exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 39 RSS Feed

Files Date: 2008-10-28

voiper-0.07.tar.gz
Posted Oct 28, 2008
Authored by nnp | Site voiper.sourceforge.net

VoIPER is a VoIP security testing toolkit incorporating several VoIP fuzzers and auxiliary tools to assist the auditor. It can currently generate over 200,000 SIP tests and H.323/IAX modules are in development.

Changes: Added a bundle of new fuzzers. Rewrote the entire SIP backend. Added a 'voiper.config' file.
tags | fuzzer
SHA-256 | 61584b71e6024bab0481eed3fcbb25f14093e26c73b0f33995d9a57693310ece
hhwebsoccer-sql.txt
Posted Oct 28, 2008
Authored by d3v1l

H&H WebSoccer version 2.80 suffers from a remote SQL injection vulnerability in liga.php.

tags | exploit, remote, php, sql injection
SHA-256 | d9c28b6ff6cf7cc6a611c0b3b5b6d3f9c4379cb7d8e9ce30c6219507c6c86b6c
elkagroup-sql.txt
Posted Oct 28, 2008
Authored by G4N0K

Elkagroup Image Gallery version 1.0 suffers from a remote SQL injection vulnerability in view.php.

tags | exploit, remote, php, sql injection
SHA-256 | 5abc14f591b88d75236d35fd942c8c23ec43be387e8e9d754cbb41f562ae00e6
Mandriva Linux Security Advisory 2008-218
Posted Oct 28, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - A vulnerability was found in the Lynxcgi: URI handler that could allow an attacker to create a web page redirecting to a malicious URL that would execute arbitrary code as the user running Lynx, if they were using the non-default Advanced user mode. This update corrects these issues and, in addition, makes Lynx always prompt the user before loading a lynxcgi: URI. As well, the default lynx.cfg configuration file marks all lynxcgi: URIs as untrusted.

tags | advisory, web, arbitrary
systems | linux, mandriva
advisories | CVE-2008-4690
SHA-256 | 985b8d2bc9b5db4c673208074097d3cf3a736514dfd033339dc951e94fff711f
Mandriva Linux Security Advisory 2008-217
Posted Oct 28, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - A flaw was found in the way Lynx handled.mailcap and.mime.types configuration files. If these files were present in the current working directory, they would be loaded prior to similar files in the user's home directory. This could allow a local attacker to possibly execute arbitrary code as the user running Lynx, if they could convince the user to run Lynx in a directory under their control. A vulnerability was found in the Lynxcgi: URI handler that could allow an attacker to create a web page redirecting to a malicious URL that would execute arbitrary code as the user running Lynx, if they were using the non-default Advanced user mode. This update corrects these issues and, in addition, makes Lynx always prompt the user before loading a lynxcgi: URI. As well, the default lynx.cfg configuration file marks all lynxcgi: URIs as untrusted.

tags | advisory, web, arbitrary, local
systems | linux, mandriva
advisories | CVE-2006-7234, CVE-2008-4690
SHA-256 | 6e7e3bc6097f70cd80a0acb4394a11415cfa5fa3bb16fc1b29d35794b961993a
Secunia Security Advisory 32401
Posted Oct 28, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - NetBSD has acknowledged a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | netbsd
SHA-256 | 82aa7461866bcc22269835cd41299260218222bdef69785794f9410b296aad19
Secunia Security Advisory 32395
Posted Oct 28, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability with an unknown impact has been reported in Novell eDirectory.

tags | advisory
SHA-256 | c3d3f869a6ec99b509e037d78d538b861e547a26eb805a66c1265982014c624b
Secunia Security Advisory 32409
Posted Oct 28, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Pouya_Server has reported some security issues in multiple Ocean12 products, which can be exploited by malicious people to disclose potentially sensitive information.

tags | advisory
SHA-256 | 0fc965d1fdbebeeb205219443aa4da7db43668ce3a2407b95738f4f31d5bbd85
Secunia Security Advisory 32427
Posted Oct 28, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - X0r has discovered a vulnerability in tlAds, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | d4f3b6445f320f6657c4eeee230655215622166ce7a1e08ab8e3e3bd38089603
Secunia Security Advisory 32431
Posted Oct 28, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - ExSploiters has discovered a vulnerability in All In One Control Panel (AIOCP), which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 7743d41834e713078dbdce2c5e3390953aafc36263c6097b371424be0467ae6e
Secunia Security Advisory 32438
Posted Oct 28, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in WebGUI, which can be exploited by malicious users to compromise a vulnerable system.

tags | advisory
SHA-256 | efdb8045ebd605a0651270a6294e5d11a9142973e944d36e7816da235b986f9d
Secunia Security Advisory 32439
Posted Oct 28, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in phplist, which potentially can be exploited by malicious users to compromise a vulnerable system.

tags | advisory
SHA-256 | 3c8e131c42abe57ecc716d156f1e4d8b49a00b74ee014e9eb6fb7d8922b1d616
Secunia Security Advisory 32449
Posted Oct 28, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Hadi Kiamarsi has discovered a vulnerability in phpMyAdmin, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 795acfcf9c790a8b6a97efd7f607ed52ed29c29ab7d7ccf16c0935823189b9ac
Secunia Security Advisory 32455
Posted Oct 28, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Blaze Media Pro, which can be exploited by malicious people to potentially compromise a user's system.

tags | advisory
SHA-256 | c7e4cc9898194c3ebda4a5a9f2014903cac82f7e8ba6f9d915cc59a1328f4f26
Secunia Security Advisory 32456
Posted Oct 28, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - n.runs AG has reported a vulnerability in Eaton MGE Network Shutdown Module, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 70b7b20a17f35e134ce5984ddf7ac88b40398bb2b9262419d798431f28d7089e
h2ocms-exec.txt
Posted Oct 28, 2008
Authored by StAkeR

H2O-CMS versions 3.4 and below remote command execution exploit that uses config.php.

tags | exploit, remote, php
SHA-256 | 476f162a875f46a265df73afb9f9ad40f4d636430039866c4a52d5c2d0e750d2
tlguestbook-insecure.txt
Posted Oct 28, 2008
Authored by X0r

TlGuestBook version 1.2 suffers from an insecure cookie handling vulnerability.

tags | exploit, insecure cookie handling
SHA-256 | ddd80cecff56ed51a164f1d77b0921baf28ba52ef9ca38978c4aa6c190eeed41
Secunia Security Advisory 32403
Posted Oct 28, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in libtirpc, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 49cd2cf62a86739476679acb1a4d4ac3a3660ca903105bdde0cccbfda4e1d5df
persianbb-sql.txt
Posted Oct 28, 2008
Authored by Hussin X | Site tryag.cc

PersianBB suffers from a remote SQL injection vulnerability in iranian_music.php.

tags | exploit, remote, php, sql injection
SHA-256 | dfcad956c33a178eed608bd579f3635aef32c3acc0e40057d132548577f52362
agares-rfi.txt
Posted Oct 28, 2008
Authored by DaRkLiFe

Agares ThemeSiteScript version 1.0 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 7d0ac2889360980373d3044b0655740be0ed4fe5f8005dfae33bdbc24e2209bd
myforum-insecure.txt
Posted Oct 28, 2008
Authored by Stack | Site v4-team.com

MyForum version 1.3 suffers from an insecure cookie handling vulnerability.

tags | exploit, insecure cookie handling
SHA-256 | 2894d3eae54e509a1025d1c3d60c5cd35fdfc46afeeb952080c809a32986c40d
phpnukeleague-xss.txt
Posted Oct 28, 2008
Authored by Ehsan_Hp200

The League module in PHP-Nuke suffers from a cross site scripting vulnerability.

tags | exploit, php, xss
SHA-256 | 9112c745dcf3bd81d5ba1b9a8beeae17f916f2d08f191e5ebcf2dc8b301f17e6
Ubuntu Security Notice 659-1
Posted Oct 28, 2008
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 659-1 - A massive amount of vulnerabilities related to the linux 2.6.15/22 kernels have been addressed and patched.

tags | advisory, kernel, vulnerability
systems | linux, ubuntu
advisories | CVE-2007-6716, CVE-2008-2372, CVE-2008-3276, CVE-2008-3525, CVE-2008-3526, CVE-2008-3534, CVE-2008-3535, CVE-2008-3792, CVE-2008-3915, CVE-2008-4113, CVE-2008-4445
SHA-256 | 624c24a6c8e809c114fc261003160921c84c9441a9e0b7253b052aab11fd50a5
Secunia Security Advisory 32411
Posted Oct 28, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Stefan Marin has discovered a vulnerability in TUGzip, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | c00ceb624ad5b998f574452c6f939c28e9ebbf6be4ea288a3c19adce07f19dea
Secunia Security Advisory 32432
Posted Oct 28, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in MyKtools, which can be exploited by malicious users to disclose sensitive information.

tags | advisory
SHA-256 | 0905318c8bd23f2141b19c873e7cedbe9a5dc2f511320294c0f4764ad6dc7c53
Page 1 of 2
Back12Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close