exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 67 RSS Feed

Files Date: 2009-05-13 to 2009-05-14

CastRipper 2.50.70 .M3U Universal Stack Overflow
Posted May 13, 2009
Authored by Stack | Site v4-team.com

CastRipper version 2.50.70 universal stack overflow that creates a malicious .m3u file.

tags | exploit, overflow
SHA-256 | 0343940fb750f67dfa8d40b54e07d57c64001d9fd2f53f7089b4dc4213519c37
CastRipper 2.50.70 .M3U Buffer Overflow
Posted May 13, 2009
Authored by hashteck

CastRipper version 2.50.70 local buffer overflow exploit that creates a malicious .m3u file.

tags | exploit, overflow, local
SHA-256 | 3cf0a98fbd475c17dc42e51c82489f1e129e637a1b3fb7fe483086d1b08ed58c
Zero Day Initiative Advisory 09-020
Posted May 13, 2009
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 09-020 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office's PowerPoint. User interaction is required to exploit this vulnerability in that the target must open up a malicious file. The vulnerability exists within the parsing of certain structures inside a Notes container. During population of a C++ object when reading the Notes container, Powerpoint incorrectly reads more data than was allocated for overwriting a function pointer for the object which is later used in a call from mso.dll. Successful exploitation can lead to remote code execution under the credentials of the currently logged in user.

tags | advisory, remote, arbitrary, code execution
advisories | CVE-2009-1130
SHA-256 | 15cb5350a1c6c38432b7c240b54f49a90cd631f7c4ef957f1c08deea7d2aa709
Zero Day Initiative Advisory 09-019
Posted May 13, 2009
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 09-019 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office PowerPoint. Exploitation requires that the attacker coerce the target into opening a malicious .PPT file. The specific flaw exists in the parsing of the OutlineTextRefAtom (3998). By specifying an invalid "index" value during parsing memory corruption occurs. Proper exploitation can lead to remote code execution under the credentials of the currently logged in user.

tags | advisory, remote, arbitrary, code execution
advisories | CVE-2009-0556
SHA-256 | b7792dc9fd8ff12502bbde82f81b3fb11b5448fe41a350aef8cea0e4a72718ed
Safari For Windows CLI Launch
Posted May 13, 2009
Authored by Lostmon | Site lostmon.blogspot.com

Safari for Windows suffers from a mishandling of command line launching functionality.

tags | advisory
systems | windows
SHA-256 | 3ccd1a3d462388c64ee832ba699fc84fecc637908f790584dff321bb68b8c0fd
Microsoft PowerPoint Atom Parsing Buffer Overflows
Posted May 13, 2009
Authored by Carsten Eiram | Site secunia.com

Secunia Research has discovered two vulnerabilities in Microsoft Office PowerPoint, which can be exploited by malicious people to compromise a user's system. The vulnerabilities are caused by boundary errors when processing certain atoms and can be exploited to cause stack-based buffer overflows via a specially crafted PowerPoint file. Successful exploitation allows execution of arbitrary code. Microsoft PowerPoint 2000 SP3 is affected.

tags | advisory, overflow, arbitrary, vulnerability
advisories | CVE-2009-1131
SHA-256 | 565f67468c3c6a9e5fa87b11ec3c1f0615fbcd97493d26b020d6d08c6e7b34ab
Bigace CMS 2.5 SQL Injection
Posted May 13, 2009
Authored by YEnH4ckEr

Bigace CMS version 2.5 user options changing SQL injection exploit.

tags | exploit, sql injection
SHA-256 | d52c279955a9aa0987bdc1d3837468e29086532c66b1128676ee10810f1dd98b
Sun IDM Arbitrary Command Execution
Posted May 13, 2009
Authored by Alex Bezroutchko | Site scanit.be

Sun IDM versions 7.1 and 8.0 suffer from an arbitrary command execution vulnerability.

tags | exploit, arbitrary
SHA-256 | 77fb0ce48591c464e79f1e0d302e91f0d8e1a8b53ff31342218dab28810a0d44
Australian Bank Cross Site Scripting
Posted May 13, 2009
Authored by militan

Various banks in Australia appear to suffer from cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 8824d4e0d1221ca7842435ea70a446063506d5854d3cd6d56cf55e526546af74
FormMail 1.92 XSS / HTTP Response Splitting
Posted May 13, 2009
Authored by Francesco Ongaro, Antonio Parata, Giovanni Pellerano | Site ush.it

FormMail version 1.92 suffers from cross site scripting, header injection, and HTTP response splitting vulnerabilities.

tags | exploit, web, vulnerability, xss
SHA-256 | dda541988029f268bc02136426254f2b6bbc63e0e3c487848827415005cc289e
XCon 2009 Call For Papers
Posted May 13, 2009
Site xcon.xfocus.net

Call For Papers for XCon 2009. This conference will take place from August 18th through the 19th in Beijing, China.

tags | paper, conference
SHA-256 | b5ac5f58a11d24a589f17cfd4dd72f66ff41f0d80406fca7540b2a3f4ba622f9
Exploiting IE8 UTF-7 XSS Using Redirection
Posted May 13, 2009
Authored by Inferno from Secure Thoughts

Exploiting the IE8 UTF-7 cross site scripting vulnerability using local redirection.

tags | paper, local, xss
SHA-256 | c0cfb29d7a2671965c82ff84f7b2d623306cc3c8597dc3cf76990135988e419a
Zervit 0.4 Traversal / Memory Corruption
Posted May 13, 2009
Authored by shinnai, e.wiZz! | Site shinnai.altervista.org

Zervit webserver version 0.4 directory traversal and memory corruption proof of concept exploit.

tags | exploit, proof of concept, file inclusion
SHA-256 | 9e10e70eaec0d3a59ef5c25f192693edebf3b377c08b4fb02b2dc28d20ad097a
Bitweaver 2.6 Code Execution
Posted May 13, 2009
Authored by Nine:Situations:Group | Site retrogod.altervista.org

Bitweaver versions 2.6 and below /boards/boards_rss.php / saveFeed() remote code execution exploit.

tags | exploit, remote, php, code execution
SHA-256 | c6e6458bc379630566edb13719dab179c4f4e4f7429501040bdeea0557510f62
Klinzmann A-A-S 2.0.48 XSRF Exploit
Posted May 13, 2009
Authored by Felipe Daragon | Site syhunt.com

Klinzmann Application Access Server version 2.0.48 cross site request forgery exploit.

tags | exploit, csrf
advisories | CVE-2009-1464
SHA-256 | 8fbdf9086123ab178a93c6aa387ee37b227bad398eb09b10822fe24d631ab585
Klinzmann A-A-S XSRF / Code Execution
Posted May 13, 2009
Authored by Felipe Daragon | Site syhunt.com

The Klinzmann Application Access Server suffers from cross site request forgery, command execution, default password, and insecure password storage vulnerabilities.

tags | exploit, vulnerability, csrf
advisories | CVE-2009-1464, CVE-2009-1465, CVE-2009-1466
SHA-256 | e216edbf657d61bdb2e559c269b7118db00d7f30c8cb83b7248238c64f6b103d
Java SE Runtime Environment Denial Of Service
Posted May 13, 2009
Authored by shinnai | Site shinnai.altervista.org

Java SE Runtime Environment resource consumption exploit.

tags | exploit, java, denial of service
SHA-256 | 527612944f0e5df5e39b6ff1472ae2184bc2eb6861f81de9ad46c7a2ded3c8e3
Secunia Security Advisory 34923
Posted May 13, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been discovered in Open Virtual Desktop, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | 1a3f6b14cb982212f6abd4f5b75e61e9426c24441de9a61293358d7bf4fa5c81
Secunia Security Advisory 35056
Posted May 13, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Apple Safari, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
systems | apple
SHA-256 | 9fabc225dca1e66091bd5f3266749cd49a420971b421415b91db9d41739e2d86
Secunia Security Advisory 35062
Posted May 13, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for kvm. This fixes a security issue and some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and bypass certain security restrictions.

tags | advisory, denial of service, local, vulnerability
systems | linux, ubuntu
SHA-256 | a1759215b76ceaddd4b7b94f97f0c5ce54d10c096c6b2b9ee952ad9f09c44b13
Secunia Security Advisory 35074
Posted May 13, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Apple has issued a security update for Mac OS X, which fixes multiple vulnerabilities.

tags | advisory, vulnerability
systems | apple, osx
SHA-256 | af712b14b05e90de54a7f0607f22c3c0e85c88bc418c9723e4de85c365540af0
Secunia Security Advisory 35052
Posted May 13, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for squirrelmail. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting, session fixation, and phishing attacks.

tags | advisory, vulnerability, xss
systems | linux, fedora
SHA-256 | c39dafcd57cc9f0beb46f60613e97a1c4b35543ca25c8e33994d16334bb20506
Secunia Security Advisory 35069
Posted May 13, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Mini-stream CastRipper, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 63b4eb77c6cc3c55bf5bbe7690ad8619aaff73653f43992edc7f1bc4b7bc7ba2
Secunia Security Advisory 35063
Posted May 13, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in BIGACE, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 1b965f502e2cc9fea373a4c496b59e7962df66496bc964d0200eaaf80c60bd1e
Secunia Security Advisory 34969
Posted May 13, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Mike Bailey has discovered a vulnerability in Transmission, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
SHA-256 | 47361a7bebd1a2c2fdc9da187ce7d167f389f0b9fd5155d61d2aa582eac50c3d
Page 2 of 3
Back123Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close