exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 25 RSS Feed

Files Date: 2009-02-16

Mandriva Linux Security Advisory 2009-039
Posted Feb 16, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-039 - Python has a variable called sys.path that contains all paths where Python loads modules by using import scripting procedure. A wrong handling of that variable enables local attackers to execute arbitrary code via Python scripting in the current gedit working directory. This update provides fix for that vulnerability.

tags | advisory, arbitrary, local, python
systems | linux, mandriva
advisories | CVE-2009-0314
SHA-256 | 8b9e849975bf8bcfad7efeb3441096ffa012879e7c7d0e753cd1cf4b14a444e4
Mandriva Linux Security Advisory 2009-038
Posted Feb 16, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-038 - Python has a variable called sys.path that contains all paths where Python loads modules by using import scripting procedure. A wrong handling of that variable enables local attackers to execute arbitrary code via Python scripting in the current Blender working directory. This update provides fix for that vulnerability.

tags | advisory, arbitrary, local, python
systems | linux, mandriva
advisories | CVE-2008-4863
SHA-256 | 1e99fa3a1f0f0ec04047779edd481b19ceb202904e32e8a38780b66885631ce7
YACS CMS 8.11 Remote File Inclusion
Posted Feb 16, 2009
Authored by ahmadbady

YACS CMS version 8.11 suffers from a remote file inclusion vulnerability in update_trailer.php.

tags | exploit, remote, php, code execution, file inclusion
SHA-256 | 0a921702a6b193271c0846b5db6240e1121e3f6b6c9b2658a7dd02a6dc6a034d
RavenNuke 2.3.0 Code Execution / SQL Injection
Posted Feb 16, 2009
Authored by Janek Vind aka waraxe | Site waraxe.us

RavenNuke version 2.3.0 suffers from multiple code execution and SQL injection vulnerabilities.

tags | exploit, vulnerability, code execution, sql injection
SHA-256 | c34ff1a2c075baf5cd498bcc9dba388976bcf111db9b56ba7173af2090138d40
SAS Hotel Management System SQL Injection
Posted Feb 16, 2009
Authored by Darkb0x

SAS Hotel Management System suffers from a remote SQL injection vulnerability in myhotel_info.asp.

tags | exploit, remote, sql injection, asp
SHA-256 | 1839523d0458fbbbc8e92253d8b34c58852ce3f9d050edf3d1343db9a0551022
OpenX 2.6.3 orderdirection/listorder Cross Site Scripting
Posted Feb 16, 2009
Authored by Vinod Sharma

OpenX version 2.6.3 orderdirection and listorder parameter cross site scripting vulnerability details with screen shots.

tags | exploit, xss
SHA-256 | 159efe1f8cce18ebb81642c90697fc004c6d446db2b89abde07fdf13afb7992c
OpenX 2.6.3 clientid Cross Site Scripting
Posted Feb 16, 2009
Authored by Vinod Sharma

OpenX version 2.6.3 clientid parameter cross site scripting vulnerability details with screen shots.

tags | exploit, xss
SHA-256 | 68b32130a6ec022e86de03f76a1ee18d06f549634f5a6afe7f3ded6b8725a0f8
TPTEST 3.1.7 Stack Buffer Oveflow
Posted Feb 16, 2009
Authored by ffwd

TPTEST versions 3.1.7 and below stack buffer overflow proof of concept exploit.

tags | exploit, overflow, proof of concept
SHA-256 | e960467ded01250b4096a2f1b3c39d2f2f30445208d7a509bc9240a451df57ca
RatProxy Security Audit Tool
Posted Feb 16, 2009
Authored by Michal Zalewski | Site code.google.com

ratproxy is a semi-automated, largely passive Web application security audit tool optimized for accurate and sensitive detection, and automatic annotation, of potential problems and security-relevant design patterns based on the observation of existing, user-initiated traffic in complex Web 2.0 environments.

tags | tool, web, sniffer
SHA-256 | 64074f2927e1d1f4a9dbc4878cdcbb6c98940d01e2588f6f9bdc85fac7498fda
GeoVision ActiveX File Corruption
Posted Feb 16, 2009
Authored by Nine:Situations:Group | Site retrogod.altervista.org

GeoVision LiveX_v8200 Active-X Control remote file corruption proof of concept exploit.

tags | exploit, remote, activex, proof of concept
SHA-256 | e24f2fa615944e208a5882c0fdc94c33d025e658885ab4a8a2437a50f59f859a
Mandriva Linux Security Advisory 2009-037
Posted Feb 16, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-037 - Internet Systems Consortium (ISC) BIND 9.6.0 and earlier does not properly check the return value from the OpenSSL EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature.

tags | advisory, remote
systems | linux, mandriva
SHA-256 | e35f21344acc99873c0c3c05ad0cf0801feef75fd84ceb50f59a670fc8061800
MemHT Portal 4.0.1 Delete Messages
Posted Feb 16, 2009
Authored by StAkeR

MemHT Portal versions 4.0.1 and below delete all private messages exploit.

tags | exploit
SHA-256 | c0e93f7e01ec0a9ee8f05fe5f09c0a75049bedd768b076dc7f200d92f04db2fc
Linux/x86 chmod 666 /etc/shadow Shellcode
Posted Feb 16, 2009
Authored by Jonathan Salwan | Site shell-storm.org

30 bytes small shellcode for Linux/x86 that performs chmod() 666 /etc/shadow & exit();

tags | x86, shellcode
systems | linux
SHA-256 | 4c44893378083171a83892266561dc67869751c21280f796639a23c91e022139
NovaBoard 1.0.0 File Upload / LFI / SQL Injection
Posted Feb 16, 2009
Authored by brain[pillow]

NovaBoard version 1.0.0 suffers from shell upload, local file inclusion, and multiple remote SQL injection vulnerabilities.

tags | exploit, remote, shell, local, vulnerability, sql injection, file inclusion, file upload
SHA-256 | cbfffa295a4b05222d38b2d1ae86e395de82376adc7fb687845cc20853a7a846
CanSecWest 2009 Speaker Lineup
Posted Feb 16, 2009
Authored by Dragos Ruiu

The final speak lineup for CanSecWest 2009 has been announced.

tags | paper, conference
SHA-256 | beb8fb16a45b6e72de1cc886f96cce253cef8ea123f7bc0bc43cb25a5e333598
Enomaly ECP/Enomalism enomalism2.sh Temporary Files
Posted Feb 16, 2009
Authored by Sam Johnston

All versions of Enomaly ECP/Enomalism before 2.2.1 have multiple issues relating to the use of temporary files in an insecure manner.

tags | exploit
advisories | CVE-2008-4990, CVE-2009-0390
SHA-256 | 461388d5af9b086c1ea7698c7c71be0f51f4b95fd1d2fce9bd1ff0fe15f9f6d3
PowerMovieList 0.14b XSS / SQL Injection
Posted Feb 16, 2009
Authored by brain[pillow]

PowerMovieList version 0.14b suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 0b5fbc41cf6afdc05cfd8593d7244cf0878bb0f42f906d22801f4822ff636204
Falt4 CMS File Upload Exploit
Posted Feb 16, 2009
Authored by Sp3shial

Falt4 CS RC4 arbitrary file upload exploit.

tags | exploit, arbitrary, file upload
SHA-256 | fe07399aa459a1057879fcf1842e7dd198c284a70f61aab7e7fdf5dbc7298218
InselPhoto 1.1 Cross Site Scripting
Posted Feb 16, 2009
Authored by rAWjAW | Site rawjaw-security.blogspot.com

InselPhoto version 1.1 suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | c749608b4fd416564aa8945271143b661a7e687fe8c3af628901df721dbfecba
Secunia Security Advisory 33931
Posted Feb 16, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Vlinks, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 2d72f5c23d8734d145d6e176dfa46cb1aabddfe7d714840e5720c867bb7091db
Secunia Security Advisory 33936
Posted Feb 16, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in xine-lib, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 6a1229c9e9ffd304f77d47fc2888c03bd747de08d43b3b7dc5410d4540e35d57
Secunia Security Advisory 33925
Posted Feb 16, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for MozillaFirefox. This fixes some vulnerabilities, which can be exploited by malicious, local users to potentially disclose sensitive information, and by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, disclose sensitive information, or potentially to compromise a user's system.

tags | advisory, local, vulnerability, xss
systems | linux, suse
SHA-256 | 36afc55a024ee0f3242df746e9076f47d0fb85155382f211202d532a06612477
Secunia Security Advisory 33951
Posted Feb 16, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for squidGuard. This fixes a security issue, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
systems | linux, fedora
SHA-256 | 13bf988147ed509f902c4523dc2328673c968d8131fbf0e97131e8f67198fe2a
Secunia Security Advisory 33909
Posted Feb 16, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some security issues have been reported in iFIX, which can be exploited by malicious users to disclose sensitive information and bypass certain security restrictions, and by malicious people to disclose sensitive information.

tags | advisory
SHA-256 | d061f37b9f0f2ee7f7c5f786d7f9d7451dd2b57e133a3d1ffda868a781b8b1a1
Solaris Kerberos PAM Module Privilege Escalation
Posted Feb 16, 2009
Site sunsolve.sun.com

Sun Security Advisory - A security vulnerability in the Solaris Kerberos PAM module may allow use of a user specified Kerberos configuration file, leading to escalation of privileges.

tags | advisory
systems | solaris
advisories | CVE-2009-0360, CVE-2009-0361
SHA-256 | 0b4f5956c54b78b438db584a20d734a43f248bdbe1b4ba68a0163cf173361186
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close