exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 72 of 72 RSS Feed

Files Date: 2009-07-17 to 2009-07-18

Zortam MP3 Media Studio 9.40 Memory Corruption
Posted Jul 17, 2009
Authored by LiquidWorm | Site zeroscience.mk

Zortam MP3 Media Studio version 9.40 suffers from multiple memory corruption vulnerabilities.

tags | exploit, vulnerability
SHA-256 | 67a94b9626456ae863ca189576300d289c3bdd30e6919aa473c28fff4a37cfed
Zortam MP3 Player 1.50 Division By Zero
Posted Jul 17, 2009
Authored by LiquidWorm | Site zeroscience.mk

Zortam MP3 Player version 1.50 suffers from an integer division by zero vulnerability.

tags | exploit
SHA-256 | bd9892b240385f0fee7373688969b1f3b3b5446fcf14347d169ee674bacf6f26
Zortam ID3 Tag Editor 5.0 Overflow
Posted Jul 17, 2009
Authored by LiquidWorm | Site zeroscience.mk

Zortam ID3 Tag Editor version 5.0 suffers from a remote stack overflow vulnerability.

tags | advisory, remote, overflow
SHA-256 | 2fed5254ef1cb86809245b26864a8090114a417f8e1fe8037899b5e0850f036f
Terratec HomeCinema Unsafe Install
Posted Jul 17, 2009
Authored by Stefan Kanthak

Terratec's TV software HomeCinema version 6.3 installs vulnerable and outdated DLLs.

tags | advisory
SHA-256 | c8d049d1777d95dfe2a9988b5a6d5b81d660efe73a3f7885f8c0e9f42bfbc7b1
iDEFENSE Security Advisory 2009-07-14.2
Posted Jul 17, 2009
Authored by iDefense Labs | Site idefense.com

iDefense Security Advisory 07.14.09 - Remote exploitation of an arbitrary pointer dereference vulnerability in version 2007 of Microsoft Corp.'s Publisher could allow an attacker to execute arbitrary code as the user running Publisher. This vulnerability exists in PUBCONV.DLL module in Microsoft Publisher 2007. PUBCONV.DLL module is responsible for converting legacy format Publisher files (.pub) created by older version of Publisher into the Publisher 2007 format. A programming error causes that module to dereference the arbitrary attacker-controlled value as the address of a table of function pointers. This vulnerability allows attackers to execute arbitrary code on the victim's system. iDefense confirmed PUBCONV.DLL (version 12.0.6311.5000) in Microsoft Office Publisher 2007 is vulnerable. Microsoft Office Publisher 2000, 2002 and 2003 do not appear to be affected.

tags | advisory, remote, arbitrary
advisories | CVE-2009-0566
SHA-256 | 60c1056ccf5f7511507f06c0c4df84e293ba9b8bff333b9f8f1e471bb047683f
LittleSite 0.1 Local File Inclusion
Posted Jul 17, 2009
Authored by Eolas_Gadai

LittleSite suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
advisories | CVE-2009-3542, OSVDB-55969
SHA-256 | 9a693910f430ccba6ecd60e553945fce8d624d29170dcafe517d65a041286b34
Mobile Rediff Disclosure
Posted Jul 17, 2009
Authored by Gursev Kalra

Mobile Rediff suffers from a username and password disclosure vulnerability.

tags | advisory
SHA-256 | 5ae381e30bdf914bd1f330628663502555fd19e691346335b2ccaae5a0726a7d
ECMAScript Denial Of Service
Posted Jul 17, 2009
Authored by Thierry Zoller

ECMAScript in IE5, IE6, IE7, IE8, Netscape, Firefox, Safari, Opera, Konqueror, Seamonkey, Wii, PS3, iPhone, iPod, Nokia, Siemens and various other browsers allows for a denial of service condition.

tags | exploit, denial of service
systems | apple, iphone
advisories | CVE-2009-1692
SHA-256 | 0565fa347a433f911f7bc37200f43fcc3f38e665338086d0cdaaf81a0163b693
Admin News Tools Contents Change
Posted Jul 17, 2009
Authored by Securitylab Security Research | Site securitylab.ir

Admin News Tools suffers from a contents change vulnerability.

tags | exploit
SHA-256 | 44539a42dce52e25ce4e970b0f0ad5a57551c2e3232a71105362a000b4fda1f4
MixSense 1.0.0.1 DJ Studio Crash
Posted Jul 17, 2009
Authored by prodigy

MixSense version 1.0.0.1 DJ Studio crash exploit that crafts a malicious .mp3 file.

tags | exploit
SHA-256 | 0827703bebba630164ed19c5c15269d56c423205a2e7e5814c718e0844393205
Easy RM To MP3 Converter 2.7.3.700 Overflow
Posted Jul 17, 2009
Authored by Crazy_Hacker | Site sec-t.com

Easy RM to MP3 Converter version 2.7.3.700 universal buffer overflow exploit that creates a malicious .m3u file.

tags | exploit, overflow
SHA-256 | c63ac24395407c2b43dbc53554c6dace1b3d8ff1d5acf6d4e413b5c170eab26e
Secunia Security Advisory 35883
Posted Jul 17, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for libtiff. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise an application using the library.

tags | advisory, denial of service, vulnerability
systems | linux, redhat
SHA-256 | 22cdd607a1f519d015cb3c28782b6b517ced85f0de33c8d36eb02ce71b5230b8
Secunia Security Advisory 35833
Posted Jul 17, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for fckeditor. This fixes a vulnerability, which can be exploited by malicious people to disclose sensitive information and compromise a vulnerable system.

tags | advisory
systems | linux, debian
SHA-256 | 8f83a1487d45e2d0a3fb6dba29fd53ad5ad388d9fd72bed4c3d44f423180a892
Secunia Security Advisory 35848
Posted Jul 17, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for rb_libtorrent and deluge. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise an application using the library.

tags | advisory
systems | linux, gentoo
SHA-256 | 6aad10d0cbc1dde438cfdb8d4cb824bd4d9f127c9216654f293e570c1115a0e7
Secunia Security Advisory 35844
Posted Jul 17, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Google Chrome, which can be exploited by malicious people to potentially compromise a user's system.

tags | advisory
SHA-256 | 34395b5e5c678b9d897c1f6476ec048d72f8cc05e5b80fed6e8493e94a60659e
Secunia Security Advisory 35860
Posted Jul 17, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - hack4love has discovered a vulnerability in MultiMedia Jukebox, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | f2354a25db0c73f68ba5e38e4cd5f4addae4a1fe946df29986a2e70a30bbe2d3
Secunia Security Advisory 35886
Posted Jul 17, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for pulseaudio. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | linux, gentoo
SHA-256 | 6537c5703ea2c0862babc69a61befbd1836a55d0fef3bc7576e539897a7be2dc
Secunia Security Advisory 35868
Posted Jul 17, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for pulseaudio. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | linux, ubuntu
SHA-256 | 5b4bd17429a3c1db6f679985b4098d8b3f44c4ef32ebcb8dc83af96f186e0ef5
Secunia Security Advisory 35839
Posted Jul 17, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and potentially gain escalated privileges.

tags | advisory, denial of service, kernel, local
systems | linux
SHA-256 | cc8bc9cdc6586023dfa8de35798d0a9b3328cf887e043537e1848d7c4b5ab08c
Secunia Security Advisory 35863
Posted Jul 17, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - petros has discovered some vulnerabilities in zenphoto, which can be exploited by malicious people to conduct cross-site scripting, cross-site request forgery, and SQL injection attacks.

tags | advisory, vulnerability, xss, sql injection, csrf
SHA-256 | cf1a38060bd122eeea6466254ab8f445089f2c288097edc4a5cc7240387c7366
Hamster Audio Player 0.3a Buffer Overflow
Posted Jul 17, 2009
Authored by ThE g0bL!N | Site h4ckf0ru.com

Hamster Audio Player version 0.3a universal buffer overflow exploit.

tags | exploit, overflow
SHA-256 | 6bb1ba5fa5b15754c305df3f52cbcbf838881c709dde166c1b969171b6f3ef29
MultiMedia Jukebox 4.0 Heap Overflow
Posted Jul 17, 2009
Authored by hack4love

MultiMedia Jukebox version 4.0 Build 020124 local heap overflow proof of concept exploit that creates a malicious .m3u file.

tags | exploit, overflow, local, proof of concept
SHA-256 | ae35ab532dba568756c54caa44dd6d08ff07b656aad33c526fa8b9398f825e36
Page 3 of 3
Back123Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close