exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 34 of 34 RSS Feed

Files Date: 2009-09-04 to 2009-09-05

Secunia Security Advisory 36535
Posted Sep 4, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in HP Operations Dashboard, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 7f46cfc4af09e09c8bdb1c93bfc6f1b9d63680a3b07672fd28511e7c2fa9e6bd
Secunia Security Advisory 36572
Posted Sep 4, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in LiteSpeed Web Server, which can be exploited by malicious users to compromise a vulnerable system and malicious people to cause a DoS (Denial of Service).

tags | advisory, web, denial of service, vulnerability
SHA-256 | 32e1cff02f0a8150385b4dbc93ea2f85e53b5700f76febe1e00039b218a46e7e
Microsoft IIS FTPd Denial Of Service
Posted Sep 4, 2009
Authored by Kingcope

Microsoft IIS versions 5 and 6 suffer from a remote denial of service vulnerability.

tags | exploit, remote, denial of service
SHA-256 | 3ceabc846fce8b956f3254881cd055cce8a81b2b8d840a4c7e25f09c4cb250d0
Asterisk Project Security Advisory - AST-2009-006
Posted Sep 4, 2009
Authored by Russell Bryant | Site asterisk.org

Asterisk Project Security Advisory - The IAX2 protocol uses a call number to associate messages with the call that they belong to. However, the protocol defines the call number field in messages as a fixed size 15 bit field. So, if all call numbers are in use, no additional sessions can be handled. A call number gets created at the start of an IAX2 message exchange. So, an attacker can send a large number of messages and consume the call number space. The attack is also possible using spoofed source IP addresses as no handshake is required before a call number is assigned.

tags | advisory, spoof, protocol
advisories | CVE-2009-2346
SHA-256 | b9b863efb0b85644076d3c974b98ce74f39e463464e8e6c41b443200a78dd088
Accounting Portal Authentication Bypass
Posted Sep 4, 2009
Authored by Ostoure Sazan

Accounting Portal suffers from an authentication bypass vulnerability related to the DesktopModules folder.

tags | exploit, bypass
SHA-256 | ed9f29f69da6a0fea8e6677774557809d89729a133a81b876d68d399908f9f45
ReadFile() Local File Disclosure
Posted Sep 4, 2009
Authored by Moudi

Whitepaper called ReadFile() Local File Disclosure. Written in French.

tags | paper, local, info disclosure
SHA-256 | c7e6ff4f06909e7f86cbf4e7347d40977029722712aade7056a43690a61421cb
Protection Against SQL Injection
Posted Sep 4, 2009
Authored by Moudi

Whitepaper called Protection Against SQL Injection. Written in French.

tags | paper, sql injection
SHA-256 | 29ffef0ca793fcfa8b985dc41aa044661000511aa27a3fef9382fa2508d840cc
LFI/RFI Testing With fimap
Posted Sep 4, 2009
Authored by Iman Karim

This paper discuss local and remote file inclusion testing and exploiting using fimap.

tags | paper, remote, local, file inclusion
SHA-256 | ca0e272e459578d65a04ea70099d78615750a284bffaa9f08e4e57350ee0f311
SIDVault 2.0e Buffer Overflow
Posted Sep 4, 2009
Authored by Blake

SIDVault version 2.0e Windows remote buffer overflow exploit. Binds a shell to port 4444.

tags | exploit, remote, overflow, shell
systems | windows
SHA-256 | 9090278453847c904085bf60589c2b42fca976232134291c075f10e549e2403a
Page 2 of 2
Back12Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close