what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 40 of 40 RSS Feed

Files Date: 2010-04-14 to 2010-04-15

AneCMS 1.0 Code Execution / Local File Inclusion
Posted Apr 14, 2010
Authored by AmnPardaz Security Research Team | Site bugreport.ir

AneCMS version 1.0 suffers from code execution and local file inclusion vulnerabilities.

tags | exploit, local, vulnerability, code execution, file inclusion
SHA-256 | a7a42b0ae756378c207f0c6956eaa4dfcd147c6e4b17fd6e58155d7d156c28dd
libssh2 C Library 1.2.5
Posted Apr 14, 2010
Site libssh2.org

libssh2 is a library implementing the SSH2 protocol as defined by Internet Drafts: SECSH-TRANS, SECSH-USERAUTH, SECSH-CONNECTION, SECSH-ARCH, SECSH-FILEXFER, SECSH-DHGEX, SECSH-NUMBERS, and SECSH-PUBLICKEY.

Changes: This release adds support for keep-alive, init/exit library API calls, and LIBSSH2_SFTP_S_IS***() macros. It fixes at least 14 bugs, including several memory leaks.
tags | encryption, protocol
SHA-256 | 9ff3d11a8d3d6c49ea6746cdb6a482473df0b758a81bc81cffcc5449db3d9c42
Tinc Virtual Private Network Daemon 1.0.13
Posted Apr 14, 2010
Authored by Ivo Timmermans | Site tinc-vpn.org

tinc is a Virtual Private Network (VPN) daemon that uses tunneling and encryption to create a secure private network between multiple hosts on the Internet. This tunneling allows VPN sites to share information with each other over the Internet without exposing any information.

Changes: tinc may now be built without LZO or Zlib. MSS of TCP packets can be clamped in both directions. Experimental StrictSubnets, Forwarding, and DirectOnly options were added, giving you more control over information and packets received from or sent to other nodes. tinc never sends symbolic names for ports over the wire anymore.
tags | encryption
SHA-256 | 6d86518161e91d0d4f8f2697ea959c90e92a409e833cdce5c92d6f0c0cb01091
PHP 6.0 Dev str_transliterate() Buffer Overflow
Posted Apr 14, 2010
Authored by Matteo Memelli | Site offensive-security.com

PHP version 6.0 Dev str_transliterate() buffer overflow exploit with NX + ASLR bypass.

tags | exploit, overflow, php
SHA-256 | c915cded3e7fe8ebb668fccbc01befdee1908158cb07caee201a7e6e7dab516d
MagnetoSoft SNTP Active-X SntpGetReply Buffer Overflow
Posted Apr 14, 2010
Authored by sasquatch | Site securestate.com

MagnetoSoft SNTP Active-X SntpGetReply buffer overflow exploit.

tags | exploit, overflow, activex
SHA-256 | 51a9eefd4c4f911f921beb85655c890f6cb86de465d2403a5ec306c06e395e04
MagnetoSoft ICMP Active-X AddDestinationEntry Buffer Overflow
Posted Apr 14, 2010
Authored by sasquatch | Site securestate.com

MagnetoSoft ICMP Active-X AddDestinationEntry buffer overflow exploit.

tags | exploit, overflow, activex
SHA-256 | 89b0255b76ebfa1550711b0155e5c372cf45debc5da3311f744dbf63db50c18d
MagnetoSoft NetworkResources Active-X NetConnectionEnum SEH Overwrite
Posted Apr 14, 2010
Authored by sasquatch | Site securestate.com

MagnetoSoft NetworkResources Active-X NetConnectionEnum SEH overwrite proof of concept exploit.

tags | exploit, activex, proof of concept
SHA-256 | 1080a3ab49ac0fdf9203a6772363e3090471d12de8f2db13f10c9d8b75b71091
MagnetoSoft NetworkResources Active-X NetShareEnum SEH Overwrite
Posted Apr 14, 2010
Authored by sasquatch | Site securestate.com

MagnetoSoft NetworkResources Active-X NetShareEnum SEH overwrite proof of concept exploit.

tags | exploit, activex, proof of concept
SHA-256 | dd532e6f01e614305bb7604e46c9fa1d71e415a6c52d6943402ac5d0af7151a3
MagnetoSoft NetworkResources Active-X NetFileClose SEH Overwrite
Posted Apr 14, 2010
Authored by sasquatch | Site securestate.com

MagnetoSoft NetworkResources Active-X NetFileClose SEH overwrite proof of concept exploit.

tags | exploit, activex, proof of concept
SHA-256 | a015bac0b3be4ea2239ecaa61b0b87e6968ee17404fa66681d4f8a117a2cfbd1
60cycleCMS 2.5.2 Local File Inclusion
Posted Apr 14, 2010
Authored by eidelweiss

60cycleCMS version 2.5.2 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 2a729c5cee6333cd9571081bd0ebefa2b89f1209ff4f61d1d3f5ef3eb2c0dbec
MagnetoSoft NetworkResources Active-X NetSessionDel Buffer Overflow
Posted Apr 14, 2010
Authored by sasquatch | Site securestate.com

MagnetoSoft NetworkResources Active-X NetSessionDel buffer overflow proof of concept exploit.

tags | exploit, overflow, activex, proof of concept
SHA-256 | 774c2d1eb4f53cab6860ea806f76836e4fea96a7f2f5edea214c62acc98bbbf7
MagnetoSoft SNTP Active-X SntpSendRequest Crash Proof Of Concept
Posted Apr 14, 2010
Authored by sasquatch | Site securestate.com

MagnetoSoft SNTP Active-X SntpSendRequest crash proof of concept exploit.

tags | exploit, activex, proof of concept
SHA-256 | 5311a9ce78e75f88dcbf4f17e5d9b1d70a1169b6165efb10f08d7eff61bccaea
MagnetoSoft DNS Active-X DNSLookupHostWithServer Proof Of Concept
Posted Apr 14, 2010
Authored by sasquatch | Site securestate.com

MagnetoSoft DNS Active-X DNSLookupHostWithServer proof of concept exploit.

tags | exploit, activex, proof of concept
SHA-256 | 3366033f2bd63c437d3c654bacba51bd869865d7e7ee13490df759a5fe5dd70c
ACROS Security Problem Report 2010-04-12.1
Posted Apr 14, 2010
Authored by Mitja Kolsek, ACROS Security, Jure Skofic | Site acrossecurity.com

ACROS Security Problem Report #2010-04-12-1 - A "binary planting" vulnerability in VMware Tools for Windows allows local or remote (possibly Internet-based) attackers to deploy and execute malicious code on virtual Windows machines in the context of logged-on users.

tags | advisory, remote, local
systems | windows
SHA-256 | 1a33ad33d61288c5a2f1bc8851a66d3420578051913dd9eb34bba9d650c3d21b
ACROS Security Problem Report 2010-04-12.2
Posted Apr 14, 2010
Authored by Mitja Kolsek, ACROS Security | Site acrossecurity.com

ACROS Security Problem Report #2010-04-12-2 - A "binary planting" vulnerability in VMware Tools for Windows allows a local non-administrative attacker, under certain circumstances, to execute a malicious executable on virtual Windows machines in the context of logged- on users.

tags | advisory, local
systems | windows
SHA-256 | f4ab6e48b6664883b247cd29bef48610a751f93149811ac6017b3e330925de9b
Page 2 of 2
Back12Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close