what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 37 RSS Feed

Files Date: 2011-04-17 to 2011-04-18

Microsoft Word Record Parsing Buffer Overflow
Posted Apr 17, 2011
Authored by MC, Andrew King | Site metasploit.com

This Metasploit module exploits a record parsing vulnerability in Microsoft Word. The Microsoft advisory detailing this issue is MS-09-027.

tags | exploit, overflow
advisories | CVE-2009-0565, OSVDB-54960
SHA-256 | 1ded3e2e88389357c74dfff95913dc140e9106025d3676e663967a157f6a57af
CitusCMS 0.6 Remote File Inclusion
Posted Apr 17, 2011
Authored by KedAns-Dz

CitusCMS versions 0.6 and below suffer from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | aa5846a5f1596b43902b4abe5a3468c800be36f75820398dab5bbf83b51422d8
osPHPSite SQL Injection
Posted Apr 17, 2011
Authored by vir0e5

osPHPSite suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 2336414a2f42b2b1d01764cc7041caf2a55c78ba45d1a62c200c45d06c507d34
Joomla Phocadownload Local File Inclusion
Posted Apr 17, 2011
Authored by KedAns-Dz

The Joomla Phocadownload component suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | bd2a6041a5869916690723e3c076d2bee7e747b0ff4900be4f4facdb07600ba2
CPSCom 2011 Call For Workshop Proposals
Posted Apr 17, 2011
Authored by CPSCom 2011 | Site cpscom.org

CPSCom 2011 Call For Workshop Proposals - The 4th IEEE International Conference on Cyber, Physical, and Social Computing will be held in Dalian, China, on October 19th, 2011.

tags | paper, conference
SHA-256 | c7f883b59190103a3b6ec659e31e2c9c3f47816902f0e36e31079cf635044b83
Bedder CMS Blind SQL Injection
Posted Apr 17, 2011
Authored by Xecuti0N3r

Bedder CMS suffers from multiple remote blind SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | ef64285819f2088ba17c824a2b3d875cc8ed4be3a796836736776026ae8d2d9f
Brainee Creations SQL Injection
Posted Apr 17, 2011
Authored by Xecuti0N3r

Brainee Creations suffers from multiple remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | 4da810ad44fe1ce0c8242e7df6953ac70faf14fb5c9c1ea7d1828674e8aca056
Kyung Studios WebDesigners SQL Injection
Posted Apr 17, 2011
Authored by Xecuti0N3r

Kyung Studios WebDesigners suffers from multiple remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | b097df8f5345f6f5a14ec8c82d3714282ec67acbe1f05f049495c6c0e3109dbe
SoftXMLCMS Shell Upload
Posted Apr 17, 2011
Authored by Alexander

SoftXMLCMS suffers from a shell upload vulnerability.

tags | exploit, shell
SHA-256 | 62f3608ce9f2df238e5192105586b63c58f00a33e0b754f1db13fa0aed0337a8
FiSH-irssi 0.99 Buffer Overflow
Posted Apr 17, 2011
Authored by Caleb James DeLisle

FiSH-irssi version 0.99 evil ircd buffer overflow exploit.

tags | exploit, overflow
advisories | CVE-2007-1397
SHA-256 | 6cb1404c7965614052a6a467b681ab3eccda4ad27cccdc7319fb1dd6a3d71261
W-Techno Shell Upload
Posted Apr 17, 2011
Authored by Net.Edit0r

W-Techno suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | 82a1b30fa55bd32f3c5db64efd540944a7371b3faab126e77eff7a393ff53065
Asterisk 1.4.x / 1.6.x Username Enumeration
Posted Apr 17, 2011
Authored by Francesco Tornieri

Asterisk versions 1.4.x and 1.6.x suffer from a SIP response user enumeration vulnerability.

tags | advisory
SHA-256 | 4973731897121ff19b4e5e74ece388fc7aed0dec962bb1d65c5b2cbcb447f513
Atlassian's Confluence Cross Site Scripting
Posted Apr 17, 2011
Authored by dave b

Atlassian's Confluence suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 483782ed7ece6c9631faae00274f07aaa17631ede14aa216d0864be891613d0e
Adobe Flash Player 10.2.153.1 SWF Memory Corruption Vulnerability
Posted Apr 17, 2011
Authored by sinn3r | Site metasploit.com

This Metasploit module exploits a vulnerability in Adobe Flash Player that was discovered, and has been exploited actively in the wild. By embedding a specially crafted .swf file, Adobe Flash crashes due to an invalid use of an object type, which allows attackers to overwrite a pointer in memory, and results arbitrary code execution.

tags | exploit, arbitrary, code execution
advisories | CVE-2011-0611, OSVDB-71686
SHA-256 | f23b8cc1c5b678d3b7d5973b2556a0644fc0282e98f2e37a645c08ea50e723dd
Secunia Security Advisory 44126
Posted Apr 17, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two security issues and two vulnerabilities have been reported in TimThumb, which can be exploited by malicious people to conduct cross-site scripting attacks and cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability, xss
SHA-256 | 44d78dcd3b292b35bdfa9833df52a9fb266649b35ca032cb85fb5387ea2bf0f9
Secunia Security Advisory 44140
Posted Apr 17, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two security issues and two vulnerabilities have been reported in WooThemes Live Wire and Gazette Edition WordPress themes, which can be exploited by malicious people to conduct cross-site scripting attacks and cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability, xss
SHA-256 | 72057db40a756fe535209523780c1e7c91f7b97dec73c31f0a2b8d6ddaa52b2a
Secunia Security Advisory 44121
Posted Apr 17, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Luigi Auriemma has discovered multiple vulnerabilities in Microsoft Reader, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | e470ba02771c982af00ef7dea9b7809e97b08d5bae9e85c15685697c35bf2511
Secunia Security Advisory 44171
Posted Apr 17, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in QianBo Enterprise Web Site Management System, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, web, xss
SHA-256 | 6d51619165cc570f892de3e95e376eb66e8e3ad4fa0cf67c74f504bd7d7ba558
Secunia Security Advisory 44129
Posted Apr 17, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in the Xceed Zip Compression Library, which can be exploited by malicious people to potentially compromise an application using the library.

tags | advisory
SHA-256 | cd098672585f852076e530600266ff33c58f07ec196799b900fbbbd61dcede6f
Secunia Security Advisory 44186
Posted Apr 17, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - HP has acknowledged a vulnerability in Network Node Manager i, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 823821b67df197662bb2232b41dba72e9caa3e13acadadbbcfef83ee33dab128
Secunia Security Advisory 44185
Posted Apr 17, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in HP Network Node Manager i, which can be exploited by malicious, local users to bypass certain security restrictions and by malicious people to conduct cross-site scripting attacks.

tags | advisory, local, vulnerability, xss
SHA-256 | 32d0669575a20ad359b2f181b2ccd169ce03aa4dd26c8d70fa64c733fc07ae46
Secunia Security Advisory 44128
Posted Apr 17, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Vallen Zipper, which can be exploited by malicious people to potentially compromise a user's system.

tags | advisory
SHA-256 | 827111b1ac38726a69635d10d53b103f39a40640046ed12d18aeea35c636e45a
Secunia Security Advisory 44153
Posted Apr 17, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Microsoft Internet Explorer, which can be exploited by malicious people to disclose certain sensitive information, bypass certain security restrictions, and compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 37d8e231d280f728c2138b17167348a00ab14186a206f3edf31692c387b1fcb4
Secunia Security Advisory 44184
Posted Apr 17, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in IBM Tivoli Directory Server, which can be exploited by malicious, local users to disclose sensitive information and by malicious people to compromise a vulnerable system.

tags | advisory, local, vulnerability
SHA-256 | 4f9045558b8167eb6f4b43c0bf004b7ab98584f90ac16ddf0a5de2207e9643c9
Secunia Security Advisory 44151
Posted Apr 17, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Apple Safari, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
systems | apple
SHA-256 | efa01e9458288a43b8b5a5b9fc66ba413f753a5cbcc788a40cc29574ab3c9747
Page 1 of 2
Back12Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close