exploit the possibilities
Showing 1 - 25 of 29 RSS Feed

Files Date: 2009-05-15

MyPic Image Gallery Local File Inclusion
Posted May 15, 2009
Authored by Securitylab Security Research | Site securitylab.ir

MyPic Image Gallery suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
MD5 | ad6fd7dfebd4a685c11aa07f38cf4e76
Shutter 0.1.1 SQL Injection
Posted May 15, 2009
Authored by YEnH4ckEr

Shutter version 0.1.1 suffers from multiple remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
MD5 | 2d72704686d075a054fdbc018424308c
Tuenti Cross Site Scripting
Posted May 15, 2009
Authored by YEnH4ckEr

Tuenti suffers from cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
MD5 | 0baf01630f44025d87736c108837f516
Rule Set Based Access Control
Posted May 15, 2009
Site rsbac.org

Rule Set Based Access Control (RSBAC) is an open source security extension for current Linux kernels. It is based on the Generalized Framework for Access Control (GFAC) and provides a flexible system of access control implemented with the help of a kernel patch. All security relevant system calls are extended by security enforcement code. This code calls the central decision component, which in turn calls all active decision modules and generates a combined decision. This decision is then enforced by the system call extensions. This version is for the 2.6 kernel. This release is for Linux kernel 2.6.29.2. A significant speedup and even better SMP scalability are expected from the new RCU based list locking. The most important changes since 1.3.5 are the addition of VUM (Virtual User Management) support, OTP support for UM, support of ANY for NETLINK control, checking of CLOSE requests in RC, the addition of SCD target videomem and kernel attribute pagenr, ext4 secure delete support, and many small bugfixes too. Generic lists were changed to use RCU instead of rw spinlocks.

tags | kernel
systems | linux
MD5 | 731cfaee70c087bb02c37a28392d31d5
Joomla ArtForms 2.1b7 Remote File Inclusion
Posted May 15, 2009
Authored by iskorpitx

The Joomla ArtForms component version 2.1b7 suffers from remote file inclusion vulnerabilities.

tags | exploit, remote, vulnerability, code execution, file inclusion
MD5 | ece3803313f46b99aff8effcea4ee32e
CFNetwork Heap Buffer Overflow
Posted May 15, 2009
Authored by Moritz Jodeit | Site nruns.com

A remotely exploitable vulnerability has been found in the HTTP header parsing code of the CFNetwork framework.

tags | advisory, web
advisories | CVE-2009-0157
MD5 | 4de6a44438fd53b33ceb6be7fa654bc9
Harland Scripts Command Execution
Posted May 15, 2009
Authored by G4N0K

Remote command execution exploit for eleven products from Harland Scripts.It performs authentication bypass and php code injection.

tags | exploit, remote, php
MD5 | d80babba6ab69693162c58a71b58f86f
iDEFENSE Security Advisory 2009-05-14.1
Posted May 15, 2009
Authored by iDefense Labs, mu-b | Site idefense.com

iDefense Security Advisory 05.14.09 -Local exploitation of an index validation vulnerability in Apple Inc.'s Mac OS X xnu kernel could allow an attacker to execute arbitrary code in the security context of the kernel. The Mac OS X xnu (Mach) kernel implements workqueues. This allows the kernel to schedule events to take place in a task. An input validation error exists within this implementation, which can lead to execution of arbitrary code in the kernel. Apple Inc.'s Mac OS X 10.5.2 and earlier is considered vulnerable to this issue.

tags | advisory, arbitrary, kernel, local
systems | apple, osx
advisories | CVE-2008-1517
MD5 | 897b30a020a855a7a6ad6d4b57afe9ad
Eggdrop/Windrop 1.6.19 Denial Of Service
Posted May 15, 2009
Authored by Thomas Sader

Remote denial of service exploit for Eggdrop and Windrop version 1.6.19.

tags | exploit, remote, denial of service
MD5 | 4e034932b09089d4d087358edf97005a
Linux 2.6.29 ptrace_attach() Race Condition
Posted May 15, 2009
Authored by prdelka | Site prdelka.blackart.org.uk

This is a local root exploit for the Linux 2.6.29 ptrace_attach() race condition that allows a process to gain elevated privileges under certain conditions.

tags | exploit, local, root
systems | linux
MD5 | 2406d30eaa6ecc2fd2340203ddef7c7a
Audioactive Player 1.93b Buffer Overflow
Posted May 15, 2009
Authored by hack4love

Audioactive Player version 1.93b local buffer overflow exploit that creates a malicious .m3u file.

tags | exploit, overflow, local
MD5 | 6b74b0df6be83a0e8cef3afb749e3255
Rama CMS 0.9.8 File Disclosure
Posted May 15, 2009
Authored by Br0ly

Rama CMS versions 0.9.8 and below suffer from a file disclosure vulnerability in download.php.

tags | exploit, php, info disclosure
MD5 | 360007268d1543a72c6984be23e5f480
StrawBerry 1.1.1 Local File Inclusion
Posted May 15, 2009
Authored by [AVT] | Site antichat.ru

StrawBerry version 1.1.1 local file inclusion and remote command execution exploit.

tags | exploit, remote, local, file inclusion
MD5 | 676d137e46a41ca53d3f6f328312ff3d
beLive 0.2.3 Local File Inclusion
Posted May 15, 2009
Authored by Kacper | Site devilteam.pl

beLive version 0.2.3 suffers from a local file inclusion vulnerability in arch.php.

tags | exploit, local, php, file inclusion
MD5 | b52f98fc6ff2dcfb84e6f3470fca8403
Secunia Security Advisory 35101
Posted May 15, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Xerox WorkCentre, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | f3cc8be7c322b823ae02ff5483bcf2b1
Secunia Security Advisory 35082
Posted May 15, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in vbDrupal, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory
MD5 | fdc6c94978866f2a7ac90faeec39030a
Secunia Security Advisory 35084
Posted May 15, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in HP Data Protector, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or potentially to gain escalated privileges.

tags | advisory, denial of service, local
MD5 | 35c72765bcc61a2e1753261d112d615c
Secunia Security Advisory 35064
Posted May 15, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for poppler. This fixes some vulnerabilities, which can be exploited by malicious people to potentially compromise an application using the library.

tags | advisory, vulnerability
systems | linux, redhat
MD5 | 7c76bff4fd5ffe3314c655a85f69b397
Secunia Security Advisory 35055
Posted May 15, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for acroread. This fixes some vulnerabilities, which can be exploited by malicious people to potentially compromise a user's system.

tags | advisory, vulnerability
systems | linux, redhat
MD5 | c4a6f0148e55cf77407679b22778b196
Secunia Security Advisory 35080
Posted May 15, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sun has acknowledged some vulnerabilities in Thunderbird included in Solaris, which can be exploited by malicious people to bypass certain security restrictions, disclose sensitive information, conduct cross-site scripting attacks, or potentially compromise a user's system.

tags | advisory, vulnerability, xss
systems | solaris
MD5 | 8c3fb8a408f80cdd5019d0dec015c599
Secunia Security Advisory 35058
Posted May 15, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for perl-DBD-Pg. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

tags | advisory, denial of service, perl, vulnerability
systems | linux, redhat
MD5 | 77aac2831472998023ecfffc16a80b71
Secunia Security Advisory 35086
Posted May 15, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in copSSH, which can be exploited by malicious people to bypass certain security restrictions or cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
MD5 | 76fac088e58cfcc0000c429ad215ddf4
Secunia Security Advisory 35045
Posted May 15, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Drupal, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory
MD5 | 5fed6f99c84b2ee6b2f50a22a9a76e84
Secunia Security Advisory 35075
Posted May 15, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in cwRsync, which can be exploited by malicious people to bypass certain security restrictions or cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
MD5 | f9b0d96e0c38c49096fb2f3c3b64aeba
Secunia Security Advisory 35039
Posted May 15, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been discovered in Family Connections, which can be exploited by malicious users and malicious people to conduct SQL injection attacks.

tags | advisory, vulnerability, sql injection
MD5 | 0f56a21e394c4c76442f8f3bebc69289
Page 1 of 2
Back12Next

File Archive:

January 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    8 Files
  • 2
    Jan 2nd
    11 Files
  • 3
    Jan 3rd
    11 Files
  • 4
    Jan 4th
    2 Files
  • 5
    Jan 5th
    2 Files
  • 6
    Jan 6th
    18 Files
  • 7
    Jan 7th
    15 Files
  • 8
    Jan 8th
    16 Files
  • 9
    Jan 9th
    10 Files
  • 10
    Jan 10th
    13 Files
  • 11
    Jan 11th
    2 Files
  • 12
    Jan 12th
    4 Files
  • 13
    Jan 13th
    21 Files
  • 14
    Jan 14th
    18 Files
  • 15
    Jan 15th
    12 Files
  • 16
    Jan 16th
    18 Files
  • 17
    Jan 17th
    11 Files
  • 18
    Jan 18th
    3 Files
  • 19
    Jan 19th
    2 Files
  • 20
    Jan 20th
    9 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    0 Files
  • 24
    Jan 24th
    0 Files
  • 25
    Jan 25th
    0 Files
  • 26
    Jan 26th
    0 Files
  • 27
    Jan 27th
    0 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close