exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 37 RSS Feed

Files Date: 2009-09-03

Attacking SAP Clients
Posted Sep 3, 2009
Authored by Sh2kerr | Site dsecrg.com

Whitepaper called SAP Security: Attacking SAP Clients.

tags | paper
SHA-256 | 3b5b7a4a9a723fba7a6ae969c5726baab2e6dd3dac776def901de911ca013066
FreeSchool 1.1.0 Remote File Inclusion
Posted Sep 3, 2009
Authored by cr4wl3r

FreeSchool versions 1.1.0 and below suffer from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 69f4ee0fd1f896fbc37ca5c562933c06b99b413727dbe391f526a9f6faca1be7
PHPope 1.0.0 Remote File Inclusion
Posted Sep 3, 2009
Authored by cr4wl3r

PHPope versions 1.0.0 and below suffer from remote file inclusion vulnerabilities.

tags | exploit, remote, vulnerability, code execution, file inclusion
SHA-256 | 647a572e0460e5dda1707053953623f616b579b32f2aa6f20e1e1be34aaa5fe1
Anantasoft's Gazelle CMS 1.0 XSS
Posted Sep 3, 2009
Authored by ghostblup

Anantasoft's Gazelle CMS version 1.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 79bd28567ecad20215cff35bb01b17daca030b1381183d1b5dd8107f0a10acde
Hamster Audio Player 0.3a Buffer Overflow
Posted Sep 3, 2009
Authored by hack4love

Hamster Audio Player 0.3a local buffer overflow exploit that spawns calc.exe.

tags | exploit, overflow, local
SHA-256 | 1cbdc6656b3690b8aeb81efa484b159013ff7bc667e0c881736591e0f830177f
SAP Player 0.9 Universal Buffer Overflow
Posted Sep 3, 2009
Authored by PLATEN

SAP Player version 0.9 universal local buffer overflow exploit that creates a malicious .m3u file.

tags | exploit, overflow, local
SHA-256 | cfc9e7ad2306b36f9931187510a90c2678181dcc6dc35e5b5d183dbed7196db3
PPStream PPSMediaList Active-X
Posted Sep 3, 2009
Authored by expose 0day | Site 0dayexpose.blogspot.com

PPStream PPSMediaList Active-X version 2.6.86.8900 crash exploit.

tags | exploit, activex
SHA-256 | 9b3dfc830a89b95e621008927e91c260c3dd1c8e8909ed6a93fe721e4c54c0bd
iPower CMS SQL Injection
Posted Sep 3, 2009
Authored by Securitylab Security Research | Site securitylab.ir

iPower CMS suffers from a remote SQL injection vulnerability in help_view.php.

tags | exploit, remote, php, sql injection
SHA-256 | eded95d1c0056156b36ba5d90312bde004b1abe8e4573d9d46d32d3d06968115
iPower CMS SQL Injection
Posted Sep 3, 2009
Authored by Securitylab Security Research | Site securitylab.ir

iPower CMS suffers from a remote SQL injection vulnerability in product_view.php.

tags | exploit, remote, php, sql injection
SHA-256 | 543b6bc1b5e2b851f0aec9c00303c1e0ffb46acd8bf1240440a10623b8cf55f7
Adobe Reader Collab.getIcon() Buffer Overflow
Posted Sep 3, 2009
Authored by Kralor

Adobe Reader Collab.getIcon() buffer overflow exploit.

tags | exploit, overflow
advisories | CVE-2009-0927
SHA-256 | 4c864bafa7d7369b396207fd655fe2e4ab8cbd7010dcb62abe900dec15e17645
GNU Privacy Guard
Posted Sep 3, 2009
Site gnupg.org

The GNU Privacy Guard (GnuPG) is GNU's tool for secure communication and data storage. It is a complete and free replacement of PGP and can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440.

Changes: 2048 bit RSA keys are now generated by default. The default hash algorithm preferences have changed to prefer SHA-256 over SHA-1. 2048 bit DSA keys are now generated to use a 256 bit hash algorithm. Support for v2 OpenPGP cards was added. Support for the Camellia cipher (RFC-5581) was implemented. Support for HKP keyservers over SSL ("HKPS") was added. The algorithm for computing the SIG_ID status was changed to match the one used in version 2.0.10. File locking was improved. A memory leak which made imports of many keys very slow was fixed. Many smaller bugs were fixed.
tags | encryption
SHA-256 | 055e92b6735fb82a6c9f7d506cdd01ae7a733a1f3793d3694083e1f283f5e914
Secunia Security Advisory 36586
Posted Sep 3, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Sun Java System Active Server Pages, one having an unspecified impact, while others can be exploited by malicious users to compromise a vulnerable system and by malicious people to cause a DoS (Denial of Service).

tags | advisory, java, denial of service, vulnerability
SHA-256 | cf571bad0fedf23c6bbb1a3ae0ab9a974ec9b2f831c33a992a0109b009d7f1c7
Secunia Security Advisory 36573
Posted Sep 3, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in MailSite, which can be exploited to cause a DoS (Denial of Service) or potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
SHA-256 | 5d690179ebc1336e20a372aedd5989b6678a67ced032547a90f14b400f6704fc
Secunia Security Advisory 36541
Posted Sep 3, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in HP Operations, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | f7cfe65e78895576bd028ce12350b1b58ef3ff3d745e4063699f8963d07f08f3
Secunia Security Advisory 36574
Posted Sep 3, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in McAfee Email and Web Security Appliance, which can be exploited to disclose potentially sensitive information.

tags | advisory, web
SHA-256 | 384280c30f4c3758a6ed1d38505b71c2b79e06f2a1322f7e108b2641b38375b8
Secunia Security Advisory 36583
Posted Sep 3, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Crystal Reports Server, which can be exploited to cause a DoS (Denial of Service) or compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
SHA-256 | 5d9336dba276b14aa94f5cc336aadedd4129cdcd883c9d760ad2c85bd86bd020
Secunia Security Advisory 36571
Posted Sep 3, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Linksys WRT54GL, which can be exploited by malicious people to compromise a vulnerable device.

tags | advisory
SHA-256 | 440f50b423138dce4761640cafdf3ff745ad52d7601a519bbfd0bb3ac4c83478
Secunia Security Advisory 36580
Posted Sep 3, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Perforce Server, where one has an unknown impact and others can be exploited to cause a DoS.

tags | advisory, vulnerability
SHA-256 | 2c004e6a1f2e497d1640879c4d943f3bbd25a80fc61991bd71c398db7cbe3531
Secunia Security Advisory 36556
Posted Sep 3, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Lotus Domino, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 33149e7aafc21697b1e14e579503cbdf22cb6299db73d9fc2fe073ea4e5a55b2
Secunia Security Advisory 36584
Posted Sep 3, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in SAP NetWeaver, which can be exploited by malicious people to disclose sensitive information or cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
SHA-256 | f5e55c8f88d8edc74d133a14c967ec08b1702fb7fe594660a3a30fd9bd51f79e
Secunia Security Advisory 36581
Posted Sep 3, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in PowerArchiver Command Line, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 3dedde04cd30312f500bbf171b39ae2ed12d46658a7ea1b570001518deece9d2
Secunia Security Advisory 36565
Posted Sep 3, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in IBM Tivoli Directory Server, which can be exploited by malicious users and potentially malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
SHA-256 | 9b427d388fd8b5001e450d17efdccad758b2f4e26e3c24e877181a7999bf5e02
Secunia Security Advisory 36576
Posted Sep 3, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Novell ZENWorks Asset Management, which can be exploited by malicious people to disclose sensitive information or compromise a vulnerable system.

tags | advisory, vulnerability
SHA-256 | db91f9141bb71c8a26741b8536bc045fcee8bc512f298ea4175819ed8a0a815b
Secunia Security Advisory 36578
Posted Sep 3, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Novell eDirectory, which can be exploited to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
SHA-256 | 40d72339ca622796837784ff1f2432d277884461ff2cb2f4e7559fb49bf3f59c
Secunia Security Advisory 36585
Posted Sep 3, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Samba, which can be exploited by malicious users to compromise a vulnerable system and by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
SHA-256 | 9a765f8fd3675a7d6c20a9d652c86fe98aa623bc4aaaa28223abaf77d9d6b649
Page 1 of 2
Back12Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    0 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close