exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 141 RSS Feed

Files Date: 2010-04-19 to 2010-04-20

Joomla Gadget Factory 1.0.0 Local File Inclusion
Posted Apr 19, 2010
Authored by AntiSecurity

The Joomla Gadget Factory component version 1.0.0 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 5008f2e222ce327f1539ba401406c8ac681c068e0111380606c26bb4e647871e
Joomla ZiMB Manager 0.1 Local File Inclusion
Posted Apr 19, 2010
Authored by AntiSecurity

The Joomla ZiMB Manager component version 0.1 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 4fdcaa27e26bf8ec235422e43511ee32dcb9a13fac6822421e8d3f46cf4edb14
Joomla ZiMB Comment 0.8.1 Local File Inclusion
Posted Apr 19, 2010
Authored by AntiSecurity

The Joomla ZiMB Comment component version 0.8.1 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | eedf90ecb027ab600e919e8cd55c265f9d4bb4e9fdaf86a2b2e4a659dd1b13ba
CMS SiteLogic Cross Site Scripting / Shell Upload
Posted Apr 19, 2010
Authored by MustLive

CMS SiteLogic suffers from cross site scripting and shell upload vulnerabilities.

tags | exploit, shell, vulnerability, xss
SHA-256 | 62e9aca8f964175fefe02ba27af0b2aedac0409a782508d7777f922344d8486c
Mandriva Linux Security Advisory 2010-078
Posted Apr 19, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-078 - The command matching functionality in sudo 1.6.8 through 1.7.2p5 does not properly handle when a file in the current working directory has the same name as a pseudo-command in the sudoers file and the PATH contains an entry for., which allows local users to execute arbitrary commands via a Trojan horse executable, as demonstrated using sudoedit, a different vulnerability than CVE-2010-0426. Packages for 2008.0 are provided for Corporate Desktop 2008.0 customers. The updated packages have been patched to correct this issue.

tags | advisory, arbitrary, local, trojan
systems | linux, mandriva
advisories | CVE-2010-1163
SHA-256 | d73db4cce13f07558bb167bb1c09f7caf34a09bdb07a74b3921f8547fa6960e6
14 Bytes execve("a->/bin/sh") Shellcode
Posted Apr 19, 2010
Authored by Magnefikko

14 bytes small execve("a->/bin/sh") shellcode.

tags | shellcode
SHA-256 | cbd9bf3d2679e4546ba2a9147e21c22a13493264f11c43178cc537383e00094a
Mandriva Linux Security Advisory 2010-076
Posted Apr 19, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-076 - The ssl3_get_record function in ssl/s3_pkt.c in OpenSSL 0.9.8f through 0.9.8m allows remote attackers to cause a denial of service (crash) via a malformed record in a TLS connection. OpenSSL before 0.9.8m does not check for a NULL return value from bn_wexpand function calls which has unspecified impact and context-dependent attack vectors. The kssl_keytab_is_available function in ssl/kssl.c in OpenSSL before 0.9.8n, when Kerberos is enabled but Kerberos configuration files cannot be opened, could allow remote attackers to cause a denial of service (NULL pointer dereference and daemon crash). Finally, this update provides support for secure renegotiation, preventing men-in-the-middle attacks. Packages for 2008.0 and 2009.0 are provided due to the Extended Maintenance Program for those products.

tags | advisory, remote, denial of service
systems | linux, mandriva
advisories | CVE-2009-3555, CVE-2009-3245, CVE-2010-0740, CVE-2010-0433
SHA-256 | 1b59ceccf86720022917393ba8d2460f6083ecf14b3020ddf7d6270d3d69d8ef
AgentX++ Stack Buffer Overflow
Posted Apr 19, 2010
Authored by ZSploit.com | Site zsploit.com

AgentX++ stack buffer overflow proof of concept exploit.

tags | exploit, overflow, proof of concept
advisories | CVE-2010-1318
SHA-256 | 9e66d7c97044c835c099e68a991b581c76c73dadb00968bebac32159afe1bb6b
Debian Linux Security Advisory 2035-1
Posted Apr 19, 2010
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2035-1 - Two issues have been found in the Apache HTTPD web server. mod_proxy_ajp would return the wrong status code if it encountered an error, causing a backend server to be put into an error state until the retry timeout expired. A remote attacker could send malicious requests to trigger this issue, resulting in denial of service. A flaw in the core subrequest process code was found, which could lead to a daemon crash (segfault) or disclosure of sensitive information if the headers of a subrequest were modified by modules such as mod_headers.

tags | advisory, remote, web, denial of service
systems | linux, debian
advisories | CVE-2010-0408, CVE-2010-0434
SHA-256 | 2e6b0f7ad880c0f3365b95e2a5bac6059fd50fbc187c84c58913bb3270c47a31
Aligro 1.2.1 SQL Injection
Posted Apr 19, 2010
Authored by indoushka

Aligro version 1.2.1 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | b4c89d984b0493a422685e922510f34fe6c9393a953b242972799e1ad5b8a9b9
eclime 1.1 Bypass / Database Disclosure
Posted Apr 19, 2010
Authored by indoushka

eclime version 1.1 suffers from bypass and database download vulnerabilities.

tags | exploit, vulnerability, info disclosure
SHA-256 | 6709837cd53684dd49310a2fb490e20802ab6644499d364e51991cb3ddb8d1ff
Windows 7/2008R2 SMB Client Trans2 Stack Overflow
Posted Apr 19, 2010
Authored by laurent gaffie

Microsoft Windows 7/2008R2 SMB Client Trans2 stack overflow exploit that leverages the vulnerability discussed in MS10-020.

tags | exploit, overflow
systems | windows
SHA-256 | c3792c66700a76e600e4a641a3d11ba1c09fab08f19b94f78816408c90755b20
Mandriva Linux Security Advisory 2010-077
Posted Apr 19, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-077 - The Free Software Foundation (FSF) Berkeley DB NSS module (aka libnss-db) 2.2.3pre1 reads the DB_CONFIG file in the current working directory, which allows local users to obtain sensitive information via a symlink attack involving a setgid or setuid application that uses this module. The updated packages have been patched to correct this issue.

tags | advisory, local
systems | linux, mandriva
advisories | CVE-2010-0826
SHA-256 | ccece97cdc94a42632eb60fec233e0eaedd86806ceda46b8535014ee4a06839a
Mojma Scripts SQL Injection
Posted Apr 19, 2010
Authored by Li0n-PaL

Mojma Scripts suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | de18a73fa64bc14f7e25af2e5220c39148a612ec14db02fd891ddbfe955cb7ee
Openscrutin 1.03 Remote / Local File Inclusion
Posted Apr 19, 2010
Authored by cr4wl3r

Openscrutin version 1.03 suffers from local file inclusion and remote file inclusion vulnerabilities.

tags | exploit, remote, local, vulnerability, code execution, file inclusion
SHA-256 | 1f1fb2bcce1b5ea4790e1b7f44e976ed97560c994f5f2ad6b80c7a26151b8681
Debian Linux Security Advisory 2034-1
Posted Apr 19, 2010
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2034-1 - Several vulnerabilities have been discovered in phpMyAdmin, a tool to administer MySQL over the web.

tags | advisory, web, vulnerability
systems | linux, debian
advisories | CVE-2008-7251, CVE-2008-7252, CVE-2009-4605
SHA-256 | c11128f13b24f32ffcfa461f8a03e8e60f8c0e84d7f0db53e30c1c42f1ab272e
Snipe Gallery 3.1.5 Remote File Inclusion
Posted Apr 19, 2010
Authored by eidelweiss

Snipe Gallery version 3.1.5 suffers from multiple remote file inclusion vulnerabilities.

tags | exploit, remote, vulnerability, code execution, file inclusion
SHA-256 | 695faed6356b7d1975ec45920035be4cfe54abf475fd0b2f1c8b28d2fa8bb9cf
WinMount MOU 3.3.0401 File Handling Overflow
Posted Apr 19, 2010
Authored by Lufeng Li

WinMount version 3.3.0401 suffers from a file handling overflow vulnerability.

tags | exploit, overflow
SHA-256 | da50e6c93f241f0f02e2fdc61ce2836c8deb69e453f03e04e6c2f56d850081a8
Secunia Security Advisory 39495
Posted Apr 19, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in eclime, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | edb82f338e781621ae03906aedec35a52e83c681df730eee63045157f4340e15
Secunia Security Advisory 39496
Posted Apr 19, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Valentin H

tags | advisory, vulnerability, xss, sql injection
SHA-256 | 7d36aa577796748cbde5fec63961542d79590e287e1b6cb913f808c73bd4cf0e
Secunia Security Advisory 39499
Posted Apr 19, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Luigi Auriemma has reported two vulnerabilities in HTTP File Server, which can be exploited by malicious people to bypass certain security restrictions or cause a DoS (Denial of Service).

tags | advisory, web, denial of service, vulnerability
SHA-256 | a71c55dd8487491d440962e4a9dfbc933d10f4d48f251ae6d1dbe0c6b40ae48c
Secunia Security Advisory 39521
Posted Apr 19, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in the Archery Scores component for Joomla, which can be exploited by malicious people to disclose potentially sensitive information.

tags | advisory
SHA-256 | 08c520742784f67bc44e3293a739a3b24066671331d9896a09dbf180f994283b
Secunia Security Advisory 39524
Posted Apr 19, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in the iNetLanka Drawroot component for Joomla, which can be exploited by malicious people to disclose potentially sensitive information.

tags | advisory
SHA-256 | ee39c1eef90b6937e7059baac6f0f82665c3c3bf763746e9afec56259b7422c0
Secunia Security Advisory 39454
Posted Apr 19, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in MySQL, which can be exploited by malicious users to manipulate certain data.

tags | advisory
SHA-256 | e2f40d2b2aff9d7a96c9b5642b820e28e2a3e273fcdf89a899799b37ed24c522
Secunia Security Advisory 39488
Posted Apr 19, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Zyke CMS, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 58560dfb89d7b3d35f21d4dff071bdcff2e197b30d14b5bade101b6a8e6e2e2f
Page 2 of 6
Back12345Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close