exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 43 of 43 RSS Feed

Files Date: 2008-10-23 to 2008-10-24

opera-xssexecpoc.txt
Posted Oct 23, 2008
Authored by Aviv Raff | Site aviv.raffon.net

Opera version 9.52 and 9.60 stored cross site scripting and remote code execution exploit. This is an expansion on the research performed by Security Assessment.

tags | exploit, remote, code execution, xss
SHA-256 | 3016c77408b82807e6ba7f702b979b7b81a888b4e82825c954fa6666b48e5e53
css-read.txt
Posted Oct 23, 2008
Authored by Sirdarckcat | Site sirdarckcat.net

CSSH is a proof of concept CSS based history crawler.

tags | exploit, proof of concept
SHA-256 | c5fdc0c0ba7fc19c5b0e54a27dd3b63cddeb2a408d065320055d5198d0defaf4
afick-2.12-1.tgz
Posted Oct 23, 2008
Authored by Eric Gerbier | Site afick.sourceforge.net

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.

Changes: Some bug fixes and additions.
tags | tool, integrity
systems | windows, unix
SHA-256 | 8fbdb2e3c4adb8abc36c58252bb031dc8d04d53a7e59d39b275a29a1bc76e829
Linux IPTables Firewall 1.4.2
Posted Oct 23, 2008
Site iptables.org

iptables is built on top of netfilter, the packet alteration framework for Linux 2.4.x and 2.6.x. It is a major rewrite of its predecessor ipchains, and is used to control packet filtering, Network Address Translation (masquerading, portforwarding, transparent proxying), and special effects such as packet mangling.

Changes: Various fixes in this release.
tags | tool, firewall
systems | linux
SHA-256 | 7b21e1e8b12a08d7ee54f83a9070950961a0a3c7d8cbeabe496a2bc4fb806c65
aflog-insecure.txt
Posted Oct 23, 2008
Authored by JosS | Site spanish-hackers.com

aflog version 1.01 suffers from multiple insecure cookie handling vulnerabilities.

tags | exploit, vulnerability, insecure cookie handling
SHA-256 | 2ad228542193af177460db92e2e34944e44a22dc092f9a4a5a8ca69ad05b198a
cspartner-sql.txt
Posted Oct 23, 2008
Authored by StAkeR

CSPartner version 1.0 remote delete all users and SQL injection exploit.

tags | exploit, remote, sql injection
SHA-256 | 753cf8a0e2b26ff2bbfa7d5c2815281f3d7ae6a713487fd1edd6284611b9d62f
goodtechssh-overflow.txt
Posted Oct 23, 2008
Authored by r0ut3r

GoodTech SSH remote buffer overflow exploit that leverages SSH_FXP_OPEN. Other operations are also vulnerable.

tags | exploit, remote, overflow
SHA-256 | f3164408344493f4dd8b44b3b08b4b3684ad0767f690e399ce5c045ca02c9a6a
freesshd-overflow.txt
Posted Oct 23, 2008
Authored by r0ut3r

freeSSHd version 1.2.1 rename buffer overflow exploit. Same vulnerability as Jeremy Brown's but with further research.

tags | exploit, overflow
SHA-256 | da63ccfe0dce66137dffb913846e32545d8e7581f703eae497a5ddbee6660649
siteengine-sqlredirphpinfo.txt
Posted Oct 23, 2008
Authored by xy7

SiteEngine version 5.x suffers from remote SQL injection, URI redirection, and information disclosure vulnerabilities.

tags | exploit, remote, vulnerability, sql injection, info disclosure
SHA-256 | 2f9e9d7d9eee9bdae3a86e90ee44e45fadf1c2405b8eda7efd30cfe9099709f7
silvershield-dos.txt
Posted Oct 23, 2008
Authored by Jeremy Brown | Site jbrownsec.blogspot.com

SilverSHielD version 1.0.2.34 remote denial of service exploit.

tags | exploit, remote, denial of service
SHA-256 | adffdb22b15610a653c02cf1010761aa42db8495512e93f297e063bfb7d1a17d
Secunia Security Advisory 27054
Posted Oct 23, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in various HP products, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | d3a9e0cd7db949573828841f35056de5bd5d034763f9aab00de447565d7ad00d
Secunia Security Advisory 32338
Posted Oct 23, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - James Bercegay has reported two vulnerabilities in WebSVN, which can be exploited by malicious people to conduct cross-site scripting attacks and manipulate data.

tags | advisory, vulnerability, xss
SHA-256 | dababb4135838307628d5fb3085c2a3d07b50069a535448d0135a2df04ffb4af
Secunia Security Advisory 32349
Posted Oct 23, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for ed. This fixes a security issue, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | linux, redhat
SHA-256 | e07da550e7916718db4a671b8085af1107b92abb689a61d885c8551694e65bc4
Secunia Security Advisory 32351
Posted Oct 23, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for ruby. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, cause a DoS (Denial of Service), and conduct spoofing attacks.

tags | advisory, denial of service, spoof, vulnerability, ruby
systems | linux, redhat
SHA-256 | 27de997ae4c096175df26246cf1de2dd453e273e562f1cc642eddde7b95ba4a2
Secunia Security Advisory 32371
Posted Oct 23, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for ruby. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, cause a DoS (Denial of Service), and conduct spoofing attacks.

tags | advisory, denial of service, spoof, vulnerability, ruby
systems | linux, redhat
SHA-256 | db071f215083119d6ed472b5f69d95c4f2fcf3807b1fc21b12194e63adc70b3c
Secunia Security Advisory 32372
Posted Oct 23, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for ruby. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions or cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability, ruby
systems | linux, redhat
SHA-256 | 87e661911fa5e14a8a508480ae98d5a87a8351b0549d4e54d81656958c81dded
Secunia Security Advisory 32385
Posted Oct 23, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for dbus. This fixes a weakness, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
systems | linux, debian
SHA-256 | bae04567f34c2c8d458823747a1186a3c467551b0451e900de6551ac7dbd4987
Secunia Security Advisory 32389
Posted Oct 23, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Drupal, which can potentially be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
SHA-256 | 3c251ddc8c1f629fbece0dabf1c61870149ae3a8d5fb7baf162012ecdc0319d5
Page 2 of 2
Back12Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close