exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 13 of 13 RSS Feed

Files Date: 2009-01-08

Core Security Technologies Advisory 2008.1128
Posted Jan 8, 2009
Authored by Core Security Technologies | Site coresecurity.com

Core Security Technologies Advisory - Openfire is a real time collaboration (RTC) server licensed under the Open Source GPL. It uses the widely adopted open protocol for instant messaging XMPP, also called Jabber. Multiple cross-site scripting vulnerabilities have been found, which may lead to arbitrary remote code execution on the server running the application due to unauthorized upload of Java plugin code. Openfire version 3.6.2 is affected.

tags | exploit, java, remote, arbitrary, vulnerability, code execution, protocol, xss
SHA-256 | f46e4ca282bdf252d717639700d9ca97890a7cb9bfe96a0c6f0efb09b2ca85f0
GOM Player 2.0.12 .ASX Stack Overflow Exploit
Posted Jan 8, 2009
Authored by DATA_SNIPER

GOM Player version 2.0.12 stack overflow exploit that creates a malicious .ASX file which will spawn calc.exe.

tags | exploit, overflow
SHA-256 | 2648e1de1d28a8ed1637ad2f8caa8a5a386c4c2ea4085a2316ea64e39b6184da
Pizzis CMS 1.5.1 Blind SQL Injection Exploit
Posted Jan 8, 2009
Authored by darkjoker | Site darkjokerside.altervista.org

Pizzis CMS versions 1.5.1 and below blind SQL injection exploit.

tags | exploit, sql injection
SHA-256 | 62b48dc28768505760d261f48e5730d64d7cffdf04f9662fb0440b64cfb4ff90
LayerOne 2009 Call For Papers
Posted Jan 8, 2009
Site layerone.info

LayerOne 2009 Information Technology Conference Call for Papers - The sixth annual LayerOne security conference is now accepting submissions for topic and speaker selection.This conference will be held May 23 and 24, 2009 in Anaheim, California.

tags | paper, conference
SHA-256 | a2306086e0eb952784ad950e4b25d06684e8ca7a8e6ffb50eb044f5dc08163f1
XOOPS 2.3.2 Code Execution Exploit
Posted Jan 8, 2009
Authored by StAkeR

XOOPS version 2.3.2 remote php code execution exploit.

tags | exploit, remote, php, code execution
SHA-256 | 15217ac9595740e295f7e7cc9aba9dc3b24baf8832c212343ae0c7bf2418d2a9
IntelliTamper 2.07 / 2.08 Language Catalog SEH Overflow Exploit
Posted Jan 8, 2009
Authored by Cn4phux

IntelliTamper versions 2.07 and 2.08 Language Catalog SEH overflow exploit.

tags | exploit, overflow
SHA-256 | bb4fc74610b73533bc64a6dd2b224001fc3c046a0a09dd1c3ef84a7a1104cc63
Ubuntu Security Notice 705-1
Posted Jan 8, 2009
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice USN-705-1 - It was discovered that NTP did not properly perform signature verification. A remote attacker could exploit this to bypass certificate validation via a malformed SSL/TLS signature.

tags | advisory, remote
systems | linux, ubuntu
advisories | CVE-2009-0021
SHA-256 | d433be9481ba7c4b533df5af3d86a31d25305815815233f66d94e668897e6dee
PHP-Fusion vArcade Module 1.8 SQL Injection
Posted Jan 8, 2009
Authored by IRCRASH | Site ircrash.com

The PHP-Fusion vArcade module version 1.8 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, php, sql injection
SHA-256 | a7624b882079817144ff7e079b7b2e20d633e652ad19ae84bbade30811865171
CuteNews 1.4.6 XSS / Code Execution Exploit
Posted Jan 8, 2009
Authored by StAkeR

CuteNews versions 1.4.6 and below remote cross site scripting and remote command execution exploit.

tags | exploit, remote, xss
SHA-256 | 47dc340b58d3dbb45286e904177789782043fd553a7083666a189192b10bc118
Secunia Security Advisory 33202
Posted Jan 8, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Symantec Mail Security for SMTP, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 617117238160b32f2adad3a6cf29a16209d80ec0c92cd7c55105bab85ed54e03
Secunia Security Advisory 33395
Posted Jan 8, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been discovered in RiotPix, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, vulnerability, sql injection
SHA-256 | 0a1671d62e3ff997cebd345296f43ec6e487779dd35fedfb5920ad417abe4d97
Secunia Security Advisory 33400
Posted Jan 8, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for am-utils. This fixes a security issue, which can be exploited by malicious, local users to perform certain actions with escalated privileges.

tags | advisory, local
systems | linux, fedora
SHA-256 | 55a328731934ddcd7a69036036b807550b8863bf54b0652f8ed45f5ac2927e5a
Secunia Security Advisory 33419
Posted Jan 8, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for xterm. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | linux, fedora
SHA-256 | 93e91f83ec38df5783622f79da5272c67d02ead2260c0cb025d65532500e3761
Page 1 of 1
Back1Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close