exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 18 of 18 RSS Feed

Files Date: 2008-11-21

Digital Defense VRT Advisory 2008.15
Posted Nov 21, 2008
Authored by Digital Defense, Corey LeBleu, r@b13$ | Site digitaldefense.net

The iPhone Configuration Web Utility 1.0 for Windows web interface is vulnerable to a common web directory traversal attack. Successful exploitation will result in arbitrary read-onlyfile access outside of the iPhone Configuration Web Utility 1.0 web root.

tags | advisory, web, arbitrary, root
systems | windows, apple, iphone
SHA-256 | 7ce5fcd314e35e70c977c9545e1d933f9a4885f0dd88693baff62488638736c9
joomlathyme-sql.txt
Posted Nov 21, 2008
Authored by Ded MustD!e | Site antichat.ru

The Joomla Thyme component version 1.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 44a23879a445714e52f164727ed831dffe4b92c3327d5f099d33b2a99e0ad589
BitDefenderDOS.zip
Posted Nov 21, 2008
Authored by ProTeuS

Proof of concept malicious pdf file that causes a denial of service and infinite loop in BitDefender using the pdf.xmd module.

tags | exploit, denial of service, proof of concept
SHA-256 | 4ced9e8886aa327fe602ddddd9c060b647df11c513eef885e318f6ef01931aa1
Fwknop Port Knocking Utility
Posted Nov 21, 2008
Authored by Michael Rash | Site cipherdyne.org

fwknop implements an authorization scheme that requires only a single encrypted packet to communicate various pieces of information, including desired access through a Netfilter policy and/or specific commands to execute on the target system. The main application of this program is to protect services such as SSH with an additional layer of security in order to make the exploitation of vulnerabilities much more difficult. The authorization server works by passively monitoring authorization packets via libpcap.

Changes: Added support to fwknop for the Linux 'any' interface. Added support for interfacing fwknop with third party software through the addition of three new variables in the access.conf file. Various other fixes and additions.
tags | tool, scanner, vulnerability
systems | unix
SHA-256 | 5aff527da9609ee49281d1ed5966d462e0ac99a728ad2fd9d3550456bdc9e1e9
Secunia Security Advisory 32801
Posted Nov 21, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in EMC Control Center SAN Manager, which can be exploited by malicious people to disclose potentially sensitive information or compromise a vulnerable system.

tags | advisory, vulnerability
SHA-256 | ba895956874869dfdf00232a63da9db78a75f76519600b2498de5ce7d54758bc
Secunia Security Advisory 32828
Posted Nov 21, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Vahid Ezraeil has reported a vulnerability in Softbiz Classifieds Script, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 90c22d815506901658cc93dd8721827f55920491d3728019ea1e4245e0a08f24
Secunia Security Advisory 32763
Posted Nov 21, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in IBM Workplace Content Management, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | 79c295b9d7e672477dfc2711df8dd0857faaae68d610af3a543341c8f5f3751c
Secunia Security Advisory 32812
Posted Nov 21, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Avaya has acknowledged a vulnerability in Avaya CMS, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 6dfe1bcd3e574de4c2e617e3ee450fc765dee709c1fb0f0725a092e70c726f1b
Secunia Security Advisory 32728
Posted Nov 21, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Tim Brown and Mark Lowe have reported a vulnerability in Checkpoint VPN-1 products, which can be exploited by malicious people to disclose certain system information.

tags | advisory
SHA-256 | af008982d4cdafa37f892409c68fa7f27de5d19f7d478071e6e0e67193da0b47
Secunia Security Advisory 32830
Posted Nov 21, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in xt:Commerce, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 3a16a0099a07d277942e9dc57853e7c5e2ebde50b96f222dbb605cc48b3ff52b
Secunia Security Advisory 32789
Posted Nov 21, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - ProTeuS has discovered a vulnerability in BitDefender Antivirus, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise a vulnerable system.

tags | advisory, denial of service
SHA-256 | d37ed0ff373ed3d5f72a8921d8f3c6e1dd8a892eb1d1aac5c5aa6cf6d9890625
Secunia Security Advisory 32786
Posted Nov 21, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for thunderbird. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, to disclose sensitive information, or to potentially compromise a user's system.

tags | advisory, vulnerability
systems | linux, fedora
SHA-256 | 57358b57aa8046f17a9eda26c5c21c70830e1143e62abb4edd5ad70fe33c3134
kvirc-exec.txt
Posted Nov 21, 2008
Authored by Nine:Situations:Group | Site retrogod.altervista.org

KVIrc version 3.4.2 Shiny URI handler remote code execution exploit.

tags | exploit, remote, code execution
SHA-256 | 89b1d00a68667e48c628f01355698055de8bcea96d730e26057639c0970fabe3
vcalendar-disclose.txt
Posted Nov 21, 2008
Authored by Swan

VCalendar suffers from a remote database disclosure vulnerability.

tags | exploit, remote, info disclosure
SHA-256 | 45cacb6669fc1d5e521d3abbd86982f6330224e0ebd4d43db25a8d11c60ac1fc
Secunia Security Advisory 32822
Posted Nov 21, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - d3v1l has reported some vulnerabilities in Easyedit CMS, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, vulnerability, sql injection
SHA-256 | b29eb0e1957a45503e4480d2159b7a4860492b4c39bf5b3a34c8076a2f42d719
Secunia Security Advisory 32722
Posted Nov 21, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in SemanticScuttle, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | 375608d372de994d4ba415e89ab8c1179308d84b59027de706f346461dca9a56
Secunia Security Advisory 32782
Posted Nov 21, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Mx has reported a vulnerability in vBulletin, which can be exploited by malicious people to conduct script insertion attacks.

tags | advisory
SHA-256 | 1462f4c76dda25bc37377a494a6b7fa72cee15123ed463310571062e1bf24965
Secunia Security Advisory 32756
Posted Nov 21, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some weaknesses, security issues, and vulnerabilities have been reported in Apple iPhone and iPod touch, which can be exploited by malicious people to bypass certain security restrictions, disclose potential sensitive information, conduct spoofing attacks, to cause a DoS (Denial of Service), or potentially compromise a user's system.

tags | advisory, denial of service, spoof, vulnerability
systems | apple, iphone
SHA-256 | 88c5064fadc55a6865c14f82be8c894fafad40ffebb9c81324b415fb51bee430
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close