exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 10 of 10 RSS Feed

Files Date: 2009-05-29

VMware Security Advisory 2009-0007
Posted May 29, 2009
Authored by VMware | Site vmware.com

VMware Security Advisory - VMware Hosted products and ESX and ESXi patches resolve a security issue. Update patch 13 for ESX 2.5.5 updates the libpng Service Console RPM.

tags | advisory
advisories | CVE-2009-1805, CVE-2009-0040, CVE-2008-1382
SHA-256 | 203a590a4bdbe48adceffe110e8cd59465f46fb0e57d0752d412221afaa50075
Core Security Technologies Advisory 2009.0401
Posted May 29, 2009
Authored by Core Security Technologies | Site coresecurity.com

Core Security Technologies Advisory - Ston3D StandalonePlayer and WebPlayer are vulnerable to a command injection vulnerability, which can be exploited by malicious remote attackers. The vulnerability is due to the Ston3D scripting language. It provides the function 'system.openURL()' which does not properly sanitize the input before using it. This can be exploited to execute arbitrary commands with the privileges of the Stone3D player by opening a specially crafted file.

tags | advisory, remote, arbitrary
advisories | CVE-2009-1792
SHA-256 | ba901a044dfa0737878b1901f13a67a16f2cb60751e063e166d74890420fe9f5
ECShop PHP Code Execution
Posted May 29, 2009
Authored by Securitylab Security Research | Site securitylab.ir

ECShop version 2.6.2 suffers from a remote php code execution vulnerability.

tags | exploit, remote, php, code execution
SHA-256 | b017ac338a4c4eea455718e0313d298cd1aa7410e9ac0bba87478f95c9adf5d0
Forum Scripts Sniffing Issue
Posted May 29, 2009
Authored by Jacques Copeau

Forum Scripts suffers from a MIME/Content-Type-Sniffing issue in the Image Uploads functionality.

tags | advisory
SHA-256 | 731d326cfc3b0dc0cf864c7ff0fd1df5cfd3722ea797c3dba0783507d8e6e2f9
PRTG Traffic Grapher Cross Site Scripting
Posted May 29, 2009
Authored by SVRT | Site security.bkis.vn

PRTG Traffic Grapher suffers from a cross site scripting vulnerability in Monitor_Bandwidth. Versions 6.2.2.977 and below are affected.

tags | advisory, xss
SHA-256 | 321c5bd641d7df9b5b7765cbbc13dae0d7c0d8fc648870ce65102abccb73035d
Firefox Denial Of Service
Posted May 29, 2009
Authored by Thierry Zoller

Mozilla Firefox 3.x suffers from a remote denial of service vulnerability.

tags | exploit, remote, denial of service
SHA-256 | 3dc1b9655716e15b6e5baacdba75bde317977a3227906edce4971b5f07d58c57
Call For Papers - ACM CCS Workshops
Posted May 29, 2009
Site sigsac.org

Call for papers for the ACM CCS Workshops that will be colocated with the 16th ACM Conference on Computer and Communications Security (CCS) 2009. It will be held from November 9th through the 13th at the Hyatt Regency in Chicago, IL, USA.

tags | paper, conference
SHA-256 | a984874b41c7e48296ee249a32a0da083c7979edb41073f1971f7251ff3afa4f
Advchk Advisory Checking Tool
Posted May 29, 2009
Authored by Stephan Schmieder | Site advchk.unixgu.ru

Advchk (Advisory Check) reads security advisories so you do not have to. Advchk gathers security advisories using RSS feeds, compares them to a list of known services, and alerts you if you are vulnerable. Since adding hosts and services by hand would be quite a boring task, advchk leverages nmap for automatic service and version discovery.

Changes: Windows hosts can now be monitored remotely by using the MS-RPC protocol. INSTALL and install.sh files have been added.
systems | unix
SHA-256 | 996ccecf32af011b6f124af930c0277523a6a9a3d7da3cc3b2395019ff878867
Zero Day Initiative Advisory 09-021
Posted May 29, 2009
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 09-021 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists when the application parses a malformed .PICT image. While decoding a tag 0x77 in the image, the application misuses a 16-bit length when allocating tag data. When copying tag data into this buffer, a heap overflow occurs. This can lead to code execution under the context of the current user.

tags | advisory, remote, overflow, arbitrary, code execution
systems | apple
advisories | CVE-2009-0010
SHA-256 | 06af55d51064952f7f13cf601e31cd96c0508c0273c50c63b702501c76b5849a
Small Pirates 2.1 SQL Injection
Posted May 29, 2009
Authored by YEnH4ckEr

Small Pirates version 2.1 suffers from SQL injection and cookie stealing vulnerabilities.

tags | exploit, vulnerability, sql injection
SHA-256 | d89f7eb8dcde6fc5937f4bd5606bba68783386d6db9dbcfebf4294bb66a10bd1
Page 1 of 1
Back1Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    0 Files
  • 9
    Sep 9th
    0 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    0 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close