exploit the possibilities
Showing 1 - 13 of 13 RSS Feed

Files Date: 2011-05-28

Mandriva Linux Security Advisory 2011-102
Posted May 28, 2011
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2011-102 - Directory traversal vulnerability in the disk_create function in disk.c in rdesktop before 1.7.0, when disk redirection is enabled, allows remote RDP servers to read or overwrite arbitrary files via a. in a pathname.

tags | advisory, remote, arbitrary
systems | linux, mandriva
advisories | CVE-2011-1595
MD5 | 0643052d98293ffbf26112475239e324
Gadu-Gadu Remote Code Execution
Posted May 28, 2011
Authored by Kacper Szczesniak

Gadu-Gadu suffers from a man-in-the-middle vulnerability that allows for remote code execution.

tags | exploit, remote, code execution
MD5 | 2c355fca29fad5310d03cb79de4610d2
Poison Ivy 2.3.2 Buffer Overflow
Posted May 28, 2011
Authored by Kevin R.V

Poison Ivy version 2.3.2 remote buffer overflow exploit.

tags | exploit, remote, overflow
MD5 | a17f81990cb4d15f73089cddcc9a0096
Guru Penny Auction Pro 3 Blind SQL Injection
Posted May 28, 2011
Authored by v3n0m

Guru Penny Auction Pro version 3 suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 8c27566e84d92b3b69644b4950860f64
Duhok Forum 1.1 SQL Injection
Posted May 28, 2011
Authored by M.Jock3R

Duhok Forum version 1.1 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 5c1f8a94de858dd080f0f4390628d275
Joomla JMSFileSeller Local File Inclusion
Posted May 28, 2011
Authored by Valentin Hoebel

Joomla JMSFileSeller component version 1.0 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
MD5 | 9c79377044b18340dcd51c3c48ae4126
Ekoparty 7 Call For Papers
Posted May 28, 2011
Site ekoparty.com.ar

Call For Papers for the 7th edition of the Ekoparty Security Conference being held from September 19th through the 20th, 2011, in Buenos Aires City, Argentina.

tags | paper, conference
MD5 | b17df868754bb43ce04ed784c609be4d
FreeBSD/x86 execve /bin/sh -c "reboot" Shellcode
Posted May 28, 2011
Authored by KedAns-Dz

Two shellcodes for FreeBSD/x86 that perform execve('/bin/sh -c "reboot"').

tags | x86, shellcode
systems | freebsd
MD5 | 539ea3f8c193fda4e4f29b9f090dd20f
Cotonti 0.9.2 Cross Site Request Forgery / Cross Site Scripting
Posted May 28, 2011
Authored by KedAns-Dz

Cotonti versions 0.9.2 and below suffer from cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
MD5 | 253b0103992f031c286bdbcaba56cb1a
HP Data Protector Client Code Execution
Posted May 28, 2011
Authored by fdisk

HP Data Protector Client remote code execution proof of concept exploit.

tags | exploit, remote, code execution, proof of concept
advisories | CVE-2011-0923
MD5 | e8b0b6acd8a60c3b4a88951f0f1b04bf
Secunia Security Advisory 44708
Posted May 28, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability and a security issue have been reported in Drupal, which can be exploited by malicious users to conduct script insertion attacks and by malicious people to bypass certain security restrictions.

tags | advisory
MD5 | 4149fbcf4d9c9c5a2fbd7cdc7f9f24e3
Secunia Security Advisory 44731
Posted May 28, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for systemtap. This fixes some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local, vulnerability
systems | linux, fedora
MD5 | 3446aabe29421e9d7617aa60ed8cdc76
Secunia Security Advisory 44697
Posted May 28, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for dbus-glib. This fixes a security issue, which can be exploited by malicious, local users to bypass certain security features.

tags | advisory, local
systems | linux, ubuntu
MD5 | 10f3958254df3e3edd3d5072922caa31
Page 1 of 1
Back1Next

File Archive:

November 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    28 Files
  • 2
    Nov 2nd
    1 Files
  • 3
    Nov 3rd
    1 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    19 Files
  • 6
    Nov 6th
    65 Files
  • 7
    Nov 7th
    22 Files
  • 8
    Nov 8th
    18 Files
  • 9
    Nov 9th
    1 Files
  • 10
    Nov 10th
    1 Files
  • 11
    Nov 11th
    11 Files
  • 12
    Nov 12th
    65 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close