exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 67 RSS Feed

Files Date: 2009-03-09

RadASM 2.2.1.5 .RAP File Overflow
Posted Mar 9, 2009
Authored by zAx

RadASM version 2.2.1.5 .rap file local stack overflow exploit.

tags | exploit, overflow, local
SHA-256 | 09add7869f7fda1c8576924f6f81d2ebb00b71aa9efa05dc66cfac314597f8ab
MediaCoder 0.6.2.4275 Universal Overflow SEH Exploit
Posted Mar 9, 2009
Authored by Stack | Site v4-team.com

MediaCoder version 0.6.2.4275 .m3u file universal buffer overflow SEH exploit.

tags | exploit, overflow
SHA-256 | 91384afea3125f73aa27643f850929bb68956192c78ed5d2ed62c5458e50e051
MediaCoder 0.6.2.4275 Universal Stack Overflow
Posted Mar 9, 2009
Authored by Stack | Site v4-team.com

MediaCoder version 0.6.2.4275 .m3u file universal stack overflow exploit.

tags | exploit, overflow
SHA-256 | 0acabdd12e6e8c20054354b412b07e3de59c1a9c1532e4054da75c01601c515b
Addonics NAS Adapter Denial Of Service
Posted Mar 9, 2009
Authored by h00die

Addonics NAS adapter post authentication denial of service exploit.

tags | exploit, denial of service
SHA-256 | b0c6cced89aa484a6d2f1ac21c2bdc2c20fbb2785596aa7bf5acaa7f417b274b
PHP Director 0.21 eval() Injection Exploit
Posted Mar 9, 2009
Authored by StAkeR

PHP Director versions 0.21 and below SQL injection into outfile eval() injection exploit.

tags | exploit, php, sql injection
SHA-256 | ae4f89565a65a1a19d6c574a5a2cb61604d37f54ae7d294f7e2427c81609e7f9
MySQL: Secure Web Apps - SQL Injection Techniques
Posted Mar 9, 2009
Authored by Omnipresent

Whitepaper called MySQL: Secure Web Apps - SQL Injection Techniques.

tags | paper, web, sql injection
SHA-256 | 0930f3a77eb458da8c9b9a814769e7cd4e1235ac3871a8c0be819bd5167283ff
Adur[IT] Magazine Issue 1
Posted Mar 9, 2009
Authored by Adurit-T, adurit

Issue 1 of Adur[IT] Magazine : IT Security. Written in Arabic.

tags | magazine
SHA-256 | 049f5e91d906c2a8b605c01007f781fb46cca541f88fba4be3b03f6116030b58
Wordlist Cracking WPA/WPA2-PSK
Posted Mar 9, 2009
Authored by ka0x

Whitepaper discussing the cracking of WPA and WPA-PSK with a wordlist. Written in Spanish.

tags | paper
SHA-256 | c270bbe7135098af512abffe5708f49a05055f3714422fb5eb2184f8ab403732
eZip Wizard 3.0 Stack Buffer Overflow
Posted Mar 9, 2009
Authored by fl0 fl0w | Site fl0-fl0w.docspages.com

Proof of concept exploit for a local stack buffer overflow vulnerability in eZip Wizard version 3.0.

tags | exploit, overflow, local, proof of concept
SHA-256 | 32ec0af182840fc0d8d5a75b1286fc8725c68ac4c8128e0c796f2aa1a1ea38fc
PHP Fuzzing In Action
Posted Mar 9, 2009
Authored by Abysssec | Site abysssec.com

PHP Fuzzing In Action - 20 Ways To Fuzz PHP Source Code.

tags | paper, php
SHA-256 | c801fa5bcab877511e3678eea2660852faecbdbf87a4d6cdc8d0712f8ed2e458
Woltlab Burning Board 3.0.x Cross Site Scripting
Posted Mar 9, 2009
Authored by StAkeR

Woltlab Burning Board version 3.0.x suffers from url redirection, tag script injection, and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 7e50f168f15272ed520d3a6bfdd401cd988209965da957f490b4ec559faaf6f0
PHP-Fusion Book Panel Module SQL Injection
Posted Mar 9, 2009
Authored by elusiven

The PHP-Fusion Book Panel module suffers from a remote SQL injection vulnerability.

tags | exploit, remote, php, sql injection
SHA-256 | 2feb70f0504ce2936a7d37d16d9d673f55399acab13d9e7cad36429708474118
Core Security Technologies Advisory 2009.0218
Posted Mar 9, 2009
Authored by Core Security Technologies, Francisco Falcon | Site coresecurity.com

Foxit Reader versions 3.0 build 1120 and build 1301 suffer from authorization bypass and buffer overflow vulnerabilities.

tags | advisory, overflow, vulnerability
advisories | CVE-2009-0836, CVE-2009-0837
SHA-256 | fbe7a9965a2887b415c01e3fe3490d016b1b5248398aa3b9b36bb9c0f1de6607
Digital Defense VRT Advisory 2009.22
Posted Mar 9, 2009
Authored by Digital Defense, r@b13$, David Marshall | Site digitaldefense.net

A directory traversal vulnerability exists in the SMART Web Server.

tags | advisory, web
SHA-256 | 97b4c28636a988b5b3e31bd1731c3e6407303b06cb0beb95394c72c068bbab87
Digital Defense VRT Advisory 2009.21
Posted Mar 9, 2009
Authored by Digital Defense, r@b13$, David Marshall | Site digitaldefense.net

The vBook login application suffers from a cross site scripting vulnerability.

tags | advisory, xss
SHA-256 | 50387c32e88aef30367458ebab6982529bc07bcda2bcc4bbd3cdf6fb68c88bb8
Gentoo Linux Security Advisory 200903-21
Posted Mar 9, 2009
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200903-21 - A vulnerability in cURL may allow for arbitrary file access. David Kierznowski reported that the redirect implementation accepts arbitrary Location values when CURLOPT_FOLLOWLOCATION is enabled. Versions less than 7.19.4 are affected.

tags | advisory, arbitrary
systems | linux, gentoo
advisories | CVE-2009-0037
SHA-256 | bf56e5fa8084f4277fc7f4c18fab20b5d542b1c39c0f73442876559855137720
Gentoo Linux Security Advisory 200903-20
Posted Mar 9, 2009
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200903-20 - Multiple vulnerabilities in WebSVN allow for file overwrite and information disclosure. James Bercegay of GulfTech Security reported a Cross-site scripting (XSS) vulnerability in the getParameterisedSelfUrl() function in index.php (CVE-2008-5918) and a directory traversal vulnerability in rss.php when magic_quotes_gpc is disabled (CVE-2008-5919). Versions less than 2.1.0 are affected.

tags | advisory, php, vulnerability, xss, info disclosure
systems | linux, gentoo
advisories | CVE-2008-5918, CVE-2008-5919, CVE-2009-0240
SHA-256 | c47bce5b9c11d49a0c300bbe9035b3bf7fc6515d15f7465de99987eca26f9e99
Gentoo Linux Security Advisory 200903-19
Posted Mar 9, 2009
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200903-19 - An error in Xerces-C++ allows for a Denial of Service via malicious XML schema files. Frank Rast reported that the XML parser in Xerces-C++ does not correctly handle an XML schema definition with a large maxOccurs value, which triggers excessive memory consumption during the validation of an XML file. Versions less than 3.0.0-r1 are affected.

tags | advisory, denial of service
systems | linux, gentoo
advisories | CVE-2008-4482
SHA-256 | 1fe98d60d68fec2dc0afd4d73f1af35fb752d7207bfc0c4a1d36dbbf3c2624cc
Gentoo Linux Security Advisory 200903-18
Posted Mar 9, 2009
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200903-18 - An insecure temporary file usage has been reported in Openswan, allowing for symlink attacks. Dmitry E. Oboukhov reported that the IPSEC livetest tool does not handle the ipseclive.conn and ipsec.olts.remote.log temporary files securely. Versions less than 2.4.13-r2 are affected.

tags | advisory, remote
systems | linux, gentoo
advisories | CVE-2008-4190
SHA-256 | fa432b659b8ee8bf4248d6dd8c9d6c56c0794d09817d68b97ecc82cbb40f7891
Gentoo Linux Security Advisory 200903-17
Posted Mar 9, 2009
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200903-17 - The Real VNC client is vulnerable to execution of arbitrary code when connecting to a malicious server. An unspecified vulnerability has been discovered in the CMsgReader::readRect() function in the VNC Viewer component, related to the encoding type of RFB protocol data. Versions less than 4.1.3 are affected.

tags | advisory, arbitrary, protocol
systems | linux, gentoo
advisories | CVE-2008-4770
SHA-256 | 1df03de82266532243e2060eaa8569a30b6ede503bc94508e3cdf4b80a1ab7c0
Gentoo Linux Security Advisory 200903-16
Posted Mar 9, 2009
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200903-16 - An untrusted search path vulnerability in Epiphany might result in the execution of arbitrary code. James Vega reported an untrusted search path vulnerability in the Python interface. Versions less than 2.22.3-r2 are affected.

tags | advisory, arbitrary, python
systems | linux, gentoo
advisories | CVE-2008-5985
SHA-256 | f8e7162ba670b96296d096765bbcc2aef7e695b25dda8955f0b94fb293566640
Gentoo Linux Security Advisory 200903-15
Posted Mar 9, 2009
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200903-15 - Multiple vulnerabilities in gitweb allow for remote execution of arbitrary commands. Versions less than 1.6.0.6 are affected.

tags | advisory, remote, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2008-5516, CVE-2008-5517, CVE-2008-5916
SHA-256 | ee4a8988fca8e7dd0cf0c04d2502155ab9179a6ee36303d43624079a303589b9
Simple Fuzzing Utility
Posted Mar 9, 2009
Authored by aaron conole | Site aconole.brad-x.com

Simple Fuzz is a simple fuzzer. It has two network modes of operation, an output mode for developing command line fuzzing scripts, as well as taking fuzzing strings from literals and building strings from sequences. It is built to fill a need - the need for a quickly configurable black box testing utility that does not require intimate knowledge of the inner workings of C or require specialized software rigs. The aim is to just provide a simple interface, clear inputs/outputs, and reusability.

tags | fuzzer
SHA-256 | e244dc374f84c63b7a6cfac17c78eed576e3b6cb4d0a536d0a32bb866d67896b
osCommerce 2.2rc1 Creation / Cross Site Scripting
Posted Mar 9, 2009
Authored by Jonathan Salwan | Site shell-storm.org

osCommerce version 2.2rc1 suffers from cross site scripting and file/directory creation vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 7920e1028d29b538f14b91648b11b2d0f8fc7ccbef4c24bb42acb872e09bc150
GeoIPGen IP By Country Generator
Posted Mar 9, 2009
Authored by Andrew Horton | Site morningstarsecurity.com

Geoipgen is an IPv4 network tool for generating geotargeted IP addresses. Features: Random or sorted order, unique or repeating ips, skips broadcast addresses, uses the MaxMind GeoLite Country database.

tags | tool, scanner
systems | unix
SHA-256 | 099eb122084fcd73c6d8edf386ad14a23ea749a990a8e99ad4acdeba5df01cac
Page 1 of 3
Back123Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close