exploit the possibilities
Showing 1 - 8 of 8 RSS Feed

Files Date: 2009-10-17

Sun VirtualBox 3.0.6 Local Root
Posted Oct 17, 2009
Authored by prdelka | Site prdelka.blackart.org.uk

Sun VirtualBox versions 3.0.6 and below local root exploit that takes advantage of a popen() meta char shell injection vulnerability.

tags | exploit, shell, local, root
advisories | CVE-2009-3692
MD5 | c406efbe8e998f36edbb0aa6652790fe
CanSecWest 2010 Call For Papers
Posted Oct 17, 2009
Authored by Dragos Ruiu

CanSecWest 2010 Call For Papers - The eleventh annual CanSecWest applied technical security conference - where the eminent figures in the international security industry will get together share best practices and technology - will be held in downtown Vancouver at the the Sheraton Wall Centre on March 22-26, 2010.

tags | paper, conference
MD5 | 66e41e81f1d9af6d89326fe6637f6898
VMware Security Advisory 2009-0014
Posted Oct 17, 2009
Authored by VMware | Site vmware.com

VMware Security Advisory - VMware ESX patches for DHCP, Service Console kernel, and JRE resolve multiple security issues. And by multiple, we mean a very, very, very large amount of issues.

tags | advisory, kernel
advisories | CVE-2009-0692, CVE-2009-1893, CVE-2009-0692, CVE-2008-4210, CVE-2008-3275, CVE-2008-5356, CVE-2008-0598, CVE-2008-2136, CVE-2008-2812, CVE-2007-6063, CVE-2008-3525, CVE-2008-2086, CVE-2008-5347, CVE-2008-5348, CVE-2008-5349, CVE-2008-5350, CVE-2008-5351, CVE-2008-5352
MD5 | cf35b0628892e0b637067c67de042b44
DWebPro Remote Command Execution
Posted Oct 17, 2009
Authored by Rafael Sousa

DWebPro suffers from a remote command execution vulnerability.

tags | exploit, remote
MD5 | 21b5612fe9b4cb961c3be5a8f7709cb2
Adobe Acrobat Memory Corruption
Posted Oct 17, 2009
Authored by Nicolas Joly | Site vupen.com

VUPEN Vulnerability Research Team discovered three critical vulnerabilities affecting Adobe Acrobat and Reader. These vulnerabilities are caused by memory corruption errors within the U3D filter when processing malformed data in a PDF file, which could allow attackers to execute arbitrary code by tricking a user into opening a specially crafted PDF document.

tags | advisory, arbitrary, vulnerability
advisories | CVE-2009-3458, CVE-2009-2997, CVE-2009-2998
MD5 | 80538ce203edb0b1aead7e62e26d2ebf
Debian Linux Security Advisory 1912-1
Posted Oct 17, 2009
Authored by Debian | Site debian.org

Debian Linux Security Advisory 1912-1 - It was discovered that CamlImages, an open source image processing library, suffers from several integer overflows, which may lead to a potentially exploitable heap overflow and result in arbitrary code execution. This advisory addresses issues with the reading of TIFF files. It also expands the patch for CVE-2009-2660 to cover another potential overflow in the processing of JPEG images.

tags | advisory, overflow, arbitrary, code execution
systems | linux, debian
advisories | CVE-2009-3296, CVE-2009-2660
MD5 | 59815ee6555b4cb9208d9a26bae782b7
Xpdf Integer Overflow
Posted Oct 17, 2009
Authored by Adam Zabrocki

Xpdf allows local and remote attackers to overflow a buffer on the heap via an integer overflow vulnerability. Xpdf is prone to a NULL pointer dereference attack. Proof of concept pdf included.

tags | exploit, remote, overflow, local, proof of concept
MD5 | 41fe0496ebc9657e8ed7b82d93dde2da
Adobe Acrobat Code Execution
Posted Oct 17, 2009
Authored by Alexios Fakos | Site nruns.com

A remotely exploitable vulnerability has been found in Adobe Acrobat Reader/Acrobat Firefox plugin. Versions 8.1.3 through 8.1.6 are affected.

tags | advisory
advisories | CVE-2009-2991
MD5 | 7f6056a9b0301dd6a64ac4de6621da59
Page 1 of 1
Back1Next

File Archive:

April 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    60 Files
  • 2
    Apr 2nd
    20 Files
  • 3
    Apr 3rd
    15 Files
  • 4
    Apr 4th
    5 Files
  • 5
    Apr 5th
    5 Files
  • 6
    Apr 6th
    27 Files
  • 7
    Apr 7th
    31 Files
  • 8
    Apr 8th
    0 Files
  • 9
    Apr 9th
    0 Files
  • 10
    Apr 10th
    0 Files
  • 11
    Apr 11th
    0 Files
  • 12
    Apr 12th
    0 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    0 Files
  • 16
    Apr 16th
    0 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close