exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 70 RSS Feed

Files Date: 2009-05-27 to 2009-05-28

Mandriva Linux Security Advisory 2009-123
Posted May 27, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-123 - src/tools/pkcs11-tool.c in pkcs11-tool in OpenSC 0.11.7, when used with unspecified third-party PKCS#11 modules, generates RSA keys with incorrect public exponents, which allows attackers to read the cleartext form of messages that were intended to be encrypted. The updated packages fix the issue.

tags | advisory
systems | linux, mandriva
advisories | CVE-2009-1603
SHA-256 | 7755490ed17aa91e9865b7bf6b17efa65a870ed74c74f7f9dc10916880b6e040
SEH Buffer Overflows Explained
Posted May 27, 2009
Authored by SecurityRules | Site sec-r1z.com

Whitepaper called Buffer Overflow Exploitation SEH Explained. Written in Arabic.

tags | paper, overflow
SHA-256 | b176886256e50ed93c85b0f5730e4144eb6ae2112a8d559480a488bd3e759f3d
Understanding SQL Injection
Posted May 27, 2009
Authored by k4m1k451

Whitepaper called Understanding SQL Injection. Written in Portuguese.

tags | paper, sql injection
SHA-256 | af987039e63ecaf10627212cb4cc10fd0b3928911e5862ae152fed93ba43490f
Gentoo Linux Security Advisory 200905-9
Posted May 27, 2009
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory GLSA 200905-09 - Multiple heap-based buffer overflow vulnerabilities in libsndfile might allow remote attackers to execute arbitrary code. Versions less than 1.0.20 are affected.

tags | advisory, remote, overflow, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2009-1788, CVE-2009-1791
SHA-256 | 93da091dbd2e5ce946b35c5825e1fc34c873fc0b15d3881bbe1fdf77c416653d
HP Security Bulletin HPSBUX02429 SSRT090058
Posted May 27, 2009
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin - Potential security vulnerabilities have been identified in Java Runtime Environment (JRE) and Java Developer Kit (JDK) running on HP-UX. These vulnerabilities could allow remote unauthorized access, privilege escalation, execution of arbitrary code, and Denial of Service (DoS).

tags | advisory, java, remote, denial of service, arbitrary, vulnerability
systems | hpux
advisories | CVE-2009-1093, CVE-2009-1094, CVE-2009-1095, CVE-2009-1096, CVE-2009-1097, CVE-2009-1098, CVE-2009-1099, CVE-2009-1100, CVE-2009-1101, CVE-2009-1102, CVE-2009-1103, CVE-2009-1104, CVE-2009-1105, CVE-2009-1106, CVE-2009-1107
SHA-256 | 21cffee8fc96ccc19efc5adaec63bae7ffc58b656b9a38a128b04eee39aabdc5
Kismet Wireless Tool
Posted May 27, 2009
Authored by Mike Kershaw | Site kismetwireless.net

Kismet is an 802.11 layer 2 wireless network sniffer. It can sniff 802.11b, 802.11a, and 802.11g traffic. It is capable of sniffing using almost any wireless card supported in Linux, which currently divide into cards handled by libpcap and the Linux-Wireless extensions (such as Cisco Aironet), and cards supported by the Wlan-NG project which use the Prism/2 chipset (such as Linksys, Dlink, and Zoom). Besides Linux, Kismet also supports FreeBSD, OpenBSD and Mac OS X systems. Features Multiple packet capture sources, Runtime network sorting by AP MAC address (bssid), IP block detection via ARP and DHCP packet dissection, Cisco product detection via CDP, Ethereal and tcpdump compatible file logging, Airsnort-compatible "interesting" (cryptographically weak) logging, Secure SUID behavior, GPS devices and wireless devices fingerprinting. Kismet also includes a tool called gpsmap that can be used to create maps from logged GPS data.

Changes: This release has a single bugfix for a parsing error in generating the command line to launch the Kismet server from inside the UI.
tags | tool, wireless
systems | cisco, linux, freebsd, openbsd, apple, osx
SHA-256 | d6e2cb1c14364dc2d8db363d72a311d54353f6491970d5cdc0b808d333642d4b
strongSwan IPsec / IKEv1 / IKEv2 Implementation For Linux
Posted May 27, 2009
Authored by Andreas Steffen | Site strongswan.org

strongSwan is a complete IPsec and IKEv1 implementation for Linux 2.4 and 2.6 kernels. It interoperates with most other IPsec-based VPN products. It is a descendant of the discontinued FreeS/WAN project. The focus of the strongSwan project is on strong authentication mechanisms using X.509 public key certificates and optional secure storage of private keys on smartcards through a standardized PKCS#11 interface. A unique feature is the use of X.509 attribute certificates to implement advanced access control schemes based on group memberships.

Changes: This release fixes two DoS vulnerabilities in the charon daemon that were discovered by fuzzing techniques. A couple of bugs caused by the massive 4.3.0 refactoring were fixed.
tags | kernel, encryption
systems | linux
SHA-256 | 1d34d793bc7cd109fa7a19486e58341d729f701d4d8736dcde568c94280d972e
AdPeeps 8.5d1 Cross Site Scripting
Posted May 27, 2009
Authored by intern0t

AdPeeps version 8.5d1 suffers from cross site scripting and HTML injection vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 3093e37ea794ca14328223f576eed8a81a3ff254bc77417ba5b9655951863885
Evernew Free Joke Script 1.2 SQL Injection
Posted May 27, 2009
Authored by taRentReXx

Evernew Free Joke Script version 1.2 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | fa7bb2e533a6e3dc591efa6e1d919e69c6ba264a9afbb539847a9ee3e95d2637
SiteX 0.7.4.418 Local File Inclusion
Posted May 27, 2009
Authored by ahmadbady

SiteX versions 0.7.4.418 and below suffer from local file inclusion vulnerabilities.

tags | exploit, local, vulnerability, file inclusion
SHA-256 | e48986405521947037729d3f633d0930c34dacca715f24b4cf684365d483b673
Vanilla 1.1.7 Cross Site Scripting
Posted May 27, 2009
Authored by Attila Gerendi

Vanilla version 1.1.7 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 779b2b4d0010280d013da4219c6ea694286e7de33cef4864456750dc85583352
PHP-Nuke 8.0 SQL Injection
Posted May 27, 2009
Authored by Attila Gerendi

PHP-Nuke version 8.0 suffers from a REFERER related SQL injection vulnerability.

tags | exploit, php, sql injection
SHA-256 | 02acf1698f582c2f5bcb8693ec211caa486de532d640b36c24719dd6188b4ab8
Easy Px 41 CMS Local File Inclusion
Posted May 27, 2009
Authored by ThE g0bL!N | Site h4ckf0ru.com

Easy Px 41 CMS version 09.00.00B1 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | c72faec39b482c8708a660980941446c81114a44d7db3becf2a2c4069b2765f8
Joomla AgoraGroup 0.3.5.3 SQL Injection
Posted May 27, 2009
Authored by Chip D3 Bi0s

The Joomla AgoraGroup component version 0.3.5.3 suffers from a blind SQL injection vulnerability.

tags | exploit, sql injection
SHA-256 | 46965ff0cd58d5a95acee4e5830eee0b7a31616329c8140503cb61afd32f1b94
Million Dollar Text Links 1.x Insecure Cookie
Posted May 27, 2009
Authored by HxH

Million Dollar Text Links version 1.x suffers from an insecure cookie handling vulnerability.

tags | exploit, insecure cookie handling
SHA-256 | e567acc8ed6555753c7119fedab15ddef71abc73e73331d74f23d75b0c63a1cd
Secunia Security Advisory 35244
Posted May 27, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in the WP-Lytebox plugin for WordPress, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
SHA-256 | bb891ebeca6db0e8aa12fe3f9c4eb538419d393dc3ad8b24702437bd453031dc
Secunia Security Advisory 35216
Posted May 27, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Tielei Wang has discovered a vulnerability in ImageMagick, which can be exploited by malicious people to potentially compromise a user's system.

tags | advisory
SHA-256 | 6771669645f23309589231acf9a73a3acc21fb11cf25b3b0a67964cefd6320d2
Secunia Security Advisory 35195
Posted May 27, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - pyrokinesis has discovered a vulnerability in jetAudio, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | f941a8a048ab5fc792f8de647f5433f4bd690f7b1764d58df5ef27f7b904db6f
Secunia Security Advisory 35237
Posted May 27, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been discovered in RoomPHPlanning, which can be exploited by malicious people to bypass certain security restrictions and conduct SQL injection attacks.

tags | advisory, vulnerability, sql injection
SHA-256 | d0948645301be76042a283aec11128aa6003f2e6007bfc916a57493ccf8b4fb3
Secunia Security Advisory 35245
Posted May 27, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - staker has discovered a vulnerability in cpCommerce, which can be exploited by malicious people to disclose sensitive information or compromise a vulnerable system.

tags | advisory
SHA-256 | 1ae0be76d42af68bf444379af9539d5773072b805f35b988562fda378be985be
Secunia Security Advisory 35240
Posted May 27, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Hot or Not Script, which can be exploited by malicious people to bypass certain security restrictions, disclose sensitive information, or to compromise a vulnerable system.

tags | advisory, vulnerability
SHA-256 | ca7d289c3089c035b04dcb42abd793508b70a86f845a2b77fcb12d8344325388
Secunia Security Advisory 35227
Posted May 27, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - KiM has discovered a vulnerability in WebMember, which can be exploited by malicious users to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 48e0d823e7ee9e8d865c6e5e2c05b250b949125e2373ff4717062d8a94f28477
Secunia Security Advisory 35189
Posted May 27, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Serena Dimensions CM, which can be exploited by malicious people to conduct spoofing attacks.

tags | advisory, spoof
SHA-256 | f47939806ed7e06698638e4eca1640f1b8de4a3844de526bee053852e115a0a0
Secunia Security Advisory 35246
Posted May 27, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Mole Group Adult Portal Script, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | b33ab39945eaa904ed4c4bfcfa18dfbe9ece2f5d8f0bd7bdf057374440d45908
Secunia Security Advisory 35208
Posted May 27, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Hakxer has reported some vulnerabilities in Zeeways PhotoVideoTube, which can be exploited by malicious people to bypass certain security restrictions or conduct script insertion attacks and by malicious users to potentially to compromise a vulnerable system.

tags | advisory, vulnerability
SHA-256 | 673b859f471cfe55e85dc57f6731cfa8a44a1d109fa81f0095bc047852717c8c
Page 1 of 3
Back123Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close