exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 46 RSS Feed

Files Date: 2009-03-23

Rittal CMC-TC Processing Unit II XSS / Command Execution
Posted Mar 23, 2009
Authored by Henri Lindberg | Site louhi.fi

The Rittal CMC-TC Processing Unit II suffers from cross site scripting, command execution, and session prediction vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 23a69ae71455c1d7a2a077cb35fc5f1de8797908c6e751da6ea0a62ed6e28b7d
BS.Player 2.34 .bsl Buffer Overflow
Posted Mar 23, 2009
Authored by Nine:Situations:Group | Site retrogod.altervista.org

BS.Player versions 2.34 Build 980 and below local buffer overflow exploit that creates a malicious .bsl file.

tags | exploit, overflow, local
SHA-256 | bbd96e9f073356e0b12a5ecfeb3103c430963df93c0bb8111141d6519e1b5a78
Sysax Multi Server 4.3 File Deletion
Posted Mar 23, 2009
Authored by Jonathan Salwan | Site shell-storm.org

Sysax Multi Server version 4.3 remote arbitrary file deletion exploit.

tags | exploit, remote, arbitrary
SHA-256 | bcff2726d61f79159743a1a6d83e1e1297ac107021d5af54664905682a92e38e
Mac OS X xnu Root Exploit
Posted Mar 23, 2009
Authored by mu-b | Site digit-labs.org

Apple Mac OS-X with xnu versions 1228.x and below local kernel root exploit.

tags | exploit, kernel, local, root
systems | apple, osx
SHA-256 | 86cfb2779df38e35334e9c3dbf19466a770971aebed37967b164ae1a730aa473
FreeBSD 7.0/7.1 Local Kernel Root Exploit
Posted Mar 23, 2009
Authored by mu-b | Site digit-labs.org

FreeBSD versions 7.0 and 7.1 local kernel root exploit.

tags | exploit, kernel, local, root
systems | freebsd
SHA-256 | 3dd4c2e8dca7fdaa067507dd47a91dc9e6ad191031b6812ef0f52673966d2aba
Racer 0.5.3b5 Stack Buffer Overflow
Posted Mar 23, 2009
Authored by fl0 fl0w | Site fl0-fl0w.docspages.com

Racer version 0.5.3b5 remote stack buffer overflow exploit.

tags | exploit, remote, overflow
SHA-256 | 75137387a7f5e45ce6a3e1d8bfd5a760b20da65932229cd799fabed801430cb0
POP Peeper 3.4.0.0 Buffer Overflow
Posted Mar 23, 2009
Authored by His0k4

POP Peeper version 3.4.0.0 remote buffer overflow exploit.

tags | exploit, remote, overflow
SHA-256 | 116d32e2803965964886668965890380f4a5c047e61ed9953e7dba126ba0d31e
Secunia Security Advisory 34372
Posted Mar 23, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for drupal-cck. This fixes a vulnerability, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory
systems | linux, fedora
SHA-256 | f623aa8fac863d39ca51eb56cdbaae773512fc9f5bc0a702e1d4cdb1ade49e0b
Secunia Security Advisory 34357
Posted Mar 23, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for weechat. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, fedora
SHA-256 | 33f00d6ae738accd05ec3af730f40e13b10960f7a9a65e8423764f128f3b699f
Secunia Security Advisory 34429
Posted Mar 23, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Avaya has acknowledged a security issue in Avaya CMS, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | 6c7ab2ac03fedabb94e27a02b67771a359a990cf0fbe5ac30223d430b82c99f7
Secunia Security Advisory 34266
Posted Mar 23, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for ghostscript. This fixes some vulnerabilities, which can potentially be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
systems | linux, fedora
SHA-256 | 90c3133fb2c53b8c6ad08624d512fed71f2abae09b150ba9d57817ce0856b990
Secunia Security Advisory 34324
Posted Mar 23, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for thunderbird. This fixes some vulnerabilities, which can be exploited by malicious, local users to potentially disclose sensitive information and by malicious people to bypass certain security restrictions or compromise a user's system.

tags | advisory, local, vulnerability
systems | linux, fedora
SHA-256 | af5335c0f9865fbce65aba263c1187eb9550aafebdf897ed30f935cf2459551b
Secunia Security Advisory 34404
Posted Mar 23, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for glib2.0. This fixes some vulnerabilities, which can potentially be exploited by malicious people to compromise an application using the library.

tags | advisory, vulnerability
systems | linux, debian
SHA-256 | ec7f933e74e9a23822873f083f9657c2ff69f6c6f4b90306aab0ec02d422b436
Secunia Security Advisory 34401
Posted Mar 23, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for libsoup. This fixes a vulnerability, which can potentially be exploited by malicious people to compromise an application using the library.

tags | advisory
systems | linux, debian
SHA-256 | dcbfd53275f1fa8c9df210f5c2565a4ab026ea5a33254b984ba0890a838e9d94
Secunia Security Advisory 34407
Posted Mar 23, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for amarok. This fixes some vulnerabilities, which potentially can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
systems | linux, gentoo
SHA-256 | b363ac9861d46857dcec2ef3027bb561573b2bde960b6fe8202f6a7c8ff50ed1
Secunia Security Advisory 34383
Posted Mar 23, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for xulrunner. This fixes some vulnerabilities, which can be exploited by malicious people to conduct spoofing attacks or compromise a user's system.

tags | advisory, spoof, vulnerability
systems | linux, debian
SHA-256 | b6017c6ef658cbedbaf132a071fd4dfb4e47dad5e3d4edeaae1ec2a902ec20ba
Secunia Security Advisory 34394
Posted Mar 23, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for linux-2.6. This fixes a weakness, some security issues, and some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and bypass certain security restrictions, and gain escalated privileges.

tags | advisory, denial of service, local, vulnerability
systems | linux, debian
SHA-256 | d825e21e8870120c81f3b4499ef961340a2a28b547172b16936a7c7f1da70a08
Secunia Security Advisory 34412
Posted Mar 23, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - pyrokinesis has reported a vulnerability in BS.Player, which can be exploited by malicious people to potentially compromise a user's system.

tags | advisory
SHA-256 | f1456595ad9537a37900988fcf58fbaed8a11114f272f83dc03fe766d1877ec1
Secunia Security Advisory 34379
Posted Mar 23, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in ExpressionEngine, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory
SHA-256 | 985a647b07ec3ff58129c52493fa4e0f64c8f048d3bdb9de2bdf61400726d025
Secunia Security Advisory 34432
Posted Mar 23, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in the Linux Kernel, which can be exploited by malicious users to bypass certain security restrictions.

tags | advisory, kernel
systems | linux
SHA-256 | 54d25c703000f998d0cf343d76859ea70d853b8de054e9b72ed64cb66a3ef494
Secunia Security Advisory 34422
Posted Mar 23, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some security issues have been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose potentially sensitive information and by malicious users to bypass certain security restrictions.

tags | advisory, kernel, local
systems | linux
SHA-256 | 3e5b5763bc2e5524203159c8a4e44a10859de3033fb15fcf1f2c645b0b52e04e
Secunia Security Advisory 34423
Posted Mar 23, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for libpng. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise an application using the library.

tags | advisory, denial of service, vulnerability
systems | linux, debian
SHA-256 | 942fd8e691cfa6e13fde2d53d8e48169504b6733c9b506ac8233022dfe2c6f30
Secunia Security Advisory 34275
Posted Mar 23, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Michael Schratt has reported some vulnerabilities in ZyXEL G570S, which can be exploited by malicious people to disclose sensitive information, bypass certain security restrictions, or cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
SHA-256 | 80c8e970aae35f5df73a1b927b88316563d30cbdb3187e337e3a661544508fc1
Secunia Security Advisory 34388
Posted Mar 23, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for libpng. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service), disclose potentially sensitive information, or potentially compromise an application using the library.

tags | advisory, denial of service, vulnerability
systems | linux, debian
SHA-256 | 4e5291d83058f184439f009ddd40c7a7ed393570fbbcc6739627da99d8e9ec67
Secunia Security Advisory 34410
Posted Mar 23, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in PHP Classifieds, which can be exploited by malicious people to conduct cross-site scripting attacks and malicious users to compromise a vulnerable system.

tags | advisory, php, vulnerability, xss
SHA-256 | 9f4a5e76c89fad7f6d1b36afc239389354b2b964ebe4469d9a2ccbb2060dd694
Page 1 of 2
Back12Next

File Archive:

February 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    11 Files
  • 2
    Feb 2nd
    9 Files
  • 3
    Feb 3rd
    5 Files
  • 4
    Feb 4th
    0 Files
  • 5
    Feb 5th
    0 Files
  • 6
    Feb 6th
    0 Files
  • 7
    Feb 7th
    0 Files
  • 8
    Feb 8th
    0 Files
  • 9
    Feb 9th
    0 Files
  • 10
    Feb 10th
    0 Files
  • 11
    Feb 11th
    0 Files
  • 12
    Feb 12th
    0 Files
  • 13
    Feb 13th
    0 Files
  • 14
    Feb 14th
    0 Files
  • 15
    Feb 15th
    0 Files
  • 16
    Feb 16th
    0 Files
  • 17
    Feb 17th
    0 Files
  • 18
    Feb 18th
    0 Files
  • 19
    Feb 19th
    0 Files
  • 20
    Feb 20th
    0 Files
  • 21
    Feb 21st
    0 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close