exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 50 RSS Feed

Files Date: 2006-03-23 to 2006-03-24

borders.txt
Posted Mar 23, 2006
Authored by Headz Shotz | Site hs.elimate.co.uk

bordersstores.com suffers from XSS in search.jsp.

tags | advisory
SHA-256 | 6726791820184fd9fa2280b8797254349d0ad602f3934508885682ae85f411ae
gov-xss.txt
Posted Mar 23, 2006
Authored by Headz Shotz | Site hs.elimate.co.uk

Several US Government sites, including ic3.gov and house.gov suffer from XSS vulnerabilities.

tags | advisory, vulnerability, xss
SHA-256 | a9daa06c8ab33ad1895a01cf09bbdbcbf4a3d36ea4a4bd058ff4f832135d5f6d
bomberclone-0.11.6.2.c
Posted Mar 23, 2006
Authored by esca zoo

Bomberclone versions less than 0.11.6.2 remote exploit.

tags | exploit, remote
SHA-256 | de7ebf09bae8d3533c40c6d55892e6d9cc4b1781559d10601d5383d129026681
CT22-03-2006.txt
Posted Mar 23, 2006
Site computerterrorism.com

Computer Terrorism (UK) :: Incident Response Centre :: Security Advisory :: CT22-03-2006 :: Microsoft Internet Explorer (mshtml.dll) - Remote Code Execution

tags | advisory, remote, code execution
SHA-256 | a358559835b66bd7f11646de7b1079018a6c6a2b80441124809359a797721011
EV0094.txt
Posted Mar 23, 2006
Authored by Aliaksandr Hartsuyeu | Site evuln.com

eVuln ID: EV0094 - PHP SimpleNEWS, PHP SimpleNEWS MySQL suffer from a weak authentication mechanism.

tags | advisory, php
SHA-256 | b19e0ccb3a4fc19fac1dc1984dfdb02af986d5df37585bb0ca39b1f0ff46b6fa
php_live-3.0.txt
Posted Mar 23, 2006
Authored by kspecial

PHP Live! 3.0 suffers from XSS in status_image.php.

tags | advisory, php
SHA-256 | 34e8bfbf37cc8f4b08ab9bbb61900ada026b59bdb97d451be810b4b8cc75abc3
WinHKI1.6x.txt
Posted Mar 23, 2006
Authored by Hamid Network Security Team | Site hamid.ir

WinHKI 1.6x Archive Extraction Directory traversal: Due to an input validation error when extracting files compressed with certain formats, it is possible to have files extracted to arbitrary locations on the filesystem.

tags | advisory, arbitrary
SHA-256 | acbbfa4624f22737b64996b5e1a76b98c6f58d897fb2102c680182f1b5d35763
cutenews1.4.1.txt
Posted Mar 23, 2006
Authored by Hamid Network Security Team | Site hamid.ir

cutenews 1.4.1 allows any user to access arbitrary files due to lack of sanitization of the "archive" parameter.

tags | advisory, arbitrary
SHA-256 | 580b43b3832494e683fa4077eddfe17d7a2d38bf9778028fe8bed5571bda0330
w3wp-dos.txt
Posted Mar 23, 2006
Authored by Debasis Mohanty | Site hackingspirits.com

It is possible to DOS the IIS Worker Process (w3wp) due to improper reference of STA COM components in ASP.NET. POC Exploit included.

tags | exploit, denial of service, asp
SHA-256 | 08835ab51fb255d6fe3eb1745d1e532f650748175084efc2259cda056de558dc
Mini-Nuke.1.8.2.txt
Posted Mar 23, 2006
Authored by Moroccan Security

Mini-Nuke versions less than or equal to 1.8.2 suffer from multiple sql injection vulnerabilities.

tags | advisory, vulnerability, sql injection
SHA-256 | e946a381b5f09a41cdb0918cee4c675e9350f2ea376baca0fd531418b2957bf0
ASPPortal.pl.txt
Posted Mar 23, 2006
Authored by Mustafa Can Bjorn | Site nukedx.com

ASPPortal versions less than 3.1.1 Multiple Remote SQL Injection exploit.

tags | exploit, remote, sql injection
SHA-256 | 70d81b25b7f53ba1155e66fe5919e491a9aa6a6d6dcd3aae4f8746a9eeddd3cd
99articles.txt
Posted Mar 23, 2006
Authored by Andries Bruinsma | Site PatrioticHackers.com

Free Articles from 99articles.com suffers from a remote command execution vulnerability.

tags | advisory, remote
SHA-256 | f1e6d5fc9b9b74dd1b7f17f05ff0d4cbedc98a488e598c576347b2b78d5bafc3
F5Firepass4100.txt
Posted Mar 23, 2006
Authored by ILION Research Labs

5 Firepass 4100 SSL VPN v. 5.4.2 suffers from XSS in in my.support.php3. This allows an attacker to submit a crafted link to users of the vulnerable Web application in order to abuse their trust and steal their authentication credentials or hijack their sessions.

tags | advisory, web
SHA-256 | ff4fd9822a3a5c3918ff9217ff53b087caf92737953fcd30bb6f7094615f0e29
Core Security Technologies Advisory 2006.0124
Posted Mar 23, 2006
Authored by Core Security Technologies | Site coresecurity.com

Core Security Technologies Advisory ID: CORE-2006-0124 - Cross-Site Scripting in Verisigns haydn.exe CGI script: A cross-site scripting vulnerability found in Verisigns haydn.exe could allow an attacker to execute scripting code in the machine of a user within the user's web browser with the same trust level as that of the site hosting the haydn.exe file (this is usually a trusted site, since it is used to enroll, revoke or validate certificates).

tags | advisory, web, cgi, xss
SHA-256 | 63b5e84abe37e8304236a3e800985b05671f3353ac846c47ccff0b26cd403452
NoahsClassified.txt
Posted Mar 23, 2006
Authored by Raphael Huck | Site zone14.free.fr

PhpOutsourcing Noah's Classified 1.3 and below suffers from XSS and full path disclosure vulnerabilities.

tags | advisory, vulnerability
SHA-256 | 8a6bfe7a4bb5e8bfc061e5a2925ff874677a048c44500b4382d59da47e19b848
MS-Commerce.txt
Posted Mar 23, 2006
Authored by Dimitri van de Giessen

It is possible to bypass authentication in Microsoft Commerce Server pre SP2

tags | advisory
SHA-256 | 896846e873ec1a1bb9b4e70032331be7942f1231cfd48459e53fb076624b6f45
FreeBSD-SA-06-13.sendmail.txt
Posted Mar 23, 2006
Site freebsd.org

FreeBSD-SA-06:13.sendmail - A remote attacker may be able to execute arbitrary code with the privileges of the user running sendmail, typically root.

tags | remote, arbitrary, root
systems | freebsd
SHA-256 | a91ef9dc623f5dd7661ec2d7d573f0c4dd33cb89772efd81f6e9c2126ba5f627
FreeBSD-SA-06-12.opie.txt
Posted Mar 23, 2006
Site freebsd.org

FreeBSD-SA-06:12.opie - The opiepasswd(1) program uses getlogin(2) to identify the user calling opiepasswd(1). In some circumstances getlogin(2) will return "root" even when running as an unprivileged user. This causes opiepasswd(1) to allow an unpriviled user to configure OPIE authentication for the root user.

tags | root
systems | freebsd
SHA-256 | b8dfcfe244434389f0f712b62834e4493fac0d0f1ef27d66baf50780b738dc15
FreeBSD-SA-06-11.ipsec.txt
Posted Mar 23, 2006
Site freebsd.org

FreeBSD-SA-06:11.ipsec - An attacker able to to intercept IPSec packets can replay them. If higher level protocols which do not provide any protection against packet replays (e.g., UDP) are used, this may have a variety of effects.

tags | udp, protocol
systems | freebsd
SHA-256 | cd1b96393a9af7c1a0e233745283261ae1a557fc3a12d765fbfe2e36128ea12b
Debian Linux Security Advisory 1013-1
Posted Mar 23, 2006
Authored by Debian | Site debian.org

Debian Security Advisory DSA 1013-1 - Will Aoki discovered that snmptrapfmt, a configurable snmp trap handler daemon for snmpd, does not prevent overwriting existing files when writing to a temporary log file.

tags | advisory
systems | linux, debian
SHA-256 | 30b891b9dec55ccf116bf3552c53a248b8cdf8e86770eac44ad6e5bb00033232
Technical Cyber Security Alert 2006-81A
Posted Mar 23, 2006
Authored by US-CERT | Site us-cert.gov

Technical Cyber Security Alert TA06-081A - Sendmail contains a race condition caused by the improper handling of asynchronous signals. In particular, by forcing the SMTP server to have an I/O timeout at exactly the correct instant, an attacker may be able to execute arbitrary code with the privileges of the Sendmail process.

tags | advisory, arbitrary
SHA-256 | 2924cc76d4b0846acbf9b32a7c2f41d6311493dcad6c5af191f7f2f93aea9a03
Gentoo Linux Security Advisory 200603-21
Posted Mar 23, 2006
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200603-21 - ISS discovered that Sendmail is vulnerable to a race condition in the handling of asynchronous signals. Versions less than 8.13.6 are affected.

tags | advisory
systems | linux, gentoo
SHA-256 | 8d039311aef14bd3b04305d5e94ff56ec5af366873df68414e559f2d5effd79b
sqlbrute.py.txt
Posted Mar 23, 2006
Authored by Justin Clarke | Site justinclarke.com

SQLbrute is a multithreaded blind SQL injection exploitation tool (in Python) for enumerating information from Microsoft SQL and Oracle databases using error/no error techniques. It also supports time based error detection for SQL Server. Generates SQL injection exploit strings with no single quotes (unless you supply them), no + signs, and no || concatenations.

tags | tool, scanner, sql injection, python
systems | unix
SHA-256 | 06963ac0be9ca07e8b5e79f1a92a691966732aff5b9203d2e7d3e162bfd5e4ec
Secunia Security Advisory 18950
Posted Mar 23, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in Orion Application Server, which can be exploited by malicious people to disclose potentially sensitive information.

tags | advisory
SHA-256 | 5db8b04f52a982a83977dadff6342d0f5d337031cb83caa607d412c96373471b
Secunia Security Advisory 19309
Posted Mar 23, 2006
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in webcheck, which can be exploited by malicious people to conduct script insertion attacks.

tags | advisory
SHA-256 | e69676ec1984d0b79441815da80e405eac376d3407fee9d386aa924051c765c7
Page 1 of 2
Back12Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    69 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close