what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 12 of 12 RSS Feed

Files Date: 2009-04-10 to 2009-04-11

Loggix Project 9.4.5 SQL Injection
Posted Apr 10, 2009
Authored by Salvatore Fresta

Loggix Project version 9.4.5 suffers from a blind remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | bf74e263eade7356ab1422ef9eae6efbcb88ad532fa4ac60fd02448bec3e67b4
PHP-Agenda 2.2.5 File Overwrite
Posted Apr 10, 2009
Authored by Salvatore Fresta

PHP-Agenda versions 2.2.5 and below suffer from remote file overwriting vulnerabilities.

tags | exploit, remote, php, vulnerability
SHA-256 | ab940479c263b2c9438e059fcd6ad6098fb9b46ba52b64feec31b1827de96af7
Xilisoft Video Converter Wizard Overflow
Posted Apr 10, 2009
Authored by fl0 fl0w | Site fl0-fl0w.docspages.com

Xilisoft Video Converter Wizard version 3 stack buffer overflow proof of concept exploit that creates a malicious .cue file.

tags | exploit, overflow, proof of concept
SHA-256 | 2cc126274b7c855c647fc40828ad4f69c12593b9076dda6df42940be2f139432
Chance-i DiViS DVR System Directory Traversal
Posted Apr 10, 2009
Site dsecrg.com

The Chance-i DiViS DVR System version 2.0 suffers from a directory traversal vulnerability that allows for arbitrary file downloads.

tags | exploit, arbitrary
SHA-256 | 6e5acf1227ee129fb817d65e73a6a1da6ba7510b159579929fb54868a9a20f46
Chance-i DiViS-Web DVR System Active-X Control
Posted Apr 10, 2009
Site dsecrg.com

The Chance-i DiViS-Web DVR System Active-X control suffers from a heap overflow vulnerability in AddSiteEx().

tags | exploit, web, overflow, activex
SHA-256 | 1cd8e13ddb80c891f935f7460c1adf64168c3cf814263a7c2969694254806742
Debian Linux Security Advisory 1768-1
Posted Apr 10, 2009
Authored by Debian | Site debian.org

Debian Security Advisory 1768-1 - Two vulnerabilities were discovered in the client part of OpenAFS, a distributed file system.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2009-1250, CVE-2009-1251
SHA-256 | ec6d39f64def46cde362948947c87b5b86ebdf51b0a8e50eb3f144440cf13645
Gentoo Linux Security Advisory 200904-12
Posted Apr 10, 2009
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200904-12 - A vulnerability in Wicd may allow for disclosure of sensitive information. Tiziano Mueller of Gentoo discovered that the DBus configuration file for Wicd allows arbitrary users to own the org.wicd.daemon object. Versions less than 1.5.9 are affected.

tags | advisory, arbitrary
systems | linux, gentoo
advisories | CVE-2009-0489
SHA-256 | ca6fbe497ff3b76cb79c665cfed2498aba6b8435b38fd9cd2b883d8d382fd60f
Intellitamper 2.07 Buffer Overflow
Posted Apr 10, 2009
Authored by ZoRLu

Intellitamper version 2.07 .txt file local buffer overflow proof of concept exploit.

tags | exploit, overflow, local, proof of concept
SHA-256 | 39c5e9df6141e257f0b5dbe381cacacfd9ebcfd7ad247b3892b5f1166d8a54dd
Mandriva Linux Security Advisory 2009-089
Posted Apr 10, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-089 - OpenSC before 0.11.7 allows physically proximate attackers to bypass intended PIN requirements and read private data objects via a (1) low level APDU command or (2) debugging tool, as demonstrated by reading the 4601 or 4701 file with the opensc-explorer or opensc-tool program. The updated packages fix the issue.

tags | advisory
systems | linux, mandriva
advisories | CVE-2009-0368
SHA-256 | 2c94ed15b7dcfbcd549b03462f5379490c77774921b12c2f2ed61c8f1193c3a8
Advanced SQL Injection To Operating System Full Control
Posted Apr 10, 2009
Authored by Bernardo Damele

Whitepaper called Advanced SQL Injection To Operating System Full Control.

tags | paper, sql injection
SHA-256 | d7ae79b18cb503635cf4e7952bd054354bf38dbbb5cf70fa1ed8ecb133293568
Secunia Security Advisory 34583
Posted Apr 10, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for tor. This fixes some vulnerabilities and weaknesses, where two have an unknown impact and others can be exploited by malicious, local users to potentially perform certain actions with escalated privileges and by malicious people to bypass certain security restrictions or cause a DoS (Denial of Service).

tags | advisory, denial of service, local, vulnerability
systems | linux, gentoo
SHA-256 | f222411da04d78c82288165645a9a0539a06349977df03225cce8a1704b0fd5d
Secunia Security Advisory 34592
Posted Apr 10, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for avahi. This fixes a vulnerability, which can be exploited by malicious people to potentially cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, gentoo
SHA-256 | 2b8647e68a6e91b42c42daad0f94169b2fb407f0548adf21cd2a76762142885c
Page 1 of 1
Back1Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    0 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close