exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 82 RSS Feed

Files Date: 2010-06-02 to 2010-06-03

Secunia Security Advisory 39933
Posted Jun 2, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in F5 ARX, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 7ec31ea45012c28cb2ddf3794b268b710d748984133ad7738a4197f729db7a2e
Secunia Security Advisory 39988
Posted Jun 2, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in EvoCam, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | d6a93f928839a213cb2125ebcd163c7d151aaa44cd5274ce95646d8929e816fd
Secunia Security Advisory 39948
Posted Jun 2, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in F5 BIG-IP, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
SHA-256 | ac5203425f781d63982d381fb0392252fb016a0951e033b398d2e095ef5f8e74
TCExam 10.1.006 Shell Upload
Posted Jun 2, 2010
Authored by AutoSec Tools

TCExam version 10.1.006 suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | beaa5b1b2fdd6349d7587a258c92ef936c7294306da2716702ee880cf2ef3ce7
Joomla Sar News SQL Injection
Posted Jun 2, 2010
Authored by LyNx

The Joomla Sar News component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 830daf4e1ba5be84791550d610a3800bed5310614ab11ff335441dba61ccce89
Trend Micro Data Loss Prevention 5.2 Data Leakage
Posted Jun 2, 2010
Authored by nitr0us

Trend Micro Data Loss Prevention version 5.2 suffers from a data leakage vulnerability.

tags | advisory
SHA-256 | 4f5ab127e23041435d6d53ee801402ea15cf4d953803bb39a87e4dc0789f0def
Ticimax E-Ticaret SQL Injection
Posted Jun 2, 2010
Authored by Neuromancer

Ticimax E-Ticaret suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 97da3976c440bfa565a6b03a765b796afb8ec0dbbea9c6062be595d89af46cc2
Delivering Digital Media CMS SQL Injection
Posted Jun 2, 2010
Authored by Cr3w-D, Dr.0rYX

Delivering Digital Media CMS suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | cf9ef7245c60eee69aedb3f65883f4dc7be782abad0925dabb836752ff275cb5
Mac OS X EvoCam Web Server Buffer Overflow
Posted Jun 2, 2010
Authored by d1dn0t

Mac OS X EvoCam web server versions 3.6.6 and 3.6.7 remote buffer overflow exploit.

tags | exploit, remote, web, overflow
systems | apple, osx
SHA-256 | c277f9fc75173d72ca92fd9949166ab4441b2ebdf519ffab0033f3ae50fb6d4c
Joomla ChronoForms Blind SQL Injection
Posted Jun 2, 2010
Authored by mlk

The Joomla ChronoForms component suffers from a blind SQL injection vulnerability.

tags | exploit, sql injection
SHA-256 | 0976536d3985e1f736eaa36199b11261c4e10b090464e264ba766bb51e478033
Ecomat CMS 5.0 SQL Injection
Posted Jun 2, 2010
Authored by High-Tech Bridge SA | Site htbridge.com

Ecomat CMS version 5.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 1b27b743c6fadee4b3be52bf597aea56952df8b3660c6c240e8ecc5b02a7b879
Ecomat CMS 5.0 Cross Site Scripting
Posted Jun 2, 2010
Authored by High-Tech Bridge SA | Site htbridge.com

Ecomat CMS version 5.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | bc94673383e27e7a8f1f257b6ca288eda4f91f8681b089265e4cc8d98bbc7fb5
phpGraphy 0.9.13 Remote File Inclusion
Posted Jun 2, 2010
Authored by Sniper Site Hacker

phpGraphy versions 0.9.13 and below suffer from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 4259872e8146bcd09671aeffc3dc5d4d95bf78e34a4368ba77fa7f5582f17397
CMS Made Simple 1.7.1 Cross Site Scripting / Cross Site Request Forgery
Posted Jun 2, 2010
Site bkis.com

CMS Made Simple versions 1.7.1 and below suffer from cross site request forgery and cross site scripting vulnerabilities.

tags | advisory, vulnerability, xss, csrf
SHA-256 | dfd0aa4f4ad263b0b79385a5b44544f3ef742e141f0336e65f0e06753682a8df
Hexjector 1.0.7.2 Cross Site Scripting
Posted Jun 2, 2010
Authored by hexon

Hexjector version 1.0.7.2 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 6b47db46a83c0cba0d1ac6dde1a8a3a525b94173fcdec62e622a45ea25cb9af5
Zero Day Initiative Advisory 10-090
Posted Jun 2, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-090 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell ZENworks. Authentication is not required to exploit this vulnerability. The specific flaw exists within the Preboot Service (novell-pbserv.exe). This service listens for incoming connections on TCP port 998. The service uses a simple binary protocol where the first DWORD is an opcode followed by the specific opcode's data, typically in length/value pairs. These length values are not checked against the destination buffers size allowing for stack-based overflows to occur. This can lead to arbitrary code execution in the context of the SYSTEM user.

tags | advisory, remote, overflow, arbitrary, tcp, code execution, protocol
SHA-256 | c3be7ca5a84838a07761a163c4293e1b165c2c1483926fc0606d77bb80fb4d12
Applicure dotDefender 4.0 Cross Site Scripting
Posted Jun 2, 2010
Authored by Sandro Gauci

Applicure dotDefender version 4.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | fefe2bf6cf86f61cea6eacfb51cf2668b0a3a88f1daf4ee354942b14753dbcd3
Gentoo Linux Security Advisory 201006-6
Posted Jun 2, 2010
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201006-6 - Stack-based buffer overflows in Transmission may allow for remote execution of arbitrary code. Multiple stack-based buffer overflows in the tr_magnetParse() function in libtransmission/magnet.c have been discovered. Versions less than 1.92 are affected.

tags | advisory, remote, overflow, arbitrary
systems | linux, gentoo
advisories | CVE-2010-1853
SHA-256 | 256bda7cb931fbc2d9d9673000eb4eb2f1bf904007fe5cba5ddfc75ade77eda4
Chocky Soft 2005 SQL Injection
Posted Jun 2, 2010
Authored by BlaCK CobRa

Chocky Soft 2005 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 32d5f29940a06e4237255011880d4efc769d0d12edee5a2b005a985dbd6e68c8
Gentoo Linux Security Advisory 201006-9
Posted Jun 2, 2010
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201006-9 - A flaw in sudo's -e option may allow local attackers to execute arbitrary commands. The command matching functionality does not properly handle when a file in the current working directory has the same name as a pseudo-command in the sudoers file and the PATH contains an entry for a period. Versions less than 1.7.2_p6 are affected.

tags | advisory, arbitrary, local
systems | linux, gentoo
advisories | CVE-2010-1163
SHA-256 | 951620b4df8257d00f282854c7cf5205bea46b3d367d82f5540205ad3cad307d
XFTP 3.0 Build 02.39 Long Filename Buffer Overflow
Posted Jun 2, 2010
Authored by sinn3r

XFTP version 3.0 build 0239 long filename buffer overflow exploit.

tags | exploit, overflow
SHA-256 | cfc2ae30218f2a28be92beae63be4a6019da42b906d218984ed0c93346e55bab
Gentoo Linux Security Advisory 201006-8
Posted Jun 2, 2010
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201006-8 - Race conditions when editing files could lead to symlink attacks or changes of ownerships of important files. Multiple race condition vulnerabilities have been discovered in nano. Versions less than 2.2.4 are affected.

tags | advisory, vulnerability
systems | linux, gentoo
advisories | CVE-2010-1160, CVE-2010-1161
SHA-256 | 24cc89e06bbf307e36ec3ca1ee9f5db1fb6563ca73121d8b5897470ea08715dd
Gentoo Linux Security Advisory 201006-7
Posted Jun 2, 2010
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201006-7 - Multiple vulnerabilities were discovered in SILC Toolkit and SILC Client, the worst of which allowing for execution of arbitrary code. Multiple vulnerabilities were discovered in SILC Toolkit and SILC Client. For further information please consult the CVE entries referenced below. Versions less than 1.1.10 are affected.

tags | advisory, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2008-7159, CVE-2008-7160, CVE-2009-3051, CVE-2009-3163
SHA-256 | 09c6f320cb1842d1cf2f553bd190328e48a36e499ce25f06245ec682f1c95c8b
Joomla JS Jobs 1.0.5.8 SQL Injection
Posted Jun 2, 2010
Authored by r0i

The Joomla JS Jobs component version 1.0.5.8 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 45ff5281b50d18c61bb6d752b7d1417b71d3a51978ceced55c7e8e27223500de
ZipExplorer 7.0 Denial Of Service
Posted Jun 2, 2010
Authored by TecR0c | Site corelan.be

ZipExplorer version 7.0 denial of service exploit that creates a malicious .rar file.

tags | exploit, denial of service
SHA-256 | 1f3600ca656cca15e957a5a74968bd9eb2758ebecd6f2b6818ffd55ef2774749
Page 2 of 4
Back1234Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    0 Files
  • 9
    Nov 9th
    0 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close