exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 154 RSS Feed

Files Date: 2008-08-13 to 2008-08-14

poldi-0.4.tar.bz2
Posted Aug 13, 2008
Authored by Moritz Schulte

Poldi is a PAM module that implements authentication through the OpenPGP smart card. It uses the smart card daemon from the GnuPG project for smart card access.

systems | linux
SHA-256 | f080c3ae8317d6c7099499f40c0aedc7e0ea67eebc788aac662824bf1d9cae19
VMware Security Advisory 2008-0013
Posted Aug 13, 2008
Authored by VMware | Site vmware.com

VMware Security Advisory - Updated ESX packages for OpenSSL, net-snmp, and perl have been released to address multiple vulnerabilities.

tags | advisory, perl, vulnerability
advisories | CVE-2007-3108, CVE-2007-5135, CVE-2008-2292, CVE-2008-0960, CVE-2008-1927
SHA-256 | b9fc79fc6d73c8635a227013728cb6e8490b89d0d62d24c585fa37fd7cbfa221
VMware Security Advisory 2008-0012
Posted Aug 13, 2008
Authored by VMware | Site vmware.com

VMware Security Advisory - An information disclosure vulnerability is present in VirtualCenter. Exploitation of this flaw might result in disclosure of the user names of system accounts. VirtualCenter versions 2.5 previous to update 2 and VirtualCenter versions 2.0.2 previous to update 5 are vulnerable.

tags | advisory, info disclosure
advisories | CVE-2008-3514
SHA-256 | f01d6babcec1ce01eeef99846eca4c77269f9ab6e83233a3e8a58f435f4beac3
hmailsever-dos.txt
Posted Aug 13, 2008
Authored by Joao Antunes

hMailServer version 4.4.1 is vulnerable to resource exhaustion attacks that can lead to a denial of service.

tags | advisory, denial of service
SHA-256 | df8e62b98bc0d6e172ac35d89b852eb297c68fa84db745d55a7b5761515ec875
iDEFENSE Security Advisory 2008-08-04.2
Posted Aug 13, 2008
Authored by iDefense Labs, Gael Delalleau | Site idefense.com

iDefense Security Advisory 08.04.08 - Remote exploitation of multiple format string vulnerabilities in Sun Microsystems Inc.'s snoop could allow an attacker to execute arbitrary code with the privileges of the nobody user. Multiple format string vulnerabilities exist within the code that parses and displays SMB traffic. All of the vulnerabilities are present due to unsanitized user input being passed to printf-style formatting function. This allows an attacker to overwrite arbitrary addresses with arbitrary data, which can result in the execution of arbitrary code. iDefense has confirmed the existence of these vulnerabilities in snoop for Solaris 10 8/07. Other versions may also be affected.

tags | advisory, remote, arbitrary, vulnerability
systems | solaris
advisories | CVE-2008-0965
SHA-256 | 86a629216fb461e13eaaf00def47aaea7455872dfc3360b326c676d8ff366859
iDEFENSE Security Advisory 2008-08-04.1
Posted Aug 13, 2008
Authored by iDefense Labs, Gael Delalleau | Site idefense.com

iDefense Security Advisory 08.04.08 - Remote exploitation of multiple stack-based buffer overflow vulnerabilities in Sun Microsystems Inc.'s snoop could allow an attacker to execute arbitrary code with the privileges of the nobody user. Multiple buffer overflow vulnerabilities exist within the code that parses and displays SMB traffic. In most cases, exploitation is trivial as an attacker has full control of the data copied. iDefense has confirmed the existence of these vulnerabilities in snoop for Solaris 10 8/07. Other versions may also be affected.

tags | advisory, remote, overflow, arbitrary, vulnerability
systems | solaris
advisories | CVE-2008-0964
SHA-256 | 44c95b7eafa3c1684d3258e1f4f590cc2c4fe2a3c61f9cf0ababd05d2179e75c
ppimp-upload.txt
Posted Aug 13, 2008
Authored by Stack | Site v4-team.com

Ppim versions 1.0 and below suffer from upload and password change vulnerabilities.

tags | exploit, vulnerability, file upload
SHA-256 | 132e0eea5712ec99ad10ea042a571d6cf331590f457539dd0b17542fa05c0813
alcatel-overflow.txt
Posted Aug 13, 2008
Authored by Deral Heiland | Site layereddefense.com

Layered Defense Research Advisory - A stack based buffer overflow was discovered within Alcatel OmniSwitch product line.

tags | advisory, overflow
SHA-256 | 7990682cd4bcbd2b3f2495a6713625e60c4b87f4bffbdfcb203ecad33dac8594
Pardus Linux Security Advisory 2008.22
Posted Aug 13, 2008
Authored by Pardus Linux, Pardus

Pardus Linux Security Advisory - Two overflow issues were discovered in Php which might possibly allow for arbitrary code execution.

tags | advisory, overflow, arbitrary, php, code execution
systems | linux
SHA-256 | 4417694c5b2a2faf02c87e054d34967fb5e89e6106a90ce2194f6858d079b678
Pardus Linux Security Advisory 2008.21
Posted Aug 13, 2008
Authored by Pardus Linux, Pardus

Pardus Linux Security Advisory - Multiple vulnerabilities have been discovered in Ruby: several vulnerabilities in safe level, DoS vulnerability in WEBrick, Lack of taintness check in dl and DNS spoofing vulnerability in resolv.rb.

tags | advisory, denial of service, spoof, vulnerability, ruby
systems | linux
SHA-256 | a3485348dd6752076c34dc92849c09f1be4a2d7a218d600345b59342a9ee3ca2
Mandriva Linux Security Advisory 2008-166
Posted Aug 13, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - An incomplete fix for CVE-2008-2713 resulted in remote attackers being able to cause a denial of service via a malformed Petite file that triggered an out-of-bounds memory access.

tags | advisory, remote, denial of service
systems | linux, mandriva
advisories | CVE-2008-3215
SHA-256 | f279139437586cfcc7ad19c35f158be4eb5f5ba74ff4b2d8f5a4c2f3548d21d5
Mandriva Linux Security Advisory 2008-167
Posted Aug 13, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - Some vulnerabilities were discovered and corrected in the Linux 2.6 kernel package.

tags | advisory, kernel, vulnerability
systems | linux, mandriva
advisories | CVE-2008-2136, CVE-2008-2148, CVE-2008-2358, CVE-2008-2750, CVE-2008-1615, CVE-2008-2826, CVE-2008-1375, CVE-2008-1675, CVE-2008-1669
SHA-256 | a22bc116b2abbe7adc279c9653623c50268cacda2c1139b16c87517248f69822
Mandriva Linux Security Advisory 2008-165
Posted Aug 13, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - The rmtree function in lib/File/Path.pm in Perl 5.10 does not properly check permissions before performing a chmod, which allows local users to modify the permissions of arbitrary files via a symlink attack. The updated packages have been patched to fix this.

tags | advisory, arbitrary, local, perl
systems | linux, mandriva
advisories | CVE-2008-2827
SHA-256 | 10b076b5e50248be914741d1113a80b1bf984236f35ec1e60e67c49db31536dc
zeebuddy-sql.txt
Posted Aug 13, 2008
Authored by Hussin X | Site tryag.cc

ZeeBuddy version 2.1 suffers from a remote SQL injection vulnerability in bannerclick.php.

tags | exploit, remote, php, sql injection
SHA-256 | fb96304aa067725c902ede07aacb360b6c81025e548540fd83438f3a860f4bce
intellitamper207-header.txt
Posted Aug 13, 2008
Authored by Wojciech Pawlikowski

IntelliTamper version 2.07 HTTP header remote code execution exploit.

tags | exploit, remote, web, code execution
SHA-256 | b028e80d5b859d3e60d3dbb0b896b69519e20b075e9b4b0e87344c6cb660a605
Gentoo Linux Security Advisory 200808-11
Posted Aug 13, 2008
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200808-11 - UUdeview makes insecure usage of the tempnam() function when creating temporary files. NZBGet includes a copy of the vulnerable code. Versions less than 0.5.20-r1 are affected.

tags | advisory
systems | linux, gentoo
advisories | CVE-2008-2266
SHA-256 | 05057434756ef0073d463e6ea74a34c1f85809b90c7ea2ba8ecb65a98edf7a20
exophpdesk-rfi.txt
Posted Aug 13, 2008
Authored by e.wiZz!

ExoPHPDesk version 1.2 Final suffers from a remote file inclusion vulnerability in common.php.

tags | exploit, remote, php, code execution, file inclusion
SHA-256 | 147792f2d1c6b1677502b505673abfb31dfc28c06f483ef59e78d8e3aea6ba5c
inguma-0.0.9.1.tar.gz
Posted Aug 13, 2008
Authored by Joxean Koret

Inguma is a free penetration testing and vulnerability discovery toolkit entirely written in python. Framework includes modules to discover hosts, gather information about, fuzz targets, brute force usernames and passwords, exploits, and a disassembler.

Changes: Various bug fixes, new modules added, and a lot of new exploits.
tags | tool, scanner, python
systems | unix
SHA-256 | e5c56aed374969acc0d9b93fac8849bb83482705761f98a010ffad11047b6ca6
openimpro-sql.txt
Posted Aug 13, 2008
Authored by nuclear

OpenImpro version 1.1 suffers from a remote SQL injection vulnerability in image.php.

tags | exploit, remote, php, sql injection
SHA-256 | 12c55fe67d2c47f11604bd14df35ec327aa5d0588d2072b7e5d76246993430bc
surfjack-0.1b.zip
Posted Aug 13, 2008
Authored by Sandro Gauci | Site enablesecurity.com

surfjack is a tool that allows you to hijack HTTP connection to steal cookies.

tags | web
SHA-256 | 65a1c73679412a460412df6144fbf8de78ac5c5048437c0211b5eee605f5abbd
tomcat-traverse.txt
Posted Aug 13, 2008
Authored by Simon Ryeo

Apache Tomcat versions prior to 6.0.18 suffer from a directory traversal vulnerability.

tags | exploit, file inclusion
advisories | CVE-2008-2938
SHA-256 | a4627d264413d5c228e2b45310a653f9683c2975d1a995ec77da67395ba2d871
rmsoftminishop-xss.txt
Posted Aug 13, 2008
Authored by Lostmon | Site lostmon.blogspot.com

The RMSOFT MiniShop module version 1.0 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 0ea07099b4d0d32c46e581f5b0da64e0af6e9435c397e086f8dac8481eeb7859
webex-activex.txt
Posted Aug 13, 2008
Authored by k'sOSe | Site pornosecurity.org

Cisco WebEx Meeting Manager Active-X related buffer overflow exploit that leverages atucfobj.dll.

tags | exploit, overflow, activex
systems | cisco
SHA-256 | b8bad26b2db68e69d638bc3a99a42064adac6bc1c33043457baa95edc60f61f1
phprealty-sql.txt
Posted Aug 13, 2008
Authored by CraCkEr

PHP Realty suffers from a remote SQL injection vulnerability.

tags | exploit, remote, php, sql injection
SHA-256 | 5b06a83e1817fda29075ca654c085f1dc6f84e1a8896bea1432262065bd54800
psipuss-sql.txt
Posted Aug 13, 2008
Authored by hadihadi | Site virangar.org

psipuss version 1.0 suffers from multiple remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | bf73d5857fe1f2ff7a7285d4aeff6d3925aed89d6f90f5feacf5ea9495f36218
Page 3 of 7
Back12345Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close