exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 40 RSS Feed

Files Date: 2008-11-13

shatter-change.txt
Posted Nov 13, 2008
Authored by Esteban Martinez Fayo | Site appsecinc.com

Team SHATTER Security Advisory - The PL/SQL package DBMS_CDC_PUBLISH owned by SYS has an instance of SQL Injection in the ALTER_AUTOLOG_CHANGE_SOURCE procedure. A malicious user can call the vulnerable procedure of this package with specially crafted parameters and execute SQL statements with the elevated privileges of the SYS user. Any Oracle database user with EXECUTE privilege on the package SYS.DBMS_CDC_PUBLISH can exploit this vulnerability. By default, users granted EXECUTE_CATALOG_ROLE have the required privilege. Exploitation of this vulnerability allows an attacker to execute SQL commands with SYS privileges.

tags | advisory, sql injection
advisories | CVE-2008-3995
SHA-256 | 6d9859110fa4472ae5c8c80e514c0e87d667d0dfdda497fbb7603deb6b05266d
MultiInjectorV0.3.tar.gz
Posted Nov 13, 2008
Authored by Raviv Raz | Site chaptersinwebsecurity.blogspot.com

MultiInjector is an automatic SQL injection utility. It uses a list of URI addresses to test parameter manipulation. Once a vulnerable parameter has been found, a signature-evasive SQL injection is performed in order to achieve arbitrary OS command execution and automatic defacement on database server. Written in Python.

tags | tool, arbitrary, scanner, sql injection, python
systems | unix
SHA-256 | d0a2c499695030d18ad21ebc9dc3a13ab00abc17a9f29a9fcee08ef33b253a06
shatter-internal.txt
Posted Nov 13, 2008
Authored by Esteban Martinez Fayo | Site appsecinc.com

Team SHATTER Security Advisory - The PL/SQL package DBMS_CDC_IPUBLISH owned by SYS has an instance of SQL Injection in the ALTER_HOTLOG_INTERNAL_CSOURCE procedure. A malicious user can call the vulnerable procedure of this package with specially crafted parameters and execute SQL statements with the elevated privileges of the SYS user. Any Oracle database user with EXECUTE privilege on the package SYS.DBMS_CDC_IPUBLISH can exploit this vulnerability. By default, users granted EXECUTE_CATALOG_ROLE have the required privilege. Exploitation of this vulnerability allows an attacker to execute SQL commands with SYS privileges.

tags | advisory, sql injection
advisories | CVE-2008-3996
SHA-256 | 82c4d19734c2c52a47749dc7aec61838a254cb0150ca211870aef6a151c901dc
Mandriva Linux Security Advisory 2008-227
Posted Nov 13, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - Martin von Gagern found a flow in how GnuTLS versions 1.2.4 up until 2.6.1 verified certificate chains provided by a server. A malicious server could use this flaw to spoof its identity by tricking client applications that used the GnuTLS library to trust invalid certificates. The updated packages have been patched to correct this issue.

tags | advisory, spoof
systems | linux, mandriva
advisories | CVE-2008-4989
SHA-256 | 0111abeb08bb42e780b644937c300f302aebebda1a1f47a4e9b45a5b6d908d34
webhostdir-insecure.txt
Posted Nov 13, 2008
Authored by G4N0K

turnkeyforms Web Hosting Directory suffers from an arbitrary database backup and insecure cookie handling vulnerabilities.

tags | exploit, web, arbitrary, vulnerability, insecure cookie handling
SHA-256 | 9fcf56cd23d0c4c7d1ab66150d90b2e0a76ea7e2f69d2b35cd0ddbc4a8e96a5b
localclassifieds-bypass.txt
Posted Nov 13, 2008
Authored by G4N0K

turnkeyforms Local Classifieds suffers from a direct access vulnerability that allow for authentication bypass.

tags | exploit, local, bypass
SHA-256 | 613e114fc711e1d9398d8caa531f82dc7a07171665630fa66baf46289d11416a
Secunia Security Advisory 32635
Posted Nov 13, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - hkm has reported a vulnerability in Siemens SpeedStream 5200, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | e79afa633fe8a133bf24a71f209d6dc6fa5eeea8cdb10f2856fac10073065410
Secunia Security Advisory 32644
Posted Nov 13, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - G4N0K has reported some vulnerabilities in TurnkeyForms Web Hosting Directory, which can be exploited by malicious people to bypass certain security restrictions and disclose sensitive information.

tags | advisory, web, vulnerability
SHA-256 | 00a797e6e27b082b074e5c18a9ff42a59b63fc8d486c869ff84bbc25e0e162b4
Secunia Security Advisory 32647
Posted Nov 13, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Hussin X has reported a vulnerability in PozScripts Business Directory Script, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 6c169ecab27647d113043042a1cdac3b431a5f02cd15e708d358aab71e8c2ee0
Secunia Security Advisory 32660
Posted Nov 13, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - ZoRLu has reported a vulnerability in AlstraSoft Web Host Directory, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, web, sql injection
SHA-256 | e0c412659a6f170fe41ac5f4252df72cd9cace0983a6b078c945b262ea1f5859
Secunia Security Advisory 32665
Posted Nov 13, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - ZoRLu has reported a vulnerability in AlstraSoft Article Manager Pro, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 2d3fe8f87a687538eb1c70d28c84e7aacf52959e351aeb117833e015767bbb09
Secunia Security Advisory 32666
Posted Nov 13, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - ZoRLu has reported a vulnerability in AlstraSoft SendIt Pro, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 99d33a6224b2261f49186950d598dd6f597f6022425f2e58b162e54433480555
Secunia Security Advisory 32670
Posted Nov 13, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Sun Java System Messaging Server, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, java, xss
SHA-256 | 1e51c4983fbf393653aac7889249bf3c2d4122af23d7995746d4a6c9ae6e22f0
Secunia Security Advisory 32674
Posted Nov 13, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Sun Logical Domains (LDoms), which can be exploited by malicious, local users to bypass certain security restrictions.

tags | advisory, local
SHA-256 | 8e7e6acf4ef04fd55ecfa9f275c4ffc90cba9d0c2243a9bae7bc1e3aed34bd04
Secunia Security Advisory 32678
Posted Nov 13, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for libcdaudio. This fixes a vulnerability, which can be exploited by malicious people to compromise an application using the library.

tags | advisory
systems | linux, debian
SHA-256 | a03ab4fa4dec08574ffda8353e50a661d92a17f3e66627133ff43702e4a63fe4
Secunia Security Advisory 32685
Posted Nov 13, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for httpd. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks or potentially cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability, xss
systems | linux, redhat
SHA-256 | 39588f0dc1c22a7c78bd6664caa3d2b7edf02d70468ad276d450da7cda801396
Secunia Security Advisory 32689
Posted Nov 13, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in TYPO3, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 44db94178634e3d7071e9a098bb0761dc09f98164e2bc8fbdb252a4745a87c4d
Secunia Security Advisory 32691
Posted Nov 13, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for gnome-screensaver. This fixes a weakness and a security issue, which can be exploited by malicious people with physical access to disclose potentially sensitive information or bypass certain security restrictions.

tags | advisory
systems | linux, ubuntu
SHA-256 | 51327509f5ba9243d3c2974d48e636e27bc30cfe919fdff952aeb299548403c9
Secunia Security Advisory 32693
Posted Nov 13, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Mozilla Firefox, which can be exploited by malicious people to disclose sensitive information, bypass certain security restrictions, or compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 755c2a29759d50db7ddb5bbd7eb751b7dd46664d18ada3481cc638b1d273b333
Secunia Security Advisory 32694
Posted Nov 13, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for seamonkey. This fixes some vulnerabilities, which can be exploited by malicious people to disclose sensitive information, bypass certain security restrictions, or compromise a user's system.

tags | advisory, vulnerability
systems | linux, redhat
SHA-256 | f3fa36071fff1ab033fc4d3858e02b08dbcd5aa28e1271682d857e0f502a4cda
Secunia Security Advisory 32695
Posted Nov 13, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for firefox. This fixes some vulnerabilities, which can be exploited by malicious people to disclose sensitive information, bypass certain security restrictions, or compromise a user's system.

tags | advisory, vulnerability
systems | linux, redhat
SHA-256 | 3cb6e0ef94c432240c33bf47a35d812cc4caeb403084ad144f8d6c55a81e5a22
Secunia Security Advisory 32712
Posted Nov 13, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in HP Service Manager, which can be exploited by malicious users to bypass certain security restrictions.

tags | advisory
SHA-256 | fa496af570c2f434b9f9e0ff25607b0ce0f3d1eed4fa438ca298d5becf139d01
Secunia Security Advisory 32713
Posted Nov 13, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Mozilla Firefox, which can be exploited by malicious people to disclose sensitive information, bypass certain security restrictions, or compromise a user's system.

tags | advisory, vulnerability
SHA-256 | a406b40f699b94c6d054447153afa387487220cc2a19a864e9ae9d112d5e8d77
Secunia Security Advisory 32715
Posted Nov 13, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Mozilla Thunderbird, which can be exploited by malicious people to disclose sensitive information, bypass certain security restrictions, or compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 12002f79e2f5e3572aceb0148357919d2b071bf341a7f02aa8ab6f64843a067a
Secunia Security Advisory 32701
Posted Nov 13, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for blender. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | linux, fedora
SHA-256 | d86975fe073de20b06d1abcf320d14cdd4acf57eb2e7b96090a7d2675f39a24e
Page 1 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close