exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 37 RSS Feed

Files Date: 2009-09-03

Attacking SAP Clients
Posted Sep 3, 2009
Authored by Sh2kerr | Site dsecrg.com

Whitepaper called SAP Security: Attacking SAP Clients.

tags | paper
SHA-256 | 3b5b7a4a9a723fba7a6ae969c5726baab2e6dd3dac776def901de911ca013066
FreeSchool 1.1.0 Remote File Inclusion
Posted Sep 3, 2009
Authored by cr4wl3r

FreeSchool versions 1.1.0 and below suffer from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 69f4ee0fd1f896fbc37ca5c562933c06b99b413727dbe391f526a9f6faca1be7
PHPope 1.0.0 Remote File Inclusion
Posted Sep 3, 2009
Authored by cr4wl3r

PHPope versions 1.0.0 and below suffer from remote file inclusion vulnerabilities.

tags | exploit, remote, vulnerability, code execution, file inclusion
SHA-256 | 647a572e0460e5dda1707053953623f616b579b32f2aa6f20e1e1be34aaa5fe1
Anantasoft's Gazelle CMS 1.0 XSS
Posted Sep 3, 2009
Authored by ghostblup

Anantasoft's Gazelle CMS version 1.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 79bd28567ecad20215cff35bb01b17daca030b1381183d1b5dd8107f0a10acde
Hamster Audio Player 0.3a Buffer Overflow
Posted Sep 3, 2009
Authored by hack4love

Hamster Audio Player 0.3a local buffer overflow exploit that spawns calc.exe.

tags | exploit, overflow, local
SHA-256 | 1cbdc6656b3690b8aeb81efa484b159013ff7bc667e0c881736591e0f830177f
SAP Player 0.9 Universal Buffer Overflow
Posted Sep 3, 2009
Authored by PLATEN

SAP Player version 0.9 universal local buffer overflow exploit that creates a malicious .m3u file.

tags | exploit, overflow, local
SHA-256 | cfc9e7ad2306b36f9931187510a90c2678181dcc6dc35e5b5d183dbed7196db3
PPStream PPSMediaList Active-X
Posted Sep 3, 2009
Authored by expose 0day | Site 0dayexpose.blogspot.com

PPStream PPSMediaList Active-X version 2.6.86.8900 crash exploit.

tags | exploit, activex
SHA-256 | 9b3dfc830a89b95e621008927e91c260c3dd1c8e8909ed6a93fe721e4c54c0bd
iPower CMS SQL Injection
Posted Sep 3, 2009
Authored by Securitylab Security Research | Site securitylab.ir

iPower CMS suffers from a remote SQL injection vulnerability in help_view.php.

tags | exploit, remote, php, sql injection
SHA-256 | eded95d1c0056156b36ba5d90312bde004b1abe8e4573d9d46d32d3d06968115
iPower CMS SQL Injection
Posted Sep 3, 2009
Authored by Securitylab Security Research | Site securitylab.ir

iPower CMS suffers from a remote SQL injection vulnerability in product_view.php.

tags | exploit, remote, php, sql injection
SHA-256 | 543b6bc1b5e2b851f0aec9c00303c1e0ffb46acd8bf1240440a10623b8cf55f7
Adobe Reader Collab.getIcon() Buffer Overflow
Posted Sep 3, 2009
Authored by Kralor

Adobe Reader Collab.getIcon() buffer overflow exploit.

tags | exploit, overflow
advisories | CVE-2009-0927
SHA-256 | 4c864bafa7d7369b396207fd655fe2e4ab8cbd7010dcb62abe900dec15e17645
GNU Privacy Guard
Posted Sep 3, 2009
Site gnupg.org

The GNU Privacy Guard (GnuPG) is GNU's tool for secure communication and data storage. It is a complete and free replacement of PGP and can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440.

Changes: 2048 bit RSA keys are now generated by default. The default hash algorithm preferences have changed to prefer SHA-256 over SHA-1. 2048 bit DSA keys are now generated to use a 256 bit hash algorithm. Support for v2 OpenPGP cards was added. Support for the Camellia cipher (RFC-5581) was implemented. Support for HKP keyservers over SSL ("HKPS") was added. The algorithm for computing the SIG_ID status was changed to match the one used in version 2.0.10. File locking was improved. A memory leak which made imports of many keys very slow was fixed. Many smaller bugs were fixed.
tags | encryption
SHA-256 | 055e92b6735fb82a6c9f7d506cdd01ae7a733a1f3793d3694083e1f283f5e914
Secunia Security Advisory 36586
Posted Sep 3, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Sun Java System Active Server Pages, one having an unspecified impact, while others can be exploited by malicious users to compromise a vulnerable system and by malicious people to cause a DoS (Denial of Service).

tags | advisory, java, denial of service, vulnerability
SHA-256 | cf571bad0fedf23c6bbb1a3ae0ab9a974ec9b2f831c33a992a0109b009d7f1c7
Secunia Security Advisory 36573
Posted Sep 3, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in MailSite, which can be exploited to cause a DoS (Denial of Service) or potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
SHA-256 | 5d690179ebc1336e20a372aedd5989b6678a67ced032547a90f14b400f6704fc
Secunia Security Advisory 36541
Posted Sep 3, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in HP Operations, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | f7cfe65e78895576bd028ce12350b1b58ef3ff3d745e4063699f8963d07f08f3
Secunia Security Advisory 36574
Posted Sep 3, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in McAfee Email and Web Security Appliance, which can be exploited to disclose potentially sensitive information.

tags | advisory, web
SHA-256 | 384280c30f4c3758a6ed1d38505b71c2b79e06f2a1322f7e108b2641b38375b8
Secunia Security Advisory 36583
Posted Sep 3, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Crystal Reports Server, which can be exploited to cause a DoS (Denial of Service) or compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
SHA-256 | 5d9336dba276b14aa94f5cc336aadedd4129cdcd883c9d760ad2c85bd86bd020
Secunia Security Advisory 36571
Posted Sep 3, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Linksys WRT54GL, which can be exploited by malicious people to compromise a vulnerable device.

tags | advisory
SHA-256 | 440f50b423138dce4761640cafdf3ff745ad52d7601a519bbfd0bb3ac4c83478
Secunia Security Advisory 36580
Posted Sep 3, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Perforce Server, where one has an unknown impact and others can be exploited to cause a DoS.

tags | advisory, vulnerability
SHA-256 | 2c004e6a1f2e497d1640879c4d943f3bbd25a80fc61991bd71c398db7cbe3531
Secunia Security Advisory 36556
Posted Sep 3, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Lotus Domino, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 33149e7aafc21697b1e14e579503cbdf22cb6299db73d9fc2fe073ea4e5a55b2
Secunia Security Advisory 36584
Posted Sep 3, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in SAP NetWeaver, which can be exploited by malicious people to disclose sensitive information or cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
SHA-256 | f5e55c8f88d8edc74d133a14c967ec08b1702fb7fe594660a3a30fd9bd51f79e
Secunia Security Advisory 36581
Posted Sep 3, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in PowerArchiver Command Line, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 3dedde04cd30312f500bbf171b39ae2ed12d46658a7ea1b570001518deece9d2
Secunia Security Advisory 36565
Posted Sep 3, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in IBM Tivoli Directory Server, which can be exploited by malicious users and potentially malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
SHA-256 | 9b427d388fd8b5001e450d17efdccad758b2f4e26e3c24e877181a7999bf5e02
Secunia Security Advisory 36576
Posted Sep 3, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Novell ZENWorks Asset Management, which can be exploited by malicious people to disclose sensitive information or compromise a vulnerable system.

tags | advisory, vulnerability
SHA-256 | db91f9141bb71c8a26741b8536bc045fcee8bc512f298ea4175819ed8a0a815b
Secunia Security Advisory 36578
Posted Sep 3, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Novell eDirectory, which can be exploited to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
SHA-256 | 40d72339ca622796837784ff1f2432d277884461ff2cb2f4e7559fb49bf3f59c
Secunia Security Advisory 36585
Posted Sep 3, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Samba, which can be exploited by malicious users to compromise a vulnerable system and by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
SHA-256 | 9a765f8fd3675a7d6c20a9d652c86fe98aa623bc4aaaa28223abaf77d9d6b649
Page 1 of 2
Back12Next

File Archive:

October 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    10 Files
  • 2
    Oct 2nd
    0 Files
  • 3
    Oct 3rd
    12 Files
  • 4
    Oct 4th
    15 Files
  • 5
    Oct 5th
    18 Files
  • 6
    Oct 6th
    16 Files
  • 7
    Oct 7th
    0 Files
  • 8
    Oct 8th
    0 Files
  • 9
    Oct 9th
    0 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    0 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close