Exploit the possiblities
Showing 1 - 25 of 70 RSS Feed

Files Date: 2009-05-27

Mandriva Linux Security Advisory 2009-123
Posted May 27, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-123 - src/tools/pkcs11-tool.c in pkcs11-tool in OpenSC 0.11.7, when used with unspecified third-party PKCS#11 modules, generates RSA keys with incorrect public exponents, which allows attackers to read the cleartext form of messages that were intended to be encrypted. The updated packages fix the issue.

tags | advisory
systems | linux, mandriva
advisories | CVE-2009-1603
MD5 | 7b7e53e8636e5e793ec38d2f590cb7bf
SEH Buffer Overflows Explained
Posted May 27, 2009
Authored by SecurityRules | Site sec-r1z.com

Whitepaper called Buffer Overflow Exploitation SEH Explained. Written in Arabic.

tags | paper, overflow
MD5 | 5daa553305b96fa44098f45720353971
Understanding SQL Injection
Posted May 27, 2009
Authored by k4m1k451

Whitepaper called Understanding SQL Injection. Written in Portuguese.

tags | paper, sql injection
MD5 | 9a48f599510d430bf04f7b2827cfd6a0
Gentoo Linux Security Advisory 200905-9
Posted May 27, 2009
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200905-09 - Multiple heap-based buffer overflow vulnerabilities in libsndfile might allow remote attackers to execute arbitrary code. Versions less than 1.0.20 are affected.

tags | advisory, remote, overflow, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2009-1788, CVE-2009-1791
MD5 | 7134e8cb4cd0c27549f12a001482fbc7
HP Security Bulletin HPSBUX02429 SSRT090058
Posted May 27, 2009
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin - Potential security vulnerabilities have been identified in Java Runtime Environment (JRE) and Java Developer Kit (JDK) running on HP-UX. These vulnerabilities could allow remote unauthorized access, privilege escalation, execution of arbitrary code, and Denial of Service (DoS).

tags | advisory, java, remote, denial of service, arbitrary, vulnerability
systems | hpux
advisories | CVE-2009-1093, CVE-2009-1094, CVE-2009-1095, CVE-2009-1096, CVE-2009-1097, CVE-2009-1098, CVE-2009-1099, CVE-2009-1100, CVE-2009-1101, CVE-2009-1102, CVE-2009-1103, CVE-2009-1104, CVE-2009-1105, CVE-2009-1106, CVE-2009-1107
MD5 | 57540a6a513d759be71ea1267c3919db
Kismet Wireless Tool
Posted May 27, 2009
Authored by Mike Kershaw | Site kismetwireless.net

Kismet is an 802.11 layer 2 wireless network sniffer. It can sniff 802.11b, 802.11a, and 802.11g traffic. It is capable of sniffing using almost any wireless card supported in Linux, which currently divide into cards handled by libpcap and the Linux-Wireless extensions (such as Cisco Aironet), and cards supported by the Wlan-NG project which use the Prism/2 chipset (such as Linksys, Dlink, and Zoom). Besides Linux, Kismet also supports FreeBSD, OpenBSD and Mac OS X systems. Features Multiple packet capture sources, Runtime network sorting by AP MAC address (bssid), IP block detection via ARP and DHCP packet dissection, Cisco product detection via CDP, Ethereal and tcpdump compatible file logging, Airsnort-compatible "interesting" (cryptographically weak) logging, Secure SUID behavior, GPS devices and wireless devices fingerprinting. Kismet also includes a tool called gpsmap that can be used to create maps from logged GPS data.

Changes: This release has a single bugfix for a parsing error in generating the command line to launch the Kismet server from inside the UI.
tags | tool, wireless
systems | cisco, linux, freebsd, openbsd, apple, osx
MD5 | a1898ed387a0484b0ee84fb412c3ba82
strongSwan IPsec / IKEv1 / IKEv2 Implementation For Linux
Posted May 27, 2009
Authored by Andreas Steffen | Site strongswan.org

strongSwan is a complete IPsec and IKEv1 implementation for Linux 2.4 and 2.6 kernels. It interoperates with most other IPsec-based VPN products. It is a descendant of the discontinued FreeS/WAN project. The focus of the strongSwan project is on strong authentication mechanisms using X.509 public key certificates and optional secure storage of private keys on smartcards through a standardized PKCS#11 interface. A unique feature is the use of X.509 attribute certificates to implement advanced access control schemes based on group memberships.

Changes: This release fixes two DoS vulnerabilities in the charon daemon that were discovered by fuzzing techniques. A couple of bugs caused by the massive 4.3.0 refactoring were fixed.
tags | kernel, encryption
systems | linux
MD5 | fce2982bdd002c666afb5fc69e68060c
AdPeeps 8.5d1 Cross Site Scripting
Posted May 27, 2009
Authored by intern0t

AdPeeps version 8.5d1 suffers from cross site scripting and HTML injection vulnerabilities.

tags | exploit, vulnerability, xss
MD5 | 8626e73850ae667047d9d42da7838f5e
Evernew Free Joke Script 1.2 SQL Injection
Posted May 27, 2009
Authored by taRentReXx

Evernew Free Joke Script version 1.2 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | cef5fb6e5c78bdf0efe4eacbc80d4d1b
SiteX 0.7.4.418 Local File Inclusion
Posted May 27, 2009
Authored by ahmadbady

SiteX versions 0.7.4.418 and below suffer from local file inclusion vulnerabilities.

tags | exploit, local, vulnerability, file inclusion
MD5 | 82ed168b791b4a9073c9a1c2d46c0838
Vanilla 1.1.7 Cross Site Scripting
Posted May 27, 2009
Authored by Attila Gerendi

Vanilla version 1.1.7 suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 9566c74d4f1cda3be4421831c0dc8e36
PHP-Nuke 8.0 SQL Injection
Posted May 27, 2009
Authored by Attila Gerendi

PHP-Nuke version 8.0 suffers from a REFERER related SQL injection vulnerability.

tags | exploit, php, sql injection
MD5 | e36014ecc8d013471d40dd73b7eac4e2
Easy Px 41 CMS Local File Inclusion
Posted May 27, 2009
Authored by ThE g0bL!N | Site h4ckf0ru.com

Easy Px 41 CMS version 09.00.00B1 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
MD5 | fce54d2bd31222bd803e98632d355c8c
Joomla AgoraGroup 0.3.5.3 SQL Injection
Posted May 27, 2009
Authored by Chip D3 Bi0s

The Joomla AgoraGroup component version 0.3.5.3 suffers from a blind SQL injection vulnerability.

tags | exploit, sql injection
MD5 | ca6b5eb5e3de1082bff7ac0b83e6e1bc
Million Dollar Text Links 1.x Insecure Cookie
Posted May 27, 2009
Authored by HxH

Million Dollar Text Links version 1.x suffers from an insecure cookie handling vulnerability.

tags | exploit, insecure cookie handling
MD5 | c5159665b29be5422918ad1478323e4d
Secunia Security Advisory 35244
Posted May 27, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in the WP-Lytebox plugin for WordPress, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
MD5 | f52ab161604348b8b19c4cb6408b2715
Secunia Security Advisory 35216
Posted May 27, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Tielei Wang has discovered a vulnerability in ImageMagick, which can be exploited by malicious people to potentially compromise a user's system.

tags | advisory
MD5 | d7eaf15428113e7f404cfcfbff2602ea
Secunia Security Advisory 35195
Posted May 27, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - pyrokinesis has discovered a vulnerability in jetAudio, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | b9dfbbc7559ce8b11b0d77640989e755
Secunia Security Advisory 35237
Posted May 27, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been discovered in RoomPHPlanning, which can be exploited by malicious people to bypass certain security restrictions and conduct SQL injection attacks.

tags | advisory, vulnerability, sql injection
MD5 | 48fca89b004dd483c07cc217e34604c6
Secunia Security Advisory 35245
Posted May 27, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - staker has discovered a vulnerability in cpCommerce, which can be exploited by malicious people to disclose sensitive information or compromise a vulnerable system.

tags | advisory
MD5 | 254d8a19ae28e5b2ecfee65bb21294c8
Secunia Security Advisory 35240
Posted May 27, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Hot or Not Script, which can be exploited by malicious people to bypass certain security restrictions, disclose sensitive information, or to compromise a vulnerable system.

tags | advisory, vulnerability
MD5 | 14edf45bad01c260b4e053f24e126eea
Secunia Security Advisory 35227
Posted May 27, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - KiM has discovered a vulnerability in WebMember, which can be exploited by malicious users to conduct SQL injection attacks.

tags | advisory, sql injection
MD5 | ba7d2b17c0b4c14ec753b50f8a4f86cd
Secunia Security Advisory 35189
Posted May 27, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Serena Dimensions CM, which can be exploited by malicious people to conduct spoofing attacks.

tags | advisory, spoof
MD5 | abe91f29bd37fb4bff916abefdc631f9
Secunia Security Advisory 35246
Posted May 27, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Mole Group Adult Portal Script, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
MD5 | 5e9a94a1d662de757454470b76522c5a
Secunia Security Advisory 35208
Posted May 27, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Hakxer has reported some vulnerabilities in Zeeways PhotoVideoTube, which can be exploited by malicious people to bypass certain security restrictions or conduct script insertion attacks and by malicious users to potentially to compromise a vulnerable system.

tags | advisory, vulnerability
MD5 | 79aade216ffb68ef80e30e20cd7b157d
Page 1 of 3
Back123Next

File Archive:

November 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    22 Files
  • 2
    Nov 2nd
    28 Files
  • 3
    Nov 3rd
    10 Files
  • 4
    Nov 4th
    1 Files
  • 5
    Nov 5th
    5 Files
  • 6
    Nov 6th
    15 Files
  • 7
    Nov 7th
    15 Files
  • 8
    Nov 8th
    13 Files
  • 9
    Nov 9th
    9 Files
  • 10
    Nov 10th
    9 Files
  • 11
    Nov 11th
    3 Files
  • 12
    Nov 12th
    2 Files
  • 13
    Nov 13th
    15 Files
  • 14
    Nov 14th
    17 Files
  • 15
    Nov 15th
    19 Files
  • 16
    Nov 16th
    15 Files
  • 17
    Nov 17th
    12 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close