exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 33 RSS Feed

Files Date: 2009-04-20

HP Security Bulletin HPSBMA02422 SSRT080146
Posted Apr 20, 2009
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin - Potential security vulnerabilities have been identified with HP StorageWorks Storage Mirroring. These vulnerabilities could be exploited remotely to execute arbitrary code, cause a Denial of Service (DoS), or gain unauthorized access.

tags | advisory, denial of service, arbitrary, vulnerability
advisories | CVE-2009-0716, CVE-2009-0717, CVE-2009-0718
SHA-256 | 45a5751478cdee9d9592c8154472851469cc8b4dfc3de596d3f011b80be182a7
HP Security Bulletin HPSBMA02414 SSRT080185
Posted Apr 20, 2009
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin - A potential security vulnerability has been identified with HP Storage Essentials running Secure NaviCLI. The vulnerability could be exploited remotely to gain unauthorized access or to gain extended privileges.

tags | advisory
advisories | CVE-2009-0715
SHA-256 | 89fa74bea338ffa329eb718b1d5a1192fa7585de4fade2f800c168c19bfbff9f
Debian Linux Security Advisory 1775-1
Posted Apr 20, 2009
Authored by Debian | Site debian.org

Debian Security Advisory 1775-1 - It was discovered that php-json-ext, a JSON serialiser for PHP, is prone to a denial of service attack, when receiving a malformed string via the json_decode function.

tags | advisory, denial of service, php
systems | linux, debian
advisories | CVE-2009-1271
SHA-256 | 59757fbe721f6e0366f91a06d6e4ae527b6f296f3717b65ca5241698130e0e0f
BlueMaho Bluetooth Auditor
Posted Apr 20, 2009
Authored by thc | Site wiki.thc.org

BlueMaho is a graphical user interface for a suite of tools used to test the security of bluetooth devices. It is freeware, open source, written in python, and uses wxPyhon.

tags | tool, python, wireless
SHA-256 | 9b36bcf73a59d7c03a2262287c4aa37fbd308801d6fa4d3cbc86b9d15ad7ff1c
Online Photo Pro 2.0 XSS
Posted Apr 20, 2009
Authored by Vrs-hCk

Online Photo Pro version 2.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 87060871d1071d1f502fee68a5a454ebc920cf9281f82bf11da989da764cc5e8
Online Contact Manager 3.0 XSS
Posted Apr 20, 2009
Authored by Vrs-hCk

Online Contact Manager version 3.0 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | a9acd577c0d8a1e4ee4483594e0aa58c1d3e638f182ee8dba6f0f1d102861ec1
FunGamez LFI / SQL Injection
Posted Apr 20, 2009
Authored by YEnH4ckEr

FunGamez RC1 suffers from a SQL injection issue that allows for authentication bypass and also suffers from local file inclusion vulnerability.

tags | exploit, local, sql injection, file inclusion
SHA-256 | 259603300e20036b391a6e5f31d797a33e362791df18e6f6a6afeb40ab7e2e3b
WysGui CMS 1.2 BETA SQL Injection
Posted Apr 20, 2009
Authored by YEnH4ckEr

WysGui CMS version 1.2 BETA blind SQL injection exploit.

tags | exploit, sql injection
SHA-256 | 5cc59da950f14bf2a331941be915fa71da04ec7fc5a9ff3f1d063065d73ab2b0
Banner Student System Cross Site Scripting
Posted Apr 20, 2009
Authored by gmar | Site yougotxssed.com

Banner Student System by SunGard version 7.4 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | e61a2d80318632bf580ba46d691ef105ef7a556ba92bbce752b7c47d7f5fff3f
Creasito E-Commerce SQL Injection
Posted Apr 20, 2009
Authored by Salvatore Fresta

Creasito E-Commerce Content Manager version 1.3.16 suffers from a remote SQL injection vulnerability allowing for authentication bypass.

tags | exploit, remote, sql injection
SHA-256 | bea2f5a817ddf450718d9d48fd1465e59fa5ae4a311c400feb6748cf76e38c1f
Multi-Lingual E-Commerce LFI / Disclosure / Upload
Posted Apr 20, 2009
Authored by Salvatore Fresta

Multi-Lingual E-Commerce System version 0.2 suffers from local file inclusion, information disclosure, and arbitrary file upload vulnerabilities.

tags | exploit, arbitrary, local, vulnerability, file inclusion, info disclosure, file upload
SHA-256 | 4058f3aa641a75ac609c2d754c5d178e4a360fceb09345d21444e4111d376374
TotalCalendar 2.4 Remote File Inclusion
Posted Apr 20, 2009
Authored by DarKdewiL

TotalCalendar version 2.4 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 19cef203067fc58835631548d3dd123059b4552c87d9fa9c5b7f8115336685b2
Pligg 9.9.0 Blind SQL Injection
Posted Apr 20, 2009
Authored by Hakxer

Pligg version 9.9.0 blind SQL injection exploit that leverages editlink.php.

tags | exploit, php, sql injection
SHA-256 | afe5deac727a73c4c42cc213794c8ddf9f09c5f04e113ac253c082f3bc25e3c4
Flatnux Local File Inclusion / Upload
Posted Apr 20, 2009
Authored by __GiReX__ | Site girex.altervista.org

Flatnux 2009-03-27 suffers from local file inclusion and shell upload vulnerabilities.

tags | exploit, shell, local, vulnerability, file inclusion, file upload
SHA-256 | c568e2779c9daad62a0cf157bd7e4dfcd22d49ad256b4f2b6cda375bc23c80a7
Seditio CMS Events SQL Injection
Posted Apr 20, 2009
Authored by OoN_Boy | Site oonboy.blogspot.com

The Seditio CMS Events plugin suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 78361086c2c1b22e6e75e6b1f7bf316faafea3b834e81887b6f613b9f1070294
Address Book 2.5 Shell Upload
Posted Apr 20, 2009
Authored by JosS | Site spanish-hackers.com

Address Book version 2.5 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell, file upload
SHA-256 | c7d2e8ec04cfb0bee965505436e6cd89942b3ae7387ad9c527b26c2ec2b9fb59
Linksys WRT54GC Password Changer
Posted Apr 20, 2009
Authored by Gabriel Lima

Linksys WRT54GC administration password changing exploit.

tags | exploit
SHA-256 | da074ee787a2a88af7e64dc05e241325daf3525e32fa2814ce3f2e5dd7e34aac
Linux 2.6 Kernel UDEV Exploit
Posted Apr 20, 2009
Authored by Kingcope

Local root exploit for the Linux 2.6 kernel udev vulnerability.

tags | exploit, kernel, local, root
systems | linux
advisories | CVE-2009-1185
SHA-256 | 6b8094daa99e89f9da003c640337c6af989fe36c0a203df09ffa80b2b8f27e6d
EZ Webitor SQL Injection
Posted Apr 20, 2009
Authored by Snakespc | Site snakespc.com

EZ Webitor suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
SHA-256 | f5c572c45fa8c3d2e3d8366bdcb7207663dcb13579dd4231c8f4c52bc8687f6c
Gentoo Linux Security Advisory 200904-19
Posted Apr 20, 2009
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200904-19 - Multiple errors in LittleCMS allow for attacks including the remote execution of arbitrary code. RedHat reported a null-pointer dereference flaw while processing monochrome ICC profiles. Chris Evans also discovered memory leaks, integer overflows, and stack-based overflows. Versions less than 1.18-r1 are affected.

tags | advisory, remote, overflow, arbitrary, memory leak
systems | linux, redhat, gentoo
advisories | CVE-2009-0581, CVE-2009-0723, CVE-2009-0733, CVE-2009-0793
SHA-256 | e3539824a2eae5dbe90fe0fb63225c5786d23d1f68b49df72ee7465b5d262ae5
Gentoo Linux Security Advisory 200904-18
Posted Apr 20, 2009
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200904-18 - Two errors in udev allow for a local root compromise and a Denial of Service. Versions less than 124-r2 are affected.

tags | advisory, denial of service, local, root
systems | linux, gentoo
advisories | CVE-2009-1185, CVE-2009-1186
SHA-256 | 608a182c5963162b9243d3477b9b676352fe1dbdf134e9d1808ebc79866b19fb
Gentoo Linux Security Advisory 200904-17
Posted Apr 20, 2009
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200904-17 - Adobe Reader is vulnerable to execution of arbitrary code. Versions less than 8.1.4 are affected.

tags | advisory, arbitrary
systems | linux, gentoo
advisories | CVE-2009-0193, CVE-2009-0658, CVE-2009-0927, CVE-2009-0928, CVE-2009-1061, CVE-2009-1062
SHA-256 | 82943914ab791c70a4e7ab66d9e6b9500c51f22b7c584169a076dca5843766d1
webClassifieds 2005 Insecure Cookie
Posted Apr 20, 2009
Authored by ThE g0bL!N | Site h4ckf0ru.com

webClassifieds 2005 suffers from an authentication bypass vulnerability due to insecure cookie handling.

tags | exploit, bypass, insecure cookie handling
SHA-256 | bd6aaa77698a1401b0788e05d86307f705f0890da46d2cae417364f6786731b3
Addonics NAS Adapter Denial Of Service
Posted Apr 20, 2009
Authored by h00die

Addonics NAS Adapter remote denial of service exploit that leverages bts.cgi.

tags | exploit, remote, denial of service, cgi
SHA-256 | dc0ed7bb8a5d050cf2fc842eb643b436ee5841782f12eaa5d52ac64761bc2222
Stronghold 2.3 Cross Site Scripting
Posted Apr 20, 2009
Authored by Xia Shing Zee

Stronghold version 2.3 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 07d457659649755c85c5160ca2fa5f9b473e32ef4664273821bd5d9608459b80
Page 1 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close