exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 101 - 125 of 178 RSS Feed

Files Date: 2008-07-10 to 2008-07-11

bluedot-upload.txt
Posted Jul 10, 2008
Authored by Codebomb Team | Site codebomb.org

Bluedot CMS suffers from an unauthenticated remote file upload vulnerability.

tags | exploit, remote, file upload
SHA-256 | e52fe98f33d42a0e32c447b813d37a97aff489f49053507cbb934871f70d3533
kasselercms-lfixss.txt
Posted Jul 10, 2008
Authored by Cr@zy_King

Kasseler CMS version 1.3.0 suffers from local file inclusion and cross site scripting vulnerabilities.

tags | exploit, local, vulnerability, xss, file inclusion
SHA-256 | 960e320a162aa963101f64d3bb25212aa97aefd716af1b465c966bfa0e7a52f4
thelia-multi.txt
Posted Jul 10, 2008
Authored by BlackH | Site blackh.free.fr

Thelia version 1.3.5 remote code execution, remote file upload, and validation vulnerabilities exploit.

tags | exploit, remote, vulnerability, code execution, file upload
SHA-256 | b395f719dff7637357db79b49ffc855c914e54212781f978584a7be59c707179
quickbite.pl.txt
Posted Jul 10, 2008
Authored by krafty

Safari using Quicktime versions 7.3 and below RTSP Content-Type remote buffer overflow exploit. Binds a shell to port 4444.

tags | exploit, remote, overflow, shell
SHA-256 | 3ae2df615d9e4a9958237076c63fea6b950f858678fd4999524ca7ecf87996c4
cmailserver-seh.txt
Posted Jul 10, 2008
Authored by Nine:Situations:Group | Site retrogod.altervista.org

CMailServer version 5.4.6 remote SEH overwrite exploit that makes use of CMailCOM.dll.

tags | exploit, remote
SHA-256 | ea0b0242a0fc727b78e7e6fb28226cc14dcc1fd48573abb0cd3ab7f3773e2bf7
Mandriva Linux Security Advisory 2008-135
Posted Jul 10, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - A vulnerability was found in gnome-screensaver 2.20.0 that could possibly allow a local user to read the clipboard contents and X selection data for a locked session by using CTRL-V. The updated packages have been patched to correct this issue.

tags | advisory, local
systems | linux, mandriva
advisories | CVE-2007-6389
SHA-256 | 856f8db83fd3e04b5b28f303f9008ca2e2b8e46a184fa73cfe420863014ed630
Mandriva Linux Security Advisory 2008-134
Posted Jul 10, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - An incorrect fix for CVE-2007-6239 resulted in Squid not performing proper bounds checking when processing cache update replies. Because of this, a remote authenticated user might have been able to trigger an assertion error and cause a denial of service. The updated packages have been patched to correct this issue.

tags | advisory, remote, denial of service
systems | linux, mandriva
advisories | CVE-2008-1612
SHA-256 | d0d3c8b5ed8a1da403fb42d6a0ee7b6726a9aaa5ff7a50b893de74b1a75cc8ee
Mandriva Linux Security Advisory 2008-133
Posted Jul 10, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - A denial of service condition was discovered in Sympa versions prior to 5.4 that allowed remote attackers to crash the Sympa daemon via a malformed email message. The updated packages have been patched to correct this issue.

tags | advisory, remote, denial of service
systems | linux, mandriva
advisories | CVE-2008-1648
SHA-256 | ec39b639b918df016c71edcd834969c4fb8b52e6740bbc04df433e55dfa91233
Mandriva Linux Security Advisory 2008-132
Posted Jul 10, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - A vulnerability was found in gnome-screensaver prior to 2.22.1 when a remote authentication server was enabled. During a network outage, gnome-screensaver would crash upon an unlock attempt, allowing physically local users to gain access to locked sessions. The updated packages have been patched to correct this issue.

tags | advisory, remote, local
systems | linux, mandriva
advisories | CVE-2008-0887
SHA-256 | db1fd54bfb61c2ea50edcb42a6982539a04cc059a046ec15aa3893a6d4f9df0a
Mandriva Linux Security Advisory 2008-131
Posted Jul 10, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - A few vulnerabilities and security-related issues have been fixed in phpMyAdmin since the 2.11.2.2 release. This update provides version 2.11.7 which is the latest stable release of phpMyAdmin and fixes CVE-2008-1149, CVE-2008-1567, CVE-2008-1924, and CVE-2008-2960. No configuration changes should be required since the previous update (version 2.11.2.2). If upgrading from older versions, it may be necessary to reconfigure phpMyAdmin. The configuration file is located in /etc/phpMyAdmin/. In most cases, it should be sufficient so simply replace config.default.php with config.default.php.rpmnew and make whatever modifications are necessary.

tags | advisory, php, vulnerability
systems | linux, mandriva
advisories | CVE-2008-1149, CVE-2008-1567, CVE-2008-1924, CVE-2008-2960
SHA-256 | 111ac8a31b58f8fecdc3b03bf5f9410ebb9e17423d9935e13fa0a53a6e8c3e8d
Mandriva Linux Security Advisory 2008-130
Posted Jul 10, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - An integer overflow in the zip_read_entry() function in PHP prior to 4.4.5 allowed remote attackers to execute arbitrary code via a ZIP archive containing a certain type of entry that triggered a heap overflow. Weaknesses in the GENERATE_SEED macro in PHP prior to 4.4.8 and 5.2.5 were discovered that could produce a zero seed in rare circumstances on 32bit systems and generations a portion of zero bits during conversion due to insufficient precision on 64bit systems. The updated packages have been patched to correct these issues.

tags | advisory, remote, overflow, arbitrary, php
systems | linux, mandriva
advisories | CVE-2007-1777, CVE-2008-2107, CVE-2008-2108
SHA-256 | 0edaea08014bc6c30ae3a3b2bcb1063f187d429361d166a693111557ccf96ac7
Mandriva Linux Security Advisory 2008-129
Posted Jul 10, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - Weaknesses in the GENERATE_SEED macro in PHP prior to 4.4.8 and 5.2.5 were discovered that could produce a zero seed in rare circumstances on 32bit systems and generations a portion of zero bits during conversion due to insufficient precision on 64bit systems. The updated packages have been patched to correct these issues.

tags | advisory, php
systems | linux, mandriva
advisories | CVE-2008-2107, CVE-2008-2108
SHA-256 | 36c685354707ed85c37d537fa3d18fa1b4cdf1dc975794ed6df7b5c8b8e59c42
Mandriva Linux Security Advisory 2008-128
Posted Jul 10, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - php-cgi in PHP prior to 5.2.6 does not properly calculate the length of PATH_TRANSLATED, which has unknown impact and attack vectors. The escapeshellcmd() API function in PHP prior to 5.2.6 has unknown impact and context-dependent attack vectors related to incomplete multibyte characters. Weaknesses in the GENERATE_SEED macro in PHP prior to 4.4.8 and 5.2.5 were discovered that could produce a zero seed in rare circumstances on 32bit systems and generations a portion of zero bits during conversion due to insufficient precision on 64bit systems. The IMAP module in PHP uses obsolete API calls that allow context-dependent attackers to cause a denial of service (crash) via a long IMAP request. In addition, the updated packages provide a number of bug fixes. The updated packages have been patched to correct these issues.

tags | advisory, denial of service, cgi, php, imap
systems | linux, mandriva
advisories | CVE-2008-0599, CVE-2008-2051, CVE-2008-2107, CVE-2008-2108, CVE-2008-2829
SHA-256 | a957e83af46278fc9927d4b20a07a5126ff6e3efeacf1d3c314a8c6362e8f534
Mandriva Linux Security Advisory 2008-127
Posted Jul 10, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - The htmlentities() and htmlspecialchars() functions in PHP prior to 5.2.5 accepted partial multibyte sequences, which has unknown impact and attack vectors. The output_add_rewrite_var() function in PHP prior to 5.2.5 rewrites local forms in which the ACTION attribute references a non-local URL, which could allow a remote attacker to obtain potentially sensitive information by reading the requests for this URL. php-cgi in PHP prior to 5.2.6 does not properly calculate the length of PATH_TRANSLATED, which has unknown impact and attack vectors. The escapeshellcmd() API function in PHP prior to 5.2.6 has unknown impact and context-dependent attack vectors related to incomplete multibyte characters. Weaknesses in the GENERATE_SEED macro in PHP prior to 4.4.8 and 5.2.5 were discovered that could produce a zero seed in rare circumstances on 32bit systems and generations a portion of zero bits during conversion due to insufficient precision on 64bit systems. The IMAP module in PHP uses obsolete API calls that allow context-dependent attackers to cause a denial of service (crash) via a long IMAP request. In addition, this update also corrects an issue with some float to string conversions.

tags | advisory, remote, denial of service, local, cgi, php, imap
systems | linux, mandriva
advisories | CVE-2007-5898, CVE-2007-5899, CVE-2008-0599, CVE-2008-2051, CVE-2008-2107, CVE-2008-2108, CVE-2008-2829
SHA-256 | 983189b46f7172be5f967d2c4586512e100842f9151f6b89c51f240979f59cba
Mandriva Linux Security Advisory 2008-126
Posted Jul 10, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - PHP 5.2.1 would allow context-dependent attackers to read portions of heap memory by executing certain scripts with a serialized data input string beginning with 'S:', which did not properly track the number of input bytes being processed. A vulnerability in the chunk_split() function in PHP prior to 5.2.4 has unknown impact and attack vectors, related to an incorrect size calculation. The htmlentities() and htmlspecialchars() functions in PHP prior to 5.2.5 accepted partial multibyte sequences, which has unknown impact and attack vectors. The output_add_rewrite_var() function in PHP prior to 5.2.5 rewrites local forms in which the ACTION attribute references a non-local URL, which could allow a remote attacker to obtain potentially sensitive information by reading the requests for this URL. The escapeshellcmd() API function in PHP prior to 5.2.6 has unknown impact and context-dependent attack vectors related to incomplete multibyte characters. Weaknesses in the GENERATE_SEED macro in PHP prior to 4.4.8 and 5.2.5 were discovered that could produce a zero seed in rare circumstances on 32bit systems and generations a portion of zero bits during conversion due to insufficient precision on 64bit systems. CVE-2008-2108). The IMAP module in PHP uses obsolete API calls that allow context-dependent attackers to cause a denial of service (crash) via a long IMAP request.

tags | advisory, remote, denial of service, local, php, imap
systems | linux, mandriva
advisories | CVE-2007-1649, CVE-2007-4660, CVE-2007-5898, CVE-2007-5899, CVE-2008-2051, CVE-2008-2107, CVE-2008-2108, CVE-2008-2829
SHA-256 | ce9b044b78980ef6d383b1f63b8399d81b2ddddbe899ab732db688d002d50709
Mandriva Linux Security Advisory 2008-125
Posted Jul 10, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - A vulnerability in the chunk_split() function in PHP prior to 5.2.4 has unknown impact and attack vectors, related to an incorrect size calculation. The htmlentities() and htmlspecialchars() functions in PHP prior to 5.2.5 accepted partial multibyte sequences, which has unknown impact and attack vectors. The output_add_rewrite_var() function in PHP prior to 5.2.5 rewrites local forms in which the ACTION attribute references a non-local URL, which could allow a remote attacker to obtain potentially sensitive information by reading the requests for this URL. The escapeshellcmd() API function in PHP prior to 5.2.6 has unknown impact and context-dependent attack vectors related to incomplete multibyte characters. Weaknesses in the GENERATE_SEED macro in PHP prior to 4.4.8 and 5.2.5 were discovered that could produce a zero seed in rare circumstances on 32bit systems and generations a portion of zero bits during conversion due to insufficient precision on 64bit systems.

tags | advisory, remote, local, php
systems | linux, mandriva
advisories | CVE-2007-5898, CVE-2007-5899, CVE-2007-4660, CVE-2008-2051, CVE-2008-2107, CVE-2008-2108
SHA-256 | 462dab3e1f36a6a4ce46057d21433dea88b99d76289a74f98523fde4a31b12ba
siteatschool-uplaod.txt
Posted Jul 10, 2008
Authored by EgiX

Site@School versions 2.4.10 and below session hijacking and file upload exploit.

tags | exploit, file upload
SHA-256 | 6d51de712c6cd5d2def192149da1adf51eacce0cd0ecbac1cc50f0808efd93e1
joomladbquery-rfi.txt
Posted Jul 10, 2008
Authored by SsEs | Site h4cks.in

The Joomla DBQuery component versions 1.4.1.1 and below suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 2b23ed557f790207a63755c717fd6827b024ed61634b6c2f28f4b2a7b487ba19
joomlais-sql.txt
Posted Jul 10, 2008
Authored by H-T Team | Site no-hack.fr

Joomla is component version 1.0.1 multiple remote SQL injection vulnerabilities exploit.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | 20998a2bf2ac4d1edd7f6947dedc2dad496801fc6304ef54cb100d7707e2b6a1
joomlaaltas-sql.txt
Posted Jul 10, 2008
Authored by H-T Team | Site no-hack.fr

Joomla altas component version 1.0 multiple remote SQL injection vulnerabilities exploit.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | 3f5da0defafb7a9afe521eb5fad2602434f5e1e4a4a1090734b9149003bacd36
phpwebnews-sql2.txt
Posted Jul 10, 2008
Authored by hadihadi | Site virangar.org

phpWebNews version 0.2 MySQL Edition suffers from a SQL injection vulnerability.

tags | exploit, sql injection
SHA-256 | a4a5231424e378960ec0b55cd1427ac869eec5f0573097b5500e9a2d58fe11cc
phpwebnews-sql.txt
Posted Jul 10, 2008
Authored by storm | Site gonullyourself.org

phpWebNews version 0.2 MySQL Edition suffers from a SQL injection vulnerability.

tags | exploit, sql injection
SHA-256 | 01f0791f72ea18e3a37ea5cebf341ec4442b39edb2b3a970a4b3026eeef15dac
Debian Linux Security Advisory 1601-1
Posted Jul 10, 2008
Authored by Debian | Site debian.org

Debian Security Advisory 1601-1 - Several remote vulnerabilities have been discovered in Wordpress, the weblog manager. WordPress allows remote attackers to redirect authenticated users to other websites and potentially obtain sensitive information. The XML-RPC implementation, when registration is enabled, allows remote attackers to edit posts of other blog users.

tags | advisory, remote, vulnerability
systems | linux, debian
advisories | CVE-2007-1599, CVE-2008-0664
SHA-256 | 8822869f8cd95f90c21a34e417807e9f29bb5fe083285efafc6419d01e43f4f0
cmswebblizzard-sql.txt
Posted Jul 10, 2008
Authored by Bl@ckbe@rd

CMS WebBlizzard blind SQL injection exploit that takes advantage of index.php.

tags | exploit, php, sql injection
SHA-256 | fe40f3991bebe0ac24f272a6bf0d3ca48f3ad1c5b41e0e275984def748c0b425
phportal-rfi.txt
Posted Jul 10, 2008
Authored by Ciph3r

phPortal version 1.2 multiple remote file inclusion vulnerabilities exploit.

tags | exploit, remote, vulnerability, code execution, file inclusion
SHA-256 | 023914ad82267ee83dda061bf5bd114995345fa96d7a842e7d111ec018758819
Page 5 of 8
Back34567Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close