exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 20 of 20 RSS Feed

Files Date: 2009-08-13

KiwiCON 2009 Call For Papers
Posted Aug 13, 2009
Site kiwicon.org

Kiwicon '09 Call For Papers - This year Kiwicon will be held from November 28th through 29th, 2009.

tags | paper, conference
SHA-256 | a1b80a48f307d2f41844c793e4aa75d2285dbceb749436ac8b32d0882aa8e003
Ubuntu Security Notice 816-1
Posted Aug 13, 2009
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice USN-816-1 - Moxie Marlinspike discovered that fetchmail did not properly handle certificates with NULL characters in the certificate name. A remote attacker could exploit this to perform a man in the middle attack to view sensitive information or alter encrypted communications.

tags | advisory, remote
systems | linux, ubuntu
advisories | CVE-2009-2666
SHA-256 | f84db5283372ab8ae42ba4dff0f41857f47a11217c3e188b9ac25bc8e7124c00
SAP NetWeaver Cross Site Scripting
Posted Aug 13, 2009
Authored by Sh2kerr | Site dsecrg.com

SAP NetWeaver Application Server version 7.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 610f63e221cf5f949da2e1908a76e98d823e3e6ea118b70ae0b3851af53f78bf
Solo Artist SQL Injection
Posted Aug 13, 2009
Authored by S3T4N | Site sux0r.net

Solo Artist websites suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 091da3a309c6e3d2c31d335ce30251e3a502860a8ac1f4f060090592ac9a9c62
MS Wordpad Local Crash
Posted Aug 13, 2009
Authored by murderkey

Microsoft Wordpad on Windows XP SP3 memory exhaustion exploit.

tags | exploit
systems | windows
SHA-256 | 841a5199863cf199f595ac60421069edd4b38c15d2488e722bd45fadae96fd56
Shorty 0.7.1b Insecure Cookie
Posted Aug 13, 2009
Authored by Pedro Laguna

Shorty version 0.7.1 Beta suffers from an insecure cooking handling vulnerability that allows for authentication bypass.

tags | exploit
SHA-256 | c8a4a0c14c920cf3542bc100815086b75f34ae49a560971714b7134aaf48864f
Microsoft Windows MSMQ Privilege Escalation
Posted Aug 13, 2009
Authored by Nikita Tarakanov | Site securitylab.ru

Positive Technologies Research Team has discovered a privilege escalation vulnerability in Windows Message Queuing service (MSMQ). The IOCTL handler in mqac.sys does not properly validate buffer data associated with the Irp object, which allows local users to crash the system or execute arbitrary code with SYSTEM privileges.

tags | advisory, arbitrary, local
systems | windows
advisories | CVE-2009-1922
SHA-256 | 8ffd0feedce3b0229ddad304c6664e17c7f172827df31047e4e31a0d9b51cb9a
Plume CMS SQL Injection
Posted Aug 13, 2009
Site senseofsecurity.com.au

Plume CMS version 1.2.3 suffers from multiple remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | 5bab71211c2f6a9682fddb09d837104f9ba905d676baa82f8739cd6ac897894f
Debian Linux Security Advisory 1860-1
Posted Aug 13, 2009
Authored by Debian | Site debian.org

Debian Security Advisory 1860-1 - Several vulnerabilities have been discovered in Ruby.

tags | advisory, vulnerability, ruby
systems | linux, debian
advisories | CVE-2009-0642, CVE-2009-1904
SHA-256 | 11affe671bc325d35bbacdaba1cc0dff84af2b4d7f43397ff4731fd74ebce484
Chavoosh CMS SQL Injection
Posted Aug 13, 2009
Authored by Isfahan University of Technology

Chavoosh CMS suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 5d8b0d5eabab77269e7db713b44de77861e2b73ac20e3557c77c7855831cb827
Gallarific Photo Gallery 1.0 Delete Issue
Posted Aug 13, 2009
Authored by Ilker Kandemir

Gallarific Photo Gallery versions 1.0 and below suffer from arbitrary delete and edit vulnerabilities.

tags | exploit, arbitrary, vulnerability
SHA-256 | 9427a5192b7c90ffca967f07d2b87723cd28ea3ba3f68619ba9b72b7ce598bbe
Mandriva Linux Security Advisory 2009-201
Posted Aug 13, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-201 - socket.c in fetchmail before 6.3.11 does not properly handle a '\\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408. This update provides a solution to this vulnerability.

tags | advisory, arbitrary, spoof
systems | linux, mandriva
advisories | CVE-2009-2666
SHA-256 | 62d87310d1b7c54e45458614ca4c8fb88bc2d0ec7cd3071189a4242f8e2c8506
Mandriva Linux Security Advisory 2009-200
Posted Aug 13, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-200 - Stack consumption vulnerability in libxml2 2.5.10, 2.6.16, 2.6.26, 2.6.27, and 2.6.32, and libxml 1.8.17, allows context-dependent attackers to cause a denial of service (application crash) via a large depth of element declarations in a DTD, related to a function recursion, as demonstrated by the Codenomicon XML fuzzing framework. Multiple use-after-free vulnerabilities in libxml2 2.5.10, 2.6.16, 2.6.26, 2.6.27, and 2.6.32, and libxml 1.8.17, allow context-dependent attackers to cause a denial of service (application crash) via crafted (1) Notation or (2) Enumeration attribute types in an XML file, as demonstrated by the Codenomicon XML fuzzing framework. This update provides a solution to these vulnerabilities.

tags | advisory, denial of service, vulnerability
systems | linux, mandriva
advisories | CVE-2009-2414, CVE-2009-2416
SHA-256 | 7e6657952e115da5b19bd1bde6b82731faf8087d3e384fe835d033a219a639b3
Gazelle CMS 1.0 Command Execution
Posted Aug 13, 2009
Authored by white_sheep

Gazelle CMS version 1.0 suffers from password reset, local file inclusion, cross site scripting, and remote command execution vulnerabilities.

tags | exploit, remote, local, vulnerability, xss, file inclusion
SHA-256 | eba2b3c41ae5e77c75a8f1c5bf03e2abb521b03ade02a8a05b9981a69224a252
2WIRE Gateway Bypass / Reset
Posted Aug 13, 2009
Authored by hkm

2Wire Gateways suffer from a remote password reset vulnerability that allows for authentication bypass. Versions 2071 Gateway, 1800HW, and 1701HG are vulnerable.

tags | exploit, remote, bypass
SHA-256 | bcf03cf41785e1546ced74abf07c45219887bda85fd037204944016c0203f0b3
Safari 4 Top Sites Hijack
Posted Aug 13, 2009
Authored by Inferno from Secure Thoughts

Safari 4 versions prior to 4.0.3 suffer from a Top Sites hijacking vulnerability. Proof of concept code is included.

tags | exploit, proof of concept
SHA-256 | f0bc8d79203a653e1efd471cc613e69ab50203cd696d1fc4f46afd708760d5fb
JibberBook Disclosure / Injection
Posted Aug 13, 2009
Authored by Onur YILMAZ

JibberBook suffers from comment information disclosure and html injection vulnerabilities.

tags | exploit, vulnerability, info disclosure
SHA-256 | 98ab48bd1dff2c59cfeeb6cbec8d5fb2e76d6cbef008a405220e5798e9ad7760
HP Security Bulletin HPSBTU02454 SSRT080172
Posted Aug 13, 2009
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin - A potential security vulnerability has been identified in Samba running on the Internet Express for Tru64 UNIX. The vulnerability could be exploited remotely to disclose information on the Samba server.

tags | advisory
systems | unix
advisories | CVE-2008-4314
SHA-256 | 5fdbf41b12769d64a1911ec21ebaef9f9088fe5065040d53d43411b9563677b3
MU Security Advisory 2009-08.01
Posted Aug 13, 2009
Authored by MU Dynamics, Mu Security research team | Site labs.musecurity.com

The Mu Dynamics Research team has found several vulnerabilities stemming from unsafe use of the sscanf C standard library function. Asterisk versions 1.6.1 through 1.6.1.2 are affected.

tags | advisory, vulnerability
SHA-256 | 4b4ca564af6eb635dec77a8869f1db6582e448ddc90620d17fb84789c0b6f227
Easy Music Player 1.0.0.2 Universal Buffer Overflow
Posted Aug 13, 2009
Authored by hack4love

Easy Music Player version 1.0.0.2 universal local buffer overflow exploit.

tags | exploit, overflow, local
SHA-256 | 789a6d932e4542932b3551b62d1cbd4b1743afa756cefe98ac1097968ea10c1d
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close