exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 48 RSS Feed

Files Date: 2010-07-21

Ubuntu Security Notice 940-2
Posted Jul 21, 2010
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 940-2 - USN-940-1 fixed vulnerabilities in Kerberos. This update provides the corresponding updates for Ubuntu 10.04. Joel Johnson, Brian Almeida, and Shawn Emery discovered that Kerberos did not correctly verify certain packet structures. An unauthenticated remote attacker could send specially crafted traffic to cause the KDC or kadmind services to crash, leading to a denial of service.

tags | advisory, remote, denial of service, vulnerability
systems | linux, ubuntu
advisories | CVE-2010-1321
SHA-256 | 3c8b93fd0edd6e58fca580bf1a44eb064495e54a3d68d843006bbfd410e691ea
Debian Linux Security Advisory 2074-1
Posted Jul 21, 2010
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2074-1 - Aki Helin discovered an integer underflow in ncompress, the original Lempel-Ziv compress/uncompress programs. This could lead to the execution of arbitrary code when trying to decompress a crafted LZW compressed gzip archive.

tags | advisory, arbitrary
systems | linux, debian
advisories | CVE-2010-0001
SHA-256 | 50c62803a6a8a590dea68ddb31eb6f822375c0761f3889df99469706d035eb40
Advanced Stats On Indexing Portal 3.1 Cross Site Scripting
Posted Jul 21, 2010
Site 3ethicalhackers.com

The Advanced Stats On Indexing Portal plugin versions 3.1 and below for MyBB suffer from cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 43cde71361c98f79fb98bd52f73957dc1149ba86eaf77d0174c0b1379bd20e41
RapidLeech Scripts Remote Shell Upload
Posted Jul 21, 2010
Authored by H-SK33PY

RapidLeech Scripts suffers from a remote shell upload vulnerability.

tags | exploit, remote, shell
SHA-256 | e0e3ad55205fddb9788552c9aa9b012362c70aae77c7bc1808e5b7248a06c14d
Outlook Web Access 2003 Cross Site Request Forgery
Posted Jul 21, 2010
Authored by anonymous

Outlook Web Access 2003 suffers from a cross site request forgery vulnerability.

tags | exploit, web, csrf
SHA-256 | 30a91fa07904715e8b9028a6989f8ead9d5901c6b67546213fd92089851942a7
Imagine CMS 2.50 SQL Injection
Posted Jul 21, 2010
Authored by Metropolis

Imagine CMS version 2.50 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 11d880d3fea212de1e726912be77780ae2709e1538fb7c8c1b597fed23a9586f
QQPlayer Buffer Overflow
Posted Jul 21, 2010
Authored by Li Qingshan

QQPlayer suffers from an asx file processing buffer overflow vulnerability.

tags | exploit, overflow
SHA-256 | fd109dd74ddd606b64616efb27793f71972a55eddb95d4bb5cff5ed640c51591
Open Source CERT Security Advisory 2010.2
Posted Jul 21, 2010
Authored by Open Source CERT | Site ocert.org

Joomla versions 1.5.19 and below suffer from cross site scripting vulnerabilities.

tags | advisory, vulnerability, xss
SHA-256 | 3b4fb9c3327b271275a41e8fc47c6c2e117dced54ae4efa6839e9540481a5804
HP Security Bulletin HPSBMA02558 SSRT010158
Posted Jul 21, 2010
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin - A potential security vulnerability has been identified with HP OpenView Network Node Manager (OV NNM). The vulnerability could be exploited remotely to execute arbitrary code under the context of the user running the web server.

tags | advisory, web, arbitrary
advisories | CVE-2010-2704
SHA-256 | 59171f8fb4745b163c4c06c6b56432aaa5ada74b3fa7adbcdaa115b65c9f1900
HP Security Bulletin HPSBMA02557 SSRT100025
Posted Jul 21, 2010
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin - A potential vulnerability has been identified with HP OpenView Network Node Manager (OV NNM) running on Windows. The vulnerability could be exploited remotely to execute arbitrary code.

tags | advisory, arbitrary
systems | windows
advisories | CVE-2010-2703
SHA-256 | ad437943a99a94a28a643b15ae3422e9d2fa3ce412d8fefb9c02b0cf8f0668f2
Debian Linux Security Advisory 2073-1
Posted Jul 21, 2010
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2073-1 - Florian Streibelt reported a a directory traversal flaw in the way the Mailing List Managing Made Joyful mailing list manager processed users' requests originating from the administrator web interface without enough input validation. A remote, authenticated attacker could use these flaws to write and / or delete arbitrary files.

tags | advisory, remote, web, arbitrary
systems | linux, debian
advisories | CVE-2009-4896
SHA-256 | b070f86d35be8b21b5141b328cb9c8a2ab13a5d95616ca8c60a7defa52b060f6
Secunia Security Advisory 40627
Posted Jul 21, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for python-cjson. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise an application using the module.

tags | advisory, denial of service, python
systems | linux, fedora
SHA-256 | fc57c77f1969c548fe1684077dc064c3ab908e77fc0a4e23cbb3b5e548622d05
Secunia Security Advisory 40689
Posted Jul 21, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for ncompress. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a user's system.

tags | advisory
systems | linux, debian
SHA-256 | 9df835662acfb4b03dabef6b51b721e55bed55af9f7856612c4dda405d2209d5
Secunia Security Advisory 40685
Posted Jul 21, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for krb5. This fixes a vulnerability, which can be exploited by malicious users to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, ubuntu
SHA-256 | 5bb8d6febeba076c175491831b6f250117a547e8debc492f8f49609c615d40cd
Secunia Security Advisory 40651
Posted Jul 21, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for thunderbird. This fixes multiple vulnerabilities, which can be exploited by malicious people to manipulate certain data, disclose sensitive information, conduct cross-site scripting attacks, bypass certain security restrictions, and potentially compromise a user's system.

tags | advisory, vulnerability, xss
systems | linux, redhat
SHA-256 | dd8feba98cfd30f4dab6b69f6363601185d67e36be91bbfd012849982669ee6c
Secunia Security Advisory 40655
Posted Jul 21, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in ncompress, which can be exploited by malicious people to potentially compromise a user's system.

tags | advisory
SHA-256 | 444bc855e0b4988e69d75c942448e147fdac9ef024c66ddde98d54a4eae48d4a
Secunia Security Advisory 40658
Posted Jul 21, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for mlmmj. This fixes a vulnerability, which can be exploited by malicious users to disclose system information and manipulate certain data.

tags | advisory
systems | linux, debian
SHA-256 | 4817198ab5d46fd7167fe3ed0381e297c09e7cba2421415c623633d9392769f4
Secunia Security Advisory 40649
Posted Jul 21, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for seamonkey. This fixes multiple vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting and spoofing attacks, and potentially compromise a vulnerable system.

tags | advisory, spoof, vulnerability, xss
systems | linux, redhat
SHA-256 | 3edb63dab01ac02aee1f94867a29772555d666a0cc985ad3428b0dcc46f93b0a
Secunia Security Advisory 40650
Posted Jul 21, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for firefox. This fixes multiple vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting and spoofing attacks, bypass certain security restrictions, disclose sensitive information, and potentially compromise a vulnerable system.

tags | advisory, spoof, vulnerability, xss
systems | linux, redhat
SHA-256 | 8082e36b8516bfb2ded6fdc90870e1f2c4fcbb5c79a3c793521d6278880b7d72
Secunia Security Advisory 40653
Posted Jul 21, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for thunderbird. This fixes multiple vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information, conduct cross site scripting attacks, bypass certain security restrictions, and compromise a user's system.

tags | advisory, vulnerability, xss
systems | linux, redhat
SHA-256 | a68feb2202fbc596af6d4879e9a8ae8089058ca3b9fb8a15c0e836148e1c6178
Secunia Security Advisory 40643
Posted Jul 21, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been discovered in Imagine CMS, which can be exploited by malicious people to conduct SQL injection attacks and disclose sensitive information.

tags | advisory, vulnerability, sql injection
SHA-256 | 9dd3985c77b15430205f531b8e707f5cfdc487053f63bc4dea1b4b0c003659e1
Secunia Security Advisory 40659
Posted Jul 21, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Mariano Nu

tags | advisory, xss
SHA-256 | 17ff2699677af18f94717b7a98ed360ce8fbdd2794df40b724d430eeeaf689ef
Secunia Security Advisory 40668
Posted Jul 21, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been discovered in QQPlayer, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 2ac9f59bf3640abb9693011a8dae9141f862c7aa022c54386bd596d08af76d27
Zero Day Initiative Advisory 10-135
Posted Jul 21, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-135 - This vulnerability allows remote attackers to execute arbitrary client side script on vulnerable installations of Novell Groupwise WebAccess. Authentication is not required to exploit this vulnerability. The specific flaw exists within handling html messages sent to a Novell Groupwise WebAccess user. Messages are improperly sanitized allowing client side script to be supplied to the user's web browser resulting in the user's WebAccess credentials being compromised.

tags | advisory, remote, web, arbitrary
SHA-256 | d9a2608c117c28f405f37042b1fa11dd1fd848c441fad6887c142f2403ce65b3
Zero Day Initiative Advisory 10-134
Posted Jul 21, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-134 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Mozilla Firefox. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists due to a workaround that was implemented in order to support recursive cloning of attribute nodes. If an event is added to the first attribute node, the application can be made to free the node, and then later access a reference to it. This can lead to code execution under the context of the application.

tags | advisory, remote, arbitrary, code execution
advisories | CVE-2010-1208
SHA-256 | 63d03b8fb29260cb331e01c3042b524ef8789e174422a32f77df32058812329e
Page 1 of 2
Back12Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    0 Files
  • 20
    Mar 20th
    0 Files
  • 21
    Mar 21st
    0 Files
  • 22
    Mar 22nd
    0 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    0 Files
  • 26
    Mar 26th
    0 Files
  • 27
    Mar 27th
    0 Files
  • 28
    Mar 28th
    0 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close