what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 112 RSS Feed

Files Date: 2009-07-28 to 2009-07-29

Debian Linux Security Advisory 1842-1
Posted Jul 28, 2009
Authored by Debian | Site debian.org

Debian Security Advisory 1842-1 - Several vulnerabilities have been discovered in the OpenEXR image library, which can lead to the execution of arbitrary code.

tags | advisory, arbitrary, vulnerability
systems | linux, debian
advisories | CVE-2009-1720, CVE-2009-1721, CVE-2009-1722
SHA-256 | 8d18f6423121c538bbd91b77365f7764e2414d77a4dd4336126808a7cbfe6741
Joomla Groups Blind SQL Injection
Posted Jul 28, 2009
Authored by Prince_Pwn3r

The Joomla Groups component version 1.0 suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 715290c3378fc82ed5669cff96f41e7a0e7eea967ee73383e06d6b515eda8e26
Free Games Board Cross Site Scripting
Posted Jul 28, 2009
Authored by PLATEN

Free Games Board CMS suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | b5da6c7ac3d3b44e127cc37f9704cdad79036b689918f54a452d1327665c1287
Secunia Security Advisory 36039
Posted Jul 28, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Asterisk, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | f14cc8c7e5279edd4d0b6aa41fe7e187dea3658fb610828c7bea9b205b6f50b5
Secunia Security Advisory 36016
Posted Jul 28, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Chip D3 Bi0s has reported a vulnerability in Ultimate Regnow Affiliate (URA), which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 36cad39cf512aa3484c71687a7d480e7f73aa56269d4d3fe2492cb08156e408c
Secunia Security Advisory 36015
Posted Jul 28, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SirGod has discovered some vulnerabilities in iWiccle, which can be exploited by malicious people and malicious users to disclose sensitive information.

tags | advisory, vulnerability
SHA-256 | 0a4f1d41b0c82620406c0db2df2a7f68b4bb910838b77b0845cfe01891e31e57
Secunia Security Advisory 35953
Posted Jul 28, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in VS PANEL, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 74b4871fce1e6809a47f34613f0404d64cf776540db8c5ba23e1f58c8c66fb2d
Secunia Security Advisory 36032
Posted Jul 28, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for openexr. This fixes some vulnerabilities, which can be exploited by malicious people to potentially compromise an application using the library.

tags | advisory, vulnerability
systems | linux, debian
SHA-256 | 1f1feb23311b54cf5fbc4b0a665c62b8f1aedf380e04171fab11e3bdc36da678
Secunia Security Advisory 35962
Posted Jul 28, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Three vulnerabilities have been reported in Internet Explorer, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | c934edb9d5676ae211c829c27332523f3c9e7544be79266a59f8dd117db8c83b
Secunia Security Advisory 36034
Posted Jul 28, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Moudi has reported some vulnerabilities in 68 Classifieds, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | e94cc66f8b86e93481a91d7c8ef63ed734209789d17993ee0e549dc3d6672e26
Secunia Security Advisory 35973
Posted Jul 28, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - MizoZ has reported a vulnerability in Super Mod System, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | b2d1ca6ac0e2eb370900c2a0bc5456baad192385476d887f9ffe1a384c6fa8db
Secunia Security Advisory 35967
Posted Jul 28, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Microsoft Visual Studio, which can be exploited by malicious people to potentially bypass security features, gain knowledge of sensitive information, or compromise applications built using ATL (Active Template Library).

tags | advisory, vulnerability
SHA-256 | b02670075578577a8069aaec987f90046f7ed6742f24a80fca341db41be0409a
Secunia Security Advisory 35975
Posted Jul 28, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - boom3rang has reported a vulnerability in Inout Adserver, which can be exploited by malicious users to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 2fc5a38345dddc313eab18aee99b6d0afe3609634346436922d59ee8f49446b5
Mandriva Linux Security Advisory 2009-161
Posted Jul 28, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-161 - Due to incorrect buffer limits and related bound checks Squid is vulnerable to a denial of service attack when processing specially crafted requests or responses. Due to incorrect data validation Squid is vulnerable to a denial of service attack when processing specially crafted responses. This update provides fixes for these vulnerabilities.

tags | advisory, denial of service, vulnerability
systems | linux, mandriva
SHA-256 | e8b33587296894599621228b943c8f2a2159e5cff07e3213709a46fb4c3bbb5b
Mandriva Linux Security Advisory 2009-160
Posted Jul 28, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-160 - The BigDecimal library in Ruby 1.8.6 before p369 and 1.8.7 before p173 allows context-dependent attackers to cause a denial of service (application crash) via a string argument that represents a large number, as demonstrated by an attempted conversion to the Float data type. This update corrects the problem.

tags | advisory, denial of service, ruby
systems | linux, mandriva
advisories | CVE-2009-1904
SHA-256 | 1a4fc3227a9c7ac57cc3cb0a7ef3171a6b6750fcdf5356e6937f862a5750b2ff
Cisco Security Advisory 20090727-wlc
Posted Jul 28, 2009
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - Multiple vulnerabilities exist in the Cisco Wireless LAN Controller (WLC) platforms.

tags | advisory, vulnerability
systems | cisco
advisories | CVE-2009-1164, CVE-2009-1165, CVE-2009-1166, CVE-2009-1167
SHA-256 | 6c17f49f0b1ebec8f9e8f8ef8b0c98af6a0c9efa00c8979e8b1fc10bbb5d7a5f
Limmy 1.01 SQL Injection
Posted Jul 28, 2009
Authored by SirGod | Site insecurity.ro

Limmy version 1.01 suffers from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection
SHA-256 | ce04046875cd37d714ad31a19a5517c33c5da30e4ee84918deca297bde6d61f9
SerWeb Remote File Inclusion
Posted Jul 28, 2009
Authored by GolD_M | Site tryag.cc

SerWeb versions 2.1.0-dev1 and below suffer from multiple remote file inclusion vulnerabilities.

tags | exploit, remote, vulnerability, code execution, file inclusion
SHA-256 | 711dc04a927a02d0e27a65df20f1cd0e13c36c5785979a3ca1030c9d9ac9156f
Magician Blog 1.0 Authentication Bypass
Posted Jul 28, 2009
Authored by Evil-Cod3r

Magician Blog versions 1.0 and below suffer from a remote SQL injection vulnerability that allows for authentication bypass.

tags | exploit, remote, sql injection, bypass
SHA-256 | 9dd95f4eae6e913164270c682042815ae518e94d923c2f9ee8a93af7455f94ab
Magician Blog 1.0 SQL Injection
Posted Jul 28, 2009
Authored by Evil-Cod3r

Magician Blog versions 1.0 and below suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 79b3b7d81caaf1486cad7aa18de32837d587f91b4dd8306bae7723a0d4f94d12
SSH Keychain Utility
Posted Jul 28, 2009
Authored by Aron Griffis | Site gentoo.org

keychain is a utility that helps manage ssh keys in a convenient and secure manner. It acts as a frontend to ssh-agent, but allows the user to easily have one long running ssh-agent process per system, rather than the norm of one ssh-agent per login session. It also makes it easy for remote cron jobs to securely hook-in to a long running ssh-agent process, allowing your scripts to take advantage of key-based logins.

Changes: Mac OS X color fix. Perl 5.10 Makefile fix. A few other improvements.
tags | remote, encryption
SHA-256 | af37ffef601e73e11dfcb9359092a7b77875159839774ea15a48a24194f312af
Libcap-NG Library
Posted Jul 28, 2009
Site people.redhat.com

The libcap-ng library is intended to make programming with POSIX capabilities much easier than the traditional libcap library. It includes utilities that can analyze all currently running applications to locate applications that may have too many privileges.

Changes: In netcap, this release will not complain about missing UDP or raw network files. A small adjustment has been made to the bit representation of file-based capabilities.
tags | library
SHA-256 | ab38136549e2bbbd5bed8738bc8647b37d0f06df711e526f7ee3ea001fce0b5e
Hyenae Packet Generator
Posted Jul 28, 2009
Authored by Robin Richter | Site sourceforge.net

Hyenae is a highly flexible and platform independent network packet generator. It allows you to reproduce low level Ethernet attack scenarios (such as MITM, DoS, and DDoS) to reveal potential security vulnerabilities of your network. Besides smart wildcard-based address randomization, a highly customizable packet generation control, and an interactive attack assistant, Hyenae comes with a clusterable remote daemon for setting up distributed attack networks.

Changes: An attack assistant was added. Minor code refactoring was done. The documentation was updated and fixed. Randomization on ARP attacks was made equal for source and sender HW-Address.
tags | tool, remote, scanner, vulnerability
systems | unix
SHA-256 | c56bfbe97e29a46bf1cb1b30c024b38b31ee81e5be5d165417e22712be8c9faf
Allomani Movies And Clips 2.7.0 SQL Injection
Posted Jul 28, 2009
Authored by Qabandi

Allomani Movies and Clips version 2.7.0 remote blind SQL injection exploit.

tags | exploit, remote, sql injection
SHA-256 | 39da39a7a4ea6873f4b295ec43063484f4bbddeb1547c74cd1bd68938b7dc177
Allomani Songs And Clips 2.7.0 SQL Injection
Posted Jul 28, 2009
Authored by Qabandi

Allomani Songs and Clips version 2.7.0 blind SQL injection exploit.

tags | exploit, sql injection
SHA-256 | 88446b22334c6032982966c45fc9a6ce61207dcb343cf970bb2effb8e1ae7852
Page 3 of 5
Back12345Next

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    0 Files
  • 6
    Aug 6th
    0 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    0 Files
  • 9
    Aug 9th
    0 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close