Exploit the possiblities
Showing 1 - 25 of 26 RSS Feed

Files Date: 2010-11-24

Windows Task Scheduler Privilege Escalation
Posted Nov 24, 2010
Authored by webDEViL

Microsoft Windows task scheduler privilege escalation exploit.

tags | exploit
systems | windows
MD5 | 8f917c83995a45cd2a161f141f883e34
Mandriva Linux Security Advisory 2010-241
Posted Nov 24, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-241 - gnc-test-env in GnuCash 2.3.15 and earlier places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory. The affected /usr/bin/gnc-test-env file has been removed to mitigate the vulnerability as gnc-test-env is only used for tests and while building gnucash. Additionally for Mandriva 2010.1 gnucash-2.2.9 was not compatible with guile. This update adapts gnucash to the new API of guile.

tags | advisory, local, trojan
systems | linux, mandriva
advisories | CVE-2010-3999
MD5 | 6d0716a6b5cdf4bc7ce4efa4f7d8cfdf
SimpLISTic 2.0 Cross Site Scripting
Posted Nov 24, 2010
Authored by Aliaksandr Hartsuyeu | Site evuln.com

SimpLISTic version 2.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 033e574c185bd927e26caf6eb8e33395
MCG GuestBook 1.0 Cross Site Scripting
Posted Nov 24, 2010
Authored by Aliaksandr Hartsuyeu | Site evuln.com

MCG GuestBook version 1.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 9aa739a7ae703975611a3e5a5a0ef653
D-Link bsc_wlan.php Access Bypass
Posted Nov 24, 2010
Authored by rapper crazy

D-Link gear suffers from a direct access authentication bypass vulnerability in bsc_wlan.php.

tags | exploit, php, bypass
MD5 | ddd49aa643a83d2e33cf74ea6370cd0a
Mandriva Linux Security Advisory 2010-240
Posted Nov 24, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-240 - Untrusted search path vulnerability in metadata/loader.c in Mono 2.8 and earlier allows local users to gain privileges via a Trojan horse shared library in the current working directory.

tags | advisory, local, trojan
systems | linux, mandriva
advisories | CVE-2010-4159
MD5 | 01b6804bfe2fa120473212ed3437cab5
DATAC RealWin SCADA Server SCPC_TXTEVENT Buffer Overflow
Posted Nov 24, 2010
Authored by Luigi Auriemma, MC | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in DATAC Control International RealWin SCADA Server 2.0 (Build 6.1.8.10). By sending a specially crafted packet, an attacker may be able to execute arbitrary code.

tags | exploit, overflow, arbitrary
advisories | CVE-2010-4142, OSVDB-68812
MD5 | d493a7806336eec108f306948e2815f3
GetSimple CMS 2.01 / 2.02 Credential Disclosure
Posted Nov 24, 2010
Authored by Michael Brooks

GetSimple CMS versions 2.01 and 2.02 suffers from an administrative credential disclosure vulnerability.

tags | exploit, info disclosure
MD5 | 1ed4fdfafb5de05a3641ac7a4d1a5af6
Windows Vista/7 UAC Bypass Exploit
Posted Nov 24, 2010
Authored by noobpwnftw

Microsoft Windows Vista / 7 privilege escalation exploit that has UAC bypass.

tags | exploit
systems | windows, vista
MD5 | c47d612c00713e5ff16a5e3db8da5ad9
OTSTurnTables 1.00.028 Buffer Overflow
Posted Nov 24, 2010
Authored by 0v3r

OTSTurnTables version 1.00.028 local buffer overflow exploit.

tags | exploit, overflow, local
MD5 | b5700795d4d3b49de85c86574ba9c42f
Secunia Security Advisory 42368
Posted Nov 24, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - HP has issued an update for Tomcat Servlet Engine in HP-UX. This fixes some vulnerabilities, which can be exploited by malicious users to disclose sensitive information or manipulate certain data and by malicious people to disclose certain system information and cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | hpux
MD5 | a72936dfd7cb509a6a7fce0f582f06e3
Secunia Security Advisory 42354
Posted Nov 24, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Vegard Nossum has reported a vulnerability in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, kernel, local
systems | linux
MD5 | d09c5e6477475732190597265e9d6748
Secunia Security Advisory 42139
Posted Nov 24, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Aleksandar Nikolic has discovered a vulnerability in webApp.secure, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | 7bff2a532cad26069825ce0a76ab11e5
Secunia Security Advisory 42345
Posted Nov 24, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for dhcp. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, fedora
MD5 | f814f8ebb432704f6ebc94f6949d3596
Secunia Security Advisory 42314
Posted Nov 24, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Apple iOS, which can be exploited by malicious people to conduct cross-site scripting and spoofing attacks, disclose sensitive information, bypass certain security restrictions, or to compromise a user's system.

tags | advisory, spoof, vulnerability, xss
systems | cisco, apple
MD5 | 3496af9a2a08d8f367932cab7ad96f44
Secunia Security Advisory 42355
Posted Nov 24, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in various Horde products, which can be exploited by malicious people to conduct script insertion attacks.

tags | advisory
MD5 | d14b3cb7ca4f9f083b2313a59ea43ed8
Secunia Security Advisory 42317
Posted Nov 24, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Apple has acknowledged multiple vulnerabilities in Apple TV, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable device.

tags | advisory, denial of service, vulnerability
systems | apple
MD5 | 1141d3dffb700dd550416e6cf2a9bf68
Secunia Security Advisory 42350
Posted Nov 24, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for clamav. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system.

tags | advisory, denial of service
systems | linux, fedora
MD5 | ad766a1d3a2c61069dc2f2ae393deb67
Secunia Security Advisory 42329
Posted Nov 24, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gjoko Krstic has discovered a vulnerability in Native Instruments Massive, which can be exploited by malicious people to potentially compromise a user's system.

tags | advisory
MD5 | 13a17d48146a350a30562ee0edfef866
Secunia Security Advisory 42352
Posted Nov 24, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for openssl. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library.

tags | advisory, denial of service
systems | linux, debian
MD5 | 7f3dcd9a2b41c521274d9838a6a3600c
Secunia Security Advisory 42337
Posted Nov 24, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Apache Tomcat, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
MD5 | b62af23f623352f152b54c928efab317
Secunia Security Advisory 42325
Posted Nov 24, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for postgresql. This fixes a security issue, which can be exploited by malicious users to perform certain actions with escalated privileges.

tags | advisory
systems | linux, redhat
MD5 | 88c8647cb996153c4dadac14488a0979
Secunia Security Advisory 42363
Posted Nov 24, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in DaDaBIK, which can be exploited by malicious users to perform script insertion attacks.

tags | advisory
MD5 | efe5398c38dd0ab0b4da263ac847ee32
Secunia Security Advisory 42370
Posted Nov 24, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Trend Micro Office Scan, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
MD5 | d4696ebe58c439d50b28aeea0f63b3a4
Secunia Security Advisory 42372
Posted Nov 24, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Xen, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local, vulnerability
MD5 | 2e75310807095440a92529e97df2042e
Page 1 of 2
Back12Next

File Archive:

December 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    15 Files
  • 2
    Dec 2nd
    2 Files
  • 3
    Dec 3rd
    1 Files
  • 4
    Dec 4th
    15 Files
  • 5
    Dec 5th
    15 Files
  • 6
    Dec 6th
    18 Files
  • 7
    Dec 7th
    17 Files
  • 8
    Dec 8th
    15 Files
  • 9
    Dec 9th
    13 Files
  • 10
    Dec 10th
    1 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close