exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 61 RSS Feed

Files Date: 2008-09-25 to 2008-09-26

ajauction-sqlxss.txt
Posted Sep 25, 2008
Authored by InjEctOrS

AJ Auction Pro Platinum suffers from a cross site scripting vulnerability in search.php and a SQL injection vulnerability in sellers_othersitem.php.

tags | exploit, php, xss, sql injection
SHA-256 | b227b01d4086134646d39a10cb80af6cdd04f5536905a65def44f14e02119f93
googledocs-xss.txt
Posted Sep 25, 2008
Authored by Alfredo Melloni

Multiple cross site scripting vulnerabilities were identified in Google Docs. A remote attacker could write a malformed document and invite, through Google Docs sharing option, other users to see it in order to obtain their cookies.

tags | advisory, remote, vulnerability, xss
SHA-256 | 54d590b34d9f2995c50a89fd510a286b3611e3649d2f739f89b855fc616475e0
ajauctionskin1-sql.txt
Posted Sep 25, 2008
Authored by Hussin X | Site tryag.cc

AJ Auction Platinum Skin #1 suffers from a remote SQL injection vulnerability in category.php.

tags | exploit, remote, php, sql injection
SHA-256 | 1a5ca6ebe67c85018d2fa741493438369b257d6ce793f56f249a54975707ee5a
Secunia Security Advisory 31932
Posted Sep 25, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - d3v1l has reported a vulnerability in JETIK-WEB, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, web, sql injection
SHA-256 | f331523bc103ca480d607e5f24517273f9d944afee0c973b8b69d58817c35357
Secunia Security Advisory 31956
Posted Sep 25, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - dun has discovered a vulnerability in Barcode Generator, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
SHA-256 | bf8c075fe005e238aae61dc49596b792ae674e20f31b6de49983b04d43535090
Secunia Security Advisory 31970
Posted Sep 25, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in Aegis, which can be exploited by malicious, local users to perform certain actions with escalated privileges.

tags | advisory, local
SHA-256 | a84bd1f1b7d1e4998235ea1ed0c54e99e6e19080919a5a976e1d8c2fcce9f600
Secunia Security Advisory 31979
Posted Sep 25, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - GoLd_M has discovered a vulnerability in web-cp, which can be exploited by malicious people to disclose sensitive information.

tags | advisory, web
SHA-256 | 4d901d67e3c3ddc1fa7957fd01b2343d33a6f5209cbd228e5f6d617726fe51f7
Secunia Security Advisory 31994
Posted Sep 25, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - dun has discovered a vulnerability in MailWatch for MailScanner, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
SHA-256 | 1fbaeba04d986b91396a376b9a07172e845f14eddbcfb08784dcc20d606af652
Secunia Security Advisory 32014
Posted Sep 25, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Michael Schratt has discovered some vulnerabilities in bitweaver, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | 170dabe36b58f161522fb3e7653a92b5150a1dd4c1109f4ddd6a12b2a49c5a51
Mandriva Linux Security Advisory 2008-204
Posted Sep 25, 2008
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory - Stefan Cornelius of Secunia Research reported a boundary error when Blender processed RGBE images which could be used to execute arbitrary code with the privileges of the user running Blender if a specially crafted.hdr or .blend file were opened. As well, multiple vulnerabilities involving insecure usage of temporary files had also been reported. The updated packages have been patched to prevent these issues.

tags | advisory, arbitrary, vulnerability
systems | linux, mandriva
advisories | CVE-2008-1102, CVE-2008-1103
SHA-256 | 48609fb663e9cc742f93f54881dfaf9d1d8f643be31783d486819229d88c5293
brilliant-sql.txt
Posted Sep 25, 2008
Authored by Mad Irish | Site madirish.net

The Drupal Brilliant Gallery module suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 1fa9fbf4c0491566e07b9b768c7c393c8f1fe71e06cc8406c3deccac49b2904b
drupalajax-sql.txt
Posted Sep 25, 2008
Authored by Mad Irish | Site madirish.net

The Drupal Ajax Checklist module suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 19b4b1389ae846a41c84306f33759cd0507a354ff4ff34a39d41bfd5e439b041
vikingboard-lfi.txt
Posted Sep 25, 2008
Authored by dun

Vikingboard versions 0.2 Beta and below suffer from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 8ed7c724af6f43081fcfa8e7fd8fb10ca3cbda697a4298aeafb191a5ce0cf74a
phpocs-lfi.txt
Posted Sep 25, 2008
Authored by dun

phpOCS versions 0.1-beta3 and below suffer from a local file inclusion vulnerability in index.php.

tags | exploit, local, php, file inclusion
SHA-256 | 12450b4524b8be61e04c5f58919480d13557a67b8d1a80127f163566418e6af7
lansuite-lfi.txt
Posted Sep 25, 2008
Authored by dun

LanSuite versions 3.4 Beta r1363 and below suffer from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 74ae9290e35aa9ed5c3f88927486948cd1a5b9246c362f846f2a8fff3ad23747
observer-exec.txt
Posted Sep 25, 2008
Authored by dun

Observer versions 0.3.2.1 and below suffer from multiple remote command execution vulnerabilities.

tags | exploit, remote, vulnerability
SHA-256 | fc6835d6802b9befb9e7eef2371880bae8242b8fd4e075ad2d4398a82f77a635
barcodegen-lfi.txt
Posted Sep 25, 2008
Authored by dun

barcodegen versions 2.0.0 and below suffer from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 1c4f10993e131d95f3e16a0f9495153949ec119a3f05acd474d63cb4c17906fa
Cisco Security Advisory 20080924-vpn
Posted Sep 25, 2008
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - Devices running Cisco IOS versions 12.0S, 12.2, 12.3 or 12.4 and configured for Multiprotocol Label Switching (MPLS) Virtual Private Networks (VPNs) or VPN Routing and Forwarding Lite (VRF Lite) and using Border Gateway Protocol (BGP) between Customer Edge (CE) and Provider Edge (PE) devices may permit information to propagate between VPNs. Workarounds are available to help mitigate this vulnerability.

tags | advisory, protocol
systems | cisco
advisories | CVE-2008-3803
SHA-256 | 7b27a5f1f05785a5a9c73fbecc1a325e0a53fa9bcd08cc65faa5702b986fa184
Cisco Security Advisory 20080924-multicast
Posted Sep 25, 2008
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - Two crafted Protocol Independent Multicast (PIM) packet vulnerabilities exist in Cisco IOS software that may lead to a denial of service (DoS) condition. Cisco has released free software updates that address these vulnerabilities. Workarounds that mitigate these vulnerabilities are available.

tags | advisory, denial of service, vulnerability, protocol
systems | cisco
advisories | CVE-2008-3808, CVE-2008-3809
SHA-256 | 8bcc80201c80f5751e92325e0807d25badbf60ab67728536641d052fd25ce2c2
Cisco Security Advisory 20080924-sip
Posted Sep 25, 2008
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - Multiple vulnerabilities exist in the Session Initiation Protocol (SIP) implementation in Cisco IOS that can be exploited remotely to trigger a memory leak or to cause a reload of the IOS device. Cisco has released free software updates that address these vulnerabilities. Fixed Cisco IOS software listed in the Software Versions and Fixes section contains fixes for all vulnerabilities addressed in this advisory.

tags | advisory, vulnerability, protocol, memory leak
systems | cisco
advisories | CVE-2008-3799
SHA-256 | 2d9090d9b0174aaf77b66cb58308f48922207eaa51a4842cbff0b79d40d10294
Secunia Security Advisory 31706
Posted Sep 25, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been discovered in ol'bookmarks, which can be exploited by malicious users to compromise a vulnerable system, and by malicious people to disclose sensitive information.

tags | advisory, vulnerability
SHA-256 | 03f5ed245551f311c06766dec36459b379b2e3ade89cda3756126c522ab5c717
Secunia Security Advisory 31779
Posted Sep 25, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - 0x90 has discovered a vulnerability in Basic PHP Events Lister, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, php, sql injection
SHA-256 | 2814a9e9c8774397bf83cfe2e0b1d8107ae40cb0be911d4596a979cbd7483b01
Secunia Security Advisory 31950
Posted Sep 25, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in BurnAware, which can be exploited by malicious people to potentially compromise a user's system.

tags | advisory
SHA-256 | b68d1207b2bb08e8b80f4d72f66394835e9e26c63c07f55cf5236b1514e5e922
Secunia Security Advisory 31984
Posted Sep 25, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Mozilla Firefox, which can be exploited by malicious people to bypass certain security restrictions, to disclose sensitive information, or to potentially compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 333812958669569f4849adcc0f318f3158c519e3afcc089f2a79b8adb14a5619
Secunia Security Advisory 31985
Posted Sep 25, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for seamonkey. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, to disclose sensitive information, or to potentially compromise a user's system.

tags | advisory, vulnerability
systems | linux, redhat
SHA-256 | 47a49445ec6bf638fcd1e97710c830ec2ef9fdb5ae6acfed95cbd2167415b035
Page 2 of 3
Back123Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close