exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 39 of 39 RSS Feed

Files Date: 2009-09-29 to 2009-09-30

HEAT Call Logging 8.01 SQL Injection
Posted Sep 29, 2009
Authored by 0 0

HEAT Call Logging version 8.01 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 79487907d47d8ea94e2652a2c662c33ca99a25fa3bc211adef688e7396d776dd
EnjoySAP Arbitrary File Overwrite
Posted Sep 29, 2009
Authored by Sh2kerr | Site dsecrg.com

EnjoySAP, SAP GUI for Windows versions 6.4 and 7.1 suffer an arbitrary file overwrite vulnerability.

tags | exploit, arbitrary
systems | windows
SHA-256 | d80fc70342e39f40fb3735be97823441b50b34fc7d0b0c1a27803a784d9a13ef
PHP 5.3 mysqli_real_escape_String() Disclosure
Posted Sep 29, 2009
Authored by David "Aesthetico" Vieira-Kurz | Site majorsecurity.de

PHP versions 5.3 and below suffer from a mysqli_real_escape_string() related full path disclosure vulnerability.

tags | advisory, php
SHA-256 | fd8379906be076c6c118615ff73d9afa57225ac48ec1b4423658885a20fc46ab
PHP 5.3 preg_match() Path Disclosure
Posted Sep 29, 2009
Authored by David "Aesthetico" Vieira-Kurz | Site majorsecurity.de

PHP versions 5.3 and below suffer from a preg_match() related full path disclosure vulnerability.

tags | advisory, php
SHA-256 | 110571519c8b75cd916edb69f611cef30e2fd5a456fc1a9922580caa97fe25a7
SILC Server 1.1.18
Posted Sep 29, 2009
Authored by priikone | Site silcnet.org

SILC (Secure Internet Live Conferencing) is a protocol which provides secure conferencing services in the Internet. It can be used to send any kind of messages, in addition to normal text messages. This includes multimedia messages like images, video, and audio stream. All messages in the SILC network are encrypted and authenticated, and messages can also be digitally signed. SILC protocol supports AES, SHA-1, PKCS#1, PKCS#3, X.509, OpenPGP, and is being developed in the IETF. This tarball holds all server related files.

Changes: This version adds heartbeat support and fixes some minor bugs.
tags | protocol
SHA-256 | fcb278f22cea61ba6e3d6e49af9de50111f5c8565408054d828af262fc0fe293
Tor-ramdisk i686 UClibc-based Linux Distribution 20090926
Posted Sep 29, 2009
Authored by Anthony G. Basile | Site opensource.dyc.edu

Tor-ramdisk is an i686 uClibc-based micro Linux distribution whose only purpose is to host a Tor server in an environment that maximizes security and privacy. Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. Security is enhanced by employing a monolithically compiled GRSEC/PAX patched kernel and hardened system tools. Privacy is enhanced by turning off logging at all levels so that even the Tor operator only has access to minimal information. Finally, since everything runs in ephemeral memory, no information survives a reboot, except for the Tor configuration file and the private RSA key which may be exported/imported by FTP.

Changes: This release is essentially the same as the previous i686 release, but a new feature was added. The setup scripts and busybox\'s configuration were modified so that the user can now choose to set up networking either by DHCP or by static assignment.
tags | tool, kernel, peer2peer
systems | linux
SHA-256 | fa37475b525c0e8a10f6c211649573c91748db2de372846b6b345761558d0095
Debian Linux Security Advisory 1896-1
Posted Sep 29, 2009
Authored by Debian | Site debian.org

Debian Security Advisory 1896-1 - Several vulnerabilities have been discovered in the opensaml and shibboleth-sp packages, as used by Shibboleth 1.x.

tags | advisory, vulnerability
systems | linux, debian
SHA-256 | aa895d29e6e58c4f1d35c30cda5514401b810940ffab3fcebc057625f9b8d1f6
Mandriva Linux Security Advisory 2009-249
Posted Sep 29, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-249 - A heap-based buffer overflow flaw was found in the way newt processes content that is to be displayed in a text dialog box. A local attacker could issue a specially-crafted text dialog box display request (direct or via a custom application), leading to a denial of service (application crash) or, potentially, arbitrary code execution with the privileges of the user running the application using the newt library. This update provides a solution to this vulnerability.

tags | advisory, denial of service, overflow, arbitrary, local, code execution
systems | linux, mandriva
advisories | CVE-2009-2905
SHA-256 | 5a8d696b1d8c9730946ced0e5d8d9d1083dd141321c71aee601072d28fae0143
Core FTP Server 1.0 Denial Of Service
Posted Sep 29, 2009
Authored by Dr_IDE

Core FTP Server version 1.0 build 304 remote denial of service exploit.

tags | exploit, remote, denial of service
SHA-256 | 311cb77ac722f0d4e7f6681a02292eaf61cab03a09ceb890c7de560290c19507
Joomla com_ircmbasic SQL Injection
Posted Sep 29, 2009
Authored by kaMtiEz | Site indonesiancoder.com

The Joomla IRCm Basic component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 444a1460f218d46f558a6171d9650d7948df057c3dc3f359a891c4ebfc980e9c
Facebook URL Cross Site Scripting
Posted Sep 29, 2009
Authored by 599eme Man

Facebook suffers from a URL string evasion cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 23b9d3c4298795b78c99ddda0f3f9d36dd4faad766df9323968a02a8552ead96
EasyMail Quicksoft 6.0.2.0 Denial Of Service
Posted Sep 29, 2009
Authored by Francis Provencher

EasyMail Quicksoft version 6.0.2.0 suffers from a remote denial of service vulnerability in emimap4.dll.

tags | exploit, remote, denial of service
SHA-256 | bf087972b10d09e567eba0a6e49b0e64d7c114197bd7dfaf866c89dc854c0c3e
Novell Groupwise Client 7.0.3.1294 Denial Of Service
Posted Sep 29, 2009
Authored by Francis Provencher

Novell Groupwise Client version 7.0.3.1294 suffers from a remote denial of service vulnerability.

tags | exploit, remote, denial of service
SHA-256 | a70fbb59e937b11f98df1ec968ce39f1a510f70c890677d3927a58a9f32a1b7c
Adobe ShockWave Player 11.5.1.601 Stack Overflow
Posted Sep 29, 2009
Authored by Francis Provencher

Adobe ShockWave Player version 11.5.1.601 suffers from an Active-X related stack overflow vulnerability.

tags | exploit, overflow, activex
SHA-256 | 646d12dd1277f5381ebdd9ef4f9956af5e7c97f52afc635da3ab6a00a6252a6a
Page 2 of 2
Back12Next

File Archive:

August 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    20 Files
  • 2
    Aug 2nd
    4 Files
  • 3
    Aug 3rd
    6 Files
  • 4
    Aug 4th
    55 Files
  • 5
    Aug 5th
    16 Files
  • 6
    Aug 6th
    0 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    13 Files
  • 9
    Aug 9th
    13 Files
  • 10
    Aug 10th
    34 Files
  • 11
    Aug 11th
    16 Files
  • 12
    Aug 12th
    5 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    25 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close