exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 58 RSS Feed

Files Date: 2008-02-14 to 2008-02-15

Secunia Security Advisory 28915
Posted Feb 14, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for tomcat5. This fixes a security issue, which can be exploited by malicious, local users to bypass certain security restrictions, and some vulnerabilities, which can be exploited by malicious people to manipulate certain data or to disclose sensitive information.

tags | advisory, local, vulnerability
systems | linux, fedora
SHA-256 | e5623db242411437ee5d60b10bd4c637074a396512afa0e78148a754c2def4de
Secunia Security Advisory 28917
Posted Feb 14, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for duplicity. This fixes a security issue, which can be exploited by malicious, local users to disclose sensitive information.

tags | advisory, local
systems | linux, fedora
SHA-256 | 46c1b149c08769b36200ba4b6c08470e92c77a1b6c58e9f945c38f1ae68090c5
Secunia Security Advisory 28918
Posted Feb 14, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for xine-lib. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | linux, fedora
SHA-256 | d0365233de6b7855a05bdd13a051bb54652afbcfdfe0f38f448df99d36bef483
Secunia Security Advisory 28927
Posted Feb 14, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - muuratsalo has discovered two vulnerabilities in artmedic weblog, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | dbef3c1a1eaf13ec1e4cb38b58ef5d88d9b34d49c4bd02c75b058a7fab3d57e7
Secunia Security Advisory 28928
Posted Feb 14, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in FreeBSD, which potentially can be exploited by malicious, local users to disclose sensitive information.

tags | advisory, local
systems | freebsd
SHA-256 | 34e43a2fabf0c38293d346108cd730ce4d1dff8f1e2cb933507da7b3011d8c42
Secunia Security Advisory 28944
Posted Feb 14, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for scponly. This fixes a security issue, which can be exploited by malicious, local users to bypass certain security restrictions.

tags | advisory, local
systems | linux, gentoo
SHA-256 | 1c9bdf9b8541f4116469db7465ac7fbc3d7d6506dc4ec869ae4fa3239e16aa31
Secunia Security Advisory 28945
Posted Feb 14, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in RoboHelp, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 885dfac8deb5273ff2cb0cff39584543ff5d3f62db715b656e99dd932e799092
Secunia Security Advisory 28946
Posted Feb 14, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Adobe Flash Media Server, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
SHA-256 | 17628183d48eeb5af6367ccaff268c760d6b4e111d1f2d7a1e0a878077c109f0
Secunia Security Advisory 28947
Posted Feb 14, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Adobe Connect Enterprise Server, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
SHA-256 | 2bfd8a50ee8a8b56fa485759e1260b9eb7a04f04bb902ce26cd2f8e43b56684c
Secunia Security Advisory 28979
Posted Feb 14, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - FreeBSD has issued an update for ipsec. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | freebsd
SHA-256 | 36d8052ca9aa88e2db7b85fe07c484d27b236d0859ba5a55558c932183b503eb
gkrellweather2sh.c
Posted Feb 14, 2008
Authored by Manuel Gebele

Local stack overflow exploit for the gkrellweather plugin version 0.2.7 that works with gkrellm version 2.2.9. Note that this is a proof of concept and only escalates privileges if the binary is setuid or spawned with sudo. By default, this binary is not normally setuid.

tags | exploit, overflow, local, proof of concept
SHA-256 | 241eac375b74dc2d498ceab2f3997c9d3487d9042bf49a997934eb2bafc39918
Secunia Security Advisory 28937
Posted Feb 14, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for the kernel. This fixes a vulnerability, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, kernel, local
systems | linux, redhat
SHA-256 | f74ea49abfaccc545637713974aa717ca1ce4115c9464a0892924f6b917da274
artmedic-multiplelfi.txt
Posted Feb 14, 2008
Authored by muuratsalo

The artmedic weblog suffers from multiple local file inclusion vulnerabilities.

tags | exploit, local, vulnerability, file inclusion
SHA-256 | 156688708e62380a600f64fe0da8e0add07dc47dce3e8ddd330778b2714b1684
jspwiki-multi.txt
Posted Feb 14, 2008
Authored by Moshe BA | Site bugsec.com

An input validation problem in JSPWiki allows the execution of arbitrary local .jsp files. Cross site scripting vulnerabilities also exist. Versions 2.4.104 and 2.5.139 are vulnerable. Earlier versions may also be susceptible.

tags | exploit, arbitrary, local, vulnerability, xss
SHA-256 | fb0a7354a4d5201811ea076e4568b7b968b1f5529f3b33253404a5f7ef5be71d
joomlaomni-sql.txt
Posted Feb 14, 2008
Authored by S@BUN | Site hackturkiye.com

The Joomla com_omnirealestate component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 29f521181456d54644030f6c9e8fa4b40fcae3054c230bd948f76aef9ebe028c
joomlamodel-sql.txt
Posted Feb 14, 2008
Authored by S@BUN | Site hackturkiye.com

The Joomla com_model component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 09114e7030f5aa4fc0903820be8a9dc7c462437031b27a00aecb952d230553bf
joomlauhp-upload.txt
Posted Feb 14, 2008
Authored by S@BUN | Site hackturkiye.com

The Joomla com_uhp component suffers from a file upload vulnerability allowing for arbitrary code execution.

tags | exploit, arbitrary, code execution, file upload
SHA-256 | 3a2f695d3c0a08b90c3f21b4d027202e3aad9a466edfc4c4fe35e4b6a7759bcf
forumsasp-sql.txt
Posted Feb 14, 2008
Authored by S@BUN | Site hackturkiye.com

forums.asp suffers from a remote SQL injection vulnerability in content.asp.

tags | exploit, remote, sql injection, asp
SHA-256 | 204a544e1478aaa68924217d33b46baa8e28b9023dd98a63c94d2b7640ecd332
phpauto-rfi.txt
Posted Feb 14, 2008
Authored by S@BUN | Site hackturkiye.com

phpAutoVideo suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | e2cf861260d76632bd7f4705d02d6015761ca2a0805e7fa5f25eddffd9ab253b
pds-sql.txt
Posted Feb 14, 2008
Authored by S@BUN | Site hackturkiye.com

The "Provided By Development Solutions" Real Estate software is vulnerable to a SQL injection vulnerability in agentlist.php.

tags | exploit, php, sql injection
SHA-256 | 4bf20a1e73bdfc4f438960ec69b082d6b37cb48f585ec5be92a66676b8600587
joomlaxfaq-sql.txt
Posted Feb 14, 2008
Authored by S@BUN | Site hackturkiye.com

The Joomla xfaq component version 1.2 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | f6e0ae946305e0c4e381d61f9ed688f61a49661290bcdb10c346c06e9eea7352
AKLINK-SA-2008-001.txt
Posted Feb 14, 2008
Authored by Alexander Klink | Site cynops.de

OpenCA version 0.9.2.5 suffers from a cross site request forgery vulnerability.

tags | advisory, csrf
advisories | CVE-2008-0556
SHA-256 | c8cc08a802f0472bdd435e3b3e2dacbf30c477ffb9c1ff098f2c5e82d42a1001
netkom-sql.txt
Posted Feb 14, 2008
Authored by Cr@zy_King

Netkom Internet Solutions suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 65bebb45a47059598bfc4886a47946fec094b931f22113d683abd1faa066a1d4
Secunia Security Advisory 28930
Posted Feb 14, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for nagios-plugins. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or to compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
systems | linux, debian
SHA-256 | a3fb15ea4c210b4d97ea387223bafe0eb64c97f36a2cc7a7475cfe5bf16eb306
Secunia Security Advisory 28866
Posted Feb 14, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for graphviz. This fixes a vulnerability, which can potentially be exploited by malicious people to compromise a user's system.

tags | advisory
systems | linux, fedora
SHA-256 | 7bdfb445ff0845cb5a808eb23ad83bade293f26e8edcbed6ee0ce14899a60bb2
Page 2 of 3
Back123Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close