exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 37 of 37 RSS Feed

Files Date: 2009-02-26 to 2009-02-27

Sopcast Sopcore Active-X Code Execution
Posted Feb 26, 2009
Authored by Nine:Situations:Group | Site retrogod.altervista.org

Sopcast SopCore Control Active-X SetExternalPlayer() code execution proof of concept exploit that leverages sopocx.ocx version 3.0.3.501.

tags | exploit, code execution, activex, proof of concept
SHA-256 | 5fa2489d39dd257067a34cb4a4c40c6ecee84847500eac51b5077ce71cb1fbe3
Cisco Unified MeetingPlace Cross Site Scripting
Posted Feb 26, 2009
Authored by National Australia Bank Security Assurance

The Cisco Unified MeetingPlace Web Conferencing system is vulnerable to a stored cross site scripting vulnerability.

tags | exploit, web, xss
systems | cisco
SHA-256 | df9ddfe51280f84ea7084cd93067cf5dc3c71d635cb29a58a61b63a95d344716
Tomcat Information Disclosure
Posted Feb 26, 2009
Authored by Mark Thomas | Site tomcat.apache.org

Apache Tomcat versions 4.1.32 through 4.1.34 and 5.5.10 through 5.5.20 suffer from an information disclosure vulnerability.

tags | advisory, info disclosure
advisories | CVE-2008-4308
SHA-256 | 768d53d9e66098ca1617ffada6c18d5bb474b2b3a0457418984e05a53b42a23e
Secunia Security Advisory 34056
Posted Feb 26, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fujitsu has acknowledged a vulnerability in some Interstage products, which can be exploited by malicious people to potentially disclose sensitive information.

tags | advisory
SHA-256 | 673f1b578979624fec138d7027cfe9584aeded0d3f8c250493093221ad766577
Secunia Security Advisory 34039
Posted Feb 26, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Sun Solaris, which can be exploited by malicious people to conduct cross-site scripting attacks or disclose sensitive information.

tags | advisory, vulnerability, xss
systems | solaris
SHA-256 | 9a408181fe00340fc5bf55be918180a0bd1f801d82d6a2d200d836708b7d204d
Secunia Security Advisory 34059
Posted Feb 26, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Drupal, which can be exploited by malicious people to disclose potentially sensitive information.

tags | advisory
SHA-256 | 9474866b50fc23c69af5c8059e6888a762ed7982f4e013b14f4d057cd64b406e
Secunia Security Advisory 34051
Posted Feb 26, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Digital Security Research Group has discovered a vulnerability in JOnAS, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 97abd4b40dfc48f0f19402a95f1b50400de00c95ebe56707a74ca0db9d8885d2
Secunia Security Advisory 34042
Posted Feb 26, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in BarnOwl, which can be exploited by malicious people to potentially compromise a vulnerable system.

tags | advisory, vulnerability
SHA-256 | ec4b872dda3948d0573e750da2b7fad87591bd06fe1c380d91faf1fa05ebdc9d
Secunia Security Advisory 34046
Posted Feb 26, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Val

tags | advisory
SHA-256 | 922314b2561f998b25f6483c414a61ca75ac118fc0d05e14732903af7b0b32fa
Secunia Security Advisory 34030
Posted Feb 26, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for Squid. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, ubuntu
SHA-256 | 4a5883717bd2064274ee18eb2ddf4779e456c2e20ba3bed42eec620c405f0a5a
Mandriva Linux Security Advisory 2009-056
Posted Feb 26, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-056 - The netsnmp_udp_fmtaddr function (snmplib/snmpUDPDomain.c) in net-snmp 5.0.9 through 5.4.2, when using TCP wrappers for client authorization, does not properly parse hosts.allow rules, which allows remote attackers to bypass intended access restrictions and execute SNMP queries, related to source/destination IP address confusion. The updated packages have been patched to prevent this.

tags | advisory, remote, tcp
systems | linux, mandriva
advisories | CVE-2008-6123
SHA-256 | cc74b832c434166e9630357395f6fe99e4f51343ac13cba9aed815b7345b4402
Mandriva Linux Security Advisory 2009-048
Posted Feb 26, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-048-2 - Python has a variable called sys.path that contains all paths where Python loads modules by using import scripting procedure. A wrong handling of that variable enables local attackers to execute arbitrary code via Python scripting in the current Epiphany working directory. This update provides fix for that vulnerability. The previous update package was not built against the correct (latest) libxulrunner-1.9.0.6 library (fixes #48163)

tags | advisory, arbitrary, local, python
systems | linux, mandriva
advisories | CVE-2008-5985
SHA-256 | b032696b04660af22c37e518a131132cba8eb6c58825fe4808fe2fa0e0faa622
Page 2 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close