exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 8 of 8 RSS Feed

Files Date: 2009-10-17 to 2009-10-18

Sun VirtualBox 3.0.6 Local Root
Posted Oct 17, 2009
Authored by prdelka | Site prdelka.blackart.org.uk

Sun VirtualBox versions 3.0.6 and below local root exploit that takes advantage of a popen() meta char shell injection vulnerability.

tags | exploit, shell, local, root
advisories | CVE-2009-3692
SHA-256 | e2ddedb66eb6b5695c18761f7fb3938a54e20b5be176b2e29ef59c221c7f1e0f
CanSecWest 2010 Call For Papers
Posted Oct 17, 2009
Authored by Dragos Ruiu

CanSecWest 2010 Call For Papers - The eleventh annual CanSecWest applied technical security conference - where the eminent figures in the international security industry will get together share best practices and technology - will be held in downtown Vancouver at the the Sheraton Wall Centre on March 22-26, 2010.

tags | paper, conference
SHA-256 | 297fecb3405e575758ff8dda2b63d615733fd8048257991cc4ad47cb7cc70936
VMware Security Advisory 2009-0014
Posted Oct 17, 2009
Authored by VMware | Site vmware.com

VMware Security Advisory - VMware ESX patches for DHCP, Service Console kernel, and JRE resolve multiple security issues. And by multiple, we mean a very, very, very large amount of issues.

tags | advisory, kernel
advisories | CVE-2009-0692, CVE-2009-1893, CVE-2009-0692, CVE-2008-4210, CVE-2008-3275, CVE-2008-5356, CVE-2008-0598, CVE-2008-2136, CVE-2008-2812, CVE-2007-6063, CVE-2008-3525, CVE-2008-2086, CVE-2008-5347, CVE-2008-5348, CVE-2008-5349, CVE-2008-5350, CVE-2008-5351, CVE-2008-5352
SHA-256 | c2c6048aa6cecef0b2620603adc69c5932ea002bec08689597fb8904eaaf2bfa
DWebPro Remote Command Execution
Posted Oct 17, 2009
Authored by Rafael Sousa

DWebPro suffers from a remote command execution vulnerability.

tags | exploit, remote
SHA-256 | 369ce1cae7adb397bc015f1abad2d8b16687801f7fb58d7556c0e707b01f5002
Adobe Acrobat Memory Corruption
Posted Oct 17, 2009
Authored by Nicolas Joly | Site vupen.com

VUPEN Vulnerability Research Team discovered three critical vulnerabilities affecting Adobe Acrobat and Reader. These vulnerabilities are caused by memory corruption errors within the U3D filter when processing malformed data in a PDF file, which could allow attackers to execute arbitrary code by tricking a user into opening a specially crafted PDF document.

tags | advisory, arbitrary, vulnerability
advisories | CVE-2009-3458, CVE-2009-2997, CVE-2009-2998
SHA-256 | 882af359f5230c5017efe5676f3a6ac3a769d82b8277a7b9369a421e012bd895
Debian Linux Security Advisory 1912-1
Posted Oct 17, 2009
Authored by Debian | Site debian.org

Debian Linux Security Advisory 1912-1 - It was discovered that CamlImages, an open source image processing library, suffers from several integer overflows, which may lead to a potentially exploitable heap overflow and result in arbitrary code execution. This advisory addresses issues with the reading of TIFF files. It also expands the patch for CVE-2009-2660 to cover another potential overflow in the processing of JPEG images.

tags | advisory, overflow, arbitrary, code execution
systems | linux, debian
advisories | CVE-2009-3296, CVE-2009-2660
SHA-256 | 31731f304b793b7ccbd25713a9ee48a24f72bafd9f3d7d422dc85aaf6032eca5
Xpdf Integer Overflow
Posted Oct 17, 2009
Authored by Adam Zabrocki

Xpdf allows local and remote attackers to overflow a buffer on the heap via an integer overflow vulnerability. Xpdf is prone to a NULL pointer dereference attack. Proof of concept pdf included.

tags | exploit, remote, overflow, local, proof of concept
SHA-256 | f018780c48e64bea6962cec1802929ee779c256f795667d18cd48ba561b20f2e
Adobe Acrobat Code Execution
Posted Oct 17, 2009
Authored by Alexios Fakos | Site nruns.com

A remotely exploitable vulnerability has been found in Adobe Acrobat Reader/Acrobat Firefox plugin. Versions 8.1.3 through 8.1.6 are affected.

tags | advisory
advisories | CVE-2009-2991
SHA-256 | 02dfa8f527d8d6db4d18a0236b10c85a02cc3272c626c753553d001851062481
Page 1 of 1
Back1Next

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    25 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close