exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 44 RSS Feed

Files

BMC Remedy / ITAM 7.1.00 / 9.1.02.003 Information Disclosure
Posted Jan 7, 2019
Authored by Filip Palian

BMC Remedy and ITAM versions 7.1.00 and 9.1.02.003 suffer from multiple information disclosure vulnerabilities.

tags | exploit, vulnerability, info disclosure
advisories | CVE-2018-18862
SHA-256 | f91d23df9bc0097fffb3bf5213fe0b8005c3a4f47d501ca62b6106eeb36a9b3a

Related Files

Xitami 2.5b4 Denial Of Service
Posted Jan 29, 2024
Authored by Fernando Mengali

Xitami version 2.5b4 remote denial of service exploit.

tags | exploit, remote, denial of service
SHA-256 | b351dc9e48a6aed313bf19e6e490bc5237d5dac13546a53e1865579f3eca6b32
Xitami 2.5 Denial Of Service
Posted Jan 15, 2024
Authored by Fernando Mengali

Xitami version 2.5 remote denial of service exploit.

tags | exploit, remote, denial of service
SHA-256 | 9cfd6521e63af7bec8aa11d85bcd2bc1d7ebfd7d243fd44b6ff495053f2c4fa2
Ubuntu Security Notice USN-4675-1
Posted Jan 5, 2021
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 4675-1 - Pritam Singh discovered that OpenStack Horizon incorrectly validated certain parameters. An attacker could possibly use this issue to cause OpenStack Horizon to redirect to a malicious URL.

tags | advisory
systems | linux, ubuntu
advisories | CVE-2020-29565
SHA-256 | ff5ce8003f2e61e5233d4e6f3e0558bb7911837b0c1febff0441e908956334bd
Debian Security Advisory 4820-1
Posted Dec 28, 2020
Authored by Debian | Site debian.org

Debian Linux Security Advisory 4820-1 - Pritam Singh discovered an open redirect in the workflow forms of OpenStack Horizon.

tags | advisory
systems | linux, debian
advisories | CVE-2020-29565
SHA-256 | aa4dcfbb55beed6cfd5dd0c5473f61da086f94bac322f0b535a9d8136898b814
Xitami Web Server 2.5 Remote Buffer Overflow
Posted May 6, 2019
Authored by ElSoufiane

Xitami Web Server version 2.5 remote SEH buffer overflow exploit with egghunter.

tags | exploit, remote, web, overflow
SHA-256 | 9266efca799b47f871561d9abe7318234f5774a03d813b9cbf03d84871e49824
Debian Security Advisory 3478-1
Posted Feb 16, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3478-1 - Daniel Genkin, Lev Pachmanov, Itamar Pipman and Eran Tromer discovered that the ECDH secret decryption keys in applications using the libgcrypt11 library could be leaked via a side-channel attack.

tags | advisory
systems | linux, debian
advisories | CVE-2015-7511
SHA-256 | 261750c746fe589baf3fabde57e9825cb9d6cc220c4d09d214ff68a6bd5eda72
Ubuntu Security Notice USN-2896-1
Posted Feb 15, 2016
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2896-1 - Daniel Genkin, Lev Pachmanov, Itamar Pipman and Eran Tromer discovered that Libgcrypt was susceptible to an attack via physical side channels. A local attacker could use this attack to possibly recover private keys.

tags | advisory, local
systems | linux, ubuntu
advisories | CVE-2015-7511
SHA-256 | 675eb78b537992ffb286496ea0c991eedfce2ffb721ea85ad463ea0773973994
Debian Security Advisory 3474-1
Posted Feb 15, 2016
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3474-1 - Daniel Genkin, Lev Pachmanov, Itamar Pipman and Eran Tromer discovered that the ECDH secret decryption keys in applications using the libgcrypt20 library could be leaked via a side-channel attack.

tags | advisory
systems | linux, debian
advisories | CVE-2015-7511
SHA-256 | 4b3c6cec624729feb1385097c768b19210a88ed628f32462d7b492304d08587f
Ubuntu Security Notice USN-2555-1
Posted Apr 1, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2555-1 - Daniel Genkin, Lev Pachmanov, Itamar Pipman, and Eran Tromer discovered that Libgcrypt was susceptible to an attack via physical side channels. A local attacker could use this attack to possibly recover private keys. Daniel Genkin, Adi Shamir, and Eran Tromer discovered that Libgcrypt was susceptible to an attack via physical side channels. A local attacker could use this attack to possibly recover private keys. Various other issues were also addressed.

tags | advisory, local
systems | linux, ubuntu
advisories | CVE-2014-3591, CVE-2015-0837
SHA-256 | 792642a0875ba38ffc370521446151efc3f78fb089ed47720138b797c6d3ce23
Ubuntu Security Notice USN-2554-1
Posted Apr 1, 2015
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 2554-1 - Daniel Genkin, Lev Pachmanov, Itamar Pipman, and Eran Tromer discovered that GnuPG was susceptible to an attack via physical side channels. A local attacker could use this attack to possibly recover private keys. Daniel Genkin, Adi Shamir, and Eran Tromer discovered that GnuPG was susceptible to an attack via physical side channels. A local attacker could use this attack to possibly recover private keys. Various other issues were also addressed.

tags | advisory, local
systems | linux, ubuntu
advisories | CVE-2014-3591, CVE-2014-5270, CVE-2015-0837, CVE-2015-1606, CVE-2015-1607
SHA-256 | acd1c36d18e0b5be95a85b1785f915c0f1383d9bbab5c56b752b2a664eb94d1f
Debian Security Advisory 3073-1
Posted Nov 17, 2014
Authored by Debian | Site debian.org

Debian Linux Security Advisory 3073-1 - Daniel Genkin, Itamar Pipman and Eran Tromer discovered that Elgamal encryption subkeys in applications using the libgcrypt11 library, for example GnuPG 2.x, could be leaked via a side-channel attack.

tags | advisory
systems | linux, debian
advisories | CVE-2014-5270
SHA-256 | 8fffc402af38bdb41e678130858ef5a67a02942cf952d7c89fbe50b5cae2713c
Secunia Security Advisory 50176
Posted Aug 7, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been discovered in the Vitamin plugin for WordPress, which can be exploited by malicious people to disclose sensitive information.

tags | advisory, vulnerability
SHA-256 | 1e6925f6212da54846413366e7e3b4d07d6ebfec345eb2ac14ed9d043180c5dd
Vitaminedz Blind SQL Injection
Posted Jun 13, 2011
Authored by Kalashinkov3

Vitaminedz suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | b6e3107bd47facb38e4641043cac3190a5677f7807ed93479482b8529cb9bbf9
Xitami Web Server 2.5 Buffer Overflow
Posted Jun 4, 2011
Authored by Glafkos Charalambous

Xitami Web Server version 2.5b4 remote buffer overflow exploit with egghunter shellcode.

tags | exploit, remote, web, overflow, shellcode
SHA-256 | 73db261ddf9325903ce5ef0bdf12b3e24b054fe1f3131430c8e164a3ee276687
iMatix Xitami 5.0a0 NULL Pointer
Posted Jun 4, 2011
Authored by Luigi Auriemma | Site aluigi.org

iMatix Xitami versions 5.0a0 and below suffer from a NULL pointer vulnerability.

tags | exploit
SHA-256 | ed4eb779232d0541e6a573825d43e2d1a268a434b65a1704fa33716fe9783002
Xitami Web Server 2.5b4 Remote Buffer Overflow
Posted Jun 3, 2011
Authored by mr.pr0n

Xitami Web Server version 2.5b4 remote buffer overflow exploit that spawns a shell.

tags | exploit, remote, web, overflow, shell
SHA-256 | d74f1c9cc0694320046e368dd4c524292f1aa8c23e024ab073a7ec3cae132bc9
Xitami 5.0a0 Denial Of Service
Posted May 10, 2010
Authored by Usman Saeed

Xitami version 5.0a0 remote denial of service exploit.

tags | exploit, remote, denial of service
SHA-256 | 11fd43d97a67c4cc99f55bc801ac2855980b31e3f58d6e5d0f0a8cd7102d847b
IntelliTamper 2.07/2.08 (defer) Remote Buffer Overflow
Posted Jan 24, 2010
Authored by Stack | Site metasploit.com

This Metasploit module exploits a stack overflow in the IntelliTamper. By sending an overly long string to the "defer" script, an attacker may be able to execute arbitrary code.

tags | exploit, overflow, arbitrary
SHA-256 | 5a7d05045fcaafffeec567421bc387b0c5e71f7d8dcecd67bd46ed81f239decd
IntelliTamper 2.07 / 2.08 Buffer Overflow
Posted Jan 22, 2010
Authored by SkuLL-HacKeR

IntelliTamper versions 2.07 and 2.08 local buffer overflow exploit.

tags | exploit, overflow, local
SHA-256 | 0ff0d088ab189c61e1aabfbc31ccc84186fcf64aaa2b72080e0fbc2512e37aa7
Xitami 2.5c2 Web Server If-Modified-Since Overflow
Posted Nov 26, 2009
Authored by patrick | Site metasploit.com

This Metasploit module exploits a stack overflow in the iMatix Corporation Xitami Web Server. If a malicious user sends an If-Modified-Since header containing an overly long string, it may be possible to execute a payload remotely. Due to size constraints, this module uses the Egghunter technique. You may wish to adjust WfsDelay appropriately.

tags | exploit, web, overflow
advisories | CVE-2007-5067
SHA-256 | 8670dc144729b546f2f7c3e942e7920a361bac99f06359655848174beb3c468d
Secunia Security Advisory 34858
Posted Apr 27, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Jonathan Salwan has discovered a vulnerability in Xitami, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 041845e4be2967c8da72558fe9fde7476b2e9be943dc3d70ac6173f9582a4db8
Xitami Web Server 5.0 Denial Of Service
Posted Apr 22, 2009
Authored by Jonathan Salwan | Site shell-storm.org

Xitami HTTP Server versions 5.0 and below remote denial of service exploit.

tags | exploit, remote, web, denial of service
SHA-256 | 35cb32d7e8deb076c7ece655c1ebee2fc47db30abc7a63c579587e00b7a55c23
Intellitamper 2.07 Buffer Overflow
Posted Apr 10, 2009
Authored by ZoRLu

Intellitamper version 2.07 .txt file local buffer overflow proof of concept exploit.

tags | exploit, overflow, local, proof of concept
SHA-256 | 39c5e9df6141e257f0b5dbe381cacacfd9ebcfd7ad247b3892b5f1166d8a54dd
IntelliTamper 2.07 / 2.08 Language Catalog SEH Overflow Exploit
Posted Jan 8, 2009
Authored by Cn4phux

IntelliTamper versions 2.07 and 2.08 Language Catalog SEH overflow exploit.

tags | exploit, overflow
SHA-256 | bb4fc74610b73533bc64a6dd2b224001fc3c046a0a09dd1c3ef84a7a1104cc63
IntelliTamper 2.07/2.08 Local Stack Overflow Exploit
Posted Dec 31, 2008
Authored by His0k4

IntelliTamper versions 2.07 and 2.08 local stack overflow exploit that spawns calc.exe.

tags | exploit, overflow, local
SHA-256 | 4845fc96b4b28c47b21be8ec74ff558ed0d123f289d416f6315ca3aa8b003567
Page 1 of 2
Back12Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    0 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close