exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 27 RSS Feed

Files Date: 2010-01-26

Publique! Framework 2.3 SQL Injection
Posted Jan 26, 2010
Authored by Christophe de la Fuente, Gustavo Pimentel Bittencourt

Publique! Framework version 2.3 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | b5c3513c8949c151cfc05bdfe1cd8973445f1bbc09b6cebdbedbef350dbaac2d
Status2k Add Administrator
Posted Jan 26, 2010
Authored by alnjm33

Status2k remote add administrator exploit.

tags | exploit, remote, add administrator
SHA-256 | 0963d7f0df034726c05cd0e475a5566182a77d8c09f06d0ec2194f29055d6b8c
Digital Defense VRT Advisory 2009.27
Posted Jan 26, 2010
Authored by Digital Defense, r@b13$, Chris Graham, Rob Kraus

The login page of the F2L-3000 version 4.0.0 is vulnerable to SQL Injection. Exploitation of the vulnerability may allow attackers tobypass authentication and access sensitive information stored on the device.

tags | advisory, sql injection
SHA-256 | 0aa31d61a17571c0fb1db50bfa89f614672ac6e1de71f37e6ea906313453af1b
Cryptography - The Magic Of The Asymmetric
Posted Jan 26, 2010
Authored by Keksa

Whitepaper called Cryptography - The Magic Of The Asymmetric. Written in German.

tags | paper
SHA-256 | f737c81ee79e0d58d85ded394f940a3195d39935d8a7917ec137a9d11bab632b
Tor-ramdisk i686 UClibc-based Linux Distribution 20100125
Posted Jan 26, 2010
Authored by Anthony G. Basile | Site opensource.dyc.edu

Tor-ramdisk is an i686 uClibc-based micro Linux distribution whose only purpose is to host a Tor server in an environment that maximizes security and privacy. Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. Security is enhanced by employing a monolithically compiled GRSEC/PAX patched kernel and hardened system tools. Privacy is enhanced by turning off logging at all levels so that even the Tor operator only has access to minimal information. Finally, since everything runs in ephemeral memory, no information survives a reboot, except for the Tor configuration file and the private RSA key which may be exported/imported by FTP.

Changes: This release incorporates an important security fix from upstream following a breach of some Tor project servers. Only tor was bumped to version 0.2.1.22 while everything else remain the same as the 20100115 release. The change was made to the i686, MIPS, and x86_64 images.
tags | tool, kernel, peer2peer
systems | linux
SHA-256 | bd68a6cfe09718d6847c3fe3e70e9fe2026a5bd51002c5b6b456b6b59ef41941
AOL 9.5 Phobos.Playlist Import() Stack-based Buffer Overflow
Posted Jan 26, 2010
Authored by Trancer | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow within Phobos.dll of AOL 9.5. By setting an overly long value to 'Import()', an attacker can overrun a buffer and execute arbitrary code.

tags | exploit, overflow, arbitrary
SHA-256 | 9b8e41c5f18f1940b770dab8c88980a409b2f76dd6cb4f4dea7b75f2c9423d54
Winamp 5.572 Local Buffer Overflow
Posted Jan 26, 2010
Authored by NeoCortex

Winamp version 5.572 local buffer overflow exploit that executes calc.exe.

tags | exploit, overflow, local
SHA-256 | 1162945d8cffe926d0d36a6ccb59950053d8f8ecb6477b387e268e72cc1e7766
PHP RFI Prevention
Posted Jan 26, 2010

Whitepaper called PHP RFI Prevention. Written in Turkish.

tags | paper, php, code execution, file inclusion
SHA-256 | 9b285f924d3fec07f867d5721ad0668203170946fe83e8003360acbb89f9619f
SQL-Ledger Cross Site Request Forgery / Local File Inclusion / SQL Injection
Posted Jan 26, 2010
Authored by Chris Travers

SQL-Ledger has been patched to address cross site request forgery, local file inclusion, no secure flag on cookie, default administrator password and remote SQL injection vulnerabilities.

tags | advisory, remote, local, vulnerability, sql injection, file inclusion, csrf
advisories | CVE-2009-3580, CVE-2009-3582, CVE-2009-3583, CVE-2009-4402, CVE-2009-3584
SHA-256 | 285bfdfd6459c517b7d7fdad4e66f894515d9a97b2c09fb44c8c4036cdd19c20
Mandriva Linux Security Advisory 2010-025
Posted Jan 26, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-025 - Multiple vulnerabilities were discovered and corrected in php-pear. Argument injection vulnerability in the sendmail implementation of the Mail::Send method (Mail/sendmail.php) in the Mail package 1.1.14 f for PEAR allows remote attackers to read and write arbitrary files via a crafted parameter, and possibly other parameters, a different vulnerability than CVE-2009-4023. Packages for 2008.0 are provided for Corporate Desktop 2008.0 customers. The updated packages have been patched to correct these issues.

tags | advisory, remote, arbitrary, php, vulnerability
systems | linux, mandriva
advisories | CVE-2009-4023, CVE-2009-4111
SHA-256 | 5f25e471637759cc8181b0216c625c69d6faeab30fa48e8d0988c3ea8ca5be0a
BoastMachine 3.1 Shell Upload
Posted Jan 26, 2010
Authored by alnjm33

BoastMachine version 3.1 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | 2651a3bb58e46c9853187e2b36d9fca27e375ef9d487387de810853f3c2799ff
Opera 10.10 XML Parser Denial Of Service
Posted Jan 26, 2010
Authored by d3b4g

Opera version 10.10 XML parser denial of service proof of concept exploit.

tags | exploit, denial of service, proof of concept
SHA-256 | 07b347736c9eacea5303892923b1407b25d1b7e0ac4d144b6fb05dd676f03ea7
Winamp 5.572 Stack Overflow Proof Of Concept
Posted Jan 26, 2010
Authored by Debug

Winamp version 5.572 whatsnew.txt stack overflow proof of concept exploit.

tags | exploit, overflow, proof of concept
SHA-256 | 7b1e4d3aca7b13c466e1b3c16a12434b67268d5a8dfcbbdb848358d16d18be34
P2GChinchilla HTTP Server Denial Of Service
Posted Jan 26, 2010
Authored by Zer0 Thunder

P2GChinchilla HTTP Server version 1.1.1 remote denial of service exploit.

tags | exploit, remote, web, denial of service
SHA-256 | 4c090cc3b9017bfff39b23bb7a5305fe47543b3ac277ba555898946b5aa6fa9a
Apache Tomcat Insecure Partial Deploy After Failed Undeploy
Posted Jan 26, 2010
Authored by Mark Thomas | Site tomcat.apache.org

Apache Tomcat suffers from an insecure partial deploy after failed deploy vulnerability.

tags | advisory
advisories | CVE-2009-2901
SHA-256 | 6e42d1072930b0a860fd427cec3601f44c65eee0533acddfbb5bb93668b5b599
Apache Tomcat Unexpected File Deletion In Work Directory
Posted Jan 26, 2010
Authored by Mark Thomas | Site tomcat.apache.org

Apache Tomcat suffers from an unexpected file deletion in work directory vulnerability. Versions 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 are affected.

tags | advisory
advisories | CVE-2009-2902
SHA-256 | b8916693e4e438f1e8ec19e93a66873769e5d428e6db947e2f31149843bb9c15
Safari 4.0.4 Crash Proof Of Concept
Posted Jan 26, 2010
Authored by systemx00

Safari version 4.0.4 suffers from a javascript crash denial of service vulnerability.

tags | exploit, denial of service, javascript
SHA-256 | 932b7c0432f67943950f03679d20b5599d0dac8992b68270d539d33cc3b771f8
Secunia Security Advisory 37769
Posted Jan 26, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities and weaknesses have been reported in Google Chrome, where some have unknown impacts and others can be exploited by malicious people to disclose potentially sensitive information, bypass certain security restrictions, or compromise a user's system.

tags | advisory, vulnerability
SHA-256 | dd68f878fdbf054cbca1b92574b0879c383af48e16f1d0c1b7de16faa96eedcb
Secunia Security Advisory 38311
Posted Jan 26, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Hernan Jais has discovered multiple vulnerabilities in OCS Inventory NG, which can be exploited by malicious users to conduct SQL injection attacks and by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss, sql injection
SHA-256 | ddfdf3eaa1470a2a487082f99d155e966636193f88e91eadc09a6094d3545c40
Secunia Security Advisory 38343
Posted Jan 26, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in bozohttpd, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

tags | advisory, denial of service
SHA-256 | 6b178bd9e67c7ae871ba4877ff20175af5d8d449cf349b6633a575fc108ff890
Secunia Security Advisory 38324
Posted Jan 26, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for python2.4 and python2.5. This fixes some vulnerabilities, where some have unknown impact and others can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | linux, debian
SHA-256 | bf70c996f1b0a6b633e106e63a8651484019df400ffe29695cd21c9aa6a09487
Secunia Security Advisory 38282
Posted Jan 26, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in the JBDiary component for Joomla, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, vulnerability, sql injection
SHA-256 | 7c1d9e74c0828124df9168b67ff348ab45e5395b5745366810c7e1a9f715fc7c
Secunia Security Advisory 38329
Posted Jan 26, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Support Incident Tracker, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | 793c90ca7e1c1a6c357ad31d64520492e44aa1bf780fe7ec54bbd322bdfcf351
Secunia Security Advisory 38326
Posted Jan 26, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in XenServer, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

tags | advisory, denial of service
SHA-256 | 9c24f3d8012ce5e0fb3cdcc079226ac1a59f58edd245b9eff68b494a98535220
Secunia Security Advisory 38335
Posted Jan 26, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Rising Antivirus, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or potentially gain escalated privileges.

tags | advisory, denial of service, local, vulnerability
SHA-256 | f538eec53b24bdd34eb00504c3613b1ce0a0b8484386ca73fea0baf5d9a496ac
Page 1 of 2
Back12Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close