exploit the possibilities
Showing 1 - 25 of 44 RSS Feed

Files Date: 2009-04-08

Gentoo Linux Security Advisory 200904-11
Posted Apr 8, 2009
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200904-11 - Multiple vulnerabilities in Tor might allow for heap corruption, Denial of Service, escalation of privileges and information disclosure. Versions less than 0.2.0.34 are affected.

tags | advisory, denial of service, vulnerability, info disclosure
systems | linux, gentoo
advisories | CVE-2008-5397, CVE-2008-5398, CVE-2009-0414, CVE-2009-0936, CVE-2009-0937, CVE-2009-0938, CVE-2009-0939
MD5 | d049594eaac17422bf69b8af28139568
Gentoo Linux Security Advisory 200904-10
Posted Apr 8, 2009
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200904-10 - An error in Avahi might lead to a Denial of Service via network and CPU consumption. Rob Leslie reported that the originates_from_local_legacy_unicast_socket() function in avahi-core/server.c does not account for the network byte order of a port number when processing incoming multicast packets, leading to a multicast packet storm. Versions less than 0.6.24-r2 are affected.

tags | advisory, denial of service
systems | linux, gentoo
advisories | CVE-2009-0758
MD5 | 3829ae568b4893b6c57d2349753e62bf
Gentoo Linux Security Advisory 200904-9
Posted Apr 8, 2009
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200904-09 - Multiple vulnerabilites in MIT Kerberos 5 might allow remote unauthenticated users to execute arbitrary code with root privileges. Versions less than 1.6.3-r6 are affected.

tags | advisory, remote, arbitrary, root
systems | linux, gentoo
advisories | CVE-2009-0844, CVE-2009-0845, CVE-2009-0846, CVE-2009-0847
MD5 | 8a7e34a777d44530639d4f9a00bf7620
OTSTurntables 1.00.027 SEH Overwrite
Posted Apr 8, 2009
Authored by His0k4

OTSTurntables version 1.00.027 SEH overwrite exploit that generates a malicious .ofl file.

tags | exploit
MD5 | 729be901765f887b6c5183fbb5465812
Exploring Below The Surface Of The GIFAR Iceberg
Posted Apr 8, 2009
Authored by Ron Brandis | Site ewa-australia.com

Whitepaper called Exploring Below the Surface of the GIFAR Iceberg. Reported at Black Hat 2008, GIFARs uses the concept of combining files such as a GIF images and a Java Archives (JAR) to enable malicious code execution. This paper explores GIFARs and the possible threats they expose.

tags | paper, java, code execution
MD5 | d4690ba565fffe14530224e1d5089d3f
net2ftp 0.97 XSS / XSRF
Posted Apr 8, 2009
Authored by C1c4Tr1Z

net2ftp versions 0.97 and below suffer from cross site scripting and cross site request forgery vulnerabilities.

tags | exploit, vulnerability, xss, csrf
MD5 | 878c8b680314f01ef8d4941131ec29f3
WebFileExplorer 3.1 Database Disclosure
Posted Apr 8, 2009
Authored by ByALBAYX | Site c4team.org

WebFileExplorer version 3.1 suffers from a remote database disclosure vulnerability.

tags | exploit, remote, info disclosure
MD5 | 9ac015300604f993eaf15c2266c33e9d
Photo Graffix 3.4 Shell Upload
Posted Apr 8, 2009
Authored by ahmadbady

Photo Graffix version 3.4 suffers from shell upload and local file inclusion vulnerabilities.

tags | exploit, shell, local, vulnerability, file inclusion, file upload
MD5 | 63366164f2c43e139d6cac13273d90b6
Joomla Cmimarketplace Directory Traversal
Posted Apr 8, 2009
Authored by Valon Kerolli | Site itshqip.com

The Joomla Cmimarketplace component suffers from a remote directory traversal vulnerability.

tags | exploit, remote, file inclusion
MD5 | 2dc063afcedd882d11da5be82658f80a
Joomla MailTo SQL Injection
Posted Apr 8, 2009
Authored by Valon Kerolli | Site itshqip.com

The Joomla MailTo component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 133d2d55611cfa091f27425578f2aa2a
Joomla Maian Music 1.2.1 SQL Injection
Posted Apr 8, 2009
Authored by Valon Kerolli | Site itshqip.com

The Joomla Maian Music component version 1.2.1 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | ad4cf6530247a2d8fcf9f507cc5c96bf
Akan Portal SQL Injection
Posted Apr 8, 2009
Authored by PLATEN

Akan Portal suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 7f1e9004f956924da5208371f85e94ab
PeterConnects Web Server Traversal
Posted Apr 8, 2009
Authored by BugsNotHugs

PeterConnects web server suffers from an arbitrary file access issue due to a traversal vulnerability.

tags | exploit, web, arbitrary, file inclusion
MD5 | beca84261226bb0e3362d47c434f293b
SASPCMS 0.9 XSS / SQL Injection / Disclosure
Posted Apr 8, 2009
Authored by AmnPardaz Security Research Team | Site bugreport.ir

SASPCMS version 0.9 suffers from cross site scripting, database disclosure, and authentication bypass via SQL injection vulnerabilities.

tags | exploit, vulnerability, xss, sql injection, bypass
MD5 | 264235e127710f9999544b40b1230111
OTSTurntables 1.00.027 Overflow
Posted Apr 8, 2009
Authored by AlpHaNiX

OTSTurntables version 1.00.027 local stack overflow universal exploit that generates a malicious .ofl file.

tags | exploit, overflow, local
MD5 | 7f85c9c78cb06ce67c9d23e6571b76a6
SUSE Security Announcement 2009-019
Posted Apr 8, 2009
Site suse.com

SUSE Security Announcement - The Kerberos implementation from MIT is vulnerable to four different security issues that range from a remote crash to to possible, but very unlikely, remote code execution.

tags | advisory, remote, code execution
systems | linux, suse
advisories | CVE-2009-0844, CVE-2009-0845, CVE-2009-0846, CVE-2009-0847
MD5 | fea5f5d965b0e9bd0ddfab127c979297
Linux Kernel exit_notify() Local Root
Posted Apr 8, 2009
Authored by gat3way

Linux Kernel versions below 2.6.29 exit_notify() local root exploit.

tags | exploit, kernel, local, root
systems | linux
advisories | CVE-2009-1337
MD5 | a3b06ec8b1799d61363150e7ef6df3f0
Cisco Security Advisory 20090408-asa
Posted Apr 8, 2009
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - Multiple vulnerabilities exist in the Cisco ASA 5500 Series Adaptive Security Appliances and Cisco PIX Security Appliances. These range from multiple denial of service issues to authentication and ACL bypass vulnerabilities.

tags | advisory, denial of service, vulnerability
systems | cisco
advisories | CVE-2009-1155, CVE-2009-1156, CVE-2009-1157, CVE-2009-1158, CVE-2009-1159, CVE-2009-1160
MD5 | 7556e82e7a3ad156bdb41b58e96c2bc9
Spywaredb3.2squared.com SQL Injection
Posted Apr 8, 2009
Authored by Xia Shing Zee

The affiliate group that controls many rogue anti-malware software has a SQL injection vulnerability in their control panel that hosts all their sites. This control panel, is also hosted on a domain that is controlled by the rogue group. On the control panel, resides a user list, malware search, definition search, settings, statistics, archives, various databases, and TODO lists.

tags | exploit, sql injection
MD5 | dc9a9aacd2bc15ed1d00991bcfca2e57
GOM Player Subtitle Buffer Overflow
Posted Apr 8, 2009
Authored by Bui Quang Minh | Site security.bkis.vn

GOM Player version 2.1.16.4613 suffers from a subtitle related buffer overflow vulnerability.

tags | advisory, overflow
MD5 | 9669f44e17d6379cc438ae838b304b2c
GOM Player Buffer Overflow Proof Of Concept
Posted Apr 8, 2009
Authored by Bui Quang Minh | Site security.bkis.vn

Proof of concept exploit that demonstrates a buffer overflow vulnerability in GOM Player version 2.1.16.4613.

tags | exploit, overflow, proof of concept
MD5 | 34b5495f567f467a5d22b606ca0153c4
Debian Linux Security Advisory 1765-1
Posted Apr 8, 2009
Authored by Debian | Site debian.org

Debian Security Advisory 1765-1 - Several vulnerabilities have been found in horde3, the horde web application framework.

tags | advisory, web, vulnerability
systems | linux, debian
advisories | CVE-2009-0932, CVE-2008-3330, CVE-2008-5917
MD5 | b5cca0990d056a78e7ade61022992391
Summer Camp Garrotxa 2009
Posted Apr 8, 2009
Site associacio-aoe.org

Summer Camp Garrotxa 2009 will be held in Bosc de Tosca, Les Preses (La Garrotxa, Girona), Spain from July 17th through the 19th, 2009. This is an invitation for anyone interested in security, technology, or that simply wants to learn, to teach, to meet with old or new friends and/or participate in this event.

tags | paper, conference
MD5 | 14406fca1073fc750c28322adf74e928
Adgregate Replay Attack
Posted Apr 8, 2009
Authored by Matthew Dempsky

Adgregate is susceptible a replay attack vulnerability.

tags | advisory
MD5 | e2b97e2b7f4dca836ccb7ec9383f1b94
Ubuntu Security Notice 755-1
Posted Apr 8, 2009
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice USN-755-1 - Multiple flaws were discovered in the Kerberos GSS-API and ASN.1 routines that did not correctly handle certain requests. An unauthenticated remote attacker could send specially crafted traffic to crash services using the Kerberos library, leading to a denial of service.

tags | advisory, remote, denial of service
systems | linux, ubuntu
advisories | CVE-2009-0844, CVE-2009-0845, CVE-2009-0846, CVE-2009-0847
MD5 | f6e818ad1ad93b2738a3aeeb21d175ab
Page 1 of 2
Back12Next

File Archive:

July 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    34 Files
  • 2
    Jul 2nd
    15 Files
  • 3
    Jul 3rd
    9 Files
  • 4
    Jul 4th
    8 Files
  • 5
    Jul 5th
    2 Files
  • 6
    Jul 6th
    3 Files
  • 7
    Jul 7th
    1 Files
  • 8
    Jul 8th
    15 Files
  • 9
    Jul 9th
    15 Files
  • 10
    Jul 10th
    20 Files
  • 11
    Jul 11th
    17 Files
  • 12
    Jul 12th
    16 Files
  • 13
    Jul 13th
    2 Files
  • 14
    Jul 14th
    1 Files
  • 15
    Jul 15th
    20 Files
  • 16
    Jul 16th
    27 Files
  • 17
    Jul 17th
    7 Files
  • 18
    Jul 18th
    5 Files
  • 19
    Jul 19th
    12 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close