exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 37 of 37 RSS Feed

Files Date: 2011-05-09 to 2011-05-10

BlueVoda Website Builder 11 Stack Buffer Overflow
Posted May 9, 2011
Authored by KedAns-Dz | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in versions 11 of BlueVoda Website Builder. By creating a specially crafted .bvp file, an attacker may be able to execute arbitrary code.

tags | exploit, overflow, arbitrary
SHA-256 | ccc5cdb9fc46f8b848c6a2a2b8db00d803d43d4e0dbcbf23eebfe6341f1d5d22
VideoLAN VLC ModPlug ReadS3M Stack Buffer Overflow
Posted May 9, 2011
Authored by jduck | Site metasploit.com

This Metasploit module exploits an input validation error in libmod_plugin as included with VideoLAN VLC 1.1.8. All versions prior to version 1.1.9 are affected. By creating a malicious S3M file, a remote attacker could execute arbitrary code. Although other products that bundle libmodplug may be vulnerable, this module was only tested against VLC. NOTE: As of July 1st, 2010, VLC now calls SetProcessDEPPoly to permanently enable NX support on machines that support it. As such, this module is capable of bypassing DEP, but not ASLR.

tags | exploit, remote, arbitrary
advisories | CVE-2011-1574, OSVDB-72143
SHA-256 | e72918bb99176c250a3e97631e70871f2208d1f45b7278b1b4936f047fb968a6
Pytbull 1.0
Posted May 9, 2011
Authored by Sebastien Damaye | Site pytbull.sourceforge.net

pytbull is an intrusion detection/prevention system (IDS/IPS) testing framework for Snort and Suricata. It can be used to test the detection and blocking capabilities of an IDS/IPS, to compare IDS/IPS, to compare configuration modifications and to check/validate configurations. The framework is shipped with about 300 tests grouped into 8 testing modules.

Changes: Support of other IDS/IPS systems. Pattern matching feature added. A new pcapRelay module has been added.
tags | tool, sniffer
SHA-256 | 659cd386ba8ed7dc51eb313de28efa7af5f82852165fb4bf64c70f42268894e8
Tinc Virtual Private Network Daemon 1.0.14
Posted May 9, 2011
Authored by Ivo Timmermans | Site tinc-vpn.org

tinc is a Virtual Private Network (VPN) daemon that uses tunneling and encryption to create a secure private network between multiple hosts on the Internet. This tunneling allows VPN sites to share information with each other over the Internet without exposing any information.

Changes: This release fixes reading configuration files that do not end with a newline, allows arbitrary configuration options to be specified on the command line, allows all options in both tinc.conf and the local host config file, and has configurable replay window, UDP send and receive buffers for performance tuning. It tries harder to get UDP communication back after falling back to TCP. There is now support for running tinc on DragonFly BSD and for attaching tinc to a VDE switch.
tags | encryption
systems | unix
SHA-256 | 321f6d76b33746230937048ebdb975aec21ad979cee43536198a8eb29a454a38
Secunia Security Advisory 44528
Posted May 9, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for firefox, thunderbird, and xulrunner. This fixes multiple vulnerabilities, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to disclose sensitive information and compromise a user's system.

tags | advisory, local, vulnerability
systems | linux, fedora
SHA-256 | 0ed1fc8e7be33f29a2ec74ee15887161ba94bee9d94fa3725878fe2182f9ceff
Secunia Security Advisory 44530
Posted May 9, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for libzip. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, suse
SHA-256 | c93d7890041bb332a5687cea67ae9d6a8c377f9413ecc11058fa4dcf8eb9fe2f
Secunia Security Advisory 44478
Posted May 9, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for exim4. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | linux, debian
SHA-256 | 4e9f0b7235720f7aa02ff369e31da1cf1f2b255b52d885840df40c09e545b72a
Secunia Security Advisory 44485
Posted May 9, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in FestOS, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 9a38d8397a053d2a759c69761222d7061a4f8f05e4c878be4765c9bbc79e8906
Secunia Security Advisory 44516
Posted May 9, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Samsung Data Management Server, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | dd9e7777b139a3779c0cafcc5476e8da40aa5002f2ac1455e0afbec5e23a553c
Secunia Security Advisory 44492
Posted May 9, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - AutoSec Tools has discovered a vulnerability in Serva, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 861fe387d2d6228ee482f05a1403d8d4fa676b6e53fd7f0784076beb991f2979
Secunia Security Advisory 44497
Posted May 9, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - AutoSec Tools has discovered a vulnerability in Ampache, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | bb7e6ff33739296b874842cfbb9f5e4b2f08f55d3f67ef536fd6650b9641c2b1
Secunia Security Advisory 44494
Posted May 9, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - AutoSec Tools has discovered a vulnerability in GetSimple CMS, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
SHA-256 | 20de5fc37da9d719273180908527ab1e16c9f09fe2809400640c77aa96d19401
Page 2 of 2
Back12Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close