exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 1,007 RSS Feed

Files Date: 2009-01-01 to 2009-01-31

Secunia Security Advisory 33713
Posted Jan 30, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in HP Select Access, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 65c85ed9f94219c549127ed26f182b043376d5591f3baa8d77e45d1c1716786e
Secunia Security Advisory 33701
Posted Jan 30, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Snakespc has discovered a vulnerability in SocialEngine, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 9e280accca3e4e2104dad8dc6b06b0e4c34d27f8e2cc5b58705ca31ca8255970
Secunia Security Advisory 33693
Posted Jan 30, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has acknowledged some security issues in Red Hat Certificate Server, which can be exploited by malicious, local users to bypass certain security restrictions and to disclose potentially sensitive information.

tags | advisory, local
systems | linux, redhat
SHA-256 | 4afb780969eb61dccb29c3bc88bcf97aebea21fbf495389f5bd5254f12571d8f
Secunia Security Advisory 33710
Posted Jan 30, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for IBMJava5-JRE and java-1_5_0-ibm. This fixes some vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions, disclose sensitive information, cause a DoS (Denial of service), or compromise a vulnerable system.

tags | advisory, java, denial of service, vulnerability
systems | linux, suse
SHA-256 | 0b25472a59a5cb6fa7f6a0723275d037bdea24bc4268df68ec1e0aee85bd2b3f
Secunia Security Advisory 33648
Posted Jan 30, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for ntp. This fixes a vulnerability, which can be exploited by malicious people to conduct spoofing attacks.

tags | advisory, spoof
systems | linux, redhat
SHA-256 | 9829b67a56e8264192f8ff7d7d57510a3aae50c897fa8cc7aad78e18e58038bd
Secunia Security Advisory 33616
Posted Jan 30, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in various Sony Ericsson phones, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 6df7fa777b946917e44cf92b49898a3c45cdd4959188426beffb5830060500c5
Secunia Security Advisory 33723
Posted Jan 30, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sun has acknowledged a vulnerability in Sun Solaris, which can potentially be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | solaris
SHA-256 | 9476f6af9c29e3dcd24e44085ab57a7edbc9563e973fc11a92c189233ee71003
Secunia Security Advisory 33727
Posted Jan 30, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sun has acknowledged a vulnerability in Sun Solaris, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
systems | solaris
SHA-256 | 7c90feacb749c0e344e2a8b3d1fc072668101912b979e32fb17c1d20ab8c9405
Secunia Security Advisory 33658
Posted Jan 30, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Max.Blog, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | da72805cec8f320dc92341934a1ec76cf4eeeb89358e18e9464c73f1cf71c6ec
Secunia Security Advisory 33696
Posted Jan 30, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sun has acknowledged a vulnerability in Samba in Solaris, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | solaris
SHA-256 | df10827f7648ef970273746eb7fda424d3a7260762285fce5e9d969de086b853
Secunia Security Advisory 33722
Posted Jan 30, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sun has acknowledged a vulnerability in libxml2 in Solaris, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise an application using the library.

tags | advisory, denial of service
systems | solaris
SHA-256 | f5dd5cbf93aee0d067eddb7c6a59496f087ae923c1c2f3f49e8eaacd59acb949
Secunia Security Advisory 33726
Posted Jan 30, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Sun Fire X2100 and X2200 M2 Server, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | 256e6d87f1126e1b230a2df53781e624531e2264efa372a629f99235724be345
Secunia Security Advisory 33711
Posted Jan 30, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Tobias Klein has reported a vulnerability in FFmpeg, which potentially can be exploited by malicious people to compromise an application using the library.

tags | advisory
SHA-256 | 127f5f40762673e9d74474c603691d7dc0d2eaebf874f208472adb24d08e4abf
Secunia Security Advisory 33715
Posted Jan 30, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Avaya has acknowledged a vulnerability in Avaya CMS, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise an application using the library.

tags | advisory, denial of service
SHA-256 | 5b549e7d2952a3719191c8e393c2f8d4c05c2d98c81224f02e660bfd7d986a4d
Secunia Security Advisory 33702
Posted Jan 30, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Avaya has acknowledged a vulnerability in Avaya CMS, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 432fd7fea2464edba595f5b8e61d23180762917b2cdae717416086ed33d18c6b
Secunia Security Advisory 33708
Posted Jan 30, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Avaya has acknowledged a vulnerability in Avaya CMS, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
SHA-256 | 79edd54fa5ebc316674da68e5c6751f7e17b3f5a683a5be3c9eba5a1927f515a
dBpowerAMP Audio Player 2 Buffer Overflow Exploit
Posted Jan 29, 2009
Authored by AlpHaNiX

dBpowerAMP Audio Player version 2 local buffer overflow exploit that generates a malicious .pls file that will bind a shell to port 4444.

tags | exploit, overflow, shell, local
SHA-256 | 7b61fef3bf02e8083f6897916f1b3e757353da051d32f656f85b73fd20ff1a58
Motorola Wimax CPEi300 Directory Traversal / XSS
Posted Jan 29, 2009
Authored by Usman Saeed | Site xc0re.net

The Motorola Wimax modem version CPEi300 suffers from directory traversal and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, file inclusion
SHA-256 | c40249b2cc26974cd51cfcdfaae55748fa9d06b6f0d392a4ff8c05c839c7daa2
GNU SIP Witch Telephony Server
Posted Jan 29, 2009
Authored by David Sugar | Site gnutelephony.org

GNU SIP Witch is a pure SIP-based office telephone call server that supports generic phone system features like call forwarding, hunt groups and call distribution, call coverage and ring groups, holding, and call transfer, as well as offering SIP specific capabilities such as presence and messaging. It supports secure telephone extensions for making calls over the Internet, and intercept/decrypt-free peer-to-peer audio and video extensions. It is not a SIP proxy, a multi-protocol telephone server, or an IP-PBX, and does not try to emulate Asterisk, FreeSWITCH, or Yate.

Changes: Subscriber plugin provider registration management. Minor update for GNU conventions. Moved more stack configuration into base object. Other enhancements.
tags | telephony, protocol
SHA-256 | 8eae1392acd43f7d9d07b236a59408b6c50e315d6e69db24bc4a371ce2d73f59
Drupal Imagefield Upload / Cross Site Scripting
Posted Jan 29, 2009
Authored by Andrew Rosborough, Justin C. Klein Keane

The Drupal Imagefield module version 5.x-2.2 on Drupal 5.15 suffers file upload and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, file upload
SHA-256 | 70b7ca51b0395989d6850139e7704f4d0741f5506342259ab3079931a19bdc6f
WFTPD Explorer Pro 1.0 Heap Overflow
Posted Jan 29, 2009
Authored by SkD

WFTPD Explorer Pro version 1.0 remote heap overflow exploit that spawns calc.exe.

tags | exploit, remote, overflow
SHA-256 | 010a0b8b7f9edfb819701abd6dd9bfe4f94c0ed71d131ae44edf94631623aed9
HP Security Bulletin 2009-00.14
Posted Jan 29, 2009
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin - A potential security vulnerability has been identified with MPE/iX running BIND/iX. The vulnerability could be exploited remotely to cause DNS cache poisoning.

tags | advisory
advisories | CVE-2008-1447
SHA-256 | 4b695913dbebd08e3d6420017c28133a6cc828fb87dc15cf2af4e7a55255859c
GLPI 0.71.3 SQL Injection
Posted Jan 29, 2009
Authored by Zigma

GLPI version 0.71.3 suffers from multiple remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | 619163e05d96d159e54663d9baedebfb774544a86bcfbcf5fda303dd6eca48cc
Oracle Forms Cross Site Scripting
Posted Jan 29, 2009
Authored by DoZ | Site hackerscenter.com

Oracle Forms suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | c58a5fc94e6d0b9193d6a1d5d65986f320efab52758141cc879a447aca844540
Star Articles 6.0 Contents Change
Posted Jan 29, 2009
Authored by ByALBAYX | Site c4team.org

Star Articles version 6.0 suffers from a remote contents change vulnerability.

tags | exploit, remote
SHA-256 | fb087a2a46e4b4469c983a10b3828587f93a9341f69d71c7ae6190748b96b606
Page 3 of 41
Back12345Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    0 Files
  • 17
    Apr 17th
    0 Files
  • 18
    Apr 18th
    0 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close