exploit the possibilities
Showing 1 - 25 of 51 RSS Feed

Files Date: 2011-12-15

ClubHACK Magazine Issue 23
Posted Dec 15, 2011
Authored by clubhack | Site chmag.in

ClubHACK Magazine Issue 23 - Topics covered include GSM, Echo Mirage, OWASP Mobile Security Project, Mobile Warfare, and more.

tags | magazine
MD5 | 0c4960c7bc49bc9f2d6908fc9c545b66
Mandriva Linux Security Advisory 2011-187
Posted Dec 15, 2011
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2011-187 - The installer in PEAR before 1.9.2 allows local users to overwrite arbitrary files via a symlink attack on the package.xml file, related to the tmp_dir, and pear-build-download directories, a different vulnerability than CVE-2007-2519. This advisory provides PEAR 1.9.4 which is not vulnerable to this issue. Additionally for Mandriva Enterprise Server 5 many new or updated PEAR packages is being provided with the latest versions of respective packages as well as mitigating various dependency issues.

tags | advisory, arbitrary, local
systems | linux, mandriva
advisories | CVE-2011-1072
MD5 | e2156f4d4c3969fc8f30fd1e0e305ccc
Journal PHP SQL Injection
Posted Dec 15, 2011
Authored by Th4 MasK

Journal PHP suffers from a remote SQL injection vulnerability.

tags | exploit, remote, php, sql injection
MD5 | 6b7224d5704c975a355cba04e2278c57
Ubuntu Security Notice USN-1309-1
Posted Dec 15, 2011
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1309-1 - It was discovered that the DHCP server incorrectly handled certain malformed packets when configured to evaluate regular expressions. A remote attacker could use this issue to cause DHCP to crash, resulting in a denial of service.

tags | advisory, remote, denial of service
systems | linux, ubuntu
advisories | CVE-2011-4539
MD5 | 8d3eee6d25b377c0ca792ccbd4565636
Owl Intranet Engine 1.00 Authentication Bypass
Posted Dec 15, 2011
Site redteam-pentesting.de

Owl Intranet Engine version 1.00 suffers from multiple authentication bypass vulnerabilities.

tags | exploit, vulnerability
MD5 | 32fbc60f09e89bd0a0d01e79981ccce4
Websense Triton 7.6 Stored Cross Site Scripting
Posted Dec 15, 2011
Authored by Ben Williams | Site ngssoftware.com

Various Websense products suffer from a stored cross site scripting vulnerability.

tags | advisory, xss
MD5 | 320731af5854ced68370a05f819fc144
Websense Triton Command Execution
Posted Dec 15, 2011
Authored by Ben Williams | Site ngssoftware.com

Various Websense products suffer from unauthenticated remote command execution vulnerability.

tags | advisory, remote
MD5 | 6095b673c35c8f0d399f7a617d7651e0
Websense Triton Cross Site Scripting
Posted Dec 15, 2011
Authored by Ben Williams | Site ngssoftware.com

Various Websense products suffer from a reflective cross site scripting vulnerability.

tags | advisory, xss
MD5 | 2024371db0bdf16c748f5f6293e22f32
Websense Triton Authentication Bypass
Posted Dec 15, 2011
Authored by Ben Williams | Site ngssoftware.com

Various Websense products suffer from an authentication bypass vulnerability.

tags | advisory, bypass
MD5 | 2125ebcc92542541adecab37a1c34a23
Stanford.edu Cross Site Scripting
Posted Dec 15, 2011
Authored by Ryuzaki Lawlet

Stanford.edu suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 902209bd24638565a5ba06318867d11c
Splunk Remote Root Command Execution / Directory Traversal
Posted Dec 15, 2011
Authored by Gary O'Leary-Steele | Site sec-1.com

Sec-1 Labs performed a product security analysis of Splunk and discovered remote command execution as a privileged user, a directory traversal vulnerability, failure to protect itself from brute force attacks and information disclosure issues. Versions 4.2.2, 4.2.3 and 4.2.4 were tested. This archive contains an advisory and an exploit.

tags | exploit, remote, info disclosure
systems | linux
advisories | CVE-2011-4642, CVE-2011-4643, CVE-2011-4644
MD5 | 7e59f2dc72f57a7160906a20c3bb2ae6
Snort IDS 2.9.2
Posted Dec 15, 2011
Authored by Martin Roesch | Site snort.org

Snort is an open source network intrusion detection system, capable of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes, such as buffer overflows, stealth port scans, CGI attacks, SMB probes, OS fingerprinting attempts, and much more. Includes real time alerting, incorporating alerting mechanisms for syslog, a user specified file, a UNIX socket, or WinPopup messages via smbclient.

Changes: Various new additions and modifications.
tags | tool, overflow, cgi, sniffer, protocol
systems | unix
MD5 | 22fa07ba915535b151329056439ae194
Secunia Security Advisory 47238
Posted Dec 15, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in the QContacts component for Joomla!, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
MD5 | 2f9209c1c96ed46375f7ae5fcab5f4e0
Secunia Security Advisory 47251
Posted Dec 15, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Adobe ColdFusion, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
MD5 | f515016a894f3fd36dcffecd28a4873a
Secunia Security Advisory 47231
Posted Dec 15, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Google Chrome, which can be exploited by malicious people to conduct spoofing attacks, disclose potentially sensitive information, and compromise a user's system.

tags | advisory, spoof, vulnerability
MD5 | a738465409c7bc956f86c8806a0fdce5
Secunia Security Advisory 47019
Posted Dec 15, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ruben Santamarta has reported some security issues in multiple Schneider Electric modules, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
MD5 | 02d014eb1f30d092c1b38cf8e38acc9d
Secunia Security Advisory 47209
Posted Dec 15, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Troy Rose has reported a weakness in Squiz Matrix, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
MD5 | faefdfd2ad016bfb6a842a4507ac119f
Secunia Security Advisory 47242
Posted Dec 15, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SignalSEC Labs has reported a vulnerability in HTC Touch2, which can be exploited by malicious people to compromise a user's device.

tags | advisory
MD5 | a34c6fcc664c27ba9e6044d93b47c383
Secunia Security Advisory 47252
Posted Dec 15, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been discovered in Bokken, which can be exploited by malicious, local users to perform certain actions with escalated privileges.

tags | advisory, local
MD5 | f58f103b993382d79b6b551f3ab0ec73
Secunia Security Advisory 47227
Posted Dec 15, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for icu. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise an application using the library.

tags | advisory
systems | linux, redhat
MD5 | f88523aec29b783c710edda2bee0ec9b
Secunia Security Advisory 46893
Posted Dec 15, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - mghack has discovered two vulnerabilities in Simple PHP Blog, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, php, vulnerability, xss
MD5 | 67c29272e07ee55a26f8185b0605a379
Secunia Security Advisory 47228
Posted Dec 15, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for ipmitool. This fixes a security issue, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
systems | linux, redhat
MD5 | f4718cb9773456b7b125563d87f31104
Secunia Security Advisory 47253
Posted Dec 15, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for php5. This fixes a vulnerability, which potentially can be exploited by malicious people to disclose potentially sensitive information or cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, ubuntu
MD5 | d8b12455eb54e4abcb6e54f4b03d0868
Secunia Security Advisory 47224
Posted Dec 15, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for susestudio and kiwi4. This fixes multiple weaknesses and vulnerabilities, which can be exploited by malicious users to compromise a vulnerable system and by malicious people to conduct script insertion attacks and compromise a vulnerable system.

tags | advisory, vulnerability
systems | linux, suse
MD5 | e39481dfea2e8f572f2c6888319e9b2f
Secunia Security Advisory 47234
Posted Dec 15, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for pidgin. This fixes some weaknesses, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, redhat
MD5 | 7fd1ea7ddfd4697fad1f612b20030789
Page 1 of 3
Back123Next

File Archive:

May 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    16 Files
  • 2
    May 2nd
    8 Files
  • 3
    May 3rd
    8 Files
  • 4
    May 4th
    2 Files
  • 5
    May 5th
    1 Files
  • 6
    May 6th
    15 Files
  • 7
    May 7th
    22 Files
  • 8
    May 8th
    16 Files
  • 9
    May 9th
    17 Files
  • 10
    May 10th
    16 Files
  • 11
    May 11th
    3 Files
  • 12
    May 12th
    4 Files
  • 13
    May 13th
    25 Files
  • 14
    May 14th
    24 Files
  • 15
    May 15th
    78 Files
  • 16
    May 16th
    16 Files
  • 17
    May 17th
    16 Files
  • 18
    May 18th
    2 Files
  • 19
    May 19th
    1 Files
  • 20
    May 20th
    11 Files
  • 21
    May 21st
    21 Files
  • 22
    May 22nd
    20 Files
  • 23
    May 23rd
    36 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close