exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 84 RSS Feed

Files Date: 2009-11-18 to 2009-11-19

phpMyBackupPro 2.1 File Download
Posted Nov 18, 2009
Authored by Amol Naik

phpMyBackupPro version 2.1 suffers from an arbitrary file download vulnerability.

tags | exploit, arbitrary
SHA-256 | a1d12fd445417e31812006bbfbd2138773e1cac3a3125503023d695a029a3b50
Simplog 0.9.3.2 XSS / XSRF
Posted Nov 18, 2009
Authored by Amol Naik

Simplog version 0.9.3.2 suffers from cross site scripting and cross site request forgery vulnerabilities.

tags | exploit, vulnerability, xss, csrf
SHA-256 | 686e77bda149b90c5d645944c9bd2384b7cf6a98c67742ce60202344b0902e81
Secunia Security Advisory 37399
Posted Nov 18, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for openssl. This fixes a vulnerability, which can be exploited by malicious people to manipulate certain data.

tags | advisory
systems | linux, suse
SHA-256 | cbe7ad4b723a086f979e7a6b457de8e00ac4e8d6cb42097fc6df8d3f1d9142d6
Secunia Security Advisory 37374
Posted Nov 18, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for gnutls13 and gnutls26. This fixes a weakness and a vulnerability, which can be exploited by malicious people to conduct spoofing attacks.

tags | advisory, spoof
systems | linux, debian
SHA-256 | 6a5dab222a1a2c7e5a0a11921b34f302dd99a96e3ea60ca00c2f9a5fb665e2ec
Secunia Security Advisory 37376
Posted Nov 18, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Dami

tags | advisory, denial of service
SHA-256 | 29733bc2ac113b994222be20259695f7bf17cfc7e2c2ed73671be42515f2ab50
Secunia Security Advisory 37386
Posted Nov 18, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued updates for sun-jre-bin, sun-jdk, blackdown-jre, blackdown-jdk, and emul-linux-x86-java. These fix some vulnerabilities, where some have unknown impacts and others can be exploited by malicious people to bypass certain security restrictions, disclose system information or potentially sensitive information, cause a DoS (Denial of Service), or compromise a vulnerable system.

tags | advisory, java, denial of service, x86, vulnerability
systems | linux, gentoo
SHA-256 | 9b60b4ac062ab84ee8330763c5117acdab6435a6e3bc7d1587c6571794b24219
Secunia Security Advisory 37350
Posted Nov 18, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for libgd2. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise an application using the library.

tags | advisory, denial of service, vulnerability
systems | linux, debian
SHA-256 | dc9d0a62a19c1f43653452e96ffaadc6189a446c28d68ebc3bee6497037bda5d
Secunia Security Advisory 37398
Posted Nov 18, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Heurs has discovered a vulnerability in Kaspersky Anti-Virus 2010, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local, virus
SHA-256 | f1ef10529a5f49e2f7ef9544d5f6c1df788143bcc94f1c6806793d3dec00085f
Secunia Security Advisory 37391
Posted Nov 18, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in telepark.wiki, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, disclose sensitive information, and compromise a vulnerable system.

tags | advisory, vulnerability, xss
SHA-256 | 3a484107043c9121edbc2f4af30d75d1c21d22999b021e09dd57c539a5f34267
Secunia Security Advisory 37401
Posted Nov 18, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some security issues have been reported in Kolab Server, which can potentially be exploited by malware to bypass certain security restrictions.

tags | advisory
SHA-256 | 8b798e4780df83fc059193d6004fa593a8e6454042ba0e4dfa4a3c0466f28177
Secunia Security Advisory 37390
Posted Nov 18, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Warcraft III: The Frozen Throne, which can be exploited by malicious people to potentially compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 8b0315151a0e41e2b714c61ebe21136d55a04c0c4a95335592a5f4ab58b36c7d
Secunia Security Advisory 37405
Posted Nov 18, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for wordpress. This fixes a security issue and a vulnerability, which can be exploited by malicious users to conduct script insertion attacks or compromise a vulnerable system.

tags | advisory
systems | linux, fedora
SHA-256 | 323548ecb2a3941388efd67d666ccde63d2431e6956c7ebe32ad4808c8aa88d5
Secunia Security Advisory 37406
Posted Nov 18, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for proftpd. This fixes a security issue, which can be exploited by malicious people to conduct spoofing attacks.

tags | advisory, spoof
systems | linux, fedora
SHA-256 | 5420632da5cdc39c0480b0363e2062db3e7f0156b632b55ead1e122a6613680b
Secunia Security Advisory 37364
Posted Nov 18, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in CUPS, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | ab19ebd9abfe82b554b09206639d62ca124b121ff3584f95b147e8212af5d897
Secunia Security Advisory 37400
Posted Nov 18, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the JoomClip component for Joomla, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 01253e932ee742b07b693f1a07c487a1bdad89402b4d0ae94187f699a190601f
Secunia Security Advisory 37360
Posted Nov 18, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for cups. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks and cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability, xss
systems | linux, redhat
SHA-256 | a1d5cd01aa0aa64d06b97126127ebc20afea92152f40e625e326f62c4570caaf
Secunia Security Advisory 37404
Posted Nov 18, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for the kernel. This fixes a vulnerability, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and potentially gain escalated privileges.

tags | advisory, denial of service, kernel, local
systems | linux, redhat
SHA-256 | 47ea7aff3e05c6b55a2392772171131009ae8ee84023632942a4d2107cd6b849
Secunia Security Advisory 37407
Posted Nov 18, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for the kernel. This fixes a vulnerability, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and potentially gain escalated privileges.

tags | advisory, denial of service, kernel, local
systems | linux, redhat
SHA-256 | 52959e55c5db7a321e4e7c158cbf0c70ecfe1c081178ce1187a44188974a7e79
Stack-based Overflows - Direct RET Overwrite
Posted Nov 18, 2009
Authored by Peter Van Eeckhoutte | Site corelan.be

Stack-based Overflows - Direct RET Overwrite. Part 1 of a series of tutorials.

tags | paper, overflow
SHA-256 | 8ca17fbe972fe2670a4950cf97e9fb154efaeba35f227c0d136feab1054cf8c5
Using Debuggers To Speed Up Exploit Development
Posted Nov 18, 2009
Authored by Peter Van Eeckhoutte | Site corelan.be

Using Debuggers To Speed Up Exploit Development. Part 5 of a series of tutorials.

tags | paper
SHA-256 | e917003add60abc8ffd870016a12e0956b32a5bdd97c4af93305b8388efbba3b
Bypassing Stack Cookies, Safeseh, NX/DEP and ASLR
Posted Nov 18, 2009
Authored by Peter Van Eeckhoutte | Site corelan.be

Bypassing Stack Cookies, Safeseh, NX/DEP and ASLR. Part 6 in a series of tutorials.

tags | paper
SHA-256 | d23c878ce0cc8394726c1d3cec3455c3f755ac70f67be4d89c07099e66c85c35
Writing Stack Based Unicode Exploits
Posted Nov 18, 2009
Authored by Peter Van Eeckhoutte | Site corelan.be

Write Stack-based Unicode Exploits. Part 7 in a series of tutorials.

tags | paper
SHA-256 | ccc6ae8cd26e700f1db01f23de24c0057fff244a5bf62512e40319ed13ad73b8
Writing Metasploit Exploits
Posted Nov 18, 2009
Authored by Peter Van Eeckhoutte | Site corelan.be

Writing Metasploit Exploits. Part 4 of a series of tutorials.

tags | paper
SHA-256 | 4f35582e40e8ba81571fb876591f36beb1b8fb8f897d6ad0fd4de688ee8f9bf8
Stack-based Overflows - SEH Part 2
Posted Nov 18, 2009
Authored by Peter Van Eeckhoutte | Site corelan.be

Stack-based Overflows - SEH Part 2. Part 4 of a series of tutorials.

tags | paper, overflow
SHA-256 | c8bfc324ac9d3102b34ed905acc1a8edf5ac83a585f5ed09a203fabdea11c052
Jumping To Shellcode
Posted Nov 18, 2009
Authored by Peter Van Eeckhoutte | Site corelan.be

Writing Buffer Overflow Exploits - Jumping To Shellcode. Part 2 of a series of tutorials.

tags | paper, overflow, shellcode
SHA-256 | a3e5d693ce518f2bcbd5625546b9bbb8dc6b4e4215c5ad5912d132ed467f8024
Page 2 of 4
Back1234Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close