exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 43 RSS Feed

Files Date: 2008-04-01

0803-exploits.tgz
Posted Apr 1, 2008
Authored by Todd J. | Site packetstormsecurity.com

Packet Storm new exploits for March, 2008.

tags | exploit
SHA-256 | 613019d940cccc4c6f3c0679a25977a020d9fc860be6af46487822ef26987a6a
modjk-overflow.txt
Posted Apr 1, 2008
Authored by Heretic2

mod_jk2 version 2.0.2 for Apache 2.0 remote buffer overflow exploit for Win32 that binds a shell to port 9999.

tags | exploit, remote, overflow, shell
systems | windows
SHA-256 | ab526bea307a48d0b9d5da1a92ef9b01c745fe4c763a0d45b267a68fc1c716b6
neatweblog-sql.txt
Posted Apr 1, 2008
Authored by IRCRASH | Site ircrash.com

Neat Weblog version 0.2 remote SQL injection exploit that makes use of index.php.

tags | exploit, remote, php, sql injection
SHA-256 | 0ea9b9799b2f50dc85971790c1e0de6507d0ba896fd06c90362b9ed28b518a92
Secunia Security Advisory 29392
Posted Apr 1, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for multiple packages. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions and compromise a vulnerable system.

tags | advisory, vulnerability
systems | linux, suse
SHA-256 | 6d48b4721a8991c3fbce8d089aa9d625c50a82af5e424240af421e57c5966352
Secunia Security Advisory 29521
Posted Apr 1, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in CDS Invenio, which can be exploited by malicious users to manipulate certain data.

tags | advisory
SHA-256 | 2558810f5db12b2cd3a6597bdf545f2f1557b790119b11a7a6d9823b562f8667
Secunia Security Advisory 29565
Posted Apr 1, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Perlbal, which can be exploited by malicious people to disclose potentially sensitive information or cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
SHA-256 | 4b095a0a18c0e36f323256398ed950f4717ec4ead3d03901eacfce39a384cf11
Secunia Security Advisory 29591
Posted Apr 1, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - VMware has issued an update for VMware ESX Server. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 082e75ca0f0cbc49f5e74c91310cbceb3c3c0d752e1cf2b2404128e3030dc36f
Secunia Security Advisory 29602
Posted Apr 1, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in OpenSSH, which can be exploited by malicious, local users to bypass certain security restrictions.

tags | advisory, local
SHA-256 | c939edb871ccda0cb6acc94069f750c46dd0f6dce1dd79fdae897f7356545cc8
Secunia Security Advisory 29605
Posted Apr 1, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Tobias Klein has reported a vulnerability in avast! Home/Professional, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
SHA-256 | be63ab457f87882ed2896740855609bdc0a19ec3c9a62b26f1067e17e317b611
Secunia Security Advisory 29609
Posted Apr 1, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in OpenBSD, which can be exploited by malicious, local users to bypass certain security restrictions.

tags | advisory, local
systems | openbsd
SHA-256 | e84e3e3992b549106fee0acb94c3e0ff3558276919b36a1ec55b2eca3cf52531
Secunia Security Advisory 29616
Posted Apr 1, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for iceweasel. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, disclose potentially sensitive information, conduct cross-site scripting and phishing attacks, and potentially compromise a user's system.

tags | advisory, vulnerability, xss
systems | linux, debian
SHA-256 | 5df21e4eee244aa7ba97f7258c4c248a4883ad2e075b6928f2933a7dc5c7e507
iDEFENSE Security Advisory 2008-03-31.1
Posted Apr 1, 2008
Authored by iDefense Labs | Site idefense.com

iDefense Security Advisory 03.31.08 - Remote exploitation of an untrusted library loading vulnerability in Macrovision's InstallShield InstallScript One-Click Install ActiveX control allows remote attackers to execute code with the privileges of the currently logged in user. iDefense confirmed this vulnerability exists in version 12.0 of the Macrovision InstallShield InstallScript One-Click Install ActiveX Control. Previous versions of the control are reported to be vulnerable to variations of this attack. Previous versions are known to use different CLSIDs.

tags | advisory, remote, activex
advisories | CVE-2007-5661
SHA-256 | 43de1fe2a2db8c9142cfcc62930c4a7e8244c9a74ebd86de23f0101133587ac1
proxystrike-v1.0.zip
Posted Apr 1, 2008
Authored by Carlos del Ojo Elias | Site edge-security.com

ProxyStrike is an active Web Application Proxy and is a tool designed to find vulnerabilities while browsing an application. It current has SQL injection and cross site scripting modules. This is the Windows version. Written in Python.

tags | tool, web, scanner, vulnerability, xss, sql injection, python
systems | windows, unix
SHA-256 | da770b4014ebd251157864ec374ad5b81d1ca7e37682b8813de1fb246c9ae242
proxystrike-v1.0.tar.gz
Posted Apr 1, 2008
Authored by Carlos del Ojo Elias | Site edge-security.com

ProxyStrike is an active Web Application Proxy and is a tool designed to find vulnerabilities while browsing an application. It current has SQL injection and cross site scripting modules. This is the Linux / Mac OSX version. Written in Python.

tags | tool, web, scanner, vulnerability, xss, sql injection, python
systems | linux, unix, apple
SHA-256 | 6911c85050d2dd1521c1b8f2b5f0a8a6bbc3fe11c7e60d55551550068026cde6
2xthinclient-traverse.txt
Posted Apr 1, 2008
Authored by Luigi Auriemma | Site aluigi.org

2X ThinClientServer versions 5.0_sp1-r3497 and below along with TFTPd.exe version 3.2.0.0 and below suffer from a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | 9b3253a8b61ef8c70cf1336d5c6c53496e12ab3bf584561690dfbd9cbdf162f7
PowerDNS_recursor_DNS_Cache_Poisoning.pdf
Posted Apr 1, 2008
Authored by Amit Klein | Site trusteer.com

PowerDNS Recursor versions 3.0 through 3.1.4 suffer form a DNS cache poisoning vulnerability.

tags | paper
SHA-256 | 8824d748ef2aaa9c0293a00da6abf363dbb510dbe88dfd97be4f16a4f3450ecf
vbseo-xss.txt
Posted Apr 1, 2008
Authored by Liz0ziM, ErNe, KraL, Ekin0x

VbSeo suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 6b6f21c6f611e76839a26986641ae360ca4bb37a26527b04d985626991e61e5c
IntroToBufferOverflows.txt
Posted Apr 1, 2008
Authored by IMC Tullywacker | Site Insanemasterminds.com

Intro to Buffer Overflows - A whitepaper demonstrating a buffer overflow on a Windows XP SP1 box using Backtrack 3 Beta.

tags | paper, overflow
systems | windows
SHA-256 | 7eee601d3a61af58f41eee3b233daabac27cbb59bda1011826f01dafdda38592
TKADV2008-002.txt
Posted Apr 1, 2008
Authored by Tobias Klein | Site trapkit.de

The kernel driver aavmker4.sys as shipped with avast! version 4.7 contains a vulnerability in the code that handles IOCTL requests. Exploitation of this vulnerability can result in denial of service or arbitrary code execution.

tags | advisory, denial of service, arbitrary, kernel, code execution
SHA-256 | d52a527b0d71922fcc4398ba23f1b4b1ef9a7c3ad9909acb482c607ce166b6e2
jscript.txt
Posted Apr 1, 2008
Authored by pentest | Site security-sh3ll.com

This is an interesting little tool that converts shellcode to javascript.

tags | javascript, shellcode
SHA-256 | 2773c8a2bf2462f587b76f904a1581da07ced3128718f697bfaead1dadb9de63
ScanPort.c
Posted Apr 1, 2008
Authored by Simpp

Simple and compact TCP port scanner.

tags | tool, scanner, tcp
systems | unix
SHA-256 | fd6d5f859bbcc997a354b1cb06ac667dcbd4040bcf8153ee871ddfd39c502986
sitekiosk-pwn.txt
Posted Apr 1, 2008
Authored by katharsis | Site katharsis.x2.to

Proviso SiteKiosk suffers from a bypass flaw that allows for file downloads.

tags | exploit
SHA-256 | 814b4daa279162f1ce3648beaa054279e4bbd422f822554387855f50615aed62
mxbbmxblogs-rfi.txt
Posted Apr 1, 2008
Authored by bd0rk | Site soh-crew.it.tt

mxBB module mx_blogs version 2.0.0-beta remote file inclusion exploit.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 27657f3dac1a3a03b450e42e044d2befa24fe921d63baa2d5956852946151c2e
woltlabbbjgs-sql.txt
Posted Apr 1, 2008
Authored by h0yt3r

The Woltlab Burning Board Add-on JGS-Treffen suffers from a SQL injection vulnerability.

tags | exploit, sql injection
SHA-256 | aaa0dce3c9d99f1879094d84fb192af4375174d8a41005901aefa552bdf73bf1
wpdownload-sql.txt
Posted Apr 1, 2008
Authored by BL4CK

The Wordpress Download plugin suffers from a SQL injection vulnerability.

tags | exploit, sql injection
SHA-256 | 5cd86be39af293e12c8a4916cea19a99cbcfe29d7446e520c78542bb4863e2ff
Page 1 of 2
Back12Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close