what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 101 - 125 of 883 RSS Feed

Files Date: 2008-10-01 to 2008-10-31

e107easyshop-sql.txt
Posted Oct 28, 2008
Authored by StAkeR

Remote blind SQL injection exploit for the EasyShop plugin used in e107.

tags | exploit, remote, sql injection
SHA-256 | 91d2cd34cdad21066924a22edc3ef89c156a1e4d3a58aa1cac53270a19e2b7e6
gw-ftrex.c
Posted Oct 28, 2008
Authored by gat3way

Linux kernel versions below 2.6.22 open/ftruncate local exploit.

tags | exploit, kernel, local
systems | linux
advisories | CVE-2008-4210
SHA-256 | fc882d020ccf02b6734ddc1e797b96bc006a5dff5b42e1b57bbbb94bebea2bf1
tandiscms-sql.txt
Posted Oct 28, 2008
Authored by G4N0K

Tandis CMS versions 2.5.0 and below suffer from multiple SQL injection vulnerabilities.

tags | exploit, vulnerability, sql injection
SHA-256 | 455d2f4c61fd4fa9543f6079f5285f7cc615899a2b30b771b935afab9a406e33
azadi-sql.txt
Posted Oct 28, 2008
Authored by Hussin X | Site tryag.cc

Azadi Network suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | f684a77bc4afa2ee0fad643c275f8b2e16dac3687d3e86b04447a931dba47b5e
Secunia Security Advisory 32397
Posted Oct 28, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Hurley has reported a vulnerability in SFS Ez Forum, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 17648d2927925e4633993585fed5dad50346050bff8af4e529bd38abf5afe3b1
Secunia Security Advisory 32405
Posted Oct 28, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - X0r has discovered a vulnerability in tlNews, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | 17f958a9bbf88a2dd0fe1ee9b1754e56a235ccccb25027c7053ded35b6d04217
Secunia Security Advisory 32412
Posted Oct 28, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Dentrasi has discovered a vulnerability in NEPT Image Uploader, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 20a7ec3e91d7b0ac6600d7c6ddc1fca738fd10c6606b68388ea3b3259f139da6
Secunia Security Advisory 32418
Posted Oct 28, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in libpng, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | eff77971bc1c98584a8091d10e5012b0cf249fc920a45c9346f21b04c1cb7c19
Secunia Security Advisory 32420
Posted Oct 28, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in JHead, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
SHA-256 | a716e23d12bed023e162c0fdf7b09a81ff7898db760ecf31c29873e45698f0f7
Secunia Security Advisory 32429
Posted Oct 28, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ghost Hacker has discovered a vulnerability in iPei Guestbook, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 0ec29c9a8223a10c8696810c59fcaa2a6b31e8cffc68e3a0ee2fc5fce026e2a7
Secunia Security Advisory 32436
Posted Oct 28, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for java-1.6.0-ibm. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, disclose system information or potentially sensitive information, cause a DoS (Denial of Service), or compromise a vulnerable system.

tags | advisory, java, denial of service, vulnerability
systems | linux, redhat
SHA-256 | cf05bdce5c3fb76c971e0fdb6d8a4fe312fdc2452fe8bd344b1ac58558d1a989
Secunia Security Advisory 32437
Posted Oct 28, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for java-1.5.0-ibm. This fixes a vulnerability, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory, java
systems | linux, redhat
SHA-256 | 208d02eaa295e760fd8a2b99b0f84a107cf6dd8903df23ac8907d2563d79ee22
Secunia Security Advisory 32442
Posted Oct 28, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been discovered in KTorrent, which can be exploited by malicious users to compromise a vulnerable system and malicious people to bypass certain security restrictions.

tags | advisory, vulnerability
SHA-256 | d556494b0fbe973978fdf0301d372252c40e957844f5386edc4a25d4b5c172f5
Mandriva Linux Security Advisory 2008-216
Posted Oct 27, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - A vulnerability was found in how Emacs would import python scripts from the current working directory during the editing of a python file. This could allow a local user to execute arbitrary code via a trojan python file.

tags | advisory, arbitrary, local, trojan, python
systems | linux, mandriva
advisories | CVE-2008-3949
SHA-256 | 1a095efce563a59c9141042a107b0c4e2c84fbdee3828e1bab4e1f300d4f01c2
Mandriva Linux Security Advisory 2008-215
Posted Oct 27, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - A number of vulnerabilities were discovered in Wireshark that could cause it to crash or abort while processing malicious packets. This update provides Wireshark 1.0.4, which is not vulnerable to these issues.

tags | advisory, vulnerability
systems | linux, mandriva
advisories | CVE-2008-4680, CVE-2008-4681, CVE-2008-4682, CVE-2008-4683, CVE-2008-4684, CVE-2008-4685
SHA-256 | 9804dc2d79718b6ef32372d3ebe08aff8bd180ae7f7e3d628e23019cc9fd2f26
n.runs-SA-2008.009.txt
Posted Oct 27, 2008
Authored by Jan Rossmann, Jan Wagner | Site nruns.com

The Network Shutdown Module version 3.10 from Eaton MGE office protection systems suffers from authentication bypass and remote code execution vulnerabilities.

tags | advisory, remote, vulnerability, code execution
SHA-256 | d54c89c3c99024d0e1e9654f37ed1b75ef5c1b7f276771d249be6e1057c18576
phpmyadminall-xss.txt
Posted Oct 27, 2008
Authored by Hadi Kiamarsi

All versions of phpMyAdmin as of 10/2008 suffer from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 7199936079984d82abcdee59bf6addda64492b9f7cb4bdf9795b9dcaf87ee55a
address-spoof.txt
Posted Oct 27, 2008
Authored by Amit Klein | Site trusteer.com

Address Bar Spoofing Attacks Against Microsoft Internet Explorer 6. Due to formatting issues when sent , additional notes regarding the attacks are appended.

tags | paper, spoof
SHA-256 | 0b50cac4814209cbe847736d64513cecbda9d1d2abe27507f6bcd18601973ba7
Secunia Security Advisory 32224
Posted Oct 27, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - G4N0K has reported two vulnerabilities in Kasra CMS, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, vulnerability, sql injection
SHA-256 | ecf24d0292d8c70ad9788a4903968683dff492ee11d1290d0148a98559d4beb1
Secunia Security Advisory 32373
Posted Oct 27, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Hussin X has reported a vulnerability in PozScripts Classified Auctions, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | f14cad6da078e6a3479f9dfc95606d381e3d164af672abb460aab8c20407b45a
questcms-sqlxsstraverse.txt
Posted Oct 27, 2008
Authored by d3b4g

Quest CMS suffers from cross site scripting, directory traversal, and SQL injection vulnerabilities.

tags | exploit, vulnerability, xss, sql injection, file inclusion
SHA-256 | e86739be1e8bb64544f30c24c91beb98e2e77a79bbccf1adfde0b2c321a9faee
zubrag-upload.txt
Posted Oct 27, 2008
Authored by Dentrasi

Zubrag Uploader version 1.0 suffers from a shell upload vulnerability due to a failed random file rename.

tags | exploit, shell, file upload
SHA-256 | c93b50c10f3ae690a5de33e25db1895cc24b5ff9b0f265ba00d333a3b6b6bcf1
mybbs142-multi.txt
Posted Oct 27, 2008
Authored by Micheal Cottingham

MyBB version 1.4.2 suffers from cross site scripting and remote code execution vulnerabilities.

tags | exploit, remote, vulnerability, code execution, xss
SHA-256 | 7cd7c424c1fe432f5291c6c5a945c4b21961ebd7c63f0678a83419ea7b5c08fc
MSF-XB11.rar
Posted Oct 27, 2008
Authored by Jerome Athias | Site securinfos.info

MSF eXploit Builder is a Windows GUI to build Metasploit Framework exploit modules. It will help you to edit/modify/create/test exploit modules for the Metasploit Framework. Full source release. It includes a built-in fuzzer, a win32 debugger, and a lot of tools used in the process of exploit development.

tags | tool, fuzzer
systems | windows, unix
SHA-256 | 4a382efc58c637872c644539f8f88fe0989f10424df3f81dc14c702a0e2f6770
myktools-lfi.txt
Posted Oct 27, 2008
Authored by X0r

MyKtools version 2.4 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | bce61fb6911b802f6c41f9c6e46404303083734196b70af885a7bae403c7c022
Page 5 of 36
Back34567Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close