exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 51 RSS Feed

Files Date: 2009-02-05

txtBB 1.0 RC3 Injection
Posted Feb 5, 2009
Authored by cOndemned | Site condemned.r00t.la

txtBB versions 1.0 RC3 and below suffer from a HTML/Javascript injection vulnerability that allows for privilege escalation.

tags | exploit, javascript
SHA-256 | 83be17128bca52eeeb3d407c98a098dcdc7d4a9f0391d6afc260ecee0531a606
Exploit Web 2.0, Real Life XSS-Worm
Posted Feb 5, 2009
Authored by Zigma | Site nullarea.net

Whitepaper called Exploiting Web 2.0, Real Life XSS-Worm.

tags | paper, worm, web
SHA-256 | de5ab8adb4270d52d585f53dd3f643708a861804db127890d71fbc495b960293
GNU SIP Witch Telephony Server
Posted Feb 5, 2009
Authored by David Sugar | Site gnutelephony.org

GNU SIP Witch is a pure SIP-based office telephone call server that supports generic phone system features like call forwarding, hunt groups and call distribution, call coverage and ring groups, holding, and call transfer, as well as offering SIP specific capabilities such as presence and messaging. It supports secure telephone extensions for making calls over the Internet, and intercept/decrypt-free peer-to-peer audio and video extensions. It is not a SIP proxy, a multi-protocol telephone server, or an IP-PBX, and does not try to emulate Asterisk, FreeSWITCH, or Yate.

Changes: Initial xmlrpc support in cgi util. Proper cdr initialization. Call maps and display of active calls in progress added.
tags | telephony, protocol
SHA-256 | 692a956d0280424ec1d44745090b00118e2cf07a274621cb29f555857ad3325c
Scannedonly Samba VFS Module
Posted Feb 5, 2009
Authored by Olivier Sessink | Site olivier.sessink.nl

Scannedonly is a samba VFS module that ensures that only files that have been scanned for viruses are visible and accessible to the end user. Scannedonly was developed because of scalability problems with samba-vscan. Scannedonly comes in two parts: a Samba VFS module and (one or more) daemons. The daemon scans files and marks them when they are known to be clean. The samba module simply filters out files that aren't marked clean.

tags | tool, scanner
systems | unix
SHA-256 | 9ce9c0fc5de9173c30ea4e53ff3bea5c330c99325454f89e30e2d70b0704619f
E-TerraHabitat Privilege Escalation / DoS
Posted Feb 5, 2009
Authored by Eyal Udassin, Jonathan Afek | Site c4-security.com

C4 SCADA Security Advisory - Areva T+D E-TerraHabitat and E-TerraPlatform solutions suffer from denial of service and privilege escalation vulnerabilities.

tags | exploit, denial of service, vulnerability
advisories | CVE-2009-0211, CVE-2009-0212, CVE-2009-0213, CVE-2009-0214
SHA-256 | 313222dd8a72c861545fb4fffdbb7ca944ab74de61117f8bcd90eb111c777005
ClearBudget 0.6.1 Insecure Cookie / LFI
Posted Feb 5, 2009
Authored by SirGod | Site insecurity.ro

ClearBudget version 0.6.1 suffers from local file inclusion and insecure cookie handling vulnerabilities.

tags | exploit, local, vulnerability, file inclusion, insecure cookie handling
SHA-256 | c2c45a31b0dd169bc8ff555020a1b36a476458018305ef9ae62593b12ec0230f
ClearBudget 0.6.1 Insecure Database
Posted Feb 5, 2009
Authored by Room-Hacker

ClearBudget version 0.6.1 suffers from a database disclosure vulnerability.

tags | exploit, info disclosure
SHA-256 | 72f1c6e82c863b2b6e34cbae5b7099ed14a6023b13560cdabe605925a4bab8b2
Nokia N95-8 Browser Crash
Posted Feb 5, 2009
Authored by Juan Pablo Lopez Yacubian

Nokia N95-8 browser crashing denial of service exploit. Apparently this vulnerability also affects Firefox 3.06 causing a stack overflow.

tags | exploit, denial of service, overflow
SHA-256 | 86dfd323b43887238748e4a0706ff35c4404cb91073d28fa6fd5e401195533fa
FeedDemon 2.7.0.0 Overflow
Posted Feb 5, 2009
Authored by Praveen Darshanam

Proof of concept exploit for the FeedMon version 2.7.0.0 outline tag buffer overflow vulnerability.

tags | exploit, overflow, proof of concept
SHA-256 | 36cff8e5f3605de8b129d70a05eacba2f012ba2169b898cb90a83b34a302ab11
dBpowerAMP Audit Player Buffer Overflow
Posted Feb 5, 2009
Authored by SimO-s0fT

dBpowerAMP Audio Player local buffer overflow exploit that spawns a shell on port 7777.

tags | exploit, overflow, shell, local
SHA-256 | 02db4c29210f95e0efd9bfe1daf53b23d6a7a7911428635f98ee77c62041d35d
SecurityFocus.com Cross Site Scripting
Posted Feb 5, 2009
Site dsecrg.com

SecurityFocus.com suffered from a linked cross site scripting vulnerability in the whitepaper search section.

tags | exploit, xss
SHA-256 | cd205aed5150ef5a15c952b41b9b02bba56e8c5d159a9e21c9894b8930705d8e
FeedDemon 2.7 Buffer Overflow
Posted Feb 5, 2009
Authored by SVRT | Site security.bkis.vn

FeedDemon versions 2.7 and below suffer from a remote buffer overflow vulnerability.

tags | advisory, remote, overflow
SHA-256 | cc0d40472e74081a342c3ee71a086147180630b62e1d792fd074ed7e63407b1c
GR Note 0.94 Beta Database Disclosure
Posted Feb 5, 2009
Authored by JosS | Site spanish-hackers.com

GR Note version 0.94 Beta suffers from a remote database disclosure vulnerability.

tags | exploit, remote
SHA-256 | e4e954066f4c8d75208d2a6a631043dfc1b88ca315f71f7a0367922f62065d95
PRDomain SQL Injection
Posted Feb 5, 2009
Authored by F-B-1 H@CKER | Site rahulhackingarticles.wetpaint.com

The prdomain business register suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 2899c9f2295dfd56c2e175b8f59c62e03f2f77395349c496b0bdccf6bf324e19
Debian Linux Security Advisory 1717-1
Posted Feb 5, 2009
Authored by Debian | Site debian.org

Debian Security Advisory 1717 - Stefan Cornelius discovered a buffer overflow in devil, a cross-platform image loading and manipulation toolkit, which could be triggered via a crafted Radiance RGBE file. This could potentially lead to the execution of arbitrary code.

tags | advisory, overflow, arbitrary
systems | linux, debian
advisories | CVE-2008-5262
SHA-256 | 265e84e682128cc2db4b0e85ebb3365be5c458f93067eff4a6edd31c6a500945
Kipper 2.01 XSS / LFI / Disclosure
Posted Feb 5, 2009
Authored by RoMaNcYxHaCkEr | Site rs-labs.com

Kipper version 2.01 suffers from cross site scripting, local file inclusion, and database disclosure vulnerabilities.

tags | exploit, local, vulnerability, xss, file inclusion
SHA-256 | 1d73cfe83d80e0a5b7cd0efb387b348bb8dceb98684fcd7db4bbf1e231553cee
Drupal Link Module XSS
Posted Feb 5, 2009
Authored by Andrew Rosborough, Justin C. Klein Keane

The Drupal Link module version 5.x-2.5 on Drupal 5.10 suffers from a cross site scripting vulnerability.

tags | advisory, xss
SHA-256 | 3e2442e480ab223cc24f6ee320ce3b85120926b9167e229e54754da3df85805f
UltraVNC/TightVNC Integer Overflow
Posted Feb 5, 2009
Authored by Andres Lopez Luksenberg

UltraVNC and TightVNC integer overflow proof of concept exploit.

tags | exploit, overflow, proof of concept
SHA-256 | ee4fc95781d5555e777203dd6d8110e53eb07ac2a46c4a04f7d1ce1780be7ae2
Secunia Security Advisory 33733
Posted Feb 5, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - D.Mortalov has reported some vulnerabilities in 4Site CMS, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, vulnerability, sql injection
SHA-256 | be1ac3054d553a1db1c0e16cf5ad5c488168802fbe8343310da83aa160f1e773
Secunia Security Advisory 33827
Posted Feb 5, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for roundcubemail. This fixes a vulnerability, which can be exploited by malicious people to conduct script insertion attacks.

tags | advisory
systems | linux, fedora
SHA-256 | e01358e092f09844126cd4a0f2041a702452ae455f71d3497f10e26cb3558b92
Secunia Security Advisory 33749
Posted Feb 5, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in multiple Cisco Products, which can be exploited by malicious people to cause a DoS (Denial of Service) and by malicious users to bypass certain security restrictions.

tags | advisory, denial of service, vulnerability
systems | cisco
SHA-256 | d76004fb0db35ad33afdcedd20c620eea016a28e1c2e6b8b1a83c3667f192032
Secunia Security Advisory 33825
Posted Feb 5, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for gpsdrive. This fixes some security issues, which can be exploited by malicious, local users to perform certain actions with escalated privileges.

tags | advisory, local
systems | linux, fedora
SHA-256 | fdad77de7aee2e0c002b6182e26c6054d68cb77f5f9bf74f112ead766795b5e7
Secunia Security Advisory 33826
Posted Feb 5, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for nss. This fixes a security issue, which potentially can be exploited by malicious people to conduct spoofing attacks.

tags | advisory, spoof
systems | linux, fedora
SHA-256 | ce3306cb6c676a7dce98d9664374322af299a4e7265ce58743cb74eaa270c53b
Secunia Security Advisory 33836
Posted Feb 5, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Views Bulk Operations module for Drupal, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory
SHA-256 | 35fc57118d9208cdd03c6131855cedad4ef1eaaa7bb6b03d6031cfeef1681c41
Secunia Security Advisory 33834
Posted Feb 5, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in htmLawed, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | a0b140dd40cb2bac576cef892365adff587801780b298bb1fa362fd632504879
Page 1 of 3
Back123Next

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    25 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close