exploit the possibilities
Showing 1 - 10 of 10 RSS Feed

Files Date: 2013-02-17

Photodex ProShow Producer 5.0.3297 Buffer Overflow
Posted Feb 17, 2013
Authored by Julien Ahrens | Site security.inshell.net

Photodex ProShow Producer version 5.0.3297 suffers from a stack-based buffer overflow vulnerability. When opening a crafted transition file (.pxt) the application loads the "title" value from the pxt file. The application does not properly validate the length of the string loaded from the "title" value from the pxt file before using it in the further application context, which leads to a buffer overflow condition with possible code execution via overwritten SEH chains on Windows XP/7 32bit. Proof of concept code included.

tags | exploit, overflow, code execution, proof of concept
systems | windows
SHA-256 | ea2d7dca9a83d313a225c8b9a5f034f06ab679db12c229e96637363431e9c049
SI6 Networks' IPv6 Toolkit 1.3
Posted Feb 17, 2013
Authored by Fernando Gont

This toolkit houses various IPv6 tools that have been tested to compile and run on Debian GNU/Linux 6.0, FreeBSD 9.0, NetBSD 5.1, OpenBSD 5.0, Mac OS 10.8.0, and Ubuntu 11.10.

Changes: Addition of a full-fledged IPv6 address scanning tool. Includes support for tunnels. Various other additions and updates.
tags | tool, scanner
systems | linux, netbsd, unix, freebsd, openbsd, debian, ubuntu
SHA-256 | 182d3e7b34ea800eae21d5fbf5fd4fa7f13792f27d9a4c5f61947ae0e178a720
Debian Security Advisory 2625-1
Posted Feb 17, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2625-1 - Multiple vulnerabilities were discovered in the dissectors for the CLNP, DTLS, DCP-ETSI and NTLMSSP protocols, which could result in denial of service or the execution of arbitrary code.

tags | advisory, denial of service, arbitrary, vulnerability, protocol
systems | linux, debian
advisories | CVE-2013-1582, CVE-2013-1586, CVE-2013-1588, CVE-2013-1590
SHA-256 | ca4004f5cc1cd1fa59fcd3119fda76f3fb2889d730e5eb1625839d1f349f366d
Debian Security Advisory 2624-1
Posted Feb 17, 2013
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2624-1 - Several vulnerabilities have been discovered in FFmpeg, a multimedia player, server and encoder. Multiple input validations in the decoders/ demuxers for Shorten, Chines AVS video, VP5, VP6, AVI, AVS and MPEG-1/2 files could lead to the execution of arbitrary code.

tags | advisory, arbitrary, vulnerability
systems | linux, debian
advisories | CVE-2012-0858, CVE-2012-2777, CVE-2012-2783, CVE-2012-2784, CVE-2012-2788, CVE-2012-2801, CVE-2012-2803
SHA-256 | 4b876f7df715ca0333966cf9cf484bac9cf550cd727edda152042ca8ddb7c066
360-FAAR Firewall Analysis Audit And Repair 0.3.9
Posted Feb 17, 2013
Authored by Dan Martin | Site sourceforge.net

360-FAAR Firewall Analysis Audit and Repair is an offline command line perl policy manipulation tool to filter, compare to logs, merge, translate and output firewall commands for new policies, in checkpoint dbedit or screenos commands.

Changes: This release permits you to to choose the types of rules and which rule actions to include in the rule rationalization mode. Both the merge from and filter rulebases rule types can be chosen. Also the rr mode rule unwrap, filter and build code has been optimized.
tags | tool, perl
systems | unix
SHA-256 | 5ac32a9f5919e2aacba845b13f0462fa75bf8dcf78d7edca80b390ceb59f5d75
Demandware Store Cross Site Scripting
Posted Feb 17, 2013
Authored by Rajat Karmarkar

Demandware Store software suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 5dd99eca7616449febf63a21dc70de761531284c0fd9181638c1aa61c67c7be6
Smoke Loader LFI / File Deletion
Posted Feb 17, 2013
Authored by Ian

Smoke Loader Command and Control panel suffers from local file inclusion and file deletion vulnerabilities.

tags | exploit, local, vulnerability, file inclusion
SHA-256 | 587519e2fdb61e9e365a4f4b17b8c75e68b3cc0b725b1248c46fd1e6ec095b73
0101SHOP CMS SQL Injection
Posted Feb 17, 2013
Authored by Mr.XpR

0101SHOP CMS suffers from multiple remote SQL injection vulnerabilities. Note that this finding houses site-specific data.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | 98f4225f210a2c559dd4809bda09437039f3365ffd866a2a2bc690d3d224867f
Scripts Genie Top Sites SQL Injection
Posted Feb 17, 2013
Authored by 3spi0n

Scripts Genie Top Sites script suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | dbb0b437f0a8decd77e87d47d475ebdc3a0ff202b8afc7de48ba5addd8f9bdbf
Shopping.com API Cross Site Scripting
Posted Feb 17, 2013
Authored by 3spi0n

The Shopping.com API V3 PHP script suffers from a cross site scripting vulnerability.

tags | exploit, php, xss
SHA-256 | 5917bfd984a3d929ce655c1ae300b33d529e84e562eb42da91b5668f5e6c7864
Page 1 of 1
Back1Next

File Archive:

May 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    0 Files
  • 2
    May 2nd
    15 Files
  • 3
    May 3rd
    19 Files
  • 4
    May 4th
    24 Files
  • 5
    May 5th
    15 Files
  • 6
    May 6th
    14 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    13 Files
  • 10
    May 10th
    7 Files
  • 11
    May 11th
    99 Files
  • 12
    May 12th
    45 Files
  • 13
    May 13th
    7 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    16 Files
  • 17
    May 17th
    26 Files
  • 18
    May 18th
    4 Files
  • 19
    May 19th
    17 Files
  • 20
    May 20th
    2 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    6 Files
  • 24
    May 24th
    19 Files
  • 25
    May 25th
    5 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close