what you don't know can hurt you
Showing 1 - 25 of 53 RSS Feed

Files Date: 2009-09-24

Regental Medien Blind SQL Injection
Posted Sep 24, 2009
Authored by NoGe

Regental Medien suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | f377587b180934342430ad4480995318
FSphp 0.2.1 Remote File Inclusion
Posted Sep 24, 2009
Authored by NoGe

FSphp version 0.2.1 suffers from remote file inclusion vulnerabilities.

tags | exploit, remote, vulnerability, code execution, file inclusion
MD5 | 0126ae83b540df6c721c18ecf50e1da5
Joomla Fastball SQL Injection
Posted Sep 24, 2009
Authored by kaMtiEz | Site indonesiancoder.com

Joomla Fastball component versions 1.1.0 through 1.2 suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 797ba9a389b14f055b847fad7039cec6
IRC Bot For Mac OS X
Posted Sep 24, 2009
Authored by r-22

Tsunami IRC Bot for Mac OS X. Supports easy addition of new command, changing of options, server information, and more.

systems | apple, osx
MD5 | ce1cf28a5384c80a86808e31dba8f900
Debian Linux Security Advisory 1895-1
Posted Sep 24, 2009
Authored by Debian | Site debian.org

Debian Security Advisory 1895-1 - Several vulnerabilities have been discovered in the xmltooling packages, as used by Shibboleth. Chris Ries discovered that decoding a crafted URL leads to a crash (and potentially, arbitrary code execution). Ian Young discovered that embedded NUL characters in certificate names were not correctly handled, exposing configurations using PKIX trust validation to impersonation attacks. Incorrect processing of SAML metadata ignores key usage constraints. This minor issue also needs a correction in the opensaml2 packages, which will be provided in an upcoming stable point release (and, before that, via stable-proposed-updates).

tags | advisory, arbitrary, vulnerability, code execution
systems | linux, debian
MD5 | dba30c5387674fa70ae8cc5ee9ec9f79
Sun Solaris 10 RPC dmispd Remote Resource Consumption
Posted Sep 24, 2009
Authored by Jeremy Brown | Site jbrownsec.blogspot.com

Sun Solaris 10 RPC dmispd remote resource consumption exploit.

tags | exploit, remote
systems | solaris
MD5 | 0c55290aef1615ae088553d9e0b248e8
Swiss Mango CMS SQL Injection
Posted Sep 24, 2009
Authored by kaMtiEz | Site indonesiancoder.com

Swiss Mango CMS suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 2354fb6adca68dc589ecec6b9846d0bc
E107 Referer Cross Site Scripting
Posted Sep 24, 2009
Authored by MustLive

E107 suffers from a referer header cross site scripting vulnerability.

tags | exploit, xss
MD5 | c85751f31a7de51dd7b2314129fd3cdb
MindSculpt CMS SQL Injection
Posted Sep 24, 2009
Authored by kaMtiEz | Site indonesiancoder.com

MindSculpt's CMS system suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | b6289d42bd89b2d20286d66c55a2ecdc
html2ps 1.0 beta5 File Disclosure
Posted Sep 24, 2009
Authored by epiphant

html2ps versions 1.0 beta5 and below suffer from an arbitrary file disclosure vulnerability.

tags | exploit, arbitrary, info disclosure
MD5 | b0a6ad44d22aa21f315013155384063a
Black Hat Briefings DC 2010 Call For Papers
Posted Sep 24, 2009
Site blackhat.com

The Black Hat Briefings DC Call for Papers is now open. It will be held February 2nd through the 3rd, 2010 at the Hyatt Regency Crystal City in Washington D.C.

tags | paper, conference
MD5 | 7dd80f84f219594b2b2489af5fc36fe3
Mandriva Linux Security Advisory 2009-245
Posted Sep 24, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-245 - The g_file_copy function in glib 2.0 sets the permissions of a target file to the permissions of a symbolic link (777), which allows user-assisted local users to modify files of other users, as demonstrated by using Nautilus to modify the permissions of the user home directory. This update provides a solution to this vulnerability.

tags | advisory, local
systems | linux, mandriva
advisories | CVE-2009-3289
MD5 | 3ebbd722a56cf2f933b4e50e0b71cec2
Debian Linux Security Advisory 1894-1
Posted Sep 24, 2009
Authored by Debian | Site debian.org

Debian Security Advisory 1894-1 - Miroslav Lichvar discovered that newt, a windowing toolkit, is prone to a buffer overflow in the content processing code, which can lead to the execution of arbitrary code.

tags | advisory, overflow, arbitrary
systems | linux, debian
advisories | CVE-2009-2905
MD5 | 44dd3c474a31a7fd75b512d93fb3c351
Ubuntu Security Notice 837-1
Posted Sep 24, 2009
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice USN-837-1 - Miroslav Lichvar discovered that Newt incorrectly handled rendering in a text box. An attacker could exploit this and cause a denial of service or possibly execute arbitrary code with the privileges of the user invoking the program.

tags | advisory, denial of service, arbitrary
systems | linux, ubuntu
advisories | CVE-2009-2905
MD5 | f1a51ebbeec56a03a600b9082ca17282
Secunia Security Advisory 36867
Posted Sep 24, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in OSSIM, which can be exploited by malicious users to conduct SQL injection attacks, and by malicious people to disclose potentially sensitive information and conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss, sql injection
MD5 | bd16c67f5c3b9db3368f3abd99291bd2
Secunia Security Advisory 36840
Posted Sep 24, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red hat has issued an update for cyrus-imapd. This fixes some vulnerabilities which can be exploited by malicious users to cause a DoS (Denial of Service) or compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
systems | linux, redhat
MD5 | 0ef3d69b11b0b325415eafb7e92e05df
Secunia Security Advisory 36846
Posted Sep 24, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for cyrus-imapd-2.2 and kolab-cyrus-imapd. This fixes some vulnerabilities, which can be exploited by malicious users to cause a DoS (Denial of Service) or compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
systems | linux, debian
MD5 | 92611d270f4b13e5032a0cc5f1bf649a
Secunia Security Advisory 36842
Posted Sep 24, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for dovecot. This fixes some vulnerabilities, which can be exploited by malicious users to cause a DoS (Denial of Service) or compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
systems | linux, debian
MD5 | b4563f374ee6a2f7db94007203195f21
Secunia Security Advisory 36849
Posted Sep 24, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in IBM Lotus Connections, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | d8e9feb966aacad3f9cd294124b1a262
Secunia Security Advisory 36848
Posted Sep 24, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Tupinambis component for Joomla, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
MD5 | 50527b470e806f865be2fcb5a8760ac4
Secunia Security Advisory 36864
Posted Sep 24, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for xmp. This fixes some vulnerabilities, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
systems | linux, fedora
MD5 | e037b3acdede6a98babbc59a5ec944e1
Secunia Security Advisory 36858
Posted Sep 24, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Giuseppe Bonfa has discovered a vulnerability in avast! Home/Professional, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or gain escalated privileges.

tags | advisory, denial of service, local
MD5 | a553bb5b52c5fd2cf9e9675a4145af45
Secunia Security Advisory 36841
Posted Sep 24, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Meta tags module for Drupal, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
MD5 | 0c5865e55c1c4dd880de3aae6f28d3d8
Secunia Security Advisory 36859
Posted Sep 24, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Devel module for Drupal, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory
MD5 | 64881090a47ec45d31a0b0c795b42484
Secunia Security Advisory 36822
Posted Sep 24, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Sun Solaris, which can be exploited by malicious, local users to bypass certain security restrictions or gain escalated privileges.

tags | advisory, local
systems | solaris
MD5 | a9d2ba280fc15e17172c09e51f8dc0ef
Page 1 of 3
Back123Next

File Archive:

April 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    17 Files
  • 2
    Apr 2nd
    2 Files
  • 3
    Apr 3rd
    2 Files
  • 4
    Apr 4th
    0 Files
  • 5
    Apr 5th
    15 Files
  • 6
    Apr 6th
    15 Files
  • 7
    Apr 7th
    20 Files
  • 8
    Apr 8th
    16 Files
  • 9
    Apr 9th
    5 Files
  • 10
    Apr 10th
    0 Files
  • 11
    Apr 11th
    0 Files
  • 12
    Apr 12th
    4 Files
  • 13
    Apr 13th
    8 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    0 Files
  • 16
    Apr 16th
    0 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close