exploit the possibilities
Showing 1 - 25 of 82 RSS Feed

Files Date: 2010-01-14

Xforum 1.4 Cross Site Scripting
Posted Jan 14, 2010
Authored by ViRuSMaN

Xforum version 1.4 suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 0d3258c87b14fdf2108042ca77cf93e8
CentrifugeSystems Denial Of Service
Posted Jan 14, 2010
Authored by Asheesh Kumar Mani Tripathi

CentrifugeSystems suffers from a denial of service vulnerability due to a looping condition.

tags | exploit, denial of service
MD5 | 49fee23f8d355d41a7a2c5e9ee4846c5
Alpha B Forum Cross Site Scripting
Posted Jan 14, 2010
Authored by ViRuSMaN

Alpha B Forum suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 97d967a03b212bb99745ce9534225421
Joomla Marketplace 1.2 Cross Site Scripting
Posted Jan 14, 2010
Authored by ViRuSMaN

The Joomla Marketplace component version 1.2 suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 1969340de1011386ddd89549a5ea2075
Apple iTunes 8.1.x Buffer Overflow
Posted Jan 14, 2010
Authored by His0k4, Simo36

Apple iTunes 8.1.x (daap) remote buffer overflow exploit that binds a shell to port 4444.

tags | exploit, remote, overflow, shell
systems | apple
advisories | CVE-2009-0950
MD5 | 3b29c90c6d68f2f00c40cfe91db4a8e6
HOUTcast 1.9.8/Win32 Cross Site Request Forgery
Posted Jan 14, 2010
Authored by cp77fk4r

HOUTcast server versions 1.9.8/Win32 and below suffer from a cross site request forgery vulnerability.

tags | exploit, csrf
systems | windows
MD5 | d714e669daa4978abfcf950524416a6b
Ubuntu Security Notice 885-1
Posted Jan 14, 2010
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 885-1 - It was discovered that the Transmission web interface was vulnerable to cross-site request forgery (CSRF) attacks. If a user were tricked into opening a specially crafted web page in a browser while Transmission was running, an attacker could trigger commands in Transmission. This issue affected Ubuntu 9.04. Dan Rosenberg discovered that Transmission did not properly perform input validation when processing torrent files. If a user were tricked into opening a crafted torrent file, an attacker could overwrite files via directory traversal.

tags | advisory, web, csrf
systems | linux, ubuntu
advisories | CVE-2009-1757, CVE-2010-0012
MD5 | b38b0ad9791fc7fbf5dc5590ecdd14c9
Linux/x86 9 Bytes Kill All Processes Shellcode
Posted Jan 14, 2010
Authored by root@thegibson

9 bytes small Linux/x86 kill all processes shellcode.

tags | x86, shellcode
systems | linux
MD5 | c67ecf094e411b72dd0a59aec0b15476
ART-VOLGA Gallery 1.0 Cross Site Scripting
Posted Jan 14, 2010
Authored by PaL-D3v1L

ART-VOLGA Gallery version 1.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | b36a46b2c61980c2e4b828b3d7ea6b77
DocuWiki 2009-12-25 Traversal / Modification
Posted Jan 14, 2010
Authored by white_sheep

DocuWiki version 2009-12-25 suffers from directory traversal listing and modification vulnerabilities.

tags | exploit, vulnerability
MD5 | 0b2ef472ba2727458f7a9421576210c2
WEBurada Dernek Koy Portali 3000 X Cross Site Scripting
Posted Jan 14, 2010
Authored by LionTurk

WEBurada Dernek Koy Portali 3000 X suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | f8ae81624ce8417aefdde1120a9982f9
Secunia Security Advisory 38178
Posted Jan 14, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for blender. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | linux, gentoo
MD5 | 52bf77cc745b01f1918072ef094e9399
Secunia Security Advisory 38127
Posted Jan 14, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness and some vulnerabilities have been reported in Zend Framework, which can be exploited by malicious people to bypass certain security restrictions and conduct script insertion or cross-site scripting attacks.

tags | advisory, vulnerability, xss
MD5 | aa4e91f8ed0d062ee0cd2952c44242d7
Secunia Security Advisory 38190
Posted Jan 14, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for gcc and gcc4. This fixes a security issue, which can be exploited by malicious, local users to potentially gain escalated privileges.

tags | advisory, local
systems | linux, redhat
MD5 | 5b0015bdff68005d9cfaf27806910f27
Secunia Security Advisory 38187
Posted Jan 14, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Google SketchUp, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
MD5 | 2f1a0ceb8af3c60ede6e4892b626864e
Secunia Security Advisory 38197
Posted Jan 14, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - rr has reported a vulnerability in the Direct URL module for xt:Commerce, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
MD5 | 6551e0d8a1e2177fbea39ce1aeb49148
Secunia Security Advisory 38203
Posted Jan 14, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for krb5. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
systems | linux, fedora
MD5 | 336e2818a9b62fadc27d1dc739f656c7
Secunia Security Advisory 38186
Posted Jan 14, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Node Blocks module for Drupal, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory
MD5 | 9070a76ffee247fbd0a98317f12eae36
Secunia Security Advisory 38193
Posted Jan 14, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for network-manager-applet. This fixes some security issues, which can be exploited by malicious, local users to gain knowledge of sensitive information and by malicious people to bypass certain security restrictions.

tags | advisory, local
systems | linux, ubuntu
MD5 | 67d65e0c3212ec773e46ba4e76af0ad3
Secunia Security Advisory 38175
Posted Jan 14, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for OpenSSL. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, ubuntu
MD5 | dbc94b0f48ba7df0beb1a3c57d755034
Secunia Security Advisory 38207
Posted Jan 14, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Bibliography module for Drupal, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory
MD5 | 745b86a4e9fc832499cbd3dcc24a8ab1
Secunia Security Advisory 38177
Posted Jan 14, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for net-snmp. This fixes a vulnerability, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
systems | linux, gentoo
MD5 | f6f95444933c73d208b10c17fffdf912
Secunia Security Advisory 38179
Posted Jan 14, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for squirrelmail. This fixes multiple vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting, session fixation, and phishing attacks.

tags | advisory, vulnerability, xss
systems | linux, gentoo
MD5 | 1e760f9b0ae31b8c66f7b7105bcf1f82
Linux 2.6.28 fasync File Descriptor Issue
Posted Jan 14, 2010
Authored by Tavis Ormandy

Linux kernel versions 2.6.28 and above suffer from an issue where locked fasync file descriptors can be referenced after free.

tags | advisory, kernel
systems | linux
MD5 | d4c53ad3931ceb50d2c64d763ec476f5
Gentoo Linux Security Advisory 201001-9
Posted Jan 14, 2010
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201001-9 - An input sanitation flaw in the WEBrick HTTP server included in Ruby might allow remote attackers to inject arbitrary control characters into terminal sessions. Giovanni Pellerano, Alessandro Tanasi and Francesco Ongaro reported that WEBrick does not filter terminal control characters, for instance when handling HTTP logs. Versions less than 1.8.7_p249 are affected.

tags | advisory, remote, web, arbitrary, ruby
systems | linux, gentoo
advisories | CVE-2009-4492
MD5 | 40e7e73f6ac553fab02aa8a843f35873
Page 1 of 4
Back1234Next

File Archive:

May 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    16 Files
  • 2
    May 2nd
    8 Files
  • 3
    May 3rd
    8 Files
  • 4
    May 4th
    2 Files
  • 5
    May 5th
    1 Files
  • 6
    May 6th
    15 Files
  • 7
    May 7th
    22 Files
  • 8
    May 8th
    16 Files
  • 9
    May 9th
    17 Files
  • 10
    May 10th
    16 Files
  • 11
    May 11th
    3 Files
  • 12
    May 12th
    4 Files
  • 13
    May 13th
    25 Files
  • 14
    May 14th
    24 Files
  • 15
    May 15th
    78 Files
  • 16
    May 16th
    16 Files
  • 17
    May 17th
    12 Files
  • 18
    May 18th
    2 Files
  • 19
    May 19th
    1 Files
  • 20
    May 20th
    2 Files
  • 21
    May 21st
    16 Files
  • 22
    May 22nd
    3 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close