what you don't know can hurt you
Showing 1 - 25 of 46 RSS Feed

Files Date: 2011-06-17

AlgoPars Software Co SQL Injection
Posted Jun 17, 2011
Authored by Bl4ck.Viper

AlgoPars Software Co suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 475575a1cbde8b9fecac457fdff03b3c
Packet Fence 2.2.1
Posted Jun 17, 2011
Site packetfence.org

PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.

Changes: Minor release focusing on stability. There's new hardware support: AeroHIVE AP, Dlink DES3550, DGS3200, and HP ProCurve 5400 series. Improved support for ExtremeNetworks Summit series. Enhancements include an improved user experience with iPod, iPhone, and iPad, performance improvements, documentation updates, and other minor polish. Issues fixed include a very important Cisco problem related to Voice over IP, a node expiration problem, Nortel switch problems, and some installer errors.
tags | tool, remote
systems | unix
MD5 | 04af255b24edba7a7424809b7ea496a8
Adobe Reader / Acrobat 10.0.1 Denial Of Service
Posted Jun 17, 2011
Authored by Soroush Dalili

This is a proof of concept denial of service exploit for Adobe Reader / Acrobat 10.0.1.

tags | exploit, denial of service, proof of concept
systems | linux
MD5 | 4731cd285bed8022afbaec5b944bd27d
Red Hat Security Advisory 2011-0882-01
Posted Jun 17, 2011
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2011-0882-01 - This package provides jabberd 2, an Extensible Messaging and Presence Protocol server used for XML based communication. It was found that the jabberd daemon did not properly detect recursion during entity expansion. A remote attacker could provide a specially-crafted XML file containing a large number of nested entity references, which once processed by the jabberd daemon, could lead to a denial of service.

tags | advisory, remote, denial of service, protocol
systems | linux, redhat
advisories | CVE-2011-1755
MD5 | 7f7f4794af4914d7f2b571d321a586c4
Red Hat Security Advisory 2011-0881-01
Posted Jun 17, 2011
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2011-0881-01 - This package provides jabberd 2, an Extensible Messaging and Presence Protocol server used for XML based communication. It was found that the jabberd daemon did not properly detect recursion during entity expansion. A remote attacker could provide a specially-crafted XML file containing a large number of nested entity references, which once processed by the jabberd daemon, could lead to a denial of service.

tags | advisory, remote, denial of service, protocol
systems | linux, redhat
advisories | CVE-2011-1755
MD5 | 28f447bf87d489dae617b8eac79bdf11
Debian Security Advisory 2263-1
Posted Jun 17, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2263-1 - It was discovered that Movable Type, a weblog publishing system, contains several security vulnerabilities.

tags | advisory, vulnerability
systems | linux, debian
MD5 | 509479b45453c4174d3b648fb3de9254
Red Hat Security Advisory 2011-0880-01
Posted Jun 17, 2011
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2011-0880-01 - This update corrects several security vulnerabilities in the IBM Java Runtime Environment shipped as part of Red Hat Network Satellite 5.4.1. In a typical operating environment, these are of low security risk as the runtime is not used on untrusted applets. This update fixes several vulnerabilities in the IBM Java 2 Runtime Environment. Detailed vulnerability descriptions are linked from the IBM "Security alerts" page, listed in the References section. Various other issues were also addressed.

tags | advisory, java, vulnerability
systems | linux, redhat
advisories | CVE-2009-3555, CVE-2010-1321, CVE-2010-3541, CVE-2010-3548, CVE-2010-3549, CVE-2010-3550, CVE-2010-3551, CVE-2010-3553, CVE-2010-3555, CVE-2010-3556, CVE-2010-3557, CVE-2010-3558, CVE-2010-3560, CVE-2010-3562, CVE-2010-3563, CVE-2010-3565, CVE-2010-3566, CVE-2010-3568, CVE-2010-3569, CVE-2010-3571, CVE-2010-3572, CVE-2010-3573, CVE-2010-3574, CVE-2010-4422, CVE-2010-4447, CVE-2010-4448, CVE-2010-4452, CVE-2010-4454
MD5 | d0b91170427beda715e7b1294fa7faef
Red Hat Security Advisory 2011-0879-01
Posted Jun 17, 2011
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2011-0879-01 - Red Hat Network Satellite provides a solution to organizations requiring absolute control over and privacy of the maintenance and package deployment of their servers. It allows organizations to utilize the benefits of the Red Hat Network without having to provide public Internet access to their servers or other client systems. It was found that RHN Satellite did not protect against Cross-Site Request Forgery attacks. If an authenticated RHN Satellite user visited a specially-crafted web page, it could lead to unauthorized command execution with the privileges of that user, for example, creating a new user account, granting administrator privileges to user accounts, disabling the account of the current user, and so on. Various other issues were also addressed.

tags | advisory, web, csrf
systems | linux, redhat
advisories | CVE-2009-4139
MD5 | 3221ae44e0007be477dd587d53c23423
Rapid Full Download Cross Site Scripting
Posted Jun 17, 2011
Authored by Bl4ck.Viper

Rapid Full Download suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 17696967a09018f8833c4e5cc9d17540
Ubuntu Security Notice USN-1154-1
Posted Jun 17, 2011
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1154-1 - It was discovered that a heap overflow in the AWT FileDialog.show() method could allow an attacker to cause a denial of service through an application crash or possibly execute arbitrary code. It was discovered that integer overflows in the JPEGImageReader readImage() function and the SunLayoutEngine nativeLayout() function could allow an attacker to cause a denial of service through an application crash or possibly execute arbitrary code. Various other issues were also addressed.

tags | advisory, denial of service, overflow, arbitrary
systems | linux, ubuntu
advisories | CVE-2011-0862, CVE-2011-0815, CVE-2011-0822, CVE-2011-0862, CVE-2011-0864, CVE-2011-0865, CVE-2011-0867, CVE-2011-0868, CVE-2011-0869, CVE-2011-0870, CVE-2011-0871, CVE-2011-0872
MD5 | d97d9e0893f12d52f77a7461ff0f9a3d
vBulletin VBExperience Cross Site Scripting
Posted Jun 17, 2011
Authored by Mr.ThieF

The vBExperience add-on as shipped with vBulletin versions 3.x.x and 4.x.x suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 7c999ec06c2c294e5619f17615f91b74
WeBid 1.0.2 Cross Site Scripting / SQL Injection
Posted Jun 17, 2011
Authored by Saif El-Sherei

WeBid version 1.0.2 suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
MD5 | b78700054cab55e678699522d227349f
Essential PIM 4.22 Outdated Libraries
Posted Jun 17, 2011
Authored by Stefan Kanthak

Essential PIM version 4.22 is shipping with multiple outdated and vulnerable libraries.

tags | advisory
MD5 | 16fa2cb920837ee592d42e429988497c
MS11-050 IE mshtml!CObjectElement Use After Free
Posted Jun 17, 2011
Authored by d0c_s4vage | Site metasploit.com

This Metasploit module exploits a use-after-free vulnerability in Internet Explorer. The vulnerability occurs when an invalid object tag exists and other elements overlap/cover where the object tag should be when rendered (due to their styles/positioning). The mshtml!CObjectElement is then freed from memory because it is invalid. However, the mshtml!CDisplay object for the page continues to keep a reference to the freed <object> and attempts to call a function on it, leading to the use-after-free.

tags | exploit
advisories | CVE-2011-1256, OSVDB-72948
MD5 | 47f386cf79681bcaa22587cf53ebd6f6
Secunia Security Advisory 44985
Posted Jun 17, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for libxml2. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise an application using the library.

tags | advisory, denial of service
systems | linux, ubuntu
MD5 | dbcc686ce79f768b216808441c2fe683
Secunia Security Advisory 44999
Posted Jun 17, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in GNU Troff, which can be exploited by malicious, local users to perform certain actions with escalated privileges.

tags | advisory, local
MD5 | 7fffca7316b0965c7097c59b829fad31
Secunia Security Advisory 44960
Posted Jun 17, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for jabberd. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, redhat
MD5 | 172d54dd5a612aa84cbf1a9740cc962b
Secunia Security Advisory 44959
Posted Jun 17, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has acknowledged a vulnerability in Red Hat Network Satellite Server, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
systems | linux, redhat
MD5 | 5ed8627d0166da504e999aed53cc41d8
Secunia Security Advisory 44921
Posted Jun 17, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - IBM has acknowledged a vulnerability in IBM Tivoli Business Service Manager, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
MD5 | 1e13ef44a7e956ca7043b69e39e1055f
Secunia Security Advisory 44942
Posted Jun 17, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for openjdk-6. This fixes multiple vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information, manipulate certain data, cause a DoS (Denial of Service), compromise a user's system, and compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
systems | linux, ubuntu
MD5 | 76dde79503c4630821471503530bffd2
Secunia Security Advisory 44918
Posted Jun 17, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in Digicom IP CAMERA 100W, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
MD5 | 9dc5bc6bcd74d5abbed6c7f630a9abd2
Secunia Security Advisory 44972
Posted Jun 17, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Context has reported a weakness in Mozilla Firefox, which can be exploited by malicious people to disclose potentially sensitive information.

tags | advisory
MD5 | 5cef35a3fcdb6ce4c34be200befb572a
Secunia Security Advisory 44952
Posted Jun 17, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Group-Office, which can be exploited by malicious users to conduct SQL injection attacks.

tags | advisory, vulnerability, sql injection
MD5 | e2b5ba312619cd3c5e5f8d6b7f631560
Secunia Security Advisory 45000
Posted Jun 17, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in FreeBSD, which can be exploited by malicious, local users to disclose certain system information.

tags | advisory, local
systems | freebsd
MD5 | 7a28ceb444c3d6c5c154f6915c7431fc
Secunia Security Advisory 44903
Posted Jun 17, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in TRENDnet TV-IP422W, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
MD5 | aee6d6eafb11677417bee2eeb111cc6c
Page 1 of 2
Back12Next

File Archive:

July 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    2 Files
  • 2
    Jul 2nd
    3 Files
  • 3
    Jul 3rd
    15 Files
  • 4
    Jul 4th
    4 Files
  • 5
    Jul 5th
    15 Files
  • 6
    Jul 6th
    15 Files
  • 7
    Jul 7th
    10 Files
  • 8
    Jul 8th
    2 Files
  • 9
    Jul 9th
    10 Files
  • 10
    Jul 10th
    15 Files
  • 11
    Jul 11th
    15 Files
  • 12
    Jul 12th
    19 Files
  • 13
    Jul 13th
    16 Files
  • 14
    Jul 14th
    15 Files
  • 15
    Jul 15th
    3 Files
  • 16
    Jul 16th
    2 Files
  • 17
    Jul 17th
    8 Files
  • 18
    Jul 18th
    11 Files
  • 19
    Jul 19th
    15 Files
  • 20
    Jul 20th
    15 Files
  • 21
    Jul 21st
    15 Files
  • 22
    Jul 22nd
    7 Files
  • 23
    Jul 23rd
    2 Files
  • 24
    Jul 24th
    19 Files
  • 25
    Jul 25th
    28 Files
  • 26
    Jul 26th
    2 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close