exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 100 RSS Feed


Posted Aug 25, 2007
Authored by Nikolaos Rangos | Site nruns.com

A remote exploitable vulnerability exists in clamav-milter when used with sendmail due to an insecure call to popen(). ClamAV versions prior to 0.91.2 are affected.

tags | advisory, remote
SHA-256 | 88430f439474ceb833877640e5ef738a4bb02bb470e976a6ef541d0b83c2d84c

Related Files

Posted Apr 19, 2007
Authored by Frank Dick | Site nruns.com

A remote exploitable format string vulnerability has been identified in the in the Sun Java Web Console. According to the Sun Security Coordination Team, Solaris 10 Operating System, Sun Java Web Console 2.2.2, Sun Java Web Console 2.2.3, Sun Java Web Console 2.2.4 and Sun Java Web Console 2.2.5 are affected.

tags | advisory, java, remote, web
systems | solaris
advisories | CVE-2007-1681
SHA-256 | e84f0182902982fef958571d637da96cc79aed6c17e01ebeaca169efc5ba049f
Posted Mar 20, 2007
Authored by Alexios Fakos | Site nruns.com

PHProjekt version 5.2.0 suffers from a privilege escalation vulnerability.

tags | advisory
SHA-256 | d0eb6dcd238466f8bf02343caec6f02edb744728d2bc4c2e508a7480db337ddc
Posted Mar 20, 2007
Authored by Alexios Fakos | Site nruns.com

PHProjekt version 5.2.0 suffers from a cross site request forgery vulnerability.

tags | advisory, csrf
SHA-256 | cf169ff516ecb37f27edb69c002fd063faf696d3add01baf063759d1e46d5b37
Posted Mar 20, 2007
Authored by Alexios Fakos | Site nruns.com

PHProjekt version 5.2.0 suffers from cross site scripting and filter evasion vulnerabilities.

tags | advisory, vulnerability, xss
SHA-256 | 2aa0a61eb00ffdfcd305ae3b72f1e7744df2d56d283d55a0fa6bb630096ffbd8
Posted Mar 20, 2007
Authored by Alexios Fakos | Site nruns.com

PHProjekt version 5.2.0 suffers from a SQL injection vulnerability.

tags | advisory, sql injection
SHA-256 | a09402b443c16796539cd108dd61aedcdcd438ccc160783d39617bb171dd08f5
Posted Feb 14, 2007
Site nruns.com

Both the command line based and the web based management interface of the Aruba Mobility Controller are vulnerable to a heap based buffer overflow when overly long strings are passed as credentials. This can potentially lead to remote code execution, resulting in a system compromise.

tags | advisory, remote, web, overflow, code execution
SHA-256 | 2765a8733591e6cc8a10571d0eddc6946cf3800a1474c9f2a49ef8364eeb7b9e
Posted Feb 14, 2007
Site nruns.com

A flaw in an authorization component allows for unauthorized access to the Wireless LAN through a Captive Portal, VPN, and administrative access using either the web-based administration or the command line interface. This vulnerability affects all versions of the Aruba Controller beginning with version 2.3.

tags | advisory, web
SHA-256 | d9f59c55b587f3d9ff9b8404f4cfc3a3b9b30d8abd4bcf3ae2558f4dc03841d6
Posted Dec 22, 2006
Authored by Sergio Alvarez | Site nruns.com

NOD32 Antivirus software versions prior 1.1743 suffer from an arbitrary code execution flaw.

tags | advisory, arbitrary, code execution
SHA-256 | dcc3ac0483403c98b5780d90539d0fc3e3f9ac428aed9e62ae4ad4c049d3f440
Posted Dec 22, 2006
Authored by Sergio Alvarez | Site nruns.com

ESET NOD32 Antivirus suffers from a arbitrary code execution vulnerability. Versions prior to 1.1743 are affected.

tags | advisory, arbitrary, code execution
SHA-256 | 68c8e00a070400f31b4f79d8fd1f5ed916dc36dd5153dcfabf13efd85383835a
Posted Dec 21, 2006
Authored by Sergio Alvarez | Site nruns.com

A remotely exploitable vulnerability has been found in the file parsing engine for BitDefender allowing for remote code execution.

tags | advisory, remote, code execution
SHA-256 | a23052956835d2a738c754384152d85f6cfda66579f00459c5f92b64f88730c5
Posted Nov 14, 2006
Authored by Sergio Alvarez | Site nruns.com

The Grisoft Inc. AVG Antivirus system has had multiple vulnerabilities discovered in the file parsing engine that allow for arbitrary code execution. The vulnerabilities are present in AVG Antivirus software versions prior to 7.1.407.

tags | advisory, arbitrary, vulnerability, code execution
SHA-256 | 2df1d6ba1168f33411d64216fc6207477b58415db787795da79aad12e7ebc9ea
Posted Dec 2, 2005
Authored by KingOfSka | Site contropotere.altervista.org

N-13 News remote SQL injection exploit that performs a PHP shell injection.

tags | exploit, remote, shell, php, sql injection
SHA-256 | a3f4c73c38a1644429c5bff832149cfee9d0326230528a3ecb052e5ecddf52e9
Posted Nov 4, 2004
Authored by SkyLined

InternetExploiter.html is a remote exploit for the IE IFRAME html tag buffer overflow vulnerability which binds a shell to tcp port 28876. Tested against IE 6.0 on Win XP SP1 and IE 6.0 on Win2k.

tags | exploit, remote, overflow, shell, tcp
systems | windows
SHA-256 | 0ecca01eb05bab171b33265b3ea3ac3e0cd2cac3fc0ae02350d422d833d55e3f
Posted Sep 30, 2004
Authored by Serguei

N-du is a Unix backdoor which does not have any open ports. It waits for a special UDP or TCP packet, then opens a tcp port backdoor.

tags | tool, udp, tcp, rootkit
systems | unix
SHA-256 | 1d716fe2d428a1b091b2323219d12fa9adc4fb7bb83e3074c1b4ab462af6d467
Posted Jun 29, 2004
Site http.tinysofa.org

A remote exploit has been discovered in the Apache 2.0.49 HTTP server which allows an attacker to cause the server to allocate increasing amounts of memory until system memory is exhausted or until process limits are reached.

tags | advisory, remote, web
SHA-256 | d52c9414d2197f648b3d31a6f01f66b36cd2811cf96502d02d2519eb5d7614b1
Posted May 9, 2004
Authored by Teolupus

Auxploiter is a remote exploitation tool for the c:\aux vulnerability and is able to completely lock a user mail client. Outlook and other mail clients read this message using Internet Explorer, which is touchy to this vulnerability.

tags | exploit, remote
SHA-256 | 379b4e6b32cfd722ac33ffd4b3b82493967efcf5b1256e6d26c1f5cd867ec2a2
Posted Oct 30, 2003
Authored by Flux

Php-nuke v6.6 and spaiz-nuke below v1.2beta remote exploit which allows you to take over the administrator account. In Spanish.

tags | exploit, remote, php
SHA-256 | fea203fbdd282ac0f1ddebfc46fcc776162fbcc14818517c43a9ca33da3b0b37
HexView Security Advisory 2003-08-01.01
Posted Aug 14, 2003
Authored by HexView | Site sgi.com

SGI Security Advisory 20030801-01-P - It is possible to create a Denial of Service attack on the IRIX nfsd through the use of carefully crafted packets which cause XDR decoding errors. This can lead to kernel panicing the system. No local account or access to an NFS mount point is required, so this could be constructed as a remote exploit.

tags | advisory, remote, denial of service, kernel, local
systems | irix
advisories | CVE-2003-0576
SHA-256 | c8555a9a5b384e2c2b2c17225b0c097f292cea81bae358a367064a71388393f1
Posted Apr 1, 2003
Authored by Knud Erik Hojgaard

Rs_iis_xpl.pl is a remote exploit for rs_iis.c, a remote IIS exploit. Sets up a web server, and if rs_iis.c is used to attempt an exploit, a shell will be spawned on the attacking host. Tested against FreeBSD 4.7-RELEASE-p7.

tags | exploit, remote, web, shell
systems | freebsd
SHA-256 | 53a1d6f18d614b512a0d0c1ca5a75101a70147c7534c005448527d40e2891a82
Posted Oct 31, 2002
Site gentoo.org

Gentoo Linux security advisory - Versions of the pam_ldap module prior to 144 include a remote exploitable format string bug in the logging function. This affects Gentoo users that have installed the net-libs/pam_ldap-134-r1 package.

tags | remote
systems | linux, gentoo
SHA-256 | 9d756befd92e1900fed84a3fd3fbaa84c844813dda28da5beeec1449d6d0c8dc
Posted Oct 30, 2002
Site stage.caldera.com

Caldera security advisory CSSA-2002-041.0 - Versions of the pam_ldap module prior to 144 include a remote exploitable format string bug in the logging function. Caldera released fixed packages for OpenLinux 3.1.1 and 3.1 configurations.

tags | remote
SHA-256 | c98cc4086624aa5d7ab9ed4caeeb7af1bae87e9ae7f7e2603f11c0243e0a66b1
Posted Oct 22, 2002
Authored by Felipe Moniz | Site nstalker.com

N-Stealth v3.5 is a vulnerability assessment tool for Windows which scans webservers for bugs that allow attackers to gain access. Uses a database of 19,000 vulnerabilities and exploits.

Changes: New holes added. Improved Top 20 Scan (based on SANS/FBI Top 20 v2.6). Improved N-Stealth Report. New interface adjustments. Code optimization.
tags | vulnerability
systems | windows
SHA-256 | f3d9cfd5d8699e4a7fd25ae3862d5e286853c68aeb7b8551bf5331421a42ef0a
Posted Oct 15, 2002
Site gentoo.org

Gentoo Linux security advisory - A vulnerability found in certain nss_ldap configuration can result in a remote exploitable buffer overflow condition. This affects nss_ldap packages prior to version 199.

tags | remote, overflow
systems | linux, gentoo
SHA-256 | a2cdd71b5e0d272c696cfd16a1cd84c49133ce730b039733785789668ede43a3
Posted Sep 23, 2002
Authored by netric | Site netric.org

Null httpd 0.5.0, a small multi-threading HTTP server, contains a remote exploitable heap overflow. Exploit code for Null httpd servers running on Red Hat Linux 7.3 is included in the advisory and can be used to spawn a remote root shell. In Null httpd version 0.5.1 this vulnerability has been fixed.

tags | remote, web, overflow, shell, root
systems | linux, redhat
SHA-256 | 95d76e6b92f65447e7530f675554f162ca32748533586a45c71c64acd8977618
Posted Jul 18, 2002
Authored by Lorian

7350fun is a remote exploit for mod_php v4.0.2rc1-v4.0.5 and v4.0.6-v4.0.7RC2. This exploit appears to be a revised version of the 73501867 exploit, which was written by the same author, contained less functionality and was not encrypted. Note: this exploit also causes PHP 4.1.2 versions to segfault. This code was abandoned in a honey pot and is published under Fair Use Law 17 U.S.C.A 107

tags | exploit, remote, php
SHA-256 | 8a1c0c6bcdd15226fa9559cd421b9ccc4eefd1e6864a6e563ecc6a07fb3258aa
Page 3 of 4

File Archive:

September 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    2 Files
  • 2
    Sep 2nd
    21 Files
  • 3
    Sep 3rd
    0 Files
  • 4
    Sep 4th
    17 Files
  • 5
    Sep 5th
    34 Files
  • 6
    Sep 6th
    29 Files
  • 7
    Sep 7th
    11 Files
  • 8
    Sep 8th
    25 Files
  • 9
    Sep 9th
    0 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    26 Files
  • 12
    Sep 12th
    23 Files
  • 13
    Sep 13th
    17 Files
  • 14
    Sep 14th
    22 Files
  • 15
    Sep 15th
    16 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    19 Files
  • 19
    Sep 19th
    60 Files
  • 20
    Sep 20th
    23 Files
  • 21
    Sep 21st
    15 Files
  • 22
    Sep 22nd
    8 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    17 Files
  • 26
    Sep 26th
    3 Files
  • 27
    Sep 27th
    13 Files
  • 28
    Sep 28th
    5 Files
  • 29
    Sep 29th
    12 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2022 Packet Storm. All rights reserved.

Security Services
Hosting By