exploit the possibilities
Showing 1 - 25 of 35 RSS Feed

Files Date: 2012-11-15

Secunia Security Advisory 51291
Posted Nov 15, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Andrea Micalizzi has discovered two vulnerabilities in Novell Privileged User Manager, which can be exploited by malicious people to bypass certain security restrictions and compromise a vulnerable system.

tags | advisory, vulnerability
MD5 | 7c871b4d61749d23d1abca99e1565060
Secunia Security Advisory 51311
Posted Nov 15, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for opera. This fixes multiple vulnerabilities, where some have unknown impacts and other can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's system.

tags | advisory, vulnerability, xss
systems | linux, suse
MD5 | 231e93291d0378715d4290b67574b11d
Secunia Security Advisory 51308
Posted Nov 15, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for libproxy. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | linux, redhat
MD5 | 41516cc119e1b98e4eb7692012ddd011
Secunia Security Advisory 51233
Posted Nov 15, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Horde Groupware, Horde Groupware Webmail Edition, and Kronolith, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory, vulnerability
MD5 | 1d3baf33d2fe16188d8a2def1eecadfe
Secunia Security Advisory 51273
Posted Nov 15, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in the User Read-Only module in Drupal, which can be exploited by malicious users to bypass certain security restrictions.

tags | advisory
MD5 | 51f77f9caba9094b13b356e5fa3b94ec
Secunia Security Advisory 51309
Posted Nov 15, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for mysql. This fixes multiple vulnerabilities, which can be exploited by malicious users to disclose potentially sensitive information, manipulate certain data, and cause a DoS (Denial of Service) and by malicious people to disclose potentially sensitive information, manipulate certain data, cause a DoS (Denial of Service), and potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
systems | linux, redhat
MD5 | 23aefb1ec004d12915985b34bc87e365
Secunia Security Advisory 51259
Posted Nov 15, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Chaos tool suite module for Drupal, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory
MD5 | 63ec748bced9c807b3631069cccee782
Secunia Security Advisory 50982
Posted Nov 15, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Charlie Eriksen has discovered a vulnerability in the post-views plugin for WordPress, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | 687a6be4944323d7ef3747d483a3d4e7
Secunia Security Advisory 51288
Posted Nov 15, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been discovered in The FAQ Manager, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, vulnerability, sql injection
MD5 | 0e059e5c4e3b70ed22d1558727c7d8fd
Secunia Security Advisory 51300
Posted Nov 15, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in MantisBT, which can be exploited by malicious users to disclose potentially sensitive information.

tags | advisory
MD5 | f3289ccfa7a37f85a41aee46d854d423
Secunia Security Advisory 51252
Posted Nov 15, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - IBM has acknowledged multiple vulnerabilities in IBM Tivoli Monitoring, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system.

tags | advisory, vulnerability
MD5 | 95b34baf71b2fdddfd551567487aaa8d
Secunia Security Advisory 51278
Posted Nov 15, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - IBM has acknowledged multiple vulnerabilities in IBM Tivoli Management Framework, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system.

tags | advisory, vulnerability
MD5 | 890bed82cb682f5ad98fe856f6f476c2
Secunia Security Advisory 51272
Posted Nov 15, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the RESTful Web Services module for Drupal, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, web, csrf
MD5 | d836d7bc84103a42f63c642ac1c0749f
Secunia Security Advisory 51297
Posted Nov 15, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Dell OpenManage Server Administrator, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | cd8cb814d83b615e3615c71c239595a4
Secunia Security Advisory 51277
Posted Nov 15, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - IBM has acknowledged multiple vulnerabilities in IBM Lotus Notes and Lotus Domino, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system.

tags | advisory, vulnerability
MD5 | 5dfa43b67c64e1d84ab665b2551f04a6
Secunia Security Advisory 51261
Posted Nov 15, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Smiley and Smileys modules for Drupal, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory
MD5 | 209fa140f93ae1ff0b6c3af5651e8bf5
Secunia Security Advisory 51244
Posted Nov 15, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in IBM Java, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system.

tags | advisory, java, vulnerability
MD5 | ca54676ef99215f65b5031d128fe7b3b
Secunia Security Advisory 49128
Posted Nov 15, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in OpenVAS Manager, which can be exploited by malicious users to compromise a vulnerable system.

tags | advisory
MD5 | 54de91b9c293b2da0a693c537cc04408
Oracle Database Client System Analyzer Arbitrary File Upload
Posted Nov 15, 2012
Authored by juan vazquez, 1c239c43f521145fa8385d64a9c32243 | Site metasploit.com

This Metasploit module exploits an arbitrary file upload vulnerability on the Client Analyzer component as included in Oracle Database 11g, which allows remote attackers to upload and execute arbitrary code. This Metasploit module has been tested successfully on Oracle Database 11g 11.2.0.1.0 on Windows 2003 SP2, where execution through the Windows Management Instrumentation service has been used.

tags | exploit, remote, arbitrary, file upload
systems | windows
advisories | CVE-2010-3600, OSVDB-70546
MD5 | 02a24712932555892eab5fede01dc4ac
Novell NetIQ Privileged User Manager 2.3.1 ldapagnt.dll Code Execution
Posted Nov 15, 2012
Authored by rgod | Site retrogod.altervista.org

Novell NetIQ Privileged User Manager version 2.3.1 suffers from a perl code evaluation remote command execution vulnerability in ldapagnt_eval() in ldapagnt.dll. The secure web interface contains a flaw which allows, without prior authentication, to execute a Perl script with SYSTEM privileges. This can be done by sending a POST request with well formed data. Full exploit included.

tags | exploit, remote, web, perl
systems | linux
MD5 | a46a9b4a8a054e22e5db154b03091612
Novell NetIQ Privileged User Manager 2.3.1 auth.dll Code Execution
Posted Nov 15, 2012
Authored by rgod | Site retrogod.altervista.org

Novell NetIQ Privileged User Manager version 2.3.1 suffers from a remote code execution vulnerability in pa_modify_accounts() in auth.dll. The secure web interface contains a flaw which allows, without prior authentication, to change the password of the user 'admin'. A remote attacker then could login to the web interface with full privileges and trigger underlying vulnerabilities to write arbitrary files against the target system with SYSTEM privileges. Full exploit included.

tags | exploit, remote, web, arbitrary, vulnerability, code execution
systems | linux
MD5 | 1018c8ceb278d2a718a97c01c9ecaf1a
Technical Cyber Security Alert 2012-318A
Posted Nov 15, 2012
Authored by US-CERT | Site us-cert.gov

Technical Cyber Security Alert 2012-318A - Select Microsoft software products contain multiple vulnerabilities. Microsoft has released updates to address these vulnerabilities.

tags | advisory, vulnerability
MD5 | 43dc9dc7f36f8950c60de005751c753e
Drupal Table Of Contents 6.x Access Bypass
Posted Nov 15, 2012
Authored by Alexis Wilke, Erik Webb | Site drupal.org

Drupal Table of Contents third party module version 6.x suffers from an access bypass vulnerability.

tags | advisory, bypass
MD5 | 0c5a26c93b62480d1a16d3559a255cf1
Drupal Chaos Tool Suite 6.x Cross Site Scripting
Posted Nov 15, 2012
Authored by Justin C. Klein Keane, Andrey Tretyakov | Site drupal.org

Drupal Chaos Tool Suite third party module version 6.x suffers from a cross site scripting vulnerability.

tags | advisory, xss
MD5 | e1ed189a82e75830acba57ab4a14c6b9
iDev Rentals 1.0 Cross Site Scripting
Posted Nov 15, 2012
Authored by Ibrahim El-Sayed | Site vulnerability-lab.com

iDev Rentals version 1.0 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
MD5 | dff6a8672c8eb2a0cfdbc0187a0f9190
Page 1 of 2
Back12Next

File Archive:

November 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    2 Files
  • 2
    Nov 2nd
    9 Files
  • 3
    Nov 3rd
    15 Files
  • 4
    Nov 4th
    90 Files
  • 5
    Nov 5th
    22 Files
  • 6
    Nov 6th
    16 Files
  • 7
    Nov 7th
    1 Files
  • 8
    Nov 8th
    1 Files
  • 9
    Nov 9th
    40 Files
  • 10
    Nov 10th
    27 Files
  • 11
    Nov 11th
    28 Files
  • 12
    Nov 12th
    13 Files
  • 13
    Nov 13th
    18 Files
  • 14
    Nov 14th
    2 Files
  • 15
    Nov 15th
    2 Files
  • 16
    Nov 16th
    29 Files
  • 17
    Nov 17th
    15 Files
  • 18
    Nov 18th
    15 Files
  • 19
    Nov 19th
    21 Files
  • 20
    Nov 20th
    16 Files
  • 21
    Nov 21st
    1 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    19 Files
  • 24
    Nov 24th
    32 Files
  • 25
    Nov 25th
    7 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close