Exploit the possiblities
Showing 1 - 25 of 82 RSS Feed

Files Date: 2010-05-19

Joomla Packages SQL Injection
Posted May 19, 2010
Authored by Kernel Security Group

The Joomla Packages component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | ce324317a88a4d701d8ba3d9e26ebbea
DB[CMS] 2.01 SQL Injection
Posted May 19, 2010
Authored by Pokeng

DB[CMS] version 2.01 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | a4024506daa72787afc7ec4644c6d1dd
Ubuntu Security Notice 939-1
Posted May 19, 2010
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 939-1 - L. Minier discovered that xvfb-run did not correctly keep the X.org session cookie private. A local attacker could gain access to any local sessions started by xvfb-run. Ubuntu 9.10 was not affected. It was discovered that the X.org server did not correctly handle certain calculations. A remote attacker could exploit this to crash the X.org session or possibly run arbitrary code with root privileges.

tags | advisory, remote, arbitrary, local, root
systems | linux, ubuntu
advisories | CVE-2009-1573, CVE-2010-1166
MD5 | 5f4cfbaa5c61fe46c05c45fe1ac3ec6e
Mandriva Linux Security Advisory 2010-099
Posted May 19, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-099 - This advisory updates wireshark to the latest version(s), fixing several bugs and one security issue. The DOCSIS dissector in Wireshark 0.9.6 through 1.0.12 and 1.2.0 through 1.2.7 allows user-assisted remote attackers to cause a denial of service (application crash) via a malformed packet trace file.

tags | advisory, remote, denial of service
systems | linux, mandriva
advisories | CVE-2010-1455
MD5 | 5814c3bbaaa3971fe1f32f6aa9686bd8
Shopzilla Affiliate Script Cross Site Scripting
Posted May 19, 2010
Authored by Andrea Bocchetti

Shopzilla Affiliate Script suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 61bc89e1429fd519bc1bc04ad8c2ef92
GSS-API Library Null Pointer Dereference
Posted May 19, 2010
Site web.mit.edu

MIT krb5 Security Advisory 2010-005 - Certain invalid GSS-API tokens can cause a GSS-API acceptor (server) to crash due to a null pointer dereference in the GSS-API library. This is an implementation vulnerability in MIT krb5, and not a vulnerability in the Kerberos protocol.

tags | advisory, protocol
advisories | CVE-2010-1321
MD5 | 42d9ccf5f12c483da2fcceaa94f67481
TeamViewer 5.0.8232 Buffer Overflow
Posted May 19, 2010
Authored by fl0 fl0w

TeamViewer version 5.0.8232 remote buffer overflow proof of concept exploit.

tags | exploit, remote, overflow, proof of concept
MD5 | e05875868bc67a4c0f8f1044e0f7a4f3
HP Security Bulletin HPSBMA02535 SSRT100029
Posted May 19, 2010
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin - Potential security vulnerabilities have been identified with HP Performance Manager. The vulnerabilities could be exploited remotely to allow unauthorized access, cross site scripting (XSS), and Denial of Service (DoS).

tags | advisory, denial of service, vulnerability, xss
advisories | CVE-2008-5515, CVE-2009-0033, CVE-2009-0580, CVE-2009-0781, CVE-2009-0783, CVE-2009-2693, CVE-2009-2901, CVE-2009-2902, CVE-2009-3548
MD5 | 8a5f518a33c1ac9f347dcd3fe0375a5e
Attachmate 13.0 / 14.0 Buffer Overflow
Posted May 19, 2010
Authored by Rad L. Sneak

Reflection Attachmate Reflection Standard Suite 2008 suffers from Active-X related buffer overflow vulnerabilities.

tags | exploit, overflow, vulnerability, activex
MD5 | b0c56b727e777b6051f7c56084792994
Mandriva Linux Security Advisory 2010-098
Posted May 19, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-098 - The name attribute of the file element of metalink files is not properly sanitized before being used to download files. If a user is tricked into downloading from a specially crafted metalink file, this can be exploited to download files to directories outside of the intended download directory via directory traversal attacks. Packages for 2009.0 are provided due to the Extended Maintenance Program. The corrected packages solves these problems.

tags | advisory
systems | linux, mandriva
advisories | CVE-2010-1000
MD5 | 9e2e1a1abc9b95db7f17a845f1244f45
Mandriva Linux Security Advisory 2010-097
Posted May 19, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-097 - The msn_emoticon_msg function in slp.c in the MSN protocol plugin in libpurple in Pidgin before 2.7.0 allows remote attackers to cause a denial of service (application crash) via a custom emoticon in a malformed SLP message. Packages for 2008.0 and 2009.0 are provided due to the Extended Maintenance Program for those products. The updated packages have been patched to correct this issue.

tags | advisory, remote, denial of service, protocol
systems | linux, mandriva
advisories | CVE-2010-1624
MD5 | c418e88d3b99c3d5daefaed1d94a8acf
MigasCMS 1.0 SQL Injection
Posted May 19, 2010
Authored by ItSecTeam

MigasCMS version 1.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 377d64355a3136321a39d1b126bbbcac
NetBSD 5.0 Hack PATH Environment Overflow
Posted May 19, 2010
Authored by jmit

NetBSD versions 5.0 and below Hack PATH environment overflow proof of concept exploit.

tags | exploit, denial of service, overflow, proof of concept
systems | netbsd
MD5 | 6f749b49074326df9478fc3b6952717e
NetBSD 5.0 Hack GENOCIDE Environment Overflow
Posted May 19, 2010
Authored by jmit

NetBSD versions 5.0 and below Hack GENOCIDE environment overflow proof of concept exploit.

tags | exploit, denial of service, overflow, proof of concept
systems | netbsd
MD5 | 31db5139a74a16605714e5121a6614e5
Joomla JComments 2.10.0 Cross Site Scripting
Posted May 19, 2010
Authored by High-Tech Bridge SA | Site htbridge.com

The Joomla JComments component version 2.1.0.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 91711094dc9041e870de921c2ec10322
Secunia Security Advisory 39815
Posted May 19, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for postgresql. This fixes some vulnerabilities, which can be exploited by malicious users to bypass certain security restrictions and compromise a vulnerable system.

tags | advisory, vulnerability
systems | linux, fedora
MD5 | 7b80231729620e4ad9e83920ce440c81
Secunia Security Advisory 39878
Posted May 19, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - ITSecTeam has discovered a vulnerability in MigasCMS, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
MD5 | 78d71d38d0754adadbcd64b186110b64
Secunia Security Advisory 39834
Posted May 19, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for xorg-server. This fixes a security issue and a vulnerability, which can be exploited by malicious, local users to bypass certain security restrictions and by malicious people to potentially compromise a user's system.

tags | advisory, local
systems | linux, ubuntu
MD5 | 4763ada10bfce8bc62eecd7312d7c694
Secunia Security Advisory 39813
Posted May 19, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for the kernel. This fixes a vulnerability, which can be exploited by malicious, local users to bypass certain security restrictions.

tags | advisory, kernel, local
systems | linux, fedora
MD5 | 0e9e11c34382ce8c0b5fedb4a1da7d2f
Secunia Security Advisory 39799
Posted May 19, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for krb5. This fixes a vulnerability, which can be exploited by malicious users to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, redhat
MD5 | 0fdea8f656a30cd52db05d19ecda672a
Secunia Security Advisory 39652
Posted May 19, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for the kernel. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, kernel
systems | linux, redhat
MD5 | 7211b00590b1f39fc30ed49f74bab8a6
Secunia Security Advisory 39577
Posted May 19, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Microsoft Windows, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a user's system.

tags | advisory, denial of service
systems | windows
MD5 | 897cffb5bb5d30b0c45247f655ecf68b
Secunia Security Advisory 39762
Posted May 19, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Kerberos, which can be exploited by malicious users to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | 8064367e58b7a180fe50c598a72cf227
Secunia Security Advisory 39814
Posted May 19, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for dvipng. This fixes some vulnerabilities, which can potentially be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
systems | linux, fedora
MD5 | 60136f1127f61545cd27503b2b273c01
Secunia Security Advisory 39817
Posted May 19, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for texlive. This fixes multiple vulnerabilities, which can potentially be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
systems | linux, fedora
MD5 | 4ac4cb16dcde7e441573a90c2c13ad43
Page 1 of 4
Back1234Next

File Archive:

December 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    15 Files
  • 2
    Dec 2nd
    2 Files
  • 3
    Dec 3rd
    1 Files
  • 4
    Dec 4th
    15 Files
  • 5
    Dec 5th
    15 Files
  • 6
    Dec 6th
    18 Files
  • 7
    Dec 7th
    17 Files
  • 8
    Dec 8th
    15 Files
  • 9
    Dec 9th
    13 Files
  • 10
    Dec 10th
    4 Files
  • 11
    Dec 11th
    41 Files
  • 12
    Dec 12th
    44 Files
  • 13
    Dec 13th
    25 Files
  • 14
    Dec 14th
    15 Files
  • 15
    Dec 15th
    28 Files
  • 16
    Dec 16th
    3 Files
  • 17
    Dec 17th
    13 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close