exploit the possibilities
Showing 1 - 25 of 39 RSS Feed

Files Date: 2010-03-11

Debian Linux Security Advisory 2013-1
Posted Mar 11, 2010
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2013-1 - Nahuel Grisolia discovered two vulnerabilities in Egroupware, a web-based may lead to the execution of arbitrary commands and a cross-site scripting vulnerability was discovered in the login page.

tags | advisory, web, arbitrary, vulnerability, xss
systems | linux, debian
MD5 | 97f5f98b2702c940fec433fe369eccb6
Mandriva Linux Security Advisory 2010-061
Posted Mar 11, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-061 - sutil/ncpumount.c in ncpumount in ncpfs 2.2.6 produces certain detailed error messages about the results of privileged file-access attempts, which allows local users to determine the existence of arbitrary files via the mountpoint name. The (1) ncpmount, (2) ncpumount, and (3) ncplogin programs in ncpfs 2.2.6 do not properly create lock files, which allows local users to cause a denial of service (application failure) via unspecified vectors that trigger the creation of a /etc/mtab~ file that persists after the program exits. Packages for 2008.0 are provided for Corporate Desktop 2008.0 customers. The updated packages have been patched to correct these issues.

tags | advisory, denial of service, arbitrary, local
systems | linux, mandriva
advisories | CVE-2010-0790, CVE-2010-0791
MD5 | 8eddb3ad2d5d24403b0b99e52c566d3b
Zero Day Initiative Advisory 10-027
Posted Mar 11, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-027 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Skype. User interaction is required to exploit this vulnerability in that the target must visit a malicious page. The specific flaw exists with how the OS web-browser passes command line arguments to Skype through the registered 'skype:' protocol handler. Insufficient sanity checking to the /datapath argument allows an attacker to construct a link that will execute Skype with arbitrary arguments. This can be abused to specify a remote configuration storage directory which can be leveraged to glean target user credentials.

tags | advisory, remote, web, arbitrary, protocol
MD5 | a5b3d84df1886a5f304313233a95f00f
Zero Day Initiative Advisory 10-028
Posted Mar 11, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-028 - This vulnerability allows remote attackers to remove arbitrary XML files on vulnerable installations of Skype. User interaction is required to exploit this vulnerability in that the target must visit a malicious page. The specific flaw exists in Skype's handling of the 'skype-plugin:' protocol. An attacker can specify a malicious URI, that upon clicking, will trigger the deletion of an arbitrary attacker specified XML file.

tags | advisory, remote, arbitrary, protocol
MD5 | 793f05951ab9ec0a9302555f95d6603b
Eros Erotik Webkatalog SQL Injection
Posted Mar 11, 2010
Authored by Easy Laster

Eros Erotik Webkatalog suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | ae621f66ffcba455b27d5cdf9ad07b63
ATutor 1.6.4 Cross Site Scripting
Posted Mar 11, 2010
Authored by ItSecTeam

ATutor version 1.6.4 suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 6eb8260401fb838bd22c79acf9a71cd6
Skype URI Handler Input Validation
Posted Mar 11, 2010
Authored by Paul Craig | Site security-assessment.com

Skype client versions prior to 4.2.0.1.55 suffer from a URI handling input validation vulnerability that allows for remote command execution.

tags | exploit, remote
MD5 | 0a20a3178c435cdde8c2ce8645f77c7b
Internet Explorer "Aurora" Memory Corruption
Posted Mar 11, 2010
Site metasploit.com

This Metasploit module exploits a memory corruption flaw in Internet Explorer. This flaw was found in the wild and was a key component of the "Operation Aurora" attacks that lead to the compromise of a number of high profile companies. The exploit code is a direct port of the public sample published to the Wepawet malware analysis site. The technique used by this module is currently identical to the public sample, as such, only Internet Explorer 6 can be reliably exploited.

tags | exploit
advisories | CVE-2010-0249
MD5 | e10bb1dd4089bb4b0d4a689573918f4d
Secunia Security Advisory 38869
Posted Mar 11, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in GNU Cpio, which can potentially be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | b5859201523a8e5d7cbab59c20865850
Secunia Security Advisory 38836
Posted Mar 11, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in GNU tar, which can potentially be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | 18529c218f89e5e1eec1eecdc6972cac
ANE CMS 1 Cross Site Request Forgery
Posted Mar 11, 2010
Authored by Pratul Agrawal

ANE CMS version 1 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
MD5 | 75931499966409c4e4d5bd37b38f2270
ANE CMS 1 Cross Site Scripting
Posted Mar 11, 2010
Authored by Pratul Agrawal

ANE CMS version 1 suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | baaa652f16f1938c75702a9aace1a1d5
Ubuntu Security Notice 909-1
Posted Mar 11, 2010
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 909-1 - William Grant discovered that dpkg-source did not safely apply diffs when unpacking source packages. If a user or an automated system were tricked into unpacking a specially crafted source package, a remote attacker could modify files outside the target unpack directory, leading to a denial of service or potentially gaining access to the system.

tags | advisory, remote, denial of service
systems | linux, ubuntu
advisories | CVE-2010-0396
MD5 | 7d4e4c416e8850722bfebfb1f166c1df
Abton CMS SQL Injection
Posted Mar 11, 2010
Authored by MustLive

Abton CMS suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 52f6b36dba1fbd3b137ebb090d43ddf1
Secunia Security Advisory 38908
Posted Mar 11, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Paul Craig has reported a vulnerability in Skype, which can be exploited by malicious people to bypass certain security restrictions and potentially disclose certain sensitive information.

tags | advisory
MD5 | 2e748a1e142c0cd6cc4d2a72269dd953
Secunia Security Advisory 38885
Posted Mar 11, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for apache2. This fixes multiple vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information and cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | linux, ubuntu
MD5 | 654e7c4fc552478dd5075c96e0f15664
Secunia Security Advisory 38911
Posted Mar 11, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Monthly Archive by Node Type module for Drupal, which can be exploited by malicious users to bypass certain security restrictions.

tags | advisory
MD5 | 5de3fc4356f4ee014bcbc91d5a31287f
Secunia Security Advisory 38904
Posted Mar 11, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in ispCP Omega, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | 0a5ebf9cdaa4ff55d5e168866bd115b9
Debian Linux Security Advisory 2011-1
Posted Mar 11, 2010
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2011-1 - William Grant discovered that the dpkg-source component of dpkg, the low-level infrastructure for handling the installation and removal of Debian software packages, is vulnerable to path traversal attacks. A specially crafted Debian source package can lead to file modification outside of the destination directory when extracting the package content.

tags | advisory
systems | linux, debian
advisories | CVE-2010-0396
MD5 | c4b2f418358eb264d4bb4d72a3b63d6a
Secunia Security Advisory 38864
Posted Mar 11, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Campsite, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
MD5 | 78b74be16fb4775504bc35f2ced36cf6
Secunia Security Advisory 38916
Posted Mar 11, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - edu has discovered a vulnerability in Microsoft Windows, which can be exploited by malicious people to potentially compromise a user's system.

tags | advisory
systems | windows
MD5 | dbb12f39abc5b43dcedf4c15523c5e09
Secunia Security Advisory 38907
Posted Mar 11, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for dpkg. This fixes a vulnerability, which can be exploited by malicious people to manipulate certain data and compromise a vulnerable system.

tags | advisory
systems | linux, debian
MD5 | 5712eae5a1e40502ab174dfe780180e5
Secunia Security Advisory 38895
Posted Mar 11, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been discovered in ViewVC, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
MD5 | d8137b02179855927803793f3eacc015
Secunia Security Advisory 38917
Posted Mar 11, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Luka Milkovic has reported some vulnerabilities in SUPERAntiSpyware, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or gain escalated privileges.

tags | advisory, denial of service, local, vulnerability
MD5 | 69735b522df2d7b127193ea0d926a03d
Secunia Security Advisory 38884
Posted Mar 11, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Luka Milkovic has reported some vulnerabilities in Super Ad Blocker, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or gain escalated privileges.

tags | advisory, denial of service, local, vulnerability
MD5 | 0a1fda5c82cfc3748298c7bb1049105e
Page 1 of 2
Back12Next

File Archive:

July 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    34 Files
  • 2
    Jul 2nd
    15 Files
  • 3
    Jul 3rd
    9 Files
  • 4
    Jul 4th
    8 Files
  • 5
    Jul 5th
    2 Files
  • 6
    Jul 6th
    3 Files
  • 7
    Jul 7th
    1 Files
  • 8
    Jul 8th
    15 Files
  • 9
    Jul 9th
    15 Files
  • 10
    Jul 10th
    20 Files
  • 11
    Jul 11th
    17 Files
  • 12
    Jul 12th
    16 Files
  • 13
    Jul 13th
    2 Files
  • 14
    Jul 14th
    1 Files
  • 15
    Jul 15th
    20 Files
  • 16
    Jul 16th
    27 Files
  • 17
    Jul 17th
    7 Files
  • 18
    Jul 18th
    5 Files
  • 19
    Jul 19th
    12 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close