exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 25 RSS Feed

Files Date: 2010-07-20 to 2010-07-21

Secunia Security Advisory 40520
Posted Jul 20, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - shinnai has discovered a vulnerability in Haihaisoft PDF Reader, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 0d85a7371404beef99fa555b738970223f778b59bf1501531d90d5d3dbeb336b
Secunia Security Advisory 40660
Posted Jul 20, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Apple iTunes, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | apple
SHA-256 | 8ed3c6b25463725d248deceb67466c214700793d41a146a7ace6668b6a523f1d
Secunia Security Advisory 40636
Posted Jul 20, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Luigi Auriemma has discovered some vulnerabilities in Microsoft DirectX, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
SHA-256 | 294ff0ce84023427ff9f193215df22f1d11b496f89bb79b601d19228d71e9058
Secunia Security Advisory 40577
Posted Jul 20, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - VMware has acknowledged some vulnerabilities in VMware vCenter Update Manager, which can be exploited by malicious people to disclose sensitive information or conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | 3949c51192918efc5764a67af26329790d795c50ffe14d04ca734dc559885f89
Secunia Security Advisory 40629
Posted Jul 20, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness and a vulnerability have been reported in NQcontent, which can be exploited by malicious people to determine valid user accounts and conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | cce58564647126dd7ec61e8a814a0acc68d888411c4cf9d8754fb190d6d4dbf9
Secunia Security Advisory 40547
Posted Jul 20, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for libpng. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise an application using the library.

tags | advisory, denial of service, vulnerability
systems | linux, debian
SHA-256 | c4fa9933b26b79db29e61d20612a14bc448687d1ade53cda16fcfa605d65d346
Secunia Security Advisory 40673
Posted Jul 20, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Novell Teaming, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 1850440c8326c3c56fd7009e4e3104d5b9dcd28494195cc92875f993d305b81c
Secunia Security Advisory 40614
Posted Jul 20, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in IBM FileNet Content Manager, which may lead to a bypass of certain security restrictions.

tags | advisory
SHA-256 | 604d9c9bc4e3073fcc78cfecaeebc4f1baf1e24fe76599a56bd7e790a302a49b
Secunia Security Advisory 40631
Posted Jul 20, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for freetype. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the library.

tags | advisory, denial of service, vulnerability
systems | linux, ubuntu
SHA-256 | d4e085583503f518c0ec39813dddb17baf8a19e4b3dc041808406caec773f77c
SapGUI BI 7100.1.400.8 Heap Corruption
Posted Jul 20, 2010
Authored by Elazar Broad

SapGUI BI version 7100.1.400.8 heap corruption exploit that launches calc.exe.

tags | exploit
SHA-256 | 0a2aec950e56fddda7c1b46af3772494756689d2d2fb0233a1faf4ab06f90173
VMware Security Advisory 2010-0012
Posted Jul 20, 2010
Authored by VMware | Site vmware.com

VMware Security Advisory - The default version of the Jetty Web server in Update Manager is version 6.1.6 for which the following relevant vulnerabilities are reported. A directory traversal vulnerability in Jetty allows for obtaining files from the system where Update Manager is installed by a remote, unauthenticated attacker. The attacker would need to be on the same network as the system where Update Manager is installed. A cross-site scripting vulnerability in Jetty allows for running JavaScript in the browser of the user who clicks a URL containing a malicious request to Update Manager. For an attack to be successful the attacker would need to lure the user into clicking the malicious URL.

tags | advisory, remote, web, javascript, vulnerability, xss
advisories | CVE-2009-1523, CVE-2009-1524
SHA-256 | 71229e8375725c682b9b8bc4687d11565e6aad277b5be549585f83274690850b
Haraldscan Bluetooth Discovery Scanner OSX 0.42
Posted Jul 20, 2010
Authored by Terence Stenvold | Site code.google.com

Harald Scan is a Bluetooth discovery scanner. It determines Major and Minor device classes according to the Bluetooth SIG specification and attempts to resolve a device's MAC address to the largest known vendor/MAC address list. Written in Python. This is the Mac OSX source release.

Changes: This release outputs in XML format for easier parsing and viewing of data.
tags | tool, python, wireless
systems | apple
SHA-256 | c1841f46addbb3487332a8fafa4d85b599763883d29be3fbccb82813f4be5a02
Haraldscan Bluetooth Discovery Scanner 32bit 0.42
Posted Jul 20, 2010
Authored by Terence Stenvold | Site code.google.com

Harald Scan is a Bluetooth discovery scanner. It determines Major and Minor device classes according to the Bluetooth SIG specification and attempts to resolve a device's MAC address to the largest known vendor/MAC address list. Written in Python. This is the Linux 32bit binary release.

Changes: This release outputs in XML format for easier parsing and viewing of data.
tags | tool, python, wireless
systems | linux
SHA-256 | 91a3b8d161a49b89633ec10b5c9b37bf2e3490e76fb7a1b9513d0921293671c6
Haraldscan Bluetooth Discovery Scanner 64bit 0.42
Posted Jul 20, 2010
Authored by Terence Stenvold | Site code.google.com

Harald Scan is a Bluetooth discovery scanner. It determines Major and Minor device classes according to the Bluetooth SIG specification and attempts to resolve a device's MAC address to the largest known vendor/MAC address list. Written in Python. This is the Linux 64bit binary release.

Changes: This release outputs in XML format for easier parsing and viewing of data.
tags | tool, python, wireless
systems | linux
SHA-256 | 985e34f83f0f978178f355ac36b80b0f24c7c3e928cf353bb7cf6ed93873c3b0
Really Simple IM 1.3 Beta Denial Of Service
Posted Jul 20, 2010
Authored by loneferret

Really Simple IM version 1.3 Beta denial of service proof of concept exploit.

tags | exploit, denial of service, proof of concept
SHA-256 | 529f9e9af3d7e65c19b1f6ae01cb0aae8442444dce6eb40daf258cf5ba95f89c
GKrellM2 System Monitor Plugin Local Exploit
Posted Jul 20, 2010
Authored by Marshall Whittaker

GKrellM2 System Monitor Plugin local proof of concept exploit that spawns a shell on tcp/6666.

tags | exploit, shell, local, tcp, proof of concept
SHA-256 | 679a1cbd327fd993035ea613c196a669dfe405e36169f64bfe774c78a1e51358
HP Quality Center Cross Site Scripting
Posted Jul 20, 2010
Authored by Dinesh Arora

HP Quality Center suffers from multiple cross site scripting vulnerabilities.

tags | advisory, vulnerability, xss
SHA-256 | cd2f3c541814d362a86c4bbb25e47feb75d4b1a877b10804a50d95306a296622
AIX5l FTP Server Remote Root Hash Disclosure
Posted Jul 20, 2010
Authored by Kingcope

AIX5l with FTP server remote root hash disclosure exploit. Creates a coredump including the root user hash from /etc/security/passwd.

tags | exploit, remote, root
SHA-256 | ffcd4f4babc007df54a8c30b68c543ca31700ab2e57bbd47c9d45f7258140368
Mandriva Linux Security Advisory 2010-137
Posted Jul 20, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-137 - Multiple integer underflows/overflows and heap buffer overflows was discovered and fixed. A heap buffer overflow was discovered in the bytecode support. The bytecode support is NOT enabled per default in Mandriva due to previous patent claims, but packages by PLF is affected. The updated packages have been patched to correct these issues.

tags | advisory, overflow
systems | linux, mandriva
advisories | CVE-2010-2497, CVE-2010-2498, CVE-2010-2499, CVE-2010-2500, CVE-2010-2519, CVE-2010-2520
SHA-256 | efd92e7d42dab7ac0d40e33efe6456624e6b0c34d5a859edf8491479d8deda99
SnowFlake CMS 1.0 Beta5.2 SQL Injection
Posted Jul 20, 2010
Authored by Dinesh Arora

SnowFlake CMS version 1.0 Beta5.2 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 9024bad91a10cd100e80dd0314d7ef7c708b444899ce0868fffa51ece74885fe
Debian Linux Security Advisory 2072-1
Posted Jul 20, 2010
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2072-1 - Several vulnerabilities have been discovered in libpng, a library for reading and writing PNG files.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2010-1205, CVE-2010-2249
SHA-256 | d17b0e986dbcc1fbbef738ae5e58903f49fceb0dc5c82dae6a6e23be776a6ddd
rapidCMS 2 SQL Injection
Posted Jul 20, 2010
Authored by Mahjong

rapidCMS version 2 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
SHA-256 | 105eb671688b0faa0724dce67c0ff13d418ecc793007a265b52e5a7930e3f72a
Hero DVD Buffer Overflow
Posted Jul 20, 2010
Authored by MadjiX

Hero DVD buffer overflow Metasploit module exploit.

tags | exploit, overflow
SHA-256 | 5d23ca9a0163c1c9270898e90296dd8ff1e83880dd7ffbbee1c0d2d705002069
Microsoft ClickOnce Man-In-The-Middle
Posted Jul 20, 2010
Authored by Tom Ritter

Interesting write up that goes indepth discussing the man-in-the-middle vulnerabilities associated with Microsoft ClickOnce.

tags | paper, vulnerability
SHA-256 | 4f5d70c70a326c2f6d3ceb75e4c77b5eaea08d46bfbab1003845d0a31aeaf26d
Facebook Political Action SQL Injection
Posted Jul 20, 2010
Authored by Inj3ct0r

The Facebook Political Action application suffers from a remote SQL injection vulnerability that can in turn result in a full shell.

tags | exploit, remote, shell, sql injection
SHA-256 | 82c14ab9c9953a579378b5653467e8fbada6cb78c2bb527ce3aa13b46d034d50
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close