exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 38 RSS Feed

Files Date: 2010-03-30

Secunia Security Advisory 39189
Posted Mar 30, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue and a vulnerability have been reported in VMware Server, which can be exploited by malicious people to bypass certain security restrictions or conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 3beb0f7269ccbb53f649ae93f11e50c2910881fdb2ddb9dc6de801d24ac4ce9a
Secunia Security Advisory 39172
Posted Mar 30, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in VMware Server, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory
SHA-256 | fd0d0dc0417806100a92315f58f4ecdd3baa996121f0d8061e4b35edbb846edd
Secunia Security Advisory 39181
Posted Mar 30, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for trac. This fixes a security issue, which can be exploited by malicious users to bypass certain security restrictions.

tags | advisory
systems | linux, fedora
SHA-256 | 60b3bd88e578e0d3bb22cffa19d6b918d88ed7257ec8da883a7dff9df5b98477
Secunia Security Advisory 39197
Posted Mar 30, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in VMware ESX and VMware VirtualCenter, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | 64a80a74f89d85064c9c3e0e5a9d613b455aa5c69a9f2c95e4dafbd91a2a97a8
Secunia Security Advisory 39151
Posted Mar 30, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Francis Provencher has reported a vulnerability in Novell NetWare, which can be exploited by malicious users to potentially compromise a vulnerable system.

tags | advisory
SHA-256 | 56eb2a5db63978409c40f98025e306a44b173dc3c3b8474b068cb2af7ccac85e
Secunia Security Advisory 39123
Posted Mar 30, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in Trac, which can be exploited by malicious users to bypass certain security restrictions.

tags | advisory
SHA-256 | c4c7b3e24381895d7e261af918bf579d5629305d6e189b8e29e928c4f4ad1cd0
Secunia Security Advisory 38918
Posted Mar 30, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered a vulnerability in ViewVC, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 4c0290cccd6d977b55ee3fd63aa502287122880b7918d11ab566be8db0ae1ce9
Secunia Security Advisory 39158
Posted Mar 30, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Apple has issued a security update for Mac OS X, which fixes multiple vulnerabilities.

tags | advisory, vulnerability
systems | apple, osx
SHA-256 | 437f928c889c59d64ab9a1a05daa640576e9f922257ec7cb9eebcf87e3c571f5
Secunia Security Advisory 39170
Posted Mar 30, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in OneCMS, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
SHA-256 | 2b1906574730b06e0deebc5ad3b20ef86d8e90ee78e16b4cc3469759f0ebd12b
Secunia Security Advisory 39140
Posted Mar 30, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in IBM WebSphere Application Server, which can be exploited by malicious users to disclose potentially sensitive information and cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
SHA-256 | 1d6fc595aac0ce9e86a9de0c58a50480350cb65143d8941ccfd097c9ca614399
Secunia Security Advisory 39187
Posted Mar 30, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in HP SOA Registry Foundation, which can be exploited by malicious users to gain escalated privileges and by malicious people to conduct cross-site scripting attacks and bypass certain security restrictions.

tags | advisory, registry, vulnerability, xss
SHA-256 | 1612622b14a877fed699f4406f0eefb5e0ea84611779fe95a94b3aa2afd705d4
Secunia Security Advisory 39159
Posted Mar 30, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Intel Active Management Technology SDK, which can be exploited by malicious people to compromise an application using the development kit.

tags | advisory
SHA-256 | 247b1dd87b25cec4b547cd6aa43bc1f9559e2ff0de21cf5d8eca4224a38eb8a2
Secunia Security Advisory 39182
Posted Mar 30, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for openssh. This fixes a security issue, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | linux, fedora
SHA-256 | 9a5e2d9b141ea11509061e76cfec1c638879072e16eca63adf95435af7c5d87b
Secunia Security Advisory 39171
Posted Mar 30, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in VMware ESX, which can be exploited by malicious people to disclose sensitive information and by malicious users to conduct script insertion attacks.

tags | advisory, vulnerability
SHA-256 | 1b51884d413e5bcab710a55cd9408bf315d647739936efe917f6e8ea7d4725d7
Secunia Security Advisory 39179
Posted Mar 30, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for maniadrive. This fixes some vulnerabilities, which can be exploited by malicious users to bypass certain security restrictions.

tags | advisory, vulnerability
systems | linux, fedora
SHA-256 | bfea94c45e40ad011d46c9704997ebe120a3afb3967a849d0e621e3969727ec5
Secunia Security Advisory 39150
Posted Mar 30, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Lukas Lueg has reported a vulnerability in Aircrack-ng, which can be exploited by malicious people to potentially compromise a user's system.

tags | advisory
SHA-256 | c5ddfa2397efe27b5454e433e372f04be5b7fa3691c8519f28ae69f478340a12
Secunia Security Advisory 39155
Posted Mar 30, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for emacs22 and emacs23. This fixes a security issue, which can be exploited by malicious, local users to perform certain actions with escalated privileges.

tags | advisory, local
systems | linux, ubuntu
SHA-256 | dbd5792b045fa5566e980f9fc295dadf7ece6099ad421b0b23c3babf32650583
Asset Integrity Manager
Posted Mar 30, 2010
Authored by Beenu Arora | Site code.google.com

The Asset Integrity Manager (AIM) application was designed to detect rootkits on various UNIX flavors and has the capability to organize client/asset information.

tags | tool
systems | unix
SHA-256 | 199467057a58b28783d9fefd4511406a80f9c8d29d602109a0632ff37b780727
Ubuntu Security Notice 919-1
Posted Mar 30, 2010
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 919-1 - Dan Rosenberg discovered that the email helper in Emacs did not correctly check file permissions. A local attacker could perform a symlink race to read or append to another user's mailbox if it was stored under a group-writable group-"mail" directory.

tags | advisory, local
systems | linux, ubuntu
advisories | CVE-2010-0825
SHA-256 | c16d9a06cf865b85e75b47ee6aaea763de817d1884db165e3a02730f2585896c
Botan C++ Crypto Algorithms Library 1.9.5
Posted Mar 30, 2010
Site botan.randombit.net

Botan is a C++ library of cryptographic algorithms, including AES, DES, SHA-1, RSA, DSA, Diffie-Hellman, and many others. It also supports X.509 certificates and CRLs, and PKCS #10 certificate requests, and has a high level filter/pipe message processing system. The library is easily portable to most systems and compilers, and includes a substantial tutorial and API reference.

Changes: This release offers numerous optimizations for the elliptic curve algorithms, and especially for ECDSA. Various small fixes to the GOST 34.10-2001 signature scheme have been made for compatibility with the version included in recent versions of OpenSSL. A compilation problem on FreeBSD was also fixed.
tags | library
SHA-256 | 9fd5050696ec10be11fd2543fdd5bc75165ade537d7875278e04f402a140eea3
ASP Comersus7F Shopping Cart Database Disclosure
Posted Mar 30, 2010
Authored by indoushka

ASP Comersus7F Shopping Cart suffers from a database disclosure vulnerability.

tags | exploit, asp, info disclosure
SHA-256 | f329299b7a543108afdc126da75e2e2c935be8430bbc13c85c1d95f1b3a1fc94
Easy Page Cross Site Scripting
Posted Mar 30, 2010
Authored by Pouya Daneshmand

Easy Page suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 3d0e4eb618caceb7a05eebb0fd603c7cc93d96a3b9a75e37d33aeaf1003b8cd6
PHP 5.3.2 Weak Random Number Generator
Posted Mar 30, 2010
Authored by Andreas Bogk

PHP versions 5.3.2 and below utilize a cryptographically weak random number generator to produce session ID information. Additionally, not enough entropy is used for the initial seeding of the RNG, and some of the entropy can leak by careless use of the uniqid() PHP function. Under certain circumstances, these individual weaknesses interact and reduce the number of possible values of a PHP session ID so much that exhaustive search for a valid session ID against the web server becomes feasible.

tags | advisory, web, php
SHA-256 | 8c84b573c1249141276869a59ae2230ce6a6572c58b5967a58370265274695f6
Joomla Xmap SQL Injection
Posted Mar 30, 2010
Authored by Pouya Daneshmand

The Joomla Xmap component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | a2c881ed75bffa97fc8d2e64d5e8c0bc6705faa9be17070b2890678e5c19640f
Joomla Weblinks SQL Injection
Posted Mar 30, 2010
Authored by Pouya Daneshmand

The Joomla Weblinks component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | f7abed5b1e3fc9c469ec4bc657f6e4ea67b816feadd281b8d1527b94009557eb
Page 1 of 2
Back12Next

File Archive:

December 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    2 Files
  • 2
    Dec 2nd
    12 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close