exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 27 RSS Feed

Files Date: 2010-04-30

Internet Download Manager FTP Buffer Overflow
Posted Apr 30, 2010
Authored by Stefan Cornelius | Site secunia.com

Secunia Research has discovered a vulnerability in Internet Download Manager, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused by a boundary error when sending certain test sequences to an FTP server. This can be exploited to cause a stack-based buffer overflow by e.g. tricking a user into downloading a file from a specially crafted FTP URI. Successful exploitation allows execution of arbitrary code. Internet Download Manager version 5.18 is affected.

tags | advisory, overflow, arbitrary
advisories | CVE-2010-0995
SHA-256 | 56af8243c012b2993b884e0396af073ae6088b78ca52aa485de63621dbffa10c
EUSecWest 2010 Call For Papers
Posted Apr 30, 2010
Site eusecwest.com

The sixth annual EUSecWest applied technical security conference - where the eminent figures in the international security industry will get together share best practices and technology - will be held in downtown Amsterdam at the the Melkweg Multimedia Center near Leidseplein on June 16/17, 2010. This is the Call For Papers.

tags | paper, conference
SHA-256 | 53f847b2c8d2b3b64a140f7dbc8fde59f63767b9847f13ef5e4c5b80a6553905
Mandriva Linux Security Advisory 2010-088
Posted Apr 30, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-088 - Some vulnerabilities were discovered and corrected in the Linux 2.6 kernel.

tags | advisory, kernel, vulnerability
systems | linux, mandriva
advisories | CVE-2009-3620, CVE-2010-1088, CVE-2010-0622, CVE-2010-0410, CVE-2010-0623
SHA-256 | e35095f623ba6a410cd3c46cfabf90eff6d811d179244c48dcb04cae2f29d1d5
Whitepaper Called Phishing And Anti-Phishing
Posted Apr 30, 2010
Authored by Rockey Killer

Whitepaper called Phishing and Anti-Phishing.

tags | paper
SHA-256 | 97a9b959e96f8d68cdd0466a74e7da4f68b3f4fa5527a93c95c365005fd0655f
KrM Haber Database Disclosure
Posted Apr 30, 2010
Authored by LionTurk

KrM Haber suffers from a database disclosure vulnerability.

tags | exploit, info disclosure
SHA-256 | 6d9528cfa5bc15f54bd75db684e4d17fe465dcea93788f1d58ae36edfe77fcc6
Alibaba Clone Platinum SQL Injection
Posted Apr 30, 2010
Authored by v3n0m

Alibaba Clone Platinum suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 80bb3fa6f103b7186b5ca0b0bcc57eb6ab8e15d6ec877e9ea4be3b976c6d784a
Webthaiapp Blind SQL Injection
Posted Apr 30, 2010
Authored by Xelenonz

Webthaiapp suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | d791fb65ed72989f913d1a837519395709e8614fb9ae750b1d9c8aa275c151b7
AutoDealer 1 / 2 SQL Injection
Posted Apr 30, 2010
Authored by Sid3 effects

AutoDealer versions 1 and 2 suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 862e9bd400d68c091bc5086d303308423f8a0f8bcfb168bd00e35296df02adf3
BPstyle Graphic Studio SQL Injection
Posted Apr 30, 2010
Authored by md.r00t

BPstyle Graphic Studio suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | d8b7d59c9974dddcc73d1f6504444cde607989fcb7046d2998dd960f8ca61d1b
Joomla NewsFeeds SQL Injection
Posted Apr 30, 2010
Authored by Archimonde

The Joomla NewsFeeds component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 8ff40dc55942fdf270c221e63518fe569f94ab940b8f47cb62abe9da97a9bbb2
Puntal 2.1.0 Remote File Inclusion
Posted Apr 30, 2010
Authored by eidelweiss

Puntal version 2.1.0 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 20c6aa2c53f0893261cadb318977c41e059fde4d8e4de0d6dfc4db6e414ca341
Suricata IDPE 0.8.2
Posted Apr 30, 2010
Site openinfosecfoundation.org

Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools.

Changes: This release adds support for detection_filter and http_client_body keywords, adds support for HTTP parser server personalities, fixes the CUDA code on x86_64, improves IPv6 support, adds support for PID files, reduces memory usage, and fixes many bugs.
tags | tool, intrusion detection
systems | unix
SHA-256 | 20f8ade2ee00dfb274030e267f8001cbc418676c2d295d7924ae12f54e109614
XML Security Library 1.2.15
Posted Apr 30, 2010
Site aleksey.com

XML Security Library is a C library based on LibXML2. It provides an implementation for major XML security standards: XML Digital Signature and XML Encryption.

Changes: This release adds HMAC with MD5, SHA1, SHA256/384/512; RSA with MD5, SHA256/384/512 support to xmlsec-mscrypto; MD5 and SHA256/384/512 support for digest, HMAC, and RSA to xmlsec-nss; and SHA256/384/512 for digest and HMAC; MD5 and RIPEMD160 digests support to xmlsec-gnutls.
tags | library
SHA-256 | 8cdcc3861ad5f2b010010ffe359acadc9777f5d1ea35a8f74e52e0e1e7eca935
FSlint Filesystem Checker 2.42
Posted Apr 30, 2010
Authored by pixelbeat | Site pixelbeat.org

FSlint is a toolkit to find various forms of lint on a filesystem. At the moment it reports duplicate files, bad symbolic links, troublesome file names, empty directories, non stripped executables, temporary files, duplicate/conflicting (binary) names, and unused ext2 directory blocks.

Changes: File dialog regressions were fixed. A Cygwin issue was fixed. Languages were updated.
tags | tool
systems | unix
SHA-256 | babbef4a34f42ab1d396152fd79b4353adc114b2e8d68b838e20a8067c5a3273
WhatWeb Scanner 0.4.2
Posted Apr 30, 2010
Authored by Andrew Horton | Site morningstarsecurity.com

WhatWeb is a next generation web scanner that identifies what websites are running. Flexible plugin architecture with over 80 plugins so far. Passive plugins use information in the headers, cookies, HTML body and URL. Aggressive plugins can identify versions of Joomla, phpBB, etc by making extra requests to the webserver.

tags | tool, web, scanner
systems | unix
SHA-256 | de9e6e8be69942bfb60ac6211dab149dbee1f67f0217105def741a0f6804663a
Ubuntu Security Notice 934-1
Posted Apr 30, 2010
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 934-1 - Marc Schoenefeld discovered a buffer overflow in Netpbm when loading certain images. If a user or automated system were tricked into opening a specially crafted XPM image, a remote attacker could crash Netpbm. The default compiler options for affected releases should reduce the vulnerability to a denial of service.

tags | advisory, remote, denial of service, overflow
systems | linux, ubuntu
advisories | CVE-2009-4274
SHA-256 | b35687a340a4fdbf7229769133d5339808e1f1c6becbce15b0647f661933d805
JobPost SQL Injection
Posted Apr 30, 2010
Authored by Sid3 effects

JobPost suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | c3371267bcff9bffabeed37094a3abab3412a1f582cfc2b01430a2882e8cfdbf
EC21 Clone 3.0 SQL Injection
Posted Apr 30, 2010
Authored by v3n0m

EC21 Clone version 3.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 4d9aae08e14e6126b114b998a4d81b2e27851e09b7a75b38e587123f7aca8976
B2B Gold Script SQL Injection
Posted Apr 30, 2010
Authored by v3n0m

B2B Gold Script suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 767cdd285dc01a559699cdc372c20d6bb1fe707b194af9e821a1be2f6084fb2e
Secunia Security Advisory 39639
Posted Apr 30, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for netpbm-free. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | linux, ubuntu
SHA-256 | 42a1c4b2abdfad7c280a2c69153d3d4a7952e9bd74890dcc178c125df00cfa5c
Secunia Security Advisory 39654
Posted Apr 30, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been discovered in deV!L'z Clanportal, which can be exploited by malicious people to disclose potentially sensitive information.

tags | advisory
SHA-256 | 7d6acee451282ffc82925a88b8d66aad8e9fe71a4bc29d522c4fb3d8c76a9a6b
Secunia Security Advisory 39603
Posted Apr 30, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft SharePoint Server 2007 and Windows SharePoint Services 3.0, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
systems | windows
SHA-256 | 0f9eb364ecbec46d5cbf86ca7e74aed76aeba37ea7cdc25c5ad1448839dea541
Secunia Security Advisory 39446
Posted Apr 30, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in Internet Download Manager, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 4271da131c95503e0ab2e9e9f6757f6fad94289067ecadfe809ae4e6d9aadaee
Mandriva Linux Security Advisory 2010-087
Posted Apr 30, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-087 - Multiple buffer overflow vulnerabilities have been found and corrected in poppler. The updated poppler packages have upgraded to 0.5.4 and have been patched to correct these issues.

tags | advisory, overflow, vulnerability
systems | linux, mandriva
advisories | CVE-2009-0146, CVE-2009-0147, CVE-2009-0166, CVE-2009-0195, CVE-2009-0799, CVE-2009-0800, CVE-2009-1179, CVE-2009-1180, CVE-2009-1181, CVE-2009-1182, CVE-2009-1183, CVE-2009-1187, CVE-2009-1188, CVE-2009-3604, CVE-2009-3606, CVE-2009-3603
SHA-256 | 4168f306577bc79b87d31896306a31d170c85717df5212b9d33cbb3aa67282ad
chCounter 3.1.1 SQL Injection / Cross Site Scripting
Posted Apr 30, 2010
Authored by Valentin Hoebel

chCounter version 3.1.1 suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | e186b67a8dc532c2bdb00c5bf5dcdec58a950e0a58dc73659bac7daf6870b26a
Page 1 of 2
Back12Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close