exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 35 RSS Feed

Files Date: 2009-06-26

CoffeeWars X - Call For Beans
Posted Jun 26, 2009
Authored by foofus

Coffee Wars X: Call For Beans - Bring your best beans and put 'em up for judgment by an over-qualified, over-caffeinated, (and over-rated) Coffee Wars judges and contestant panel!

tags | paper, conference
SHA-256 | 4b9a2de46ba551c39854022cd9a5029dccd12df01a8d834dabf984b76826db4a
Mandriva Linux Security Advisory 2009-143
Posted Jun 26, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-143 - Multiple security vulnerabilities has been identified and fixed in netpbm. The updated packages have been patched to prevent this.

tags | advisory, vulnerability
systems | linux, mandriva
advisories | CVE-2008-3520, CVE-2008-3522
SHA-256 | b81ea8edb865aa9d27f8415798b828cc20746cd83801b09dfc80cc4527f2804a
Mandriva Linux Security Advisory 2009-142
Posted Jun 26, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-142 - Multiple security vulnerabilities have been identified and fixed in jasper. The updated packages have been patched to prevent this.

tags | advisory, vulnerability
systems | linux, mandriva
advisories | CVE-2007-2721, CVE-2008-3520, CVE-2008-3521, CVE-2008-3522
SHA-256 | b920991474e725876f9cb28ec9f67c5880d98861c674fd23c25eec1f1ac63adc
PHP Address Book 4.0.x SQL Injection
Posted Jun 26, 2009
Authored by YEnH4ckEr

PHP Address Book version 4.0.x suffers from multiple remote SQL injection vulnerabilities.

tags | exploit, remote, php, vulnerability, sql injection
SHA-256 | fed6f8d567a568ddda69e8d3a90bcc6a319adf4a36aa02549d0b5afd301e1c6f
iDEFENSE Security Advisory 2009-06-26.1
Posted Jun 26, 2009
Authored by iDefense Labs | Site idefense.com

iDefense Security Advisory 06.26.09 - Remote exploitation of a stack based buffer overflow vulnerability in Hewlett-Packard Development Co. LP (HP)'s Network Node Manager could allow an attacker to execute arbitrary code with the privileges of the affected service. The vulnerability exists within the 'rping' application, which is distributed with the Linux version of NNM. It is possible for a remote attacker to launch the 'rping' application and trigger a stack based buffer overflow. iDefense has confirmed the existence of this vulnerability in Network Node Manager version 7.53 for Linux. Previous versions may also be affected. The Windows version is not affected.

tags | advisory, remote, overflow, arbitrary
systems | linux, windows
advisories | CVE-2009-1420
SHA-256 | 7675a1f6766cff4edda973a4f9158e1010e7d7b646122849c2e2c355ac3642bf
Harvest Manager Cross Site Scripting
Posted Jun 26, 2009
Authored by S3T4N | Site sux0r.net

Harvest Manager suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 7780cfe5b22a91ad34b50b4b21607b5465a49bf84f12cb4b1af77fdc602118cb
Mega File Manager 1.0 Local File Inclusion
Posted Jun 26, 2009
Authored by SirGod | Site insecurity.ro

Mega File Manager version 1.0 suffers from a local file inclusion vulnerability in index.php.

tags | exploit, local, php, file inclusion
SHA-256 | 53fecea1baff2992bff2b56a3f5800d86614fb8629f743d120f04db87c17ac41
ForumPal 1.5 SQL Injection
Posted Jun 26, 2009
Authored by ThE g0bL!N | Site h4ckf0ru.com

ForumPal version 1.5 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
SHA-256 | c775ba7cfbb748e03bcca44fe5f8239a8eacdb481df7f344c613c0e1da19eec4
Mandriva Linux Security Advisory 2009-141
Posted Jun 26, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-141 - A number of security vulnerabilities have been discovered for Mozilla Thunderbird version 2.0.0.21. This update provides the latest Thunderbird to correct these issues.

tags | advisory, vulnerability
systems | linux, mandriva
advisories | CVE-2009-1302, CVE-2009-1303, CVE-2009-1304, CVE-2009-1305, CVE-2009-1306, CVE-2009-1307, CVE-2009-1308, CVE-2009-1309, CVE-2009-2210, CVE-2009-1392, CVE-2009-1832, CVE-2009-1833, CVE-2009-1838, CVE-2009-1836, CVE-2009-1840, CVE-2009-1841
SHA-256 | 5a7c5e992f20a8403dc5d445cc3a02e58db61488c89841fcedd3ba1b98f1673a
Multiple Vendors libc/gdtoa printf(3) Array Overrun
Posted Jun 26, 2009
Authored by Maksymilian Arciemowicz | Site securityreason.com

An array overrun vulnerability has been discovered in libc/gdtoa printf(3). Systems affected include OpenBSD version 4.5, NetBSD version 5.0, and FreeBSD versions 7.2 and 6.4.

tags | advisory, overflow
systems | netbsd, freebsd, openbsd
advisories | CVE-2009-0689
SHA-256 | 6fc751f14f61d5dec5fcbcc881b492b6baf8d6e0fa133f6837603632c8dae90f
Trillian SSL Certificate Vulnerability
Posted Jun 26, 2009
Authored by Gabriel Menezes Nunes

Trillian does not check SSL certificate before sending MSN user credentials. An attacker is able to obtain MSN username and password with a spoofed certificate and no alert is generated to the user. This vulnerability was found in Trillian Basic 3.1. Other versions and/or protocols may also be affected.

tags | advisory, spoof, protocol
SHA-256 | 80d0f4c5d39bf9cdc1609026d7171a8aae4c7e7e4e63be77e04ab20607f422c4
Gizmo SSL Certificate Vulnerability
Posted Jun 26, 2009
Authored by Gabriel Menezes Nunes

Gizmo does not check SSL certificate before sending user credentials. An attacker is able to obtain username and password with a spoofed certificate and no alert is generated to the user. This vulnerability was found in Gizmo for Linux 3.1.0.79. Other versions may also be affected.

tags | advisory, spoof
systems | linux
SHA-256 | 0963411148dff3a957067bbccd8efaaa161c21fd0b97df9edee8c399b471c0bb
aMSN SSL Certification Vulnerability
Posted Jun 26, 2009
Authored by Gabriel Menezes Nunes

aMSN does not check SSL certificate before sending MSN user credentials. An attacker is able to obtain MSN username and password with a spoofed certificate and no alert is generated to the user. This vulnerability was found in aMSN 0.97.2. Other versions may also be affected.

tags | advisory, spoof
SHA-256 | 6962e53c0cb275dfaea9d2d636b399df88d809156cea4cd085ce397d8df3d471
MAPDAV - More Accurate Password Dictionary Attack Vector
Posted Jun 26, 2009
Authored by Marshall Whittaker | Site mapdav.sourceforge.net

MAPDAV, or the More Accurate Password Dictionary Attack Vector, is designed to use what is known about a user or users (ex, username, first name, middle name, last name, etc) on a unix/linux system from a /etc/passwd file and tries to come up with probable combinations that could be the user's password. An administrator could run the output through a cracker and see if their user's passwords are anything easy to guess.

tags | cracker
systems | linux, unix
SHA-256 | 4c539a231681899f26f1275b056ed0eecd96ac227aed64e16f61b780e72584e1
Virtue Online Test Generator XSS / SQL Injection
Posted Jun 26, 2009
Authored by HxH

Virtue Online Test Generator suffers from cross site scripting, authentication bypass, and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | a29470c962e84f125dd0cb589cb6d63f0ff9318a79eb9f98f338ee32ae530e91
TOR Virtual Network Tunneling Tool 0.2.0.35
Posted Jun 26, 2009
Site tor.eff.org

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).

Changes: This release fixes a big bug that was causing Tor relays with dynamic IP addresses to disappear from the network. It also fixes a rare crash bug on fast exit relays.
tags | tool, remote, local, peer2peer
SHA-256 | 7180c56c11e13d1ca860e3773ddfb2c9f951900670224a0850766795ac94b62e
Trafscrambler Anti-Sniffer For OS X
Posted Jun 26, 2009
Authored by Maxim Bourmistrov | Site en.roolz.org

Trafscrambler is an anti-sniffer/IDS NKE (Network Kernel Extension) for Mac OS X. This initial release implements SYN-decoy, Pre/Post connections SYN, TCP reset, and zero window attacks. Author tested this on x86 OS X versions 10.5.6 and 10.5.7. It should work on PPC and older releases as well.

tags | tool, x86, kernel, tcp, intrusion detection, ppc
systems | unix, apple, osx
SHA-256 | aab723f080dfb7656d1c9a5a1e0be87e610747f7fbbad4ff67a4c809ec5c6cf2
2BGal 3.1.2 phpinfo() Disclosure
Posted Jun 26, 2009
Authored by NoGe

2BGal version 3.1.2 appears to suffer from phpinfo() disclosure vulnerabilities.

tags | exploit, vulnerability
SHA-256 | 95f7ff25ea1b56cf3f39e41a3aabf8bd7a6dc046f0e068fa74bc645290bac44f
Debian Linux Security Advisory 1824-1
Posted Jun 26, 2009
Authored by Debian | Site debian.org

Debian Security Advisory 1824-1 - Several remote vulnerabilities have been discovered in phpMyAdmin, a tool to administer MySQL over the web.

tags | advisory, remote, web, vulnerability
systems | linux, debian
advisories | CVE-2009-1150, CVE-2009-1151
SHA-256 | c0543d372c815f7c798ee667d335e91cd6644265af5e237a867f283f8dcbb999
Aardvark Topsites XSS / Disclosure
Posted Jun 26, 2009
Authored by J07AP3

Aardvark Topsites PHP suffers from cross site scripting / html injection and information disclosure vulnerabilities.

tags | exploit, php, vulnerability, xss, info disclosure
SHA-256 | b5e3d3a0c3bcff1926ee75f02cb44cfcfb5488814b5329d97ffc834650a997fd
Secunia Security Advisory 35557
Posted Jun 26, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Drupal Links Package, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory
SHA-256 | 7ed75c971bad04a9d5a75fa5f4a6772afe834d8b691559f1e62a62df041ace2d
Secunia Security Advisory 35573
Posted Jun 26, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for samba. This fixes some vulnerabilities, which can be exploited by malicious users to bypass certain security restrictions and by malicious people to potentially compromise a user's system.

tags | advisory, vulnerability
systems | linux, debian
SHA-256 | 6e900cc7fc13a2e127764c69dbf51d41498093a9b70804c78053fcbd206b3598
Secunia Security Advisory 35585
Posted Jun 26, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for phpmyadmin. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks or compromise a vulnerable system.

tags | advisory, vulnerability, xss
systems | linux, debian
SHA-256 | 4b01504221bdc7389b6aba6bb5b6e2f337baa3e084cfbc99b102b7bc695d2b7b
Secunia Security Advisory 35580
Posted Jun 26, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Sun Solaris, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | solaris
SHA-256 | 71bdacf246f1264554a04194e430eaa6ef1a810c6510fee025fcae1714bb080a
Secunia Security Advisory 35537
Posted Jun 26, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Sun Solaris, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
systems | solaris
SHA-256 | 880f478221551aa3dde3139d40b82a0adc155443cddcff00bb8049dfc8dc291b
Page 1 of 2
Back12Next

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close