exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 96 RSS Feed

Files Date: 2009-01-21 to 2009-01-22

Trend Micro Network Security Component Vulnerabilities
Posted Jan 21, 2009
Authored by Carsten Eiram | Site secunia.com

Secunia Research has discovered vulnerabilities in Trend Micro Network Security Component (NSC) modules as bundled with various products. These can be exploited by malicious, local users to cause a DoS (Denial of Service) or potentially gain escalated privileges.

tags | advisory, denial of service, local, vulnerability
advisories | CVE-2008-3864, CVE-2008-3865
SHA-256 | 5b5de053e6d625822504987e45ced7ca8fde5c1b4c6de316295e4d04a0d56dbd
Dodo's Quiz Script 1.1 Local File Inclusion
Posted Jan 21, 2009
Authored by cOndemned | Site condemned.r00t.la

Dodo's Quiz Script version 1.1 suffers from a local file inclusion vulnerability in dodosquiz.php.

tags | exploit, local, php, file inclusion
SHA-256 | ab94a979e7893e7229ec8d733242d1bc73edc9ee00fccbe569470ca1dd5cc570
openAcunetix Web Application Scanner
Posted Jan 21, 2009
Authored by John Martinelli from ISRD.com | Site redlevel.org

openAcunetic is an open source java-based web application vulnerability scanner.

tags | tool, java, web, scanner
systems | unix
SHA-256 | 0f54c34b400f277378cf94969b4343cb6d90574f229786adbbf0ec2258d03503
Oracle Containers For Java Traversal
Posted Jan 21, 2009
Authored by Sirdarckcat | Site sirdarckcat.net

The Oracle Containers For Java (OC4J) in the Oracle Application Server 10g suffers from a directory traversal vulnerability.

tags | exploit, java, file inclusion
advisories | CVE-2008-2938
SHA-256 | d382fb99ab02805477ef1961d910f2d0495189ba45d6a79eff38e57289168967
Microsoft Bluetooth Directory Traversal
Posted Jan 21, 2009
Authored by Alberto Moreno Tablado

A directory traversal vulnerability exists in the OBEX FTP service in the Microsoft Bluetooth stack as implemented in Windows Mobile 5.0 / 6 devices.

tags | exploit, file inclusion
systems | windows
SHA-256 | 95339cb6c88198101aa58c039084a0716173bceced5f132981d0c227944e0d77
Cybershade CMS Remote File Inclusion
Posted Jan 21, 2009
Authored by HACKERS PAL | Site soqor.net

Cybershade CMS suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 3bdba5ddbca7ba90f12773df5588a7df5b410963c0ed960cde912ddace38f3a7
Joomla com_waticketsystem Blind SQL Injection
Posted Jan 21, 2009
Authored by Cyb3r-1sT

Joomla com_waticketsystem blind remote SQL injection exploit.

tags | exploit, remote, sql injection
SHA-256 | b4287e62ebd235d30e03f752d31e3b312572a164fd4f8641cc7327ea7919efcf
Another File Integrity Checker 2.13-1
Posted Jan 21, 2009
Authored by Eric Gerbier | Site afick.sourceforge.net

afick is another file integrity checker, designed to be fast and fully portable between Unix and Windows platforms. It works by first creating a database that represents a snapshot of the most essential parts of your computer system. Then a user can run the script to discover all modifications made since the snapshot was taken (i.e. files added, changed, or removed). The configuration syntax is very close to that of aide or tripwire, and a graphical interface is provided.

Changes: Removed udev files from scan. Began to remove global variables. Various other bug fixes and additions.
tags | tool, integrity
systems | windows, unix
SHA-256 | c3070a5715957e2d8f94273a98bc4f922f8d2077847b1e2c87f41ca241e65b61
Mandriva Linux Security Advisory 2009-019
Posted Jan 21, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-019 - A vulnerability has been discovered in the load function of the XPM loader for imlib2, which allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted XPM file. The updated packages have been patched to prevent this.

tags | advisory, denial of service, arbitrary
systems | linux, mandriva
advisories | CVE-2008-5187
SHA-256 | 73a97dd51e4154a413d606b62ec901993627719aee7635186cba2f5e5ab6e85a
AXIS 70U Privilege Escalation / XSS
Posted Jan 21, 2009
Site dsecrg.com

The AXIS 70U Network Document Server suffers from privilege escalation and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 325620ec912bf03a65d863de04d8f8b613d58c9041732106c5d7777d8abe765e
PHPAds 2.0 XSS / Administrative Bypass
Posted Jan 21, 2009
Authored by Danny Moules | Site push55.co.uk

PHPAds version 2.0 suffers from administrative bypass and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, bypass
SHA-256 | c12bcdb2388d348913cec836ab01dc0db9ea270c2b7fe5435a04997858b9eb93
RCBlog 1.03 Authentication Bypass
Posted Jan 21, 2009
Authored by Danny Moules | Site push55.co.uk

RCBlog version 1.03 suffers from a remote authentication bypass vulnerability.

tags | exploit, remote, bypass
SHA-256 | da5417acc6ca4dc1f2a03a7e2dcad56f2148ebabd28197a5fa86f28d560a7513
Wintercore Advisory WM01-0109
Posted Jan 21, 2009
Authored by Ruben Santamarta | Site wintercore.com

Wintercore Advisory - PXEService.exe is prone to a remote buffer overflow due to improper bounds checking when handling PXE requests. A remote unauthenticated malicious attacker can take advantage of this flaw to execute arbitrary code by sending a specially crafted UDP packet. SystemcastWizard Lite versions 2.0 and below are affected.

tags | advisory, remote, overflow, arbitrary, udp
SHA-256 | 1e4e1fc447fa7a1d81f5dee9dc92ca06a9dc682581918bf7809c0defad38df4b
Debian Linux Security Advisory 1708-1
Posted Jan 21, 2009
Authored by Debian | Site debian.org

Debian Security Advisory 1708-1 - It was discovered that gitweb, the web interface for the Git version control system, contained several vulnerabilities.

tags | advisory, web, vulnerability
systems | linux, debian
advisories | CVE-2008-5516, CVE-2008-5517
SHA-256 | a85d54391b9a0dec2fa27e6fd569312f862e2f7682c8ac9d941e8370225058fb
AJAuctionPro OOPD 2.3 SQL Injection
Posted Jan 21, 2009
Authored by Snakespc | Site snakespc.com

AJAuctionPro OOPD version 2.3 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 95042fe624dabfa3be6821a96f183cf6c7564603b8547f201f4c23fc62df7bd7
Web Hacking Incidents Database Update
Posted Jan 21, 2009
Authored by Ofer Shezaf

This file documents recent incidents that have been reported to the Web Hacking Incidents Database (WHID).

tags | advisory, web
SHA-256 | ff37a59381e965e20aa2bf1ee57101c6ce54502a13d33c97989767eabd92f9ff
Browser Fuzzer 2
Posted Jan 21, 2009
Authored by Jeremy Brown | Site krakowlabs.com

Browser Fuzzer 2 (bf2) is a comprehensive web browser fuzzer that fuzzes CSS, DOM, HTML and JavaScript.

tags | web, javascript, fuzzer
SHA-256 | 9c0853e1720bef8ed4d5727782ddb76c3ffde6981e51439d0fe5e1c930239e27
Max.Blog 1.0.6 Delete Post Exploit
Posted Jan 21, 2009
Authored by SirGod | Site insecurity.ro

Max.Blog version 1.0.6 arbitrary post deletion exploit.

tags | exploit, arbitrary
SHA-256 | 21810211c2c035878884e489b8b21bcf5bdaf6b13e0721544b781c41b40d9608
53KF Web Instant Messenger Cross Site Scripting
Posted Jan 21, 2009
Authored by xisigr

53KF Web Instant Messenger suffers from cross site scripting vulnerabilities.

tags | exploit, web, vulnerability, xss
SHA-256 | 4bc97a975505c79d3be2ad3a4be1d64fec853f8c95472df5a857306e86911555
Ninja Blog 4.8 XSRF / XSS
Posted Jan 21, 2009
Authored by Danny Moules | Site push55.co.uk

Ninja Blog version 4.8 suffers from cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
SHA-256 | 5fbe07eb78e8f607da18b753d206d57a195804171d49b6c8158f3636bfdc2b5e
Ninja Blog 4.8 Information Disclosure
Posted Jan 21, 2009
Authored by Danny Moules | Site push55.co.uk

Ninja Blog version 4.8 suffers from a remote information disclosure vulnerability.

tags | exploit, remote, info disclosure
SHA-256 | 1ac8fb81127a7b04e575118d9675250f9a679afb9faf5e72a948f869c9a46498
Gentoo Linux Security Advisory 200901-12
Posted Jan 21, 2009
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200901-12 - A buffer overflow in noip-updater can lead to arbitrary code execution. xenomuta found out that the GetNextLine() function in noip2.c misses a length check, leading to a stack-based buffer overflow. Versions less than 2.1.9 are affected.

tags | advisory, overflow, arbitrary, code execution
systems | linux, gentoo
advisories | CVE-2008-5297
SHA-256 | f1bcd3a344d56136356bfd4a55b9b152edc291fc676accc64c95aac9747954d5
Ralinktech Wireless Cards Integer Overflow
Posted Jan 21, 2009
Authored by Aviv

Various Ralinktech wireless card drivers suffer from an integer overflow vulnerability when receiving malformed probe request packets.

tags | advisory, overflow
SHA-256 | ae16ac53a7a29c00f338e19e014d2ed2d63c217b91173699758d476c2704fb44
Joomla News Component SQL Injection
Posted Jan 21, 2009
Authored by Snakespc | Site snakespc.com

The Joomla News component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 2833670d93b8335ecf34fa7255003169ff76b189ee490bebbca5674965cf9adf
Joomla PC Cookbook Component Blind SQL Injection
Posted Jan 21, 2009
Authored by Cyb3r-1sT

Joomla com_pccookbook blind remote SQL injection exploit.

tags | exploit, remote, sql injection
SHA-256 | 05e8e1cbd1abf9c196f6f1c5072a1dfb2a5f0d8c81ea7a2e82a777c78d1e6f41
Page 3 of 4
Back1234Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close