exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 49 RSS Feed

Files Date: 2008-01-07

Secunia Security Advisory 28189
Posted Jan 7, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - GeFORC3 has reported a vulnerability in RapidShare Database, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 13d62bc3f361b07d84fbfdbcb17f828a8e8f0b1ab11fcf7d9cb675394484c8a6
Secunia Security Advisory 28292
Posted Jan 7, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Xerox ESS/Network Controller, which can be exploited by malicious users or malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
SHA-256 | 02191091eac90dc746e608be88af7a304077cbe0646f0261efd8972444c4bc20
Secunia Security Advisory 28305
Posted Jan 7, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - KiNgOfThEwOrLd has reported a vulnerability in SineCMS, which can be exploited by malicious people to disclose sensitive information or to compromise a vulnerable system.

tags | advisory
SHA-256 | 4556e77c38bd317623856f908be27aa37799010b88d2d5304a46ec03a00cf103
Secunia Security Advisory 28328
Posted Jan 7, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - hadihadi and S.W.A.T. have discovered some vulnerabilities in NetRisk, which can be exploited by malicious people to conduct SQL injection attacks and to compromise a vulnerable system.

tags | advisory, vulnerability, sql injection
SHA-256 | f799457cba7e80b7b9a9d5a13d1af366be12a2a8449116a75f2e24c65848e3b9
Secunia Security Advisory 28330
Posted Jan 7, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Eugene Minaev has discovered a vulnerability in Strawberry, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 83a5310a057eeed7c3886bccdedc8c33a9d95f8a69d9c40f6352b4d43ca40d45
apache-mod-rewrite.rb.txt
Posted Jan 7, 2008
Authored by Marcin Kozlowski

Apache mod_rewrite escape_absolute_uri() off-by-one buffer overflow Metasploit exploit module. This affects Apache versions 1.3.28 through 1.3.36, 2.0.46 through 2.0.58, and 2.2.1 through 2.2.2.

tags | exploit, overflow
advisories | CVE-2006-3747
SHA-256 | 503139768b0cda278959c2bc8df18f7cb0aee2077db8a28468990531d48c3000
Secunia Security Advisory 28298
Posted Jan 7, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sun has acknowledged a vulnerability in Solaris, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise an application using the FreeType library.

tags | advisory, denial of service
systems | solaris
SHA-256 | 6a74711b0efe708765ccd148f999a64e7184f660178dd06e1e6f634ae6b58303
iDEFENSE Security Advisory 2008-01-07.1
Posted Jan 7, 2008
Authored by iDefense Labs, Stephen Fewer | Site idefense.com

iDefense Security Advisory 01.07.08 - Local exploitation of a privilege escalation vulnerability in Motorola Inc.'s netOctopus could allow an attacker to execute arbitrary code in kernel context. iDefense has confirmed the existence of this vulnerability in version 5.0.0.115 of the nantsys.sys driver as included with netOctopus version 5.1.2 build 1011. Previous versions may also be affected.

tags | advisory, arbitrary, kernel, local
advisories | CVE-2007-5761
SHA-256 | 8c1d1e8dc48c46909722b81670b93c2a3e9c3a8a5803f30b9a78e760c2b94d3e
Secunia Security Advisory 28357
Posted Jan 7, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in Aruba Mobility Controller, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | e2585a381d38194f2d978cc181ecdcc6ebbe31775375e1e5caa8d019ebbe620e
Core Security Technologies Advisory 2007.1106
Posted Jan 7, 2008
Authored by Core Security Technologies, Alfredo Ortega, Oren Isacson | Site coresecurity.com

Core Security Technologies Advisory - The vdccm daemon from SynCE version 0.92 is susceptible to a remote command injection vulnerability. Proof of concept code included.

tags | exploit, remote, proof of concept
SHA-256 | 686f2cf42763970f2eb071d3ad0b8654108f0faa3334bc4f61de9ff5409255cc
PWDumpX11.zip
Posted Jan 7, 2008
Authored by Reed Arvin | Site reedarvin.thearvins.com

PWDumpX version 1.1 allows a user with administrative privileges to retrieve the domain password cache, password hashes and LSA secrets from a Windows system. This tool can be used on the local system or on one or more remote systems. If an input list of remote systems is supplied, PWDumpX will attempt to obtain the domain password cache, the password hashes and the LSA secrets from each remote Windows system in a multi-threaded fashion (up to 64 systems simultaneously). The domain password cache, password hashes and LSA secrets from remote Windows systems are encrypted as they are transfered over the network. No data is sent over the network in clear text. This tool is a completely re-written version of CacheDump, PWDump3e and LSADump2 which integrates suggestions/bug fixes for PWDump3e and LSADump2 found on various web sites, etc. Source code included.

tags | remote, web, local, cracker
systems | windows
SHA-256 | 21b007f246e12a73e716385390d30923a19d359c42aec9b012653ebcd27303f1
PWDumpX.zip
Posted Jan 7, 2008
Authored by Reed Arvin | Site reedarvin.thearvins.com

The PWDumpX tool allows a user with administrative privileges to retrieve the encrypted password hashes and LSA secrets from a Windows system. This tool can be used on the local system or on one or more remote systems.

tags | remote, local, cracker
systems | windows
SHA-256 | 78b4ff5e1bbac4a8bde265705a5c6e36b41bb2a9170f8f060a09bb1552549af2
ThumbStego-0.1.0.zip
Posted Jan 7, 2008
Authored by Shane Pope | Site sourceforge.net

Thumbnail steganography creates a thumbnail from a source image and stores data in it by altering the color channels. To decipher the data, a new thumbnail is made from the original image and the differences between the pixels are calculated. This is intended to increase complexity of automated deciphering of images containing extra (steganographied) data. It requires both the original and the thumbnail to decipher. The original works like a key to unlock the thumbnail.

tags | encryption, steganography
SHA-256 | f3845a5cdf01a87f7ef86b7326e8f66fc02245079f6e4398dbe07ec9cfa4442e
PWDumpX14.zip
Posted Jan 7, 2008
Authored by Reed Arvin | Site reedarvin.thearvins.com

PWDumpX allows a user with administrative privileges to retrieve the domain password cache, password hashes and LSA secrets from a Windows system. This tool can be used on the local system or on one or more remote systems. If an input list of remote systems is supplied, PWDumpX will attempt to obtain the domain password cache, the password hashes and the LSA secrets from each remote Windows system in a multi-threaded fashion (up to 64 systems simultaneously). The domain password cache, password hashes and LSA secrets from remote Windows systems are encrypted as they are transfered over the network. No data is sent over the network in clear text. This tool is a completely re-written version of CacheDump, PWDump3e and LSADump2 which integrates suggestions/bug fixes for PWDump3e and LSADump2 found on various web sites, etc. Source code included.

Changes: Now dumps domain password cache (if available), LSA secrets, password hashes, and password history hashes (if available).
tags | remote, web, local, cracker
systems | windows
SHA-256 | 38d449a11af56e57d1ca2b8bd6d718ffb60c28e19d2f99481dbeb583c28a1e0d
layerone2008-cfp.txt
Posted Jan 7, 2008
Site layerone.info

LayerOne 2008 Information Technology Conference Call for Papers - The fifth annual LayerOne information technology conference is now accepting submissions for topic and speaker selection. This conference will be held May 17 and 18, 2008 in Los Angeles, California.

tags | paper, conference
SHA-256 | 7d5ea1a08151759e1609b9e0cf4ea775174564e94335ed9bacd23489020ce9bb
Debian Linux Security Advisory 1454-1
Posted Jan 7, 2008
Authored by Debian | Site debian.org

Debian Security Advisory 1454-1 - Greg MacManus discovered an integer overflow in the font handling of libfreetype, a FreeType 2 font engine, which might lead to denial of service or possibly the execution of arbitrary code if a user is tricked into opening a malformed font.

tags | advisory, denial of service, overflow, arbitrary
systems | linux, debian
advisories | CVE-2007-1351
SHA-256 | 3c6caa2944e02ca65c3e653bcaf92d5dda00f4c2edf646e7e2d0742c711ed1c0
Debian Linux Security Advisory 1453-1
Posted Jan 7, 2008
Authored by Debian | Site debian.org

Debian Security Advisory 1453-1 - Several remote vulnerabilities have been discovered in the Tomcat servlet and JSP engine.

tags | advisory, remote, vulnerability
systems | linux, debian
advisories | CVE-2007-3382, CVE-2007-3385, CVE-2007-5461
SHA-256 | f0058027bd81c3df7af449fda82679ec96ba240bf2e3ddb5747c63b2d40e77c2
mds-disclose.txt
Posted Jan 7, 2008
Authored by p4imi0

Million Dollar Script version 2.0.14 suffers from a remote file disclosure vulnerability.

tags | exploit, remote, info disclosure
SHA-256 | b6de7988bd2bbe4a2e566fdd0f290d08723a6161610f767d9c7969418aaaa0ba
postgresql-multi.txt
Posted Jan 7, 2008
Site postgresql.org

The PostgreSQL Global Development Group has released updated versions which patch five security vulnerabilities. These releases update all current PostgreSQL versions, including 8.2, 8.1, 8.0, 7.4 and 7.3.

tags | advisory, vulnerability
SHA-256 | fe9ceda5324b25e5aca3e65f7f3906c213a45895c6e151fe1c884caa9627e579
ksdispatch_plugin.zip
Posted Jan 7, 2008
Authored by Ruben Santamarta | Site reversemode.com

K-Plugin for Kartoffel that exploits WDM Audio Drivers.

tags | exploit
SHA-256 | 042ebae1315d13a3c95adcddabacc43987a422b3e6eef43023174235e2f8c7bb
paper-wdm.pdf
Posted Jan 7, 2008
Authored by Ruben Santamarta | Site reversemode.com

Whitepaper called Exploiting WDM Audio Drivers. This paper explains an attack vector inherent to certain WDM audio drivers running on Windows Vista, XP, 2000 and 2003. Successful exploitation could lead to local escalation of privileges.

tags | paper, local
systems | windows
SHA-256 | 9cbca45b4be7edc8ff733bf3de9195c2f60ed5817c5be356604c988f2adb213f
socialurl-xss.txt
Posted Jan 7, 2008
Authored by Josh Morin

SocialURL suffers from a cross site scripting vulnerability during the login sequence.

tags | exploit, xss
SHA-256 | fc4567720a2a7d2f5aa14eaf65bc1ebafedfc347117e13168887a7e28cd8ae3c
tutos-exec.txt
Posted Jan 7, 2008
Authored by H-T Team | Site no-hack.fr

TUTOS version 1.3 is susceptible to a remote command execution vulnerability leveraging cmd.php.

tags | exploit, remote, php
SHA-256 | 8da0cb82ac555ee1877c9557497db786d9954fedff7136778014d4115f1a2f49
Secunia Security Advisory 28257
Posted Jan 7, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability with an unknown impact has been reported in IBM AIX.

tags | advisory
systems | aix
SHA-256 | 820d83e59275435957e184648880a015291be416657f39667fd59cd9cba8a3a8
Secunia Security Advisory 28355
Posted Jan 7, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Crackers_Child has discovered a vulnerability in the samPHPweb template included in SAM Broadcaster, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 85632192a3d428943de9cf2b35433da1fd04158443bd65885e6c1736c8caff2d
Page 1 of 2
Back12Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close