exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 22 of 22 RSS Feed

Files Date: 2008-08-29 to 2008-08-30

phpemlak-sql.txt
Posted Aug 29, 2008
Authored by Hussin X | Site tryag.cc

Full PHP Emlak Script suffers from a remote SQL injection vulnerability in landsee.php.

tags | exploit, remote, php, sql injection
SHA-256 | f4968c6b56d104c765733c5faf2219cf134b9b74903857fe4c2b0f03acd80198
scip-dreambox.txt
Posted Aug 29, 2008
Authored by Marc Ruef | Site scip.ch

An input validation error within the web interface of Dreambox model DM500C allows for a denial of service condition.

tags | advisory, web, denial of service
SHA-256 | b07f925091a95eb3ffd99e8e205d865b485e692d12f1fceebd5a4600fea29e9e
logmein-activex.txt
Posted Aug 29, 2008
Authored by Yag Kohha

LogMeIn remote access utility Active-X memory consumption denial of service exploit.

tags | exploit, remote, denial of service, activex
SHA-256 | b9e39f98515adef80631fb01feadece13b9cbbe60fe4aa1703cfff921eabe808
najdisi-overflow.txt
Posted Aug 29, 2008
Authored by shinnai | Site shinnai.altervista.org

Najdi.si Toolbar Active-X remote buffer overflow proof of concept exploit.

tags | exploit, remote, overflow, activex, proof of concept
SHA-256 | 3899e619ee304913fc06cfbe1291b6a323d591ea4a1aa9a662fccef3f676a068
ipb235-multi.txt
Posted Aug 29, 2008
Authored by DarkFig

Invision Power Board versions 2.3.5 and below remote exploit that brute forces, attempts IDS evasion, and more.

tags | exploit, remote
SHA-256 | 7779c993b7397aaec65eef50dc7ff88cbb5936a2ae85c14d56352edc8fc4a524
hoagie_snoop.c
Posted Aug 29, 2008
Authored by Andi | Site void.at

Sun Solaris 8/9/10 and OpenSolaris versions below snv_96 snoop utility remote exploit.

tags | exploit, remote
systems | solaris
SHA-256 | 35e45fd192fe8d93b73a8b63f302b1e8583257b9ea95ef03be4093ea08ebd7e9
Secunia Security Advisory 31632
Posted Aug 29, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - shinnai has reported some vulnerabilities in Ultra Office Control, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 255b574a168a3e6406787895902cd1755882c6ad556f4434770644caf0ff0148
Secunia Security Advisory 31670
Posted Aug 29, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for libtiff. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system.

tags | advisory, denial of service, vulnerability
systems | linux, redhat
SHA-256 | ce9a3c800358679991197d67825bf3fea0ef0f7fcae2270b87e52f735798c644
Zero Day Initiative Advisory 08-054
Posted Aug 29, 2008
Authored by Tipping Point | Site zerodayinitiative.com

A vulnerability allows remote attackers to execute arbitrary code on systems with vulnerable installations of messaging applications that make use of the libpurple library. User interaction is not required to exploit this vulnerability. The specific flaw exists in the implementation of the MSN protocol, specifically the handling of SLP messages. The function msn_slplink_process_msg() fails to properly validate an offset value specified in the SLP packet. By providing a specific value, an attacker can overflow a heap buffer resulting in arbitrary code execution.

tags | advisory, remote, overflow, arbitrary, code execution, protocol
advisories | CVE-2008-2927
SHA-256 | e15e4d5ffbe515920af88f4eecd3c1a6f1e9059e4b62cd784e5ab4422f7cbdf1
Mandriva Linux Security Advisory 2008-181
Posted Aug 29, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - Two denial of service vulnerabilities were discovered in the ipsec-tools racoon daemon, which could allow a remote attacker to cause it to consume all available memory. The updated packages have been patched to prevent these issues.

tags | advisory, remote, denial of service, vulnerability
systems | linux, mandriva
advisories | CVE-2008-3651, CVE-2008-3652
SHA-256 | b4f033c3e31a18567428fc5e4fb2e5075e6cda5c26ecbc7bc4b1a23e35c731a6
kisgearth-0.01f.tar.bz2
Posted Aug 29, 2008
Authored by Richard Sammet | Site e-axe.mytty.org

Kisgearth is a small perl script that gives you the ability to convert your Kismet xml logfiles to GoogleEarth kml files. You can apply a lot of filters and use sorting/ordering functions in order to get the best results.

tags | tool, perl, wireless
SHA-256 | 31ac8f67bde714ccc5fca9ee9a6fbdf207a2c2f93db48bc89e7067ac53d1f364
firefox301-exec.txt
Posted Aug 29, 2008
Authored by Beenu Arora | Site beenuarora.com

Firefox version 3.0.1 (final release) suffers from an unspecified remote code execution vulnerability.

tags | advisory, remote, code execution
SHA-256 | 6b29cd17dad920f95700394f167e1dd62ff0044187a945c553e4d426532288a9
OpenSSH-4.4p1-backdoored.tar.gz
Posted Aug 29, 2008
Authored by Balla

OpenSSH version 4.4p1 backdoor that logs all incoming and outgoing logins and password via the client and the daemon, adds a magic password for sshd, store passwords to an encrypted logfile, and disables logging if the magic password is used. Based on the Aion 3.8p1 patch.

tags | encryption
SHA-256 | a37080bf2f46a81e30b27a17681b99e82a47b947525a968a013ef8be8b1e3560
dotproject-sqlxss.txt
Posted Aug 29, 2008
Authored by C1c4Tr1Z | Site lowsec.org

dotProject version 2.1.2 suffers from cross site scripting and SQL injection vulnerabilities.

tags | exploit, vulnerability, xss, sql injection
SHA-256 | c2506e01037c9e81b5e703b788820b64c68d357035112d587f80012a70e76508
Lynis Auditing Tool 1.2.0
Posted Aug 29, 2008
Authored by Michael Boelen | Site cisofy.com

Lynis is an auditing tool for Unix (specialists). It scans the system and available software to detect security issues. Beside security related information it will also scan for general system information, installed packages and configuration mistakes. This software aims in assisting automated auditing, software patch management, vulnerability and malware scanning of Unix based systems.

Changes: Multiple new tests added, various support added, and various changes.
tags | tool, scanner
systems | unix
SHA-256 | a41a081e1d1074f88648a1ab30268e78a9587597eb81d590110b220f81570eff
HP Security Bulletin 2008-01.18
Posted Aug 29, 2008
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin - A potential security vulnerability has been identified with HP-UX running Apache. These vulnerabilities could be exploited remotely resulting in Cross Site Scripting (XSS) or Denial of Service (DoS).

tags | advisory, denial of service, vulnerability, xss
systems | hpux
advisories | CVE-2007-4465, CVE-2008-2168, CVE-2008-2364
SHA-256 | 62638e73004cc9a719789f3b5f3bd25a1ac9061f94ca30f50e9fc24c6a49b2d5
sara-7.8.1.tgz
Posted Aug 29, 2008
Authored by Advanced Research Corporation | Site www-arc.com

Security Auditor's Research Assistant (SARA) is a security analysis tool based on the SATAN model. It is updated twice a month to address the latest threats. Checks for common old holes, backdoors, trust relationships, default cgi, common logins, open shares, and much more.

Changes: Various changes and additions.
tags | tool, cgi, scanner
systems | unix
SHA-256 | cc994308e211e00f3605f8cf45a45ced5a82c28524f0a4062e2064e0e92d0177
mercadolibre-xssrfi.txt
Posted Aug 29, 2008
Authored by Ivan Sanchez | Site nullcode.com.ar

Mercadolibre.com suffers from cross site scripting and remote javascript insertion vulnerabilities.

tags | exploit, remote, javascript, vulnerability, code execution, xss, file inclusion
SHA-256 | e5d66c658f2078cfc30d24d389e3fc9a796a985b1977213ed9c47555dcdda4f0
strongSwan IPsec / IKEv1 / IKEv2 Implementation For Linux
Posted Aug 29, 2008
Authored by Andreas Steffen | Site strongswan.org

strongSwan is a complete IPsec and IKEv1 implementation for Linux 2.4 and 2.6 kernels. It interoperates with most other IPsec-based VPN products. It is a descendant of the discontinued FreeS/WAN project. The focus of the strongSwan project is on strong authentication mechanisms using X.509 public key certificates and optional secure storage of private keys on smartcards through a standardized PKCS#11 interface. A unique feature is the use of X.509 attribute certificates to implement advanced access control schemes based on group memberships.

Changes: A NetworkManager plugin allows GUI-based configuration of road-warrior clients in a simple way. A new EAP-GTC plugin implements draft-sheffer-ikev2-gtc-00.txt and allows username/password authentication against any PAM service on the gateway. Various other fixes and additions.
tags | kernel, encryption
systems | linux
SHA-256 | e90ab31519bdc93ded04df1b116b84ca7a4840cf492fe8ffcc5d254470693c68
friendly-exec.txt
Posted Aug 29, 2008
Authored by spdr

Friendly Technologies Active-X related remote command execution exploit that leverages fwRemoteCfg.dll.

tags | exploit, remote, activex
SHA-256 | cf791a62866e8c13b0bb4170fecbd62a11c9aa209334d2a4bd08c4ac0092e078
friendly-fwremotecfg.txt
Posted Aug 29, 2008
Authored by spdr

Friendly Technologies Active-X remote buffer overflow exploit that leverages fwRemoteCfg.dll.

tags | exploit, remote, overflow, activex
SHA-256 | 36eddcbf66c4d13623f2f168843ec44c7ed28ea5b3f30556054af77b456fb53d
acoustica-overflow.txt
Posted Aug 29, 2008
Authored by koshi

Acoustica Mixcraft versions 4.2 Build 98 and below mx4 file local buffer overflow exploit.

tags | exploit, overflow, local
SHA-256 | 43b6c437b76203c406a76bf1208c80f1560e902d45286eea3f3997178aafd87f
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close