exploit the possibilities
Showing 1 - 19 of 19 RSS Feed

Files Date: 2009-04-23

CoolPlayer Portable 2.19.1 Overflow
Posted Apr 23, 2009
Authored by Stack | Site v4-team.com

CoolPlayer Portable version 2.19.1 skin related buffer overflow exploit.

tags | exploit, overflow
MD5 | caec4aa612e3b209bd0f9db404a6ca12
Popcorn 1.87 Heap Overflow
Posted Apr 23, 2009
Authored by x.CJP.x

Popcorn version 1.87 remote heap overflow proof of concept exploit.

tags | exploit, remote, overflow, proof of concept
MD5 | 3efe21add07ec46b91f350965ad5f861
Dream FTP Server 1.02 File Disclosure
Posted Apr 23, 2009
Authored by Cyber-Zone | Site iq-ty.com

Dream FTP Server version 1.02 arbitrary file disclosure exploit.

tags | exploit, arbitrary, info disclosure
MD5 | 72efe1ee66ecec601e8dffad5ebb652d
CS Whois Lookup Command Execution
Posted Apr 23, 2009
Authored by SirGod | Site insecurity.ro

CS Whois Lookup suffers from a remote command execution vulnerability in index.php.

tags | exploit, remote, php
MD5 | f97722d938dfffe90b7a9a7ce90bb0da
Curuncula Rootkit Detection
Posted Apr 23, 2009
Authored by Giuseppe Cocomazzi

Curuncula is a tool shipped as a loadable kernel module that aims to detect rootkits based on the Intel debugging support facilities. Rootkits that set the GD access flag are also detected. It makes use of the "last branch recording" mechanism provided by the Intel architecture. Support both the 2.4 and 2.6 Linux kernels.

tags | kernel
systems | linux, unix
MD5 | 45435a5c2788ef4e37926b909a998c12
Beltane Web-Based Management For Samhain
Posted Apr 23, 2009
Site la-samhna.de

Beltane is a web-based central management console for the Samhain file integrity / intrusion detection system. It enables the administrator to browse client messages, acknowledge them, and update centrally stored file signature databases. Beltane requires a Samhain (version 1.6.0 or higher) client/server installation, with file signature databases stored on the central server, and logging to a SQL database enabled.

Changes: Error logging has been improved by adding more information.
tags | tool, web, intrusion detection
systems | unix
MD5 | 41168bb942a8c35a84f0c716137bac29
Ubuntu Security Notice 764-1
Posted Apr 23, 2009
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice USN-764-1 - Several flaws were discovered in the Firefox and XULRunner browser engines. These could lead to arbitrary code execution, spoofing attacks, and more.

tags | advisory, arbitrary, spoof, code execution
systems | linux, ubuntu
advisories | CVE-2009-0652, CVE-2009-1302, CVE-2009-1303, CVE-2009-1304, CVE-2009-1305, CVE-2009-1306, CVE-2009-1307, CVE-2009-1308, CVE-2009-1309, CVE-2009-1310, CVE-2009-1311, CVE-2009-1312
MD5 | 49bf61a146ae689053e485693248b9bb
strongSwan IPsec / IKEv1 / IKEv2 Implementation For Linux
Posted Apr 23, 2009
Authored by Andreas Steffen | Site strongswan.org

strongSwan is a complete IPsec and IKEv1 implementation for Linux 2.4 and 2.6 kernels. It interoperates with most other IPsec-based VPN products. It is a descendant of the discontinued FreeS/WAN project. The focus of the strongSwan project is on strong authentication mechanisms using X.509 public key certificates and optional secure storage of private keys on smartcards through a standardized PKCS#11 interface. A unique feature is the use of X.509 attribute certificates to implement advanced access control schemes based on group memberships.

Changes: This release implements IKEv2 Multiple Authentication Exchanges (RFC 4739). Refactored IKEv1 pluto code uses the libstrongswan library for basic functions. Up to two DNS and WINS servers to be sent via the IKEv1 ModeConfig protocol can thus be configured via strongswan.conf attributes.
tags | kernel, encryption
systems | linux
MD5 | eaffd26ebfad2ced3cd28cc4e43d9775
Stunnel SSL Wrapper
Posted Apr 23, 2009
Authored by Michal Trojnara | Site stunnel.org

Stunnel is a program that allows you to encrypt arbitrary TCP connections inside SSL (Secure Sockets Layer) available on both Unix and Windows. Stunnel can allow you to secure non-SSL aware daemons and protocols (like POP, IMAP, NNTP, LDAP, etc) by having Stunnel provide the encryption, requiring no changes to the daemon's code.

Changes: Win32 DLLs were provided for OpenSSL 0.9.8k. FIPS support was updated for openssl-fips 1.2. A new priority failover strategy was implemented for multiple "connect" targets. pgsql protocol negotiation was added.
tags | arbitrary, encryption, tcp, imap, protocol
systems | windows, unix
MD5 | 3c655d815576f50046a1c28744b88681
Home Web Server r1.7.1 Memory Corruption
Posted Apr 23, 2009
Authored by Aodrulez | Site aodrulez.blogspot.com

Home Web Server versions r1.7.1 and below GUI thread memory corruption exploit.

tags | exploit, web
MD5 | 571a9185ea25b2f6f2e4e0f590da8728
Norton Ghost Support Module Denial Of Service
Posted Apr 23, 2009
Authored by shinnai | Site shinnai.altervista.org

Norton Ghost Support module for EasySetup wizard suffers from a remote denial of service vulnerability.

tags | exploit, remote, denial of service
MD5 | 8b0d59b36fb5e49ef8469aaf9d862d53
Fowl CMS 1.1 SQL Injection / LFI / Upload
Posted Apr 23, 2009
Authored by YEnH4ckEr

Fowl CMS version 1.1 suffers from shell upload, SQL injection, authentication bypass, and insecure cookie vulnerabilities.

tags | exploit, shell, vulnerability, sql injection, bypass, file inclusion, file upload, insecure cookie handling
MD5 | 49d70fd5b60720fbf3f6a40f29567448
Secunia Security Advisory 34806
Posted Apr 23, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - gmar has reported a vulnerability in Banner Student, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory
MD5 | 4d718f3c0d06db5458a03b54c3e086c3
Secunia Security Advisory 34763
Posted Apr 23, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities with unknown impacts have been reported in OCS Inventory NG (Open Computers and Software Inventory).

tags | advisory, vulnerability
MD5 | b445810bc6ec1ec750d1c08f20e3c022
Secunia Security Advisory 34820
Posted Apr 23, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - zer0day has discovered a vulnerability in New 5 Star Rating System, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
MD5 | a0aa80989b7e8430ef7171c8d055c292
Secunia Security Advisory 34846
Posted Apr 23, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for moin. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
systems | linux, fedora
MD5 | 4f93761b549b00120ab0329aad3453c4
Secunia Security Advisory 34789
Posted Apr 23, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Mahara, which can be exploited by malicious people to conduct cross-site scripting attacks and potentially compromise a vulnerable system.

tags | advisory, vulnerability, xss
MD5 | 1abce74cbb24fd6cf8962510b20c29a1
Secunia Security Advisory 34794
Posted Apr 23, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has acknowledged a security issue in git-core, which can be exploited by malicious, local users manipulate certain data and to potentially gain escalated privileges.

tags | advisory, local
systems | linux, debian
MD5 | 007ed798420daeac51ea3b49f5b141dc
Secunia Security Advisory 34834
Posted Apr 23, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some weaknesses have been reported in 010 Editor, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | 7a19f0c3f1fe1d09b5787319119c1b5c
Page 1 of 1
Back1Next

File Archive:

February 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    1 Files
  • 2
    Feb 2nd
    2 Files
  • 3
    Feb 3rd
    17 Files
  • 4
    Feb 4th
    15 Files
  • 5
    Feb 5th
    24 Files
  • 6
    Feb 6th
    16 Files
  • 7
    Feb 7th
    19 Files
  • 8
    Feb 8th
    1 Files
  • 9
    Feb 9th
    2 Files
  • 10
    Feb 10th
    15 Files
  • 11
    Feb 11th
    20 Files
  • 12
    Feb 12th
    12 Files
  • 13
    Feb 13th
    18 Files
  • 14
    Feb 14th
    17 Files
  • 15
    Feb 15th
    4 Files
  • 16
    Feb 16th
    4 Files
  • 17
    Feb 17th
    34 Files
  • 18
    Feb 18th
    15 Files
  • 19
    Feb 19th
    19 Files
  • 20
    Feb 20th
    20 Files
  • 21
    Feb 21st
    15 Files
  • 22
    Feb 22nd
    2 Files
  • 23
    Feb 23rd
    2 Files
  • 24
    Feb 24th
    16 Files
  • 25
    Feb 25th
    37 Files
  • 26
    Feb 26th
    15 Files
  • 27
    Feb 27th
    15 Files
  • 28
    Feb 28th
    4 Files
  • 29
    Feb 29th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close