exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 49 of 49 RSS Feed

Files Date: 2009-11-05 to 2009-11-06

Secunia Security Advisory 37290
Posted Nov 5, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Organic Groups Vocabulary module for Drupal, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory
SHA-256 | a0e0a8989ecabb90849430e7a1d6538f1bc7cc069d95245e2756d853e10ed639
Secunia Security Advisory 37289
Posted Nov 5, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Link module for Drupal, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory
SHA-256 | b6ec0f76b60d82afdd3f8fc19a4321987ad561ef2b305f5851b8b46b299fe911
Secunia Security Advisory 37287
Posted Nov 5, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in the NGP COO/CWP Integration module for Drupal, which can be exploited by malicious users to conduct script insertion attacks and by malicious people to bypass certain security restrictions.

tags | advisory, vulnerability
SHA-256 | ce6d09d3ff01177132960a3319854b9bf91c35aba5b0a855feae2ba4fd87c434
Secunia Security Advisory 37263
Posted Nov 5, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Zoomify module for Drupal, which can be exploited by malicious people to conduct script insertion attacks.

tags | advisory
SHA-256 | fba108c4cf9032780d39f646f8423c18614e81c2d9bb6f74fb08c933d567d638
Secunia Security Advisory 37262
Posted Nov 5, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some security issues have been reported in Joomla!, which can be exploited by malicious people to disclose version information and by malicious users to manipulate certain data.

tags | advisory
SHA-256 | cbe3a143f3481bc7c1567c10c135d7054f762eb564efd5a942c8854a0ff0932e
Secunia Security Advisory 37224
Posted Nov 5, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in Sun Solaris, which can be exploited by malicious people with physical access to the system to potentially bypass certain security restrictions.

tags | advisory
systems | solaris
SHA-256 | 1af325ce2179c5b333867b62ac520d158f6b940a0891052666268326ba5e39d3
Secunia Security Advisory 37215
Posted Nov 5, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for wget. This fixes a vulnerability, which can be exploited by malicious people to conduct spoofing attacks.

tags | advisory, spoof
systems | linux, redhat
SHA-256 | ee569c52ed3b667daa5e94f50cfbfb0d97931cf4c5f6a8d337d0b8a1ca52934c
Secunia Security Advisory 37248
Posted Nov 5, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in Sun Solaris, which can be exploited by malicious people with physical access to the system to potentially bypass certain security restrictions.

tags | advisory
systems | solaris
SHA-256 | 2ae4e8c99cbed146a0fae37a404b3b7b950c5beb2f0ab27998c08d918a0cedd5
Secunia Security Advisory 37240
Posted Nov 5, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in e-Courier CMS, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 0a6022cb6b3c38a3ba150f5d4fa4ed45c68f3408bb3241b872d1de60397595cf
Secunia Security Advisory 37207
Posted Nov 5, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Brett Gervasoni has reported a vulnerability in SafeNet SoftRemote, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 2b14c1158cc4fa12b20e26e25c349210683bcca40bb773e249afc9c661aa91ff
Secunia Security Advisory 37247
Posted Nov 5, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sun has acknowledged some vulnerabilities in Adobe Reader in Solaris, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
systems | solaris
SHA-256 | 620d16e663e425bb65672bfbd3bad0f735e07f6edb28ed064a817a79dbec4ec5
Secunia Security Advisory 37237
Posted Nov 5, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Shibboleth Identity and Service Provider, which can be exploited by malicious people to conduct cross-site scripting and potentially script insertion attacks.

tags | advisory, xss
SHA-256 | 32f5a692b233401969ef1bae78e92622bc16e7144383857c5365a3aa4be13d6f
Secunia Security Advisory 37249
Posted Nov 5, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Sun Solaris, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | solaris
SHA-256 | c4be10786c39dca0386bb3cda67f296e030434044cf2e1fd37f59710290075a5
Secunia Security Advisory 37235
Posted Nov 5, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in RoundCube Webmail, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, vulnerability, csrf
SHA-256 | 5340395caf4e3fcfa5c195022996531f9c4094a3e7421f159ac8ada57d553707
Cosminexus XML Processor Denial Of Service
Posted Nov 5, 2009
Site hitachi.co.jp

The Cosminexus XML processor suffers from a remote denial of service vulnerability when receiving an invalid SOAP message.

tags | advisory, remote, denial of service
SHA-256 | 69bee83c0ee9e888ce02c4291882f7a5428cc4b4f0eac82f075ca86f3638b428
Asterisk Project Security Advisory - AST-2009-009
Posted Nov 5, 2009
Authored by Joshua Colp | Site asterisk.org

Asterisk Project Security Advisory - Asterisk includes a demonstration AJAX based manager interface, ajamdemo.html which uses the prototype.js framework. An issue was uncovered in this framework which could allow someone to execute a cross-site AJAX request exploit.

tags | advisory
advisories | CVE-2008-7220
SHA-256 | e86a0ecb6a897bcb9f1220e85d46af735a82bc2ef2a6208e6cc14a3c6f4996dd
Asterisk Project Security Advisory - AST-2009-008
Posted Nov 5, 2009
Authored by Joshua Colp | Site asterisk.org

Asterisk Project Security Advisory - It is possible to determine if a peer with a specific name is configured in Asterisk by sending a specially crafted REGISTER message twice. The username that is to be checked is put in the user portion of the URI in the To header. A bogus non-matching value is put into the username portion of the Digest in the Authorization header. If the peer does exist the second REGISTER will receive a response of "403 Authentication user name does not match account name". If the peer does not exist the response will be "404 Not Found" if alwaysauthreject is disabled and "401 Unauthorized" if alwaysauthreject is enabled.

tags | advisory
SHA-256 | 3634bc8c6b1fcdae106d21b04636f67125dbeb10fda75b29b1244e3e1cd34bf0
Mozilla Firefox Data Theft
Posted Nov 5, 2009
Authored by Paul Stone | Site contextis.co.uk

Mozilla Firefox versions 3.5 and 3.0 suffer from an autocomplete data theft vulnerability.

tags | advisory
advisories | CVE-2009-3370
SHA-256 | 55e951518276dc7c097f9bba03ab3a9f677c0997fa82a607138edb31bf240c43
Debian Linux Security Advisory 1926-1
Posted Nov 5, 2009
Authored by Debian | Site debian.org

Debian Linux Security Advisory 1926-1 - Several remote vulnerabilities have been discovered in the TYPO3 web content management framework.

tags | advisory, remote, web, vulnerability
systems | linux, debian
advisories | CVE-2009-3628, CVE-2009-3629, CVE-2009-3630, CVE-2009-3631, CVE-2009-3632, CVE-2009-3633, CVE-2009-3634, CVE-2009-3635, CVE-2009-3636
SHA-256 | a31da610926d6e1e3800b5a2eddeca9b7395185a3fe5bb747d8d316e7fc0b2fc
Malformation's Interactive HTTP GET And POST Shell
Posted Nov 5, 2009
Authored by Malformation

This is Malformation's Interactive HTTP GET and POST Shell.

tags | tool, web, shell, rootkit
systems | unix
SHA-256 | d304cf274bb961d977a885e60060650ec032a74412bac078d3ca8f7b72aa5c21
Endonesia 8.4 CMS Local File Inclusion
Posted Nov 5, 2009
Authored by s4r4d0

Endonesia CMS version 8.4 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 89621b89898413d59ea39f85e6729a2d083b27dc0c2fc6ed0f2be4d1ce94654f
IBM Tivoli Storage Manager CAD Service Buffer Overflow
Posted Nov 5, 2009
Authored by Dyon Balding | Site secunia.com

Secunia Research has discovered a vulnerability in IBM Tivoli Storage Manager Client, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused by an input validation error in the CAD service. This can be exploited to cause a stack-based buffer overflow by sending a specially crafted packet via TCP. Successful exploitation allows execution of arbitrary code. IBM Tivoli Storage Manager Express Client version 5.3.6.2 is affected.

tags | advisory, overflow, arbitrary, tcp
advisories | CVE-2008-4826
SHA-256 | d162501f8a502894ddca76f531d423886089eb16e3f1abdd39eaa04d684d2343
Portili Personal And Team Wiki Disclosure / XSS / Execution
Posted Nov 5, 2009
Authored by Abysssec | Site abysssec.com

The Portili Personal and Team Wiki versions 1.14 and below suffer from cross site scripting, shell upload, and information and password disclosure vulnerabilities.

tags | exploit, shell, vulnerability, xss
SHA-256 | 47dd3f2d94b415af5fadfbaec383af1cb38fb562ed107c7ef39cfdc841ff5874
Adobe Shockwave Player Code Execution
Posted Nov 5, 2009
Authored by Nicolas Joly | Site vupen.com

Multiple code execution vulnerabilities have been discovered in the Adobe Shockwave Player. Versions 11.5.1.601 and below are affected.

tags | advisory, vulnerability, code execution
advisories | CVE-2009-3463, CVE-2009-3464, CVE-2009-3465, CVE-2009-3466
SHA-256 | 551711ee8bc2dbf403137d959930ea96fa8074b6018fb3d13dd477357426dd00
Page 2 of 2
Back12Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    17 Files
  • 21
    May 21st
    18 Files
  • 22
    May 22nd
    7 Files
  • 23
    May 23rd
    111 Files
  • 24
    May 24th
    27 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    6 Files
  • 28
    May 28th
    12 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close