what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 1,016 RSS Feed

Files Date: 2010-03-01 to 2010-03-31

Novell Netware 6.5 SP8 Stack Overflow
Posted Mar 30, 2010
Authored by Francis Provencher

Novell Netware version 6.5 SP8 suffers from a FTP related remote stack overflow vulnerability.

tags | advisory, remote, overflow
advisories | CVE-2010-0625
SHA-256 | d70cb64062375e67c59fa55ccdfc4459fc2ba986572b94e42fd9a52b123d90c9
OneCMS 2.6 Cross Site Request Forgery
Posted Mar 30, 2010
Authored by ItSecTeam

OneCMS version 2.6 add administrator cross site request forgery exploit.

tags | exploit, csrf
SHA-256 | 8ab8915fa1505c926a2308d040a9378f814880aab9448fd823e751fc2b13fe15
StreamArmor ADS Discovery Tool 1.0
Posted Mar 30, 2010
Site streamarmor.com

StreamArmor is a sophisticated tool for discovering hidden alternate data streams (ADS) that can also clean them completely from the system. StreamArmor comes with a fast multi-threaded ADS scanner which can recursively scan over the entire system and quickly uncover all hidden streams. All such discovered streams are represented using specific color patterns based on threat level which makes it easy for human eye to distinguish between suspicious and normal streams.

SHA-256 | b4edb0ddb4cf443c06ecdc7ade05e2b382760d2c669384164c61922999e15c22
Powie's PSCRIPT Gastebuch 2.09 SQL Injection
Posted Mar 30, 2010
Authored by Easy Laster

Powie's PSCRIPT Gastebuch versions 2.09 and below suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | a877dae77f90cb557ee806ec7270624ccd227158f317bddab76bdcc60d3f1812
Joomla Radio SQL Injection
Posted Mar 30, 2010
Authored by DevilZ TM

The Joomla Radio component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | a9d001fecc7d6b066d3bfcccbd3d131d42d4c224aead4a13dbec9675a6ce24eb
Joomla Business SQL Injection
Posted Mar 30, 2010
Authored by DevilZ TM

The Joomla Business component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 15a2efdf2f9a9819a16ad7682dfe74da30c48150e4b51f94f825cc6f4b97ba96
Joomla Departments SQL Injection
Posted Mar 30, 2010
Authored by DevilZ TM

The Joomla Departments component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 10aa99c9ce2c211ffc6c2ad26d6beb4f193f459788a2cad9a70ff934455a4476
ASX To MP3 Converter 3.0.0.100 Stack Overflow
Posted Mar 30, 2010
Authored by mat

ASX to MP3 Converter version 3.0.0.100 local stack overflow proof of concept.

tags | exploit, denial of service, overflow, local, proof of concept
SHA-256 | b26a4687332849aa5253a9e509e57a89dbb8eb40b0b6376f44dfc9c0360cdb3e
How To Develop WhatWeb Plugins
Posted Mar 30, 2010
Authored by Andrew Horton | Site morningstarsecurity.com

Document on how to research and develop plugins for WhatWeb to identify content management systems, web application frameworks, etc. As an example it includes how to research and write a plugin for the SilverStripe CMS. The document covers passive plugin development only and is accurate for WhatWeb version 0.4.

tags | paper, web
SHA-256 | 5f3f119d174b65e22f243ac401684758be8a9c7c1fe680743529431b7ca20d1b
aircrack-ng / airdecap-ng Denial Of Service
Posted Mar 30, 2010
Authored by Lukas Lueg

aircrack-ng and airdecap-ng suffer from a denial of service / crash vulnerability when reading specially crafted dump files. Exploit code to generate said dump files included.

tags | exploit, denial of service
SHA-256 | b40761105074bbca410e972c1e0f176ba38ecfa43d8ad420888d18ef5a548d02
PhotoPost vBGallery 2.5 SQL Injection
Posted Mar 30, 2010
Authored by Andreas Kirbach

PhotoPost vBGallery version 2.5 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | a9e866c249ce1d2b696110e23e901d508b3e238c35f78be9b7bb6a6550f273c3
UltraISO CUE File Parsing Buffer Overflow
Posted Mar 30, 2010
Authored by jduck | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow in EZB Systems, Inc's UltraISO. When processing .CUE files, data is read from file into a fixed-size stack buffer. Since no bounds checking is done, a buffer overflow can occur. Attackers can execute arbitrary code by convincing their victim to open an CUE file. NOTE: A file with the same base name, but the extension of "bin" must also exist. Opening either file will trigger the vulnerability, but the files must both exist.

tags | exploit, overflow, arbitrary
advisories | CVE-2007-2888
SHA-256 | fc09c8dc01c38a077fed4faed0017f5c4c92e09f67b17b911db36ba4850952ae
xwine 1.0.1 Crash Proof Of Concept
Posted Mar 30, 2010
Authored by JosS

xwine version 1.0.1 .exe file local crash proof of concept exploit.

tags | exploit, denial of service, local, proof of concept
SHA-256 | b9643633f7d5a68cbe65a1d44af0a460083068522c82abc63812548b840fa245
Secunia Security Advisory 39163
Posted Mar 29, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Easy Laster has reported a vulnerability in Flirt Matching SMS System, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | ef4e8ef11d812d0eef3cc5db9c5bcf2ac442a91b8b4b41cec1022d490043858f
Secunia Security Advisory 39195
Posted Mar 29, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for fcron. This fixes multiple security issues, which can be exploited by malicious, local users to disclose sensitive information.

tags | advisory, local
systems | linux, fedora
SHA-256 | 5529ec7c52f241de74a94271b31ef37a1a2a0a856343b7301d70765a59389ff0
Secunia Security Advisory 39153
Posted Mar 29, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Open Web Analytics, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, web
SHA-256 | 1fdf900258f76e45e3554e7d6681229b8ceee3c087535b7859b21b94890b9b97
Secunia Security Advisory 39087
Posted Mar 29, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for curl. This fixes a security issue, which can potentially be exploited by malicious people to cause a DoS (Denial of Service) or compromise an application using the library.

tags | advisory, denial of service
systems | linux, debian
SHA-256 | 38ad4a73bbaebd00d6f0f57934c605dd9208d820243fad45f865f62958bf13b8
Secunia Security Advisory 39130
Posted Mar 29, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Stud_PE, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 69d0cf22a7c9f25004f60305d9509db0c25aaea3fb6747bafea98e28eb4f7eec
Secunia Security Advisory 39129
Posted Mar 29, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Moodle, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 1c508506a4267b420c06f1ff12defd562724b287d27fa735653aaacb5565457e
Secunia Security Advisory 39114
Posted Mar 29, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Easy Laster has reported a vulnerability in Date & Sex Vor und R

tags | advisory, sql injection
SHA-256 | f02ee871cd77da8b129d05d20714511c92e3aa718115ed1323582bbda6f6f473
Secunia Security Advisory 39137
Posted Mar 29, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for Moodle. This fixes a vulnerability, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
systems | linux, fedora
SHA-256 | 6d2e8b40abc7b7140befb6f7245773ec8458eaba4eaf7a6a170720b2f663bb7e
Secunia Security Advisory 39180
Posted Mar 29, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for krb5. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | linux, fedora
SHA-256 | 6776c8eb6778d842fcf4d20dfb95bb247e318e0158014888609d1a1a84ab01c9
Secunia Security Advisory 39183
Posted Mar 29, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Post Card, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | b6edeb846c0be24b1dfc8121a14f296c6883f47b8b1a16191a6f27357ba6d01e
Secunia Security Advisory 39161
Posted Mar 29, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the dcsFlashGames component for Joomla!, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | eb79a49d0f1530a93f2738aed386a39060edb796e209dba8f5046c7fe9cf7fba
Secunia Security Advisory 39144
Posted Mar 29, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in N-13 News, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
SHA-256 | a163ec6b6744e60183ddb1271bcbd750d2473983d8e353573bf2f4478c1f89b3
Page 2 of 41
Back12345Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close