exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 36 RSS Feed

Files Date: 2009-03-02 to 2009-03-03

RitsBlog 0.4.2 SQL Injection / XSS
Posted Mar 2, 2009
Authored by Salvatore Fresta

RitsBlog version 0.4.2 suffers from remote SQL injection and cross site scripting vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 04c270a31c61d62424c774368c0ec3076eedeb455e44d6c7558d5c31d9263b75
VUplayer 2.49 Local Buffer Overflow
Posted Mar 2, 2009
Authored by Assed Edin

VUplayer version 2.49 .CUE file local buffer overflow exploit

tags | exploit, overflow, local
SHA-256 | 86282dd45c27beb8b0f93dc8c5e9830c1c0ca024f7f6878eea7beb68ab8d5673
Debian Linux Security Advisory 1730-1
Posted Mar 2, 2009
Authored by Debian | Site debian.org

Debian Security Advisory 1730-1 - The security update for proftpd-dfsg in DSA-1727-1 caused a regression with the postgresql backend. This update corrects the flaw. Also it was discovered that the oldstable distribution (etch) is not affected by the security issues.

tags | advisory
systems | linux, debian
advisories | CVE-2009-0542, CVE-2009-0543
SHA-256 | 422c018fd821493e6bba8fd79fc76a6860442a69113ba1ce44662dd4dc848dfb
eXtplorer Code Execution
Posted Mar 2, 2009
Authored by Juan Galiana Lara

The eXtplorer file management component for Joomla! and Mambo suffers from a local file inclusion vulnerability that allows for remote code execution. Versions below 2.0.0 are vulnerable.

tags | exploit, remote, local, code execution, file inclusion
SHA-256 | 0c8be37f45dd7716c3e21eb52f60bdef7051a84c86dec14021ede81924f79d5b
Internet Download Manager 5.15 .LNG Buffer Overflow
Posted Mar 2, 2009
Authored by fl0 fl0w | Site fl0-fl0w.docspages.com

Internet Download Manager version 5.15 local .LNG buffer overflow exploit that can add a user, spawn calc.exe, or a reverse shell.

tags | exploit, overflow, shell, local
SHA-256 | 7527ff2505c9e73bb87e3aad89c8f20b520b7df9c8ec0d3efca0d312e7f1fa12
Academic Web Tools CMS Cross Site Scripting
Posted Mar 2, 2009
Authored by Isfahan University of Technology

Academic Web Tools CMS versions 1.5.7 and below suffer from multiple cross site scripting vulnerabilities.

tags | exploit, web, vulnerability, xss
SHA-256 | 80bab068f154421effca84501b67ac35d666a318f087352c33f1a93af627fb50
OpenX 2.6.3 Cross Site Scripting
Posted Mar 2, 2009
Authored by Vinod Sharma

OpenX version 2.6.3 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 8cd5cc68b1a3038bfd30b384151ab76cbf9014fda66b495c8fd3b1746e35d6d9
FRHACK 01 Call For Papers
Posted Mar 2, 2009
Site frhack.org

FRHACK 01 Second Call For Papers - FRHACK is the First International IT Security Conference, by hackers - for hackers, in France! The FRHACK Team (TFT) encourages speakers to present new and interesting projects for FRHACK 01 and will give preferential treatment to submissions that have not been presented at other conferences. The conference takes place September 7th and 8th, 2009.

tags | paper, conference
SHA-256 | 82d8282dcf44468e200fa83f029fadd85ce52e0be2096b313f056721c216bdb1
Web Hacking Incidents Database Update
Posted Mar 2, 2009
Authored by Ofer Shezaf

This file documents recent incidents that have been reported to the Web Hacking Incidents Database (WHID).

tags | advisory, web
SHA-256 | b75d34e09ff5f706bc546f62f391d928327a0a0992c1927332d39262a989aa71
Debian Linux Security Advisory 1729-1
Posted Mar 2, 2009
Authored by Debian | Site debian.org

Debian Security Advisory 1729-1 - Several vulnerabilities have been found in gst-plugins-bad0.10, a collection of various GStreamer plugins.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2009-0386, CVE-2009-0387, CVE-2009-0397
SHA-256 | bd7632e5aeca4ad66f55586ac401d00d1c0fccd151a6fab63225619d970fb44f
Merak Media Player 3.2 Buffer Overflow
Posted Mar 2, 2009
Authored by Encrypt3d.M!nd

Merak Media Player version 3.2 .m3u file local buffer overflow proof of concept exploit.

tags | exploit, overflow, local, proof of concept
SHA-256 | c3ed8408c1e1e6fdd9e99e7bcde13fb55675a30c4d535a1d9fb7e41e876ef34e
Graugon PHP Article Publisher 1.0 SQL Injection
Posted Mar 2, 2009
Authored by X0r

Graugon PHP Article Publisher version 1.0 suffers from remote SQL injection and insecure cookie handling vulnerabilities.

tags | exploit, remote, php, vulnerability, sql injection, insecure cookie handling
SHA-256 | 9e64a422a7ec75251330e7952ccfb94a8f0989be6fbd92c49e3ed5597aaa394b
Access2asp imageLibrary Shell Upload
Posted Mar 2, 2009
Authored by mr.al7rbi

Access2asp imageLibrary suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell, file upload
SHA-256 | 6ca25a9b46a8f8c76293f4488943e7232fd283080d978bb36402acc47569ab65
Afian Local File Inclusion
Posted Mar 2, 2009

Afian Document Manager suffers from path disclosure and local file inclusion vulnerabilities.

tags | exploit, local, vulnerability, file inclusion
SHA-256 | 8064ece9bccef24920b75bd32ac97f9458fed2418084df0a0b52589bc9b0bb98
Scannedonly Samba VFS Module
Posted Mar 2, 2009
Authored by Olivier Sessink | Site olivier.sessink.nl

Scannedonly is a samba VFS module that ensures that only files that have been scanned for viruses are visible and accessible to the end user. Scannedonly was developed because of scalability problems with samba-vscan. Scannedonly comes in two parts: a Samba VFS module and (one or more) daemons. The daemon scans files and marks them when they are known to be clean. The samba module simply filters out files that aren't marked clean.

tags | tool, scanner
systems | unix
SHA-256 | d7321683ba9dc13f69b40c25ff050442c76e905d1544370951381ef698300613
Media Commands Heap Overflow
Posted Mar 2, 2009
Authored by Hakxer

Media Commands local heap overflow proof of concept exploit that can create malicious meu, m3l, txt, and lrc files.

tags | exploit, overflow, local, proof of concept
SHA-256 | 16f0cecb44d9471d81ccd482d974ad47b4580a77d424d4550f8446d688dcbc3d
Novell eDirectory Accept-Language Buffer Overflow
Posted Mar 2, 2009
Site assurent.com

A remotely exploitable vulnerability has been discovered in the iMonitor component of Novell eDirectory. Specifically, the vulnerability is due to a boundary error when processing incoming HTTP requests and can lead to a buffer overflow condition. This boundary error can allow attackers to inject and execute arbitrary code on the target host with System or root privileges.

tags | advisory, web, overflow, arbitrary, root
SHA-256 | 077aceb320e67ce659ef5fd16c675b9a733f6c13a16131a79e46761045a9364d
Novell eDirectory iMonitor Overflow
Posted Mar 2, 2009
Authored by Praveen Darshanam

Novell eDirectory iMonitor Accept-Language request buffer overflow proof of concept exploit.

tags | exploit, overflow, proof of concept
SHA-256 | 023720d0fdc680824cc4fc5d5fa8069b3d01a41f04ad6a09683461259503f79e
EZ-Blog 1b SQL Injection
Posted Mar 2, 2009
Authored by Salvatore Fresta

EZ-Blog version 1b suffers from post deletion and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | db159f9f362c30292914cfb010ceae933e7f34251329ffb658b711338ce3d112
BlogMan 0.45 SQL Injection
Posted Mar 2, 2009
Authored by Salvatore Fresta

BlogMan version 0.45 suffers from multiple SQL injection vulnerabilities that allow for privilege escalation and authentication bypass.

tags | exploit, vulnerability, sql injection
SHA-256 | 7782bc25bfc32ee55757646cf7ac06f1b0d8ee5a9786f562e226790e4fe3595b
Packet Storm New Exploits For February, 2009
Posted Mar 2, 2009
Authored by Todd J. | Site packetstormsecurity.com

Packet Storm new exploits for February, 2009.

tags | exploit
SHA-256 | d9e012424f8c22f55e33e8d8710e47dd322c50d3ee90db3e3d21dba05d3927a0
Joomla Digistore Blind SQL Injection
Posted Mar 2, 2009
Authored by Cyb3r-1sT

Joomla Digistore component remote blind SQL injection exploit.

tags | exploit, remote, sql injection
SHA-256 | c7d8dc5991bfbb4c715181773ada5a66f9d2126742fcc7fe12928d05f4b07c3a
Document Library 1.0.1 Arbitrary Change Admin
Posted Mar 2, 2009
Authored by ByALBAYX | Site c4team.org

Document Library version 1.0.1 suffers from an arbitrary change administrator vulnerability.

tags | exploit, arbitrary
SHA-256 | 7a391b0957a78f12a695515bebb8ed6d91767b00a41975b65caffde35b027dcf
Digital Interchange Calendar 5.7.13 Contents Change
Posted Mar 2, 2009
Authored by ByALBAYX | Site c4team.org

Digital Interchange Calendar version 5.7.13 suffers from a contents change vulnerability.

tags | exploit
SHA-256 | f271ae3d5ee259d7032e3ed58943d73a11537aeb07d98097329cb8b0eff8d6f7
Secunia Security Advisory 34053
Posted Mar 2, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for dkim-milter. This fixes a vulnerability, which can be exploited by malicious people to conduct DoS (Denial of Service) attacks.

tags | advisory, denial of service
systems | linux, debian
SHA-256 | db8b8c8509d7c1b9d5c7579243d1327313421d98c93af428fe1026c41fac3b79
Page 1 of 2
Back12Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close