exploit the possibilities
Showing 1 - 20 of 20 RSS Feed

Files Date: 2011-02-04

osCommerce Authentication Bypass
Posted Feb 4, 2011
Authored by Nicolas Krassas

osCommerce suffers from an authentication bypass vulnerability that allows for unsolicited mailing.

tags | exploit, bypass
MD5 | e341f303940477096e8da109ca1591b6
Stack Overflow: Automatic write() Discovery
Posted Feb 4, 2011
Authored by Marco Ortisi

Whitepaper called Stack Overflow: Automatic write() Discovery.

tags | paper, overflow
MD5 | 6d379fed5ebf5ecbf7071284e1d95950
The Metasploit Framework
Posted Feb 4, 2011
Authored by badc0re

Whitepaper called The Metasploit Framework. It gives an overview of using Metasploit and is written in Macedonian.

tags | paper
MD5 | d9a24f1ad84610f4d0e29e2de0f6ffd7
Penetration Testing / Hacking Overview
Posted Feb 4, 2011
Authored by sup3r

This paper is a high-level overview of the threat space used during penetration testing and hacking.

tags | paper
MD5 | eecdc03df308819d185ee5f95a2ec9f7
HTC Peep Credential Disclosure
Posted Feb 4, 2011
Authored by Raul Siles

HTC Peep, the Twitter application found on HTC mobile devices, suffers from multiple information disclosure vulnerabilities where your credentials are passed in the clear.

tags | advisory, vulnerability, info disclosure
MD5 | 361c1ac74d7b507e108f18a9629a34e5
Ubuntu Security Notice USN-1058-1
Posted Feb 4, 2011
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1058-1 - Geoff Keating reported that a buffer overflow exists in the intarray module's input function for the query_int type. This could allow an attacker to cause a denial of service or possibly execute arbitrary code as the postgres user.

tags | advisory, denial of service, overflow, arbitrary
systems | linux, ubuntu
advisories | CVE-2010-4015
MD5 | 43058c87a6e1db9bc51c2b44a19b5860
SSH2FTPCrack FTP / SSH Brute Forcer
Posted Feb 4, 2011
Authored by GhOsT-PR

ssh2ftpcrack is a simple FTP and SSH dictionary brute force cracking tool written in Perl.

tags | cracker, perl
MD5 | 94420de4a0bb2f483450662081948cc9
Secunia Security Advisory 43119
Posted Feb 4, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for asterisk. This fixes a vulnerability, which can be exploited by malicious users to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

tags | advisory, denial of service
systems | linux, fedora
MD5 | 3ef532e73e46349101d086b565ef68df
Secunia Security Advisory 43177
Posted Feb 4, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in BMC products, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | 4d7cfdd30acc52462fb0828f18fb424e
Secunia Security Advisory 43159
Posted Feb 4, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been discovered Serendipity, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a vulnerable system.

tags | advisory, vulnerability, xss
MD5 | 536f9fa8b2aaa62bddd673eb6358f0b0
Secunia Security Advisory 43142
Posted Feb 4, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in MediaWiki, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory
MD5 | acb271a72047fa668c5307706ef70dd4
Secunia Security Advisory 43176
Posted Feb 4, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been discovered CMME, which can be exploited by malicious users to compromise a vulnerable system and by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
MD5 | b90f8ac66a48d705582991582c0c9c78
Secunia Security Advisory 43183
Posted Feb 4, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in the Chatroom module for Drupal, which can be exploited by malicious people to conduct cross-site request forgery and script insertion attacks.

tags | advisory, vulnerability, csrf
MD5 | d0843fff5a0625799c84e25cbdb13823
Secunia Security Advisory 43196
Posted Feb 4, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Techphoebe QuickShare File Server, which can be exploited by malicious users to disclose potentially sensitive information and compromise a vulnerable system.

tags | advisory
MD5 | 97294752719569f3e58ad32f2ed17137
Secunia Security Advisory 43193
Posted Feb 4, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some weaknesses and vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to bypass certain security restrictions and potentially compromise a user's system.

tags | advisory, vulnerability
MD5 | fb2a34a111dfb684916478a62d2732bd
Secunia Security Advisory 43189
Posted Feb 4, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for php53. This fixes a weakness and some vulnerabilities, which can be exploited by malicious people to potentially disclose sensitive information and cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | linux, redhat
MD5 | aea8a9b414fdddfd53b235b3de7d0a7a
Zero Day Initiative Advisory 11-039
Posted Feb 4, 2011
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 11-039 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of BMC Patrol Agent. Authentication is not required to exploit this vulnerability. The specific flaw exists within the service daemon which listens by default on TCP port 6768. When processing the BGS_MULTIPLE_READS commands a user-supplied length value is trusted and utilized in reading arbitrary data into a stack buffer. By providing large enough values a remote attacker can abuse this to execute remote code under the context of the SYSTEM user.

tags | advisory, remote, arbitrary, tcp
MD5 | dd3c195c79bef2df1321ba5f64d811a0
Ubuntu Security Notice USN-1057-1
Posted Feb 4, 2011
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1057-1 - Dave Chinner discovered that the XFS filesystem did not correctly order inode lookups when exported by NFS. A remote attacker could exploit this to read or write disk blocks that had changed file assignment or had become unlinked, leading to a loss of privacy. Dan Rosenberg discovered that several network ioctls did not clear kernel memory correctly. A local user could exploit this to read kernel stack memory, leading to a loss of privacy. Kees Cook and Vasiliy Kulikov discovered that the shm interface did not clear kernel memory correctly. A local attacker could exploit this to read kernel stack memory, leading to a loss of privacy.

tags | advisory, remote, kernel, local
systems | linux, ubuntu
advisories | CVE-2010-2943, CVE-2010-3297, CVE-2010-4072
MD5 | 5ebc82f8363d3d96ef4dc449e56f3464
Debian Security Advisory 2157-1
Posted Feb 4, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2157-1 - It was discovered that PostgreSQL's intarray contrib module does not properly handle integers with a large number of digits, leading to a server crash and potentially arbitrary code execution.

tags | advisory, arbitrary, code execution
systems | linux, debian
advisories | CVE-2010-4015
MD5 | 0e80b770fd39fa63f31a79b779047477
Mandriva Linux Security Advisory 2011-020
Posted Feb 4, 2011
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2011-020 - Heap-based buffer overflow in the pango_ft2_font_render_box_glyph function in pango/pangoft2-render.c in libpango in Pango 1.28.3 and earlier, when the FreeType2 backend is enabled, allows user-assisted remote attackers to cause a denial of service or possibly execute arbitrary code via a crafted font file, related to the glyph box for an FT_Bitmap object.

tags | advisory, remote, denial of service, overflow, arbitrary
systems | linux, mandriva
advisories | CVE-2011-0020
MD5 | e74249313c93aec7a78c42ed27493af7
Page 1 of 1
Back1Next

File Archive:

July 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    15 Files
  • 2
    Jul 2nd
    19 Files
  • 3
    Jul 3rd
    12 Files
  • 4
    Jul 4th
    1 Files
  • 5
    Jul 5th
    2 Files
  • 6
    Jul 6th
    25 Files
  • 7
    Jul 7th
    35 Files
  • 8
    Jul 8th
    4 Files
  • 9
    Jul 9th
    0 Files
  • 10
    Jul 10th
    0 Files
  • 11
    Jul 11th
    0 Files
  • 12
    Jul 12th
    0 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close