exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 79 RSS Feed

Files Date: 2008-07-15 to 2008-07-16

codedb-lfi.txt
Posted Jul 15, 2008
Authored by cOndemned | Site condemned.r00t.la

CodeDB suffers from a local file inclusion vulnerability in list.php.

tags | exploit, local, php, file inclusion
SHA-256 | 56a2663dce48b0521bb75e349218563a73d072d01c14cfb3c65d04310ef30ebe
scripteen-grabber.txt
Posted Jul 15, 2008
Authored by Dj ReMix | Site coderx.org

Scripteen Free Image Hosting Script version 1.2 administrative password grabbing exploit.

tags | exploit
SHA-256 | 6a0a610f81f0863e880117b1e3ac6a87e0141fd6b9b5fdce033db61209d64ce3
itechbids-sqlxss.txt
Posted Jul 15, 2008
Authored by Encrypt3d.M!nd

ITechBids version 7.0 Gold suffers from cross site scripting and SQL injection vulnerabilities.

tags | exploit, vulnerability, xss, sql injection
SHA-256 | 3738018d4c007f87135d3353ef09c273379c8aa5348129adbff3cafca24ae3c4
pluck-lfi.txt
Posted Jul 15, 2008
Authored by AmnPardaz Security Research Team | Site bugreport.ir

Pluck version 4.5.1 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 97359dbd07b27df4394cfd514c94a283ac92098fcbf90ff15c5c3cfc0e028c60
deepsec2008-cfp.txt
Posted Jul 15, 2008
Site deepsec.net

The Call For Papers for DeepSec IDSC 2008 ends tomorrow. Get your submission in today!

tags | paper, conference
SHA-256 | 20b960645ed6dfedd3a4d472a94e74ca34f364ce7013583ff139630ebb4895f6
FreeBSD-SA-08.06.bind.txt
Posted Jul 15, 2008
Site security.freebsd.org

FreeBSD Security Advisory - The BIND DNS implementation does not randomize the UDP source port when doing remote queries, and the query id alone does not provide adequate randomization.

tags | advisory, remote, udp
systems | freebsd
advisories | CVE-2008-1447
SHA-256 | fb04e361ce950a2eb37bbee1c2ca35ab538b362079ecb611780d440663993f72
avlc-sql.txt
Posted Jul 15, 2008
Authored by CWH Underground | Site citecclub.org

Avlc Forum suffers from a remote SQL injection vulnerability in vlc_forum.php.

tags | exploit, remote, php, sql injection
SHA-256 | 6179f2da4d08d4a167d084865f97f3185b39cff49c836ed0b85fe2c00a6cfe71
mforum-admin.txt
Posted Jul 15, 2008
Authored by CWH Underground | Site citecclub.org

MFORUM version 0.1a suffers from an arbitrary add administrator vulnerability.

tags | exploit, arbitrary, add administrator
SHA-256 | 807f18e60215df83baf72791fca62e63d51add18a51c869243eddde68c0bb583
jsite-sqllfi.txt
Posted Jul 15, 2008
Authored by S.W.A.T. | Site xmors.com

jSite version 1.0 OE suffers from SQL injection and local file inclusion vulnerabilities.

tags | exploit, local, vulnerability, sql injection, file inclusion
SHA-256 | fdd01faf208fb1601f555295be0fe1dfc2afd66dfe54d830f0c6ede0312317a4
fuzzylime301-execphpcomm.txt
Posted Jul 15, 2008
Authored by real

Fuzzylime CMS version 3.01 remote code execution exploit that leverages commrss.php. Written in PHP.

tags | exploit, remote, php, code execution
SHA-256 | bfb84d50396053f20de768ceab95923c2ab02c1c3871d340f8128bd4c32e42cf
fuzzylime301-execperl.txt
Posted Jul 15, 2008
Authored by Inphex, real

Fuzzylime CMS version 3.01 remote code execution exploit that leverages polladd.php. Written in Perl.

tags | exploit, remote, perl, php, code execution
SHA-256 | 14aeffdf9e319fce05296d28467b43e83c68ba71e5948fae3423e2be99820120
fuzzylime301-execphp.txt
Posted Jul 15, 2008
Authored by Inphex, real

Fuzzylime CMS version 3.01 remote code execution exploit that leverages polladd.php. Written in PHP.

tags | exploit, remote, php, code execution
SHA-256 | a8c44acead9986af75368b435f55146aa609a6ffaefd0d7e3f9ac812287aa5b6
ymsg81-dos.txt
Posted Jul 15, 2008
Authored by Jeremy Brown | Site jbrownsec.blogspot.com

Yahoo! Messenger version 8.1 ActiveX remote denial of service exploit.

tags | exploit, remote, denial of service, activex
SHA-256 | b86529c5c94705d2fa1eb098389b8c296df0db1270649c873ef34d3cbd30931c
Debian Linux Security Advisory 1608-1
Posted Jul 15, 2008
Authored by Debian | Site debian.org

Debian Security Advisory 1608-1 - Sergei Golubchik discovered that MySQL, a widely-deployed database server, did not properly validate optional data or index directory paths given in a CREATE TABLE statement, nor would it (under proper conditions) prevent two databases from using the same paths for data or index files. This permits an authenticated user with authorization to create tables in one database to read, write or delete data from tables subsequently created in other databases, regardless of other GRANT authorizations.

tags | advisory
systems | linux, debian
advisories | CVE-2008-2079
SHA-256 | f36bea7ac060105616e86d6befc0a778abc8db40a7c072eabdd764d2b4e156ae
sdns-remote-dos.pl.txt
Posted Jul 15, 2008
Authored by Exodus | Site blackhat.org.il

Simple DNS Plus versions 5.0 and 4.1 remote denial of service exploit.

tags | exploit, remote, denial of service
SHA-256 | 6c347700d81e481ba932dc2c036c6a9ad7f8890deff1e0a3dff7bfebc77dbe17
Mandriva Linux Security Advisory 2008-144
Posted Jul 15, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - A denial of service vulnerability was discovered in the way the OpenLDAP slapd daemon processed certain network messages. An unauthenticated remote attacker could send a specially crafted request that would crash the slapd daemon. The updated packages have been patched to correct this issue.

tags | advisory, remote, denial of service
systems | linux, mandriva
advisories | CVE-2008-2952
SHA-256 | 0086e0b69ef62cdf3040c7dbe542813ee38fad87afd143e3d4de43d040215a78
Mandriva Linux Security Advisory 2008-138
Posted Jul 15, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - Integer overflow in the rtl_allocateMemory function in sal/rtl/source/alloc_global.c in OpenOffice.org (OOo) 2.0 through 2.4 allows remote attackers to execute arbitrary code via a crafted file that triggers a heap-based buffer overflow. The updated packages have been patched to fix the issue. The OpenOffice.org package for Mandriva Corporate 3 missed the patch application due to a build error. This update fixes that.

tags | advisory, remote, overflow, arbitrary
systems | linux, mandriva
advisories | CVE-2008-2152
SHA-256 | cba8ef6fe369d68f51876e63cd4e84efabd1b52022f827bc2ffa123464041e03
snoop-0.3.1.tar.gz
Posted Jul 15, 2008
Authored by Florin Malita | Site snoop.sourceforge.net

Snoop is a GNU/Linux file descriptor monitoring tool inspired by FreeBSD's 'watch'. It goes beyond simple TTY snooping by allowing the interception of any file descriptor. You can attach on the fly to regular files, TTYs, named pipes, character devices, and pretty much anything that is represented by a file descriptor and addressable in the standard name space.

tags | tool
systems | linux, unix, freebsd
SHA-256 | ac10fd95cf6b885d3ca967216b94200f527e87415a52f0f743d521a845da925f
silk-1.1.0.tar.gz
Posted Jul 15, 2008
Authored by CERT | Site tools.netsa.cert.org

SiLK (System for Internet-Level Knowledge) consists of two sets of tools: a packing system and an analysis suite. The packing system receives Netflow V5 PDUs and converts them into a more space efficient format, recording the packed records into service-specific binary flat files. The analysis suite consists of tools that can read these flat files and then perform various query operations, ranging from per-record filtering to statistical analysis of groups of records. The analysis tools interoperate using pipes, allowing a user to develop a relatively sophisticated query from a simple beginning.

Changes: Various updates and additions.
tags | tool
systems | unix
SHA-256 | a6367a8c25a709527279819c4ec474da194eccd5bb306d9b195f22e9f7ad640c
ultrastats-blindsql.txt
Posted Jul 15, 2008
Authored by DNX

Ultrastats versions 0.2.142 and below remote blind SQL injection exploit that makes use of players-detail.php.

tags | exploit, remote, php, sql injection
SHA-256 | 019e21465b24053ea907149e640207acc794f0d6201b1b7a809e5c5162b188fb
webcms-sql.txt
Posted Jul 15, 2008
Authored by Mr.SQL | Site pal-hacker.com

WebCMS Portal suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 8c0060a7cca56e19e7977dcdc0f0ee2f5f3d7ebf8a2ea6babdfc83f6164d55d1
joomlanforms-sql.txt
Posted Jul 15, 2008
Authored by The Moorish

Joomla n-forms component version 1.01 blind SQL injection exploit.

tags | exploit, sql injection
SHA-256 | 2563504ee8b94b0f75e1a2841c690b08d2c111348c01ad6c28cefd90ea8cc090
trixbox261-pwn.txt
Posted Jul 15, 2008
Authored by Mati Aharoni | Site offensive-security.com

Trixbox version 2.6.1 remote root exploit written in Python that spawns a reverse shell.

tags | exploit, remote, shell, root, python
SHA-256 | 3f6ae161657fee10bb1b94f8851f662ec45c6d00a9982ae5161a385caba2cc38
maianrecipe-cookie.txt
Posted Jul 15, 2008
Authored by S.W.A.T. | Site xmors.com

Maian Recipe versions 1.2 and below suffer from a poorly designed cookie vulnerability.

tags | exploit
SHA-256 | c01a73156e6de4fa6d759d7ca6ad2eecc65ff0223e229fcdb73deea384319e23
maianlinks-cookie.txt
Posted Jul 15, 2008
Authored by S.W.A.T. | Site xmors.com

Maian Links versions 3.1 and below suffer from a poorly designed cookie vulnerability.

tags | exploit
SHA-256 | 007bf1d1fddad50e1b187cc8bd740a5c3dc8dc39919720f1b4fe547e052c3afa
Page 2 of 4
Back1234Next

File Archive:

January 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    0 Files
  • 2
    Jan 2nd
    13 Files
  • 3
    Jan 3rd
    5 Files
  • 4
    Jan 4th
    5 Files
  • 5
    Jan 5th
    9 Files
  • 6
    Jan 6th
    5 Files
  • 7
    Jan 7th
    0 Files
  • 8
    Jan 8th
    0 Files
  • 9
    Jan 9th
    18 Files
  • 10
    Jan 10th
    31 Files
  • 11
    Jan 11th
    30 Files
  • 12
    Jan 12th
    33 Files
  • 13
    Jan 13th
    25 Files
  • 14
    Jan 14th
    0 Files
  • 15
    Jan 15th
    0 Files
  • 16
    Jan 16th
    7 Files
  • 17
    Jan 17th
    25 Files
  • 18
    Jan 18th
    38 Files
  • 19
    Jan 19th
    6 Files
  • 20
    Jan 20th
    21 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    24 Files
  • 24
    Jan 24th
    68 Files
  • 25
    Jan 25th
    22 Files
  • 26
    Jan 26th
    20 Files
  • 27
    Jan 27th
    17 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close