exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 54 RSS Feed

Files Date: 2009-08-17 to 2009-08-18

Ubuntu Security Notice 818-1
Posted Aug 17, 2009
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice USN-818-1 - Scott Cantor discovered that Curl did not correctly handle SSL certificates with zero bytes in the Common Name. A remote attacker could exploit this to perform a man in the middle attack to view sensitive information or alter encrypted communications.

tags | advisory, remote
systems | linux, ubuntu
advisories | CVE-2009-2417
SHA-256 | 87d7384d403bedb921aab72dddaf26c450c38d3b491ce5ce3c4a0d3c673b2369
TheGreenBow VPN Denial Of Service
Posted Aug 17, 2009
Authored by Evilcry | Site evilcry.altervista.org

TheGreenBow VPN client versions 4.61.003 suffers from a local denial of service vulnerability in tgbvpn.sys.

tags | exploit, denial of service, local
SHA-256 | e0ea557aeaba20df3c36ad63d0a47918f2843ad7fe7be83c63da10582025c08e
Adobe JRUN Directory Traversal
Posted Aug 17, 2009
Authored by Sh2kerr | Site dsecrg.com

Adobe JRun Application Server version 4 updater 7 suffers from a directory traversal vulnerability.

tags | exploit
advisories | CVE-2009-1873
SHA-256 | a9bb76b8db1518a8b84fd46fa28ee3a623c046f5c797d18dff2e20ab5500a9ab
Adobe Coldfusion 8 XSS / XSRF
Posted Aug 17, 2009
Authored by Sh2kerr | Site dsecrg.com

Adobe Coldfusion 8 suffers from cross site scripting and cross site request forgery vulnerabilities.

tags | exploit, vulnerability, xss, csrf
advisories | CVE-2009-1872
SHA-256 | 49f9ee669e1a069a54b29ec05332edca7f85faad63df7b07cebcd25f400c8e50
Piwigo 2.0.0 SQL Injection
Posted Aug 17, 2009
Site senseofsecurity.com.au

Piwigo version 2.0.0 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 70f523fca2812c34e9071d86d676486374c18aa275531deb1cb0a0a266cf7c68
Mandriva Linux Security Advisory 2009-204
Posted Aug 17, 2009
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2009-204 - Integer overflow in the wxImage::Create function in src/common/image.cpp in wxWidgets 2.8.10 allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted JPEG file, which triggers a heap-based buffer overflow.

tags | advisory, denial of service, overflow, arbitrary
systems | linux, mandriva
advisories | CVE-2009-2369
SHA-256 | fd411e86c0abb62e49dcbb06a9bb371a4c10151d6d6cbe04dfad140d75c10b0a
Polymorphic Shellcode To Disable eth0
Posted Aug 17, 2009
Authored by Jonathan Salwan | Site shell-storm.org

eth0 network card disabling polymorphic shellcode for Linux/x86.

tags | x86, shellcode
systems | linux
SHA-256 | b27693455f31b2416b2f93393c268807021608c34376c422293af6af3589d84b
Debian Linux Security Advisory 1865-1
Posted Aug 17, 2009
Authored by Debian | Site debian.org

Debian Security Advisory 1865-1 - Several vulnerabilities have been discovered in the Linux kernel that may lead to denial of service or privilege escalation.

tags | advisory, denial of service, kernel, vulnerability
systems | linux, debian
advisories | CVE-2009-1385, CVE-2009-1389, CVE-2009-1630, CVE-2009-1633, CVE-2009-2692
SHA-256 | fcae27437b2b0fdbfe3736c4335096431f370e8341becfdced7a741ef6ea4579
Debian Linux Security Advisory 1864-1
Posted Aug 17, 2009
Authored by Debian | Site debian.org

Debian Security Advisory 1864-1 - A vulnerability has been discovered in the Linux kernel that may lead to privilege escalation.

tags | advisory, kernel
systems | linux, debian
advisories | CVE-2009-2692
SHA-256 | 009ec0aca4015d32052a8fcf82a6d204c1a7ab6c9be5da98346d1d83ee133a6d
Debian Linux Security Advisory 1863-1
Posted Aug 17, 2009
Authored by Debian | Site debian.org

Debian Security Advisory 1863-1 - Several remote vulnerabilities have been discovered in the zope, a feature-rich web application server written in python, that could lead to arbitrary code execution in the worst case.

tags | advisory, remote, web, arbitrary, vulnerability, code execution, python
systems | linux, debian
advisories | CVE-2009-0668, CVE-2009-0669
SHA-256 | 9b50510b177e062943b28811c9b6700a49751d2e9d25c506bfa91c5bd4ee2182
Rackspace SQL Injection
Posted Aug 17, 2009
Authored by Rohit Bansal

www.rackspace.com suffered from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | f7265e670f795c1d66f8ad62df52f964db75311a6728c1c1d0d37c1b17ec0a53
Easy Music Player 1.0.0.2 WAV Buffer Overflow
Posted Aug 17, 2009
Authored by Ostoure Sazan

Easy Music Player version 1.0.0.2 .wav file universal local buffer overflow exploit.

tags | exploit, overflow, local
SHA-256 | fbf171eed24da261741c833e89c9787cae3cb2bf64be3c44314a873b4be6e4b2
Hyenae Packet Generator
Posted Aug 17, 2009
Authored by Robin Richter | Site sourceforge.net

Hyenae is a highly flexible and platform independent network packet generator. It allows you to reproduce low level Ethernet attack scenarios (such as MITM, DoS, and DDoS) to reveal potential security vulnerabilities of your network. Besides smart wildcard-based address randomization, a highly customizable packet generation control, and an interactive attack assistant, Hyenae comes with a clusterable remote daemon for setting up distributed attack networks.

Changes: This release has bugfixes, an improved attack assistant, extended / fixed documentation, a TCP-Land attack in the attack assistant, and an ICMP-Smurf attack in the attack assistant. It changes the daemon max clients argument (from -C to -m).
tags | tool, remote, scanner, vulnerability
systems | unix
SHA-256 | 250217ea75c2bc9d734031a5fdbcd9407e3c3c910c95de1378b359368cb5f07f
Secunia Security Advisory 36306
Posted Aug 17, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in IBM WebSphere Application Server Feature Pack for SCA, which can be exploited by malicious users to bypass certain security restrictions.

tags | advisory
SHA-256 | f6a9427e31f1b9dbfadcb40ccc9c3f5aac3a1a4425b350af63a972323997ef50
Secunia Security Advisory 36195
Posted Aug 17, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been discovered in Spiceworks, which can be exploited by malicious people to cause a DoS (Denial of Service) and conduct cross-site request forgery attacks.

tags | advisory, denial of service, vulnerability, csrf
SHA-256 | d64d27d53b4131c5c216b4fbaf9a0e4c27dd42287bbeeea063368cda38a6c425
Secunia Security Advisory 36216
Posted Aug 17, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Adam Baldwin has discovered a vulnerability in Spiceworks, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 62e3d53df8ce64b64dc0d23db326380b13178718a3e428a99e131040c1d8ba5a
Secunia Security Advisory 36219
Posted Aug 17, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SwEET-DeViL has reported some vulnerabilities in Alwasel, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, vulnerability, sql injection
SHA-256 | 57081e0a9bf4e7c76e2e40f2018f8d4168042baaa82f4da61f7d77a68688113b
Secunia Security Advisory 36253
Posted Aug 17, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Adam Baldwin has reported a vulnerability in Kayako SupportSuite, which can be exploited by malicious people to conduct script insertion attacks.

tags | advisory
SHA-256 | 82d0570f3ec91543126431f385658b398228348f69953404aa56c6a30a8c5eac
Secunia Security Advisory 36245
Posted Aug 17, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - ilkerkandemir has discovered a vulnerability in the Kunena component for Joomla, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | dd57d2afde633587b83e3123947dd8755e8c9c9c4fb775757a371c81877ad484
Secunia Security Advisory 36227
Posted Aug 17, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Asterisk, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
SHA-256 | ed771f8a529d085ce884b5372055602637d7d80d569e5c675f32cb63ecd1d961
Secunia Security Advisory 36260
Posted Aug 17, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for imagemagick. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a user's system.

tags | advisory, denial of service, vulnerability
systems | linux, debian
SHA-256 | d91198411e86d253cd898b614403cb433228cb65751002b1c67bbbb9ad946bc7
Secunia Security Advisory 36262
Posted Aug 17, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for subversion. This fixes some vulnerabilities, which can be exploited by malicious users and malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
systems | linux, fedora
SHA-256 | a0e3719b79d9329c22e008feaa3f58f8c333a837aeef91ea9734b6759fbdae55
Secunia Security Advisory 36230
Posted Aug 17, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in libvorbis, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise an application using the library.

tags | advisory, denial of service, vulnerability
SHA-256 | e84f418349bd1de17140d879c4b5c70eab372f0c1b6a524f098f234d12a3c618
Secunia Security Advisory 36257
Posted Aug 17, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for subversion. This fixes some vulnerabilities, which can be exploited by malicious users and malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
systems | linux, redhat
SHA-256 | fe6f26390fede37f0b72cae951475c6c2a596f64c9baa2626e1d5203345763f5
Secunia Security Advisory 36105
Posted Aug 17, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in MAXcms, which can be exploited by malicious people to disclose sensitive information and compromise a vulnerable system.

tags | advisory, vulnerability
SHA-256 | 89687214339ad86796c71db7461b6c4982ed03f1cd115062159d77c6a913edcc
Page 1 of 3
Back123Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close