exploit the possibilities
Showing 1 - 25 of 38 RSS Feed

Files Date: 2010-05-08

Mandriva Linux Security Advisory 2010-093
Posted May 8, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-093 - A vulnerability was discovered in mysql which would permit mysql users without any kind of privileges to use the UNINSTALL PLUGIN function. A problem was discovered in the mysqld init script which under certain circumstances could cause the service to exit too quickly, giving the [ OK ] status and before the mysql server was really started and bound to the mysql socket or IP address. This caused a problem for products like Pulse2. The corrected packages solves these problems.

tags | advisory
systems | linux, mandriva
MD5 | 1e9905996e268c86c6282248257bf991
CMS Made Simple Cross Site Scripting
Posted May 8, 2010
Authored by Hanno Boeck | Site hboeck.de

CMS Made Simple versions 1.7.0 and below suffer from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2010-1482
MD5 | 480ad2827d9c90ecc0c20a0b82857006
Pmwiki Cross Site Scripting
Posted May 8, 2010
Authored by Hanno Boeck | Site hboeck.de

Pmwiki suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2010-1481
MD5 | e5158fbff504a99aee511439b4e117c5
Consona Cross Site Scripting / Code Execution / Buffer Overflow
Posted May 8, 2010
Authored by Ruben Santamarta | Site wintercore.com

Consona products uses a proprietary ActiveX site-lock mechanism that can be defeated through XSS attacks. Once an attacker can inject arbitrary JS code within the context of an allowed domain, unsafe methods can invoked to download and execute arbitrary binaries. A local privilege escalation flaw discovered in the Consona's Repair Service can be used to bypass IE8 Protected Mode, thus gaining SYSTEM privileges.

tags | advisory, arbitrary, local, activex
MD5 | fc7e35986eaf8367ccb3508e1a2dd010
Jaws 0.8.12 Cross Site Scripting
Posted May 8, 2010
Authored by High-Tech Bridge SA | Site htbridge.com

Jaws version 0.8.12 suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 7e23672533fe25b69753b9622d309446
ECShop 2.7.2 SQL Injection
Posted May 8, 2010
Authored by Liscker

ECShop version 2.7.2 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 472528c99bd31f67c4c058e49e8c0661
AgentX++ Master AgentX::receive_agentx Stack Buffer Overflow
Posted May 8, 2010
Authored by jduck | Site metasploit.com

This exploits a stack buffer overflow in the AgentX++ library, as used by various applications. By sending a specially crafted request, an attacker can execute arbitrary code, potentially with SYSTEM privileges. This Metasploit module was tested successfully against master.exe as included with Real Network\\'s Helix Server v12. When installed as a service with Helix Server, the service runs as SYSTEM, has no recovery action, but will start automatically on boot. This Metasploit module does not work with NX/XD enabled but could be modified easily to do so. The address

tags | exploit, overflow, arbitrary
advisories | CVE-2010-1318
MD5 | cdba212357d08cbd896fe9918209b238
JBoss Java Class DeploymentFileRepository Directory Traversal
Posted May 8, 2010
Authored by MC | Site metasploit.com

This Metasploit module exploits a directory traversal vulnerability in the DeploymentFileRepository class in JBoss Application Server (jbossas) 3.2.4 through 4.0.5. This vulnerability allows remote authenticated (and unauthenticated) users to read or modify arbitrary files, and possibly execute arbitrary code.

tags | exploit, remote, arbitrary
advisories | CVE-2006-5750
MD5 | 839402ed8449cb061f1c1ba837cdfd69
OpenX banner-edit.php File Upload PHP Code Execution
Posted May 8, 2010
Authored by jduck | Site metasploit.com

This Metasploit module exploits a vulnerability in the OpenX advertising software. In versions prior to version 2.8.2, authenticated users can upload files with arbitrary extensions to be used as banner creative content. By uploading a file with a PHP extension, an attacker can execute arbitrary PHP code. NOTE: The file must also return either "png", "gif", or "jpeg" as its image type as returned from the PHP getimagesize() function.

tags | exploit, arbitrary, php
advisories | CVE-2009-4098
MD5 | e42c76a052945a31434e621876ad7db4
Secunia Security Advisory 39670
Posted May 8, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Apple Safari, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | apple
MD5 | c1fce79008192a689719d10be4eccea1
Secunia Security Advisory 39698
Posted May 8, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Hanno Boeck has discovered a vulnerability in PmWiki, which can be exploited by malicious people to conduct script insertion attacks.

tags | advisory
MD5 | 27456f85ff100e5af32ca54d24683e2f
Secunia Security Advisory 39751
Posted May 8, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in the Consona SdcUser.TgConCtl ActiveX control, which potentially can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability, activex
MD5 | a467e6f1457fedbddeefa80b3e2fb520
Secunia Security Advisory 39721
Posted May 8, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Baofeng Storm, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | b4abf59cdb13947bbb5e40c7f2dc2873
Secunia Security Advisory 39648
Posted May 8, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Tex Live, which can potentially be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
MD5 | 0179711463caea3ae1a8ffef9f3a6845
Secunia Security Advisory 39742
Posted May 8, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for the kernel. This fixes some vulnerabilities, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and disclose potentially sensitive information and by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, kernel, local, vulnerability
systems | linux, suse
MD5 | 3a77feb16bd9bf70a732cda7b7dac0bb
Secunia Security Advisory 39722
Posted May 8, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in HP Mercury LoadRunner Agent, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | b88d6c9d67a0abf5da40be81334ac9b6
Secunia Security Advisory 39727
Posted May 8, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in VMware View, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | 131e00c6eb46070501d747f053fafc3f
Secunia Security Advisory 39657
Posted May 8, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for tetex. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system.

tags | advisory, denial of service, vulnerability
systems | linux, redhat
MD5 | 0135d7e8f52fb243be176c7045e3d3a4
Secunia Security Advisory 39726
Posted May 8, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for iscsitarget. This fixes multiple vulnerabilities which can be exploited by malicious users to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
systems | linux, debian
MD5 | c54368ebecfd5a71d72a8381f5e62739
Secunia Security Advisory 39641
Posted May 8, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for sahana. This fixes a security issue, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
systems | linux, fedora
MD5 | edabbae0ef76a61966b94aa81be439be
Secunia Security Advisory 39750
Posted May 8, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for tetex. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system.

tags | advisory, denial of service, vulnerability
systems | linux, redhat
MD5 | 4c45b6c68937877e2622c4b81d47021d
Secunia Security Advisory 39719
Posted May 8, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in AV Arcade Pro, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | 045c35aadb19b4c556c1a6c5c5104b78
Secunia Security Advisory 39749
Posted May 8, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for tetex. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system.

tags | advisory, denial of service, vulnerability
systems | linux, redhat
MD5 | a5a077b4ca791743136bec92e2c86712
Secunia Security Advisory 39725
Posted May 8, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for dvipng. This fixes some vulnerabilities, which can potentially be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
systems | linux, ubuntu
MD5 | e22e0c95cc41072caedd0e446c0f3541
Secunia Security Advisory 39734
Posted May 8, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Avaya has acknowledged a security issue in curl included in Avaya products, which can potentially be exploited by malicious people to cause a DoS (Denial of Service) or compromise an application using the library.

tags | advisory, denial of service
MD5 | 31971975075a4f898c6948559496e1fd
Page 1 of 2
Back12Next

File Archive:

February 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    1 Files
  • 2
    Feb 2nd
    2 Files
  • 3
    Feb 3rd
    17 Files
  • 4
    Feb 4th
    15 Files
  • 5
    Feb 5th
    24 Files
  • 6
    Feb 6th
    16 Files
  • 7
    Feb 7th
    19 Files
  • 8
    Feb 8th
    2 Files
  • 9
    Feb 9th
    2 Files
  • 10
    Feb 10th
    15 Files
  • 11
    Feb 11th
    20 Files
  • 12
    Feb 12th
    16 Files
  • 13
    Feb 13th
    19 Files
  • 14
    Feb 14th
    17 Files
  • 15
    Feb 15th
    4 Files
  • 16
    Feb 16th
    4 Files
  • 17
    Feb 17th
    34 Files
  • 18
    Feb 18th
    15 Files
  • 19
    Feb 19th
    20 Files
  • 20
    Feb 20th
    0 Files
  • 21
    Feb 21st
    0 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files
  • 29
    Feb 29th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close