exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 36 RSS Feed

Files Date: 2008-10-13

uninformed-10.tgz
Posted Oct 13, 2008
Authored by Matt Miller, H D Moore, Skywing, uninformed, mxatone | Site uninformed.org

Uninformed is pleased to announce the release of its tenth volume which is composed of 4 articles: Can you find me now? Unlocking the Verizon Wireless xv6800 (HTC Titan), Using dual-mappings to evade automated unpacker, Analyzing local privilege escalations in win32k, and Exploiting Tomorrow's Internet Today: Penetration testing with IPv6.

tags | local
SHA-256 | e88f63b59cd99b5222f1427aefd7f83c0b9a99bc49ee4a80852eb736c8296ba6
Secunia Security Advisory 32183
Posted Oct 13, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for mon. This fixes a vulnerability, which can be exploited by malicious, local users to perform certain actions with escalated privileges.

tags | advisory, local
systems | linux, debian
SHA-256 | 3a94520b14e9046999712f245d5cccd9be0d4980cfe641a9834ce9ba20bdf3cb
Secunia Security Advisory 32213
Posted Oct 13, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in Apache Tomcat, which potentially can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | 20606b4ab31a588c89659e08c43bdb881cbd707cb94d34a5ecf7e1fda8828b83
Secunia Security Advisory 32254
Posted Oct 13, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for openldap. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, debian
SHA-256 | efea1de6c4a64ec201f849288882c2dbfd729dd8ca823b31d0eba751bfae9f44
Secunia Security Advisory 32255
Posted Oct 13, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for ruby1.9. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions or cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | linux, debian
SHA-256 | 2157726b45f988d0887d557a893c251d6648e14255c6d886878692ddf25863a2
Secunia Security Advisory 32256
Posted Oct 13, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for ruby1.8. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions or cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | linux, debian
SHA-256 | 1bedd515e46a3683bc571a55ef0d6d6ab4ba8e9812d9fa64d1714ab0730e7dd8
Debian Linux Security Advisory 1653-1
Posted Oct 13, 2008
Authored by Debian | Site debian.org

Debian Security Advisory 1653-1 - Several vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or privilege escalation.

tags | advisory, denial of service, kernel, vulnerability
systems | linux, debian
advisories | CVE-2007-6716, CVE-2008-1514, CVE-2008-3276, CVE-2008-3525
SHA-256 | 51feee12105362895af7d75faa8099507a11e88fe4815b2f8d435d8d823ee3ba
indexscript30-sql.txt
Posted Oct 13, 2008
Authored by d3v1l

IndexScript version 3.0 suffers from a remote SQL injection vulnerability in sug_cat.php.

tags | exploit, remote, php, sql injection
SHA-256 | 8a06de796f9af2f26218de6e9ae0f7e769c332a657653a3445d4ed28f919e598
marvell-association.txt
Posted Oct 13, 2008
Authored by Laurent Butti, Julien Tinnes

The wireless drivers in some Wi-Fi access points (such as the MARVELL-based Linksys WAP4400N) do not correctly parse some malformed 802.11 frames, allowing for denial of service and possible code execution.

tags | advisory, denial of service, code execution
advisories | CVE-2008-4441
SHA-256 | 1a181ff342a3f2e4a532d4f63245f3886efc056a407e5ba031eaab9f54c9e7ff
globsy-rewrite.txt
Posted Oct 13, 2008
Authored by StAkeR

Globsy versions 1.0 and below remote file rewriting exploit.

tags | exploit, remote
SHA-256 | 6cf02c8dc6a61740e88d1d92395867b0a322d9a40d12443319a4a92951d7df18
createdirectory2sysdba.sql
Posted Oct 13, 2008
Authored by Paul Wright | Site oracleforensics.com

Proof of concept code that demonstrates how an Oracle DB user which has been granted CREATE ANY DIRECTORY can use that system privilege to grant themselves the SYSDBA system privilege by creating a DIRECTORY pointing to the password file location on the OS and then overwriting it with a previously prepared known binary password file using UTL_FILE.PUT_RAW from within the DB.

tags | exploit, proof of concept
SHA-256 | e5b9d81d9e3e453e88ecc084ad1516012f5e333ec7dcdbb2dbe569b1350618e0
create_any_directory_to_sysdba.pdf
Posted Oct 13, 2008
Authored by Paul Wright | Site oracleforensics.com

An Oracle DB user which has been granted CREATE ANY DIRECTORY can use that system privilege to grant themselves the SYSDBA system privilege by creating a DIRECTORY pointing to the password file location on the OS and then overwriting it with a previously prepared known binary password file using UTL_FILE.PUT_RAW from within the DB. This paper will show how the issue can be exploited and most importantly how to secure against it.

tags | paper
SHA-256 | d831e6ebd8c7df2437915b869b9d31a97fd007d4363bebebfe908afab3c60f97
lokicms034-exec.txt
Posted Oct 13, 2008
Authored by __GiReX__ | Site girex.altervista.org

LokiCMS versions 0.3.4 and below remote command execution exploit.

tags | exploit, remote
SHA-256 | 80595446863befacbff02165f9b101243a867c06247ccd3102473d3240f56088
lokicms-lfi.txt
Posted Oct 13, 2008
Authored by JosS | Site spanish-hackers.com

Loki CMS version 0.3.4 create local file inclusion exploit that uses admin.php.

tags | exploit, local, php, file inclusion
SHA-256 | 26574cf08b78d7b4b1d9512248aa5c98ed4456f006a5e6c112bc386894965525
lokicms-check.txt
Posted Oct 13, 2008
Authored by JosS | Site spanish-hackers.com

Loki CMS versions 0.3.4 and below arbitrary check file exploit that uses index.php.

tags | exploit, arbitrary, php
SHA-256 | be67f43384df6c25801eed843addc07a10d6839ec99575f2f587cb95fb6e88a4
myphpindexer-download.txt
Posted Oct 13, 2008
Authored by JosS | Site spanish-hackers.com

My PHP Indexer version 1.0 suffers from a local file download vulnerability in index.php.

tags | exploit, local, php
SHA-256 | a1392038b1e69def84ab2acba7afbdd1e3dfc80d35f0416d38bd9ccccf451a21
res-sql.txt
Posted Oct 13, 2008
Authored by EgY Coders Team

Real Estate Scripts 2008 suffers from a remote SQL injection vulnerability in index.php.

tags | exploit, remote, php, sql injection
SHA-256 | c3c3c80087e75a4543a08e0a1f1ba1fcf778ccb8489bfe67266c46d6610d4aec
Secunia Security Advisory 32223
Posted Oct 13, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Hakxer has reported a vulnerability in Real Estates Classifieds, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | d1e1ae669ab60b067cd1c42e5c8729598dbb3c32da104fa0082af9f6b1f64702
Secunia Security Advisory 32235
Posted Oct 13, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - H!tm@N has discovered a vulnerability in the OwnBiblio component for Joomla!, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 9f93fd5ad33f87349be417eeffa47ecc85303dcc181e30ecf113ad809b9c225b
Secunia Security Advisory 32238
Posted Oct 13, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - LUPUS has reported a vulnerability in MunzurSoft Wep Portal W3, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | d346ed65832a35bdb36c7b8d9283cbb5a260227f01ce31a24bb7f3f696cf8d09
Secunia Security Advisory 32239
Posted Oct 13, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - H!tm@N has reported a vulnerability in the Mad4Joomla Mailforms component for Joomla!, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 6dacbc94a390eaec5f5777a9c45630078f28cbcf12d1711530fd1bdfb585b198
Secunia Security Advisory 32240
Posted Oct 13, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - H!tm@N has reported a vulnerability in the Ignite Gallery component for Joomla!, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | bb4b8abcb44d61651d54a3c0167b1eb07caa1328ce1ee2107c3667755a06b042
Secunia Security Advisory 32244
Posted Oct 13, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Crackers_Child has reported a vulnerability in Ayco Okul, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 26b9eb65ac85cb0d2d0e4893397ba5fce33755f0bd6073668c32fbee64a6b091
zomplog39-xss.txt
Posted Oct 13, 2008
Authored by swappie aka faithlove

Zomplog version 3.9 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 4e1a5194115849b5c655c7c3ae48ce7fe16f14e60f2285a128ec095590bc511b
web_vuln-en.txt
Posted Oct 13, 2008
Authored by Pepelux | Site enye-sec.org

Web Vulnerabilities To Gain Access To The System - A paper that goes into detail on the exploitation of local/remote file inclusion and blind SQL injection vulnerabilities.

tags | paper, remote, web, local, vulnerability, sql injection, file inclusion
SHA-256 | 6b544ae8700af98ccaefa3500f771e5ee3f3cec3278cfa6a9e4a1618c9d74d11
Page 1 of 2
Back12Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close