exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 22 of 22 RSS Feed

Files Date: 2008-10-03 to 2008-10-04

ampjuke-sql.txt
Posted Oct 3, 2008
Authored by S_DLA_S Th3 1r4Q1 Cr4Ck3r | Site sdlas-iq.co.cc

AmpJuke version 0.7.5 suffers from a remote SQL injection vulnerability in index.php.

tags | exploit, remote, php, sql injection
SHA-256 | 4eda65f53d67a572474e8ca9adb9d46023f2183e68de6551f5c2c0b92f31413f
Secunia Security Advisory 32046
Posted Oct 3, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Frank Breedijk has reported a vulnerability in AutoNessus, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | da9a9be00aac1b2b364c183c270cec34f282a7bbfa5a7366289010df3d7adbcf
Secunia Security Advisory 32124
Posted Oct 3, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Eugene Teo has reported a vulnerability in the Linux Kernel, which can be exploited by malicious, local users in a VMI guest to cause a DoS (Denial of Service) and potentially gain escalated privileges.

tags | advisory, denial of service, kernel, local
systems | linux
SHA-256 | a5f382b0be62f7256463f69ebeca1edac448ebff14560f627513199a1061051f
ShellCodeForBeginners.pdf
Posted Oct 3, 2008
Authored by Beenu Arora | Site beenuarora.com

ShellCode For Beginners - A short whitepaper discussing what defines shellcode and simple fundamentals surrounding its use.

tags | paper, shellcode
SHA-256 | 1f3f95250b72edf4c8401066283dbc4fcebcc43a81a3faabe29da879973ffeba
secunia-trendtraverse.txt
Posted Oct 3, 2008
Site secunia.com

Secunia Research has discovered a vulnerability in Trend Micro OfficeScan, which can be exploited by malicious people to gain knowledge of sensitive information. The vulnerability is caused by an input validation error in TmListen.exe when a client is configured to be an update agent. This can be exploited to retrieve arbitrary files from the system via directory traversal attacks. Affected is Trend Micro OfficeScan 7.3 patch 4 build 1367.

tags | advisory, arbitrary, file inclusion
advisories | CVE-2008-2439
SHA-256 | a9715fb85128d4752fbdf96f4edc916287aef1ff60c79cffb13367ba9453c50b
vba32-poc.tgz
Posted Oct 3, 2008
Authored by LiquidWorm | Site zeroscience.mk

VBA32 Personal Antivirus version 3.12.8.x suffers from a malformed archive denial of service vulnerability. Proof of concept exploit enclosed.

tags | exploit, denial of service, proof of concept
SHA-256 | ad2c38a912c99a79a854b18b6764c1f6bc99ba62e2dbefd7387e91832915a02f
Gdi.tgz
Posted Oct 3, 2008
Authored by Ac!dDrop

This archive contains two EMR_COLORMATCHTOTARGETW related stack buffer overflow exploits. calc.zip executes calc.exe and IE.zip and localhost.zip connect back to port 230.

tags | exploit, overflow
SHA-256 | 1f1b22c2fe28d57b357a34bc7bd70bb858bae3b5bb9f825e50ac9f26721d1929
OpenNHRP NBMA Next Hop Resolution 0.8
Posted Oct 3, 2008
Authored by Timo Teras | Site sourceforge.net

OpenNHRP implements the NBMA Next Hop Resolution Protocol (as defined in RFC 2332). It makes it possible to create a dynamic multipoint VPN Linux router using NHRP, GRE, and IPsec. It aims to be Cisco DMVPN compatible.

Changes: Fixed a memory leak, turned down verbosity on logging, some new admin commands, and more.
tags | encryption, protocol
systems | cisco, linux
SHA-256 | a0664c0298c1e686e526dd0d3f11cf61ce4242c9986e9c3d1acd9cc5af05fc92
servu72-upload.txt
Posted Oct 3, 2008
Authored by dmnt

Serv-U version 7.2.0.1 suffers from a remote FTP file replacement vulnerability.

tags | exploit, remote, file upload
SHA-256 | c0a03a640ec788873a527e1b51ec531cab940531c7f295895fc5390cb9eddc54
servu72-dos.txt
Posted Oct 3, 2008
Authored by dmnt

Serv-U version 7.2.0.1 suffers from a remote denial of service vulnerability.

tags | exploit, remote, denial of service
SHA-256 | fd018bc2b0de9c357b20598278f54fb94e9d84b8ef3c5c862ad4b92c05aefcf3
mirc-overflow.txt
Posted Oct 3, 2008
Authored by securfrog

MIRC version 6.34 remote buffer overflow proof of concept exploit.

tags | exploit, remote, overflow, proof of concept
SHA-256 | 2aee81b6b2e35e94a53916e7591eb6290eb3830fdcf79a436a0191ae3bea7cbd
openx-blindsql.txt
Posted Oct 3, 2008
Authored by d00m3r4ng

OpenX version 2.6 remote blind SQL injection exploit that leverages ac.php.

tags | exploit, remote, php, sql injection
SHA-256 | 6ab8e15ffec0d054d0ee4075768a1cf41e58026a97ce5aea083ca04cae496a72
adaptcms-blindsql.txt
Posted Oct 3, 2008
Authored by StAkeR

AdaptCMS Lite versions 1.3 and below blind SQL injection exploit.

tags | exploit, sql injection
SHA-256 | 0796714b58425cf943ab227267fe960898b56e60e0555e8a7a2cdb6fecb7ae96
ipreg-blindsql.txt
Posted Oct 3, 2008
Authored by StAkeR

IP Reg versions 0.4 and below blind SQL injection exploit that leverages login.php.

tags | exploit, php, sql injection
SHA-256 | 6b31c754faa068a01a99d9c7130862809419f16a62ba8b062ddf7777a56e6ebe
fpe-sql.txt
Posted Oct 3, 2008
Authored by Hussin X | Site tryag.cc

Full PHP Emlak Script suffers from a remote SQL injection vulnerability in arsaprint.php.

tags | exploit, remote, php, sql injection
SHA-256 | b54a7fca3820d71b0de8735bd11730fb46ba9594f48f2a9ec7f19b488f5d17ec
Ubuntu Security Notice 650-1
Posted Oct 3, 2008
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 650-1 - A buffer overflow was discovered in cpio. If a user were tricked into opening a crafted cpio archive, an attacker could cause a denial of service via application crash, or possibly execute code with the privileges of the user invoking the program.

tags | advisory, denial of service, overflow
systems | linux, ubuntu
advisories | CVE-2007-4476
SHA-256 | cc2e0d30e067041417172ae7fe859eda11e0ad3a215aaabcfa689d1c421a6c78
Secunia Security Advisory 31820
Posted Oct 3, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been discovered in MySQL Quick Admin, which can be exploited by malicious people to disclose sensitive information.

tags | advisory, vulnerability
SHA-256 | 6d1c7cb8e88eefee4ae2934df7b15f71882b93ef80766031cfa9431867c9fa67
Secunia Security Advisory 32081
Posted Oct 3, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - teuquooch1seero at hushmail dot com has reported a vulnerability in Celoxis, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 0dc57d1876d40b479c6f61e002aa0fb71b3a730f4501f4a902ce2add3fd864d4
Secunia Security Advisory 32091
Posted Oct 3, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for wireshark. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | linux, redhat
SHA-256 | 86bafbfaf9e3ff3fa4b56d023eadaacada1ed072ef31387dde869fa732e87c3c
Secunia Security Advisory 32097
Posted Oct 3, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Trend Micro OfficeScan, which can be exploited by malicious people to disclose sensitive information, cause a DoS (Denial of Service), or compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
SHA-256 | 52c31d6958e04598f8e0797a9bcf769d019e5d598ddd4407a5b3c8c99163c689
Secunia Security Advisory 32104
Posted Oct 3, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for the kernel. This fixes some vulnerabilities, which can be exploited by malicious, local users to disclose potentially sensitive information and cause a DoS (Denial of Service), and by malicious people to compromise a vulnerable system.

tags | advisory, denial of service, kernel, local, vulnerability
systems | linux, suse
SHA-256 | 3339d9f7f325dc39206a446cd2fc7d24ceb2357e8240b0c99f9123cab38ad036
Secunia Security Advisory 32110
Posted Oct 3, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for openssh-server. This fixes a weakness, which can be exploited by malicious, local users to bypass certain security restrictions.

tags | advisory, local
systems | linux, ubuntu
SHA-256 | 9876f0a868e1ad05dd2cc4863478f034e924259e76f3929ca48705caafb16bec
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close