce66213e05ec6e311c300a52ea6a73436286c058c21c6733c9f54c32e0d897
iptbb-lfi.txt
Posted Jun 20, 2008
Authored by storm | Site gonullyourself.org

IPTBB version 0.5.6 suffers from a local file inclusion vulnerability in index.php.

tags | exploit, local, php, file inclusion
SHA-256 | cd585ae94bbb4db38defc09246ab850e88b1ae559e0fbb6b9f5b7e65b3da9a67
lightweight-xssetc.txt
Posted Jun 20, 2008
Authored by storm | Site gonullyourself.org

Lightweight News Portal version 1.0-BETA suffers from cross site scripting, insecure administration, code injection, and file upload vulnerabilities.

tags | exploit, vulnerability, xss, file upload
SHA-256 | b4c5e165378d3873d840ce64bc5980119b2a6ea3898b4a30cdbedb8631b45070
ajauctionoopd-sql.txt
Posted Jun 20, 2008
Authored by Hussin X | Site tryag.cc

AJ Auction OOPD version 1.0 suffers from a SQL injection vulnerability.

tags | exploit, sql injection
SHA-256 | 4049a38bebb5e7a541dd93fd4bc108431f08f1199311972019d1be6b6e389db2
ajauctionweb-sql.txt
Posted Jun 20, 2008
Authored by Hussin X | Site tryag.cc

AJ Auction Web version 2.0 suffers from a SQL injection vulnerability.

tags | exploit, web, sql injection
SHA-256 | 5abf0027e62c843f2e69b120947b6ad5f356292fe5370bf2784cfcd6b08e76b3
fubarforum-lfi.txt
Posted Jun 20, 2008
Authored by cOndemned | Site condemned.r00t.la

FubarForum version 1.5 suffers from a local file inclusion vulnerability in index.php.

tags | exploit, local, php, file inclusion
SHA-256 | 697bfce36204e5895f32c1f3907d7f29dcb89a0fccdc2a93c19e92f489d8eae1
fireant-lfi.txt
Posted Jun 20, 2008
Authored by cOndemned | Site condemned.r00t.la

FireAnt version 1.3 suffers from a local file inclusion vulnerability in index.php.

tags | exploit, local, php, file inclusion
SHA-256 | 33b7e5d41d5643758b44cd89aac2f84bcd9a885464bc8c3adbb3ce7ef0d460d0
Ubuntu Security Notice 618-1
Posted Jun 20, 2008
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 618-1 - Memory access issues, buffer overflows, denial of service, race conditions.. all sorts of fun and mayhem has been addressed in the Linux 2.6 kernel branch on Ubuntu.

tags | advisory, denial of service, overflow, kernel
systems | linux, ubuntu
advisories | CVE-2007-4571, CVE-2007-5904, CVE-2007-6694, CVE-2008-0007, CVE-2008-1294, CVE-2008-1375, CVE-2008-1669
SHA-256 | 0acf6967795b6e572efa6fa96bc8daa4c48aa9762c583cd6ee70d852449a6d06
Debian Linux Security Advisory 1598-1
Posted Jun 20, 2008
Authored by Debian | Site debian.org

Debian Security Advisory 1598-1 - It was discovered that a buffer overflow in the GIF image parsing code of Tk, a cross-platform graphical toolkit, could lead to denial of service and potentially the execution of arbitrary code.

tags | advisory, denial of service, overflow, arbitrary
systems | linux, debian
advisories | CVE-2008-0553
SHA-256 | 8d4fa0e660fb2391a1e879325519f70d5386c9e51e4687e81785bf17382b497c
rfdump-1.6.tar.gz
Posted Jun 20, 2008
Authored by lgrunwald | Site rfdump.org

RFDump is a tool to detect RFID-Tags and show their meta information: Tag ID, Tag Type, manufacturer etc. The user data memory of a tag can be displayed and modified using either a Hex or an ASCII editor. Tag contents can be stored and loaded using a specific XML format. This effectively allows the copy of data from one tag to another. In addition, the integrated cookie feature demonstrates how easy it is for a company to abuse RFID technology to spy on their customers. RFDump works with the ACG Multi-Tag Reader or similar card reader hardware. The tags that are supported for reading, writing, and editing are ISO 15693, ISO 14443 A, ISO 14443 B, SR176(1,2), Tag-it®, and I-Code®.

systems | unix
SHA-256 | 5b1ec066d28905df8526862c77629c8cecb6f3ea2462021a0b30d8c44d7b30dc
glshdeaf-multi.txt
Posted Jun 20, 2008
Authored by AmnPardaz Security Research Team | Site bugreport.ir

GL-SH Deaf Forum versions 6.5.5 and below suffer from local file inclusion, cross site scripting, and upload vulnerabilities.

tags | exploit, local, vulnerability, xss, file inclusion
SHA-256 | ebe09075b7348be97113052f9b0888b053a0f94d156ccf5ebcfa6fbe9855baa2
virtualsupport-multi.txt
Posted Jun 20, 2008
Authored by AmnPardaz Security Research Team | Site bugreport.ir

Virtual Support Office-XP versions 3.0.29 and below suffer from session management, SQL injection, cross site scripting, and authentication vulnerabilities.

tags | exploit, vulnerability, xss, sql injection
SHA-256 | 93b343caab0ecc35adc6352a1ada251d3995ee13022c16042bdbd378944667d2
lotuscore-rfi.txt
Posted Jun 20, 2008
Authored by Ciph3r

Lotus Core CMS version 1.0.1 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | f5766ad64fa9af40cecb8eeb19db245574b08b3af340807c192f06118041e4e4
Secunia Security Advisory 30705
Posted Jun 20, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - AmnPardaz Security Research Team has reported a vulnerability in doITLive CMS, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks.

tags | advisory, xss, sql injection
SHA-256 | bd067f418ab1fe2f18d47b3679b353cedcbbbeaf71f467d09ba1928f563d9d7a
Secunia Security Advisory 30707
Posted Jun 20, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Luigi Auriemma has reported a vulnerability in S.T.A.L.K.E.R.: Shadow of Chernobyl, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | b4440fde5306fa24ac8d92fb5e71224f9af62e6037501f6dd5f6bf0bb20a610b
Secunia Security Advisory 30721
Posted Jun 20, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for freetype. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise an application using the library.

tags | advisory, vulnerability
systems | linux, redhat
SHA-256 | 5fe29967a5c6a2d4b51d7703b20f238cb9560d346bc12986b6751f127a41aea7
Secunia Security Advisory 30724
Posted Jun 20, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - HaCker_Egy has reported a vulnerability in MyBizz-Classifieds, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | d79f4428bc0509a2e76e358daa8f84405dbcc81e9aaad6aa0897b0b567a49e9c
Secunia Security Advisory 30726
Posted Jun 20, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Mr.SQL has reported a vulnerability in Easy Webstore, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 25e2e79243bccea1e9c75e4aef9fcfcb16ebb6ae8762e9d4da83a8a60f25e555
Secunia Security Advisory 30739
Posted Jun 20, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in SurgeMail, which can be exploited by malicious users to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 2790867350d0d89f57dbcdabded81f654f9584458a130a991f4a5534143b47da
Page 1 of 2
Back12Next

File Archive:

June 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jun 1st
    0 Files
  • 2
    Jun 2nd
    0 Files
  • 3
    Jun 3rd
    18 Files
  • 4
    Jun 4th
    21 Files
  • 5
    Jun 5th
    0 Files
  • 6
    Jun 6th
    57 Files
  • 7
    Jun 7th
    6 Files
  • 8
    Jun 8th
    0 Files
  • 9
    Jun 9th
    0 Files
  • 10
    Jun 10th
    12 Files
  • 11
    Jun 11th
    27 Files
  • 12
    Jun 12th
    38 Files
  • 13
    Jun 13th
    16 Files
  • 14
    Jun 14th
    14 Files
  • 15
    Jun 15th
    0 Files
  • 16
    Jun 16th
    0 Files
  • 17
    Jun 17th
    16 Files
  • 18
    Jun 18th
    26 Files
  • 19
    Jun 19th
    15 Files
  • 20
    Jun 20th
    18 Files
  • 21
    Jun 21st
    8 Files
  • 22
    Jun 22nd
    0 Files
  • 23
    Jun 23rd
    0 Files
  • 24
    Jun 24th
    0 Files
  • 25
    Jun 25th
    0 Files
  • 26
    Jun 26th
    0 Files
  • 27
    Jun 27th
    0 Files
  • 28
    Jun 28th
    0 Files
  • 29
    Jun 29th
    0 Files
  • 30
    Jun 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close