what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 26 RSS Feed

Files Date: 2010-05-07

joomlacartweberp-lfi.txt
Posted May 7, 2010
Authored by Fl0riX

The Joomla Cartweberp suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 5bde175d802917c5b8d0a8433e90b8e3e21a71a1b51116d4df038f7fbb21c303
Joomla Rapid Recipe SQL Injection
Posted May 7, 2010
Authored by UnD3rGr0unD W4rri0rZ

The Joomla Rapid Recipe component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 80d3482d3f55b88c113d8e7078dec4a0e8fc009f59f6d1df0ee422fc02e66bcd
AVCON 4.6.8.7 Buffer Overflow
Posted May 7, 2010
Authored by Dillon Beresford

AVCON version 4.6.8.7 local buffer overflow exploit.

tags | exploit, overflow, local
SHA-256 | 1a8a480461d0d3c2498b083537be67c68a7297cd1eb60d87123ba8dc696ca7e6
Mandriva Linux Security Advisory 2010-092
Posted May 7, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-092 - SQL injection vulnerability in templates_export.php in Cacti 0.8.7e and earlier allows remote attackers to execute arbitrary SQL commands via the export_item_id parameter. Additionally cacti has been upgraded to 0.8.7e for Corporate Server 4. The updated packages have been patched to correct this issue.

tags | advisory, remote, arbitrary, php, sql injection
systems | linux, mandriva
advisories | CVE-2010-1431
SHA-256 | 903d2242306e3fcc193b0e0611311173ff9c27b1c6764c9cad6cea5d2d29552e
Microsoft Windows SMB2 Negotiate Protocol Response Crash
Posted May 7, 2010
Authored by Jelmer de Hen | Site h.ackack.net

Microsoft Windows SMB2 negotiate protocol response crash proof of concept exploit.

tags | exploit, protocol, proof of concept
systems | windows
SHA-256 | db7a828f945156b4e74b46c9c79c3bcae2bfc04bf5f6efa327998f2e3f9dba17
WeBProdZ CMS SQL Injection
Posted May 7, 2010
Authored by MasterGipy

WeBProdZ CMS suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 87b8af857bec065aaf31ed2bca1bec0a7ecb4ab1e0973cba0c3defa70e2e53eb
PHP-Nuke Friend SQL Injection
Posted May 7, 2010
Authored by CMD

The PHP-Nuke Friend module suffers from a remote SQL injection vulnerability.

tags | exploit, remote, php, sql injection
SHA-256 | 860f3e3d62f88754e5d08f5538ddaa7ef90f1f1b3f6bb1792b77f86246edd3eb
OCS Inventory NG Server 1.3.1 Authentication Bypass
Posted May 7, 2010
Authored by Nicolas DEROUET

OCS Inventory NG server versions 1.3.1 and below suffer from a remote authentication bypass vulnerability.

tags | exploit, remote, bypass
SHA-256 | df00bc06d5a09e0f650d5ca1c68a00ee8664bfabe600ad3ac09a1932aa2d4431
Factux Local File Inclusion
Posted May 7, 2010
Authored by altbta

Factux suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | e100af75ff0a46babd8facaba7cbdc2745fea471b44cb52ab2aca511539fb40e
Friendster Persistent Cross Site Scripting
Posted May 7, 2010
Authored by AutoSec Tools

Friendster suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 5e3ae4259dd3a1f557c556ce903ecf836f49f137416e2023b89094e9a8a22ed8
Zolsoft Office Server Free Edition Cross Site Request Forgery
Posted May 7, 2010
Authored by AutoSec Tools

Zolsoft Office Server Free Edition version 2010.0502 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 3322659f39a07946ac87618a0eaa1d2721658df7b1ccadad036ab3c9b1e6433b
REZERVI 3.0.2 Command Execution
Posted May 7, 2010
Authored by eidelweiss

REZERVI version 3.0.2 remote command execution exploit.

tags | exploit, remote
SHA-256 | 96c46747f9050c4f46db0eb0e2965b1b837513d27059ac1aa665fbf9ff4827ba
Zero Day Initiative Advisory 10-080
Posted May 7, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-080 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of HP Mercury LoadRunner. Authentication is not required to exploit this vulnerability. The specific flaw exists within the process magentproc.exe that binds to TCP port 54345. A specially crafted packet will allow unauthenticated users to execute local commands. When a state of 0 or 4 is passed after the parameters, mchan.dll will process the commands on the host. This allows for remote code execution under the context of the SYSTEM user.

tags | advisory, remote, arbitrary, local, tcp, code execution
advisories | CVE-2010-1549
SHA-256 | 3a697f5301d22a62418676bae429ae274cd15b41bafb566750835d21ed410f17
AV Arcade Cross Site Scripting
Posted May 7, 2010
Authored by Vadim Toptunov

AV Arcade suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 710f09d43d85d38901770d7f8a0134eda76aced8b9d3868d64ae09a42309ebc8
HP Security Bulletin HPSBMA02201 SSRT071328
Posted May 7, 2010
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin - A potential security vulnerability has been identified with the HP LoadRunner Agent running on Windows. The vulnerability could be exploited by a remote unauthenticated user to execute arbitrary code.

tags | advisory, remote, arbitrary
systems | windows
advisories | CVE-2010-1549
SHA-256 | 1778c04329294e34e18038a5d43bb6331b07a1a68d55165ce58abdbef6ba638a
Ubuntu Security Notice 937-1
Posted May 7, 2010
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 937-1 - It was discovered that TeX Live incorrectly handled certain long .bib bibliography files. If a user or automated system were tricked into processing a specially crafted bib file, an attacker could cause a denial of service via application crash. This issue only affected Ubuntu 8.04 LTS, 9.04 and 9.10. Marc Schoenefeld, Karel Šrot and Ludwig Nussel discovered that TeX Live incorrectly handled certain malformed dvi files. If a user or automated system were tricked into processing a specially crafted dvi file, an attacker could cause a denial of service via application crash, or possibly execute arbitrary code with the privileges of the user invoking the program. Dan Rosenberg discovered that TeX Live incorrectly handled certain malformed dvi files. If a user or automated system were tricked into processing a specially crafted dvi file, an attacker could cause a denial of service via application crash, or possibly execute arbitrary code with the privileges of the user invoking the program.

tags | advisory, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2009-1284, CVE-2010-0739, CVE-2010-0827, CVE-2010-1440
SHA-256 | b7a0d008a0ef89d7a2fa39ac5e79750e6a3daa6eba9a13f5e1374344a352caa7
Ubuntu Security Notice 936-1
Posted May 7, 2010
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 936-1 - Dan Rosenberg discovered that dvipng incorrectly handled certain malformed dvi files. If a user or automated system were tricked into processing a specially crafted dvi file, an attacker could cause a denial of service via application crash, or possibly execute arbitrary code with the privileges of the user invoking the program.

tags | advisory, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2010-0829
SHA-256 | 23e1806e667e375ce224dd1551dd81e163a77a4b0d3c96e6310f8689450dcab6
GetSimple 2.01 Local File Inclusion
Posted May 7, 2010
Authored by Batch

GetSimple version 2.01 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | d0b0f4cc28206d2ad99e6c1cf5d156238b243833e3511e2c00293f1675b6e2b7
Fetchmail Denial Of Service In Debug Mode
Posted May 7, 2010
Authored by Matthias Andree

Fetchmail versions 4.6.3 through 6.3.16 suffer from a denial of service vulnerability in debug mode.

tags | advisory, denial of service
advisories | CVE-2010-1167
SHA-256 | c8acef1aeacf591fd77b9ec4a3ca6e3b6bcb8df278661e852d11d431d6c64b01
VMware Security Advisory 2010-0008
Posted May 7, 2010
Authored by VMware | Site vmware.com

VMware Security Advisory - VMware View 3.1.3 addresses an important cross-site scripting vulnerability.

tags | advisory, xss
advisories | CVE-2010-1143
SHA-256 | 50ad4e9c926166df1d54d7221256e059c8c05c335380ebe8d8e1d0b293d57e06
Microsoft Paint Integer Overflow Denial Of Service
Posted May 7, 2010
Authored by unsign

Microsoft Paint version 5.1.2600.218 integer overflow denial of service exploit.

tags | exploit, denial of service, overflow
advisories | CVE-2010-0028
SHA-256 | 52915ad5a4c5bfc8b0e90325411a6130f2f27daddabcde06029616246b2a6550
BaoFeng Storm M3U Buffer Overflow
Posted May 7, 2010
Authored by Lufeng Li, Li Qingshan

BaoFeng Storm suffers from .m3u file processing buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | 9b98995cabbd9c0bd80f5d6b3aca58dc27665d553115a69ba088940978b0a9fa
Debian Linux Security Advisory 2042-1
Posted May 7, 2010
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2042-1 - Florent Daigniere discovered multiple format string vulnerabilities in Linux SCSI target framework (which is known as iscsitarget under Debian) allow remote attackers to cause a denial of service in the ietd daemon. The flaw could be trigger by sending a carefully-crafted Internet Storage Name Service (iSNS) request.

tags | advisory, remote, denial of service, vulnerability
systems | linux, debian
advisories | CVE-2010-0743
SHA-256 | 86a82c4e0ffeee67d6e274032a347076cfee35affcfb26b3981bf2350db918fe
PCRE Library 8.02 Overflow
Posted May 7, 2010
Authored by Michael Santos

PCRE Library version 8.02 suffers from a buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | de0bdca03cd607c8f16f4706a2e7b1b5838e073bcf537ba31d70baaf405b082f
Libcap-NG Library 0.6.4
Posted May 7, 2010
Site people.redhat.com

The libcap-ng library is intended to make programming with POSIX capabilities much easier than the traditional libcap library. It includes utilities that can analyze all currently running applications to locate applications that may have too many privileges.

Changes: The library now uses kernel thread ID for capget/set calls. A display problem of filesystem based capabilities was fixed. netcap now prints device name for packet socket apps.
tags | library
SHA-256 | 9d508706f72ba613e6afdcd02208e2491b3e0d4dff60867a7738ae8d352f0de8
Page 1 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close