exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 68 of 68 RSS Feed

Files Date: 2010-04-20 to 2010-04-21

Secunia Security Advisory 39501
Posted Apr 20, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for apache2. This fixes some vulnerabilities, which can be exploited by malicious people to gain access to potentially sensitive information and cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | linux, debian
SHA-256 | c4ce7eec0616d3488541e67050dc5be3be50de1c73c602792c5e7ee4c2485016
Secunia Security Advisory 39013
Posted Apr 20, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered two vulnerabilities in e107, which can be exploited by malicious users to conduct script insertion attacks or to compromise a vulnerable system.

tags | advisory, vulnerability
SHA-256 | 49123e7fcfbdcd34b94ca961d9f0a69034aea1dae73cf1ad362a5eb21c9371fc
Secunia Security Advisory 39506
Posted Apr 20, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for kdm. This fixes a security issue, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | linux, debian
SHA-256 | b2a2990e78ed5573402f8f6828864c1ddac30c8dc2bcd70e826bf151b2d29de2
Secunia Security Advisory 39493
Posted Apr 20, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been discovered in openMairie openScrutin, which can be exploited by malicious people to disclose sensitive information and compromise a vulnerable system.

tags | advisory, vulnerability
SHA-256 | 56330adf544fc5a9b4ed5fe33b48767eb92532da489d18694b848a423043efb9
Secunia Security Advisory 39509
Posted Apr 20, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for pidgin. This fixes some weaknesses, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, debian
SHA-256 | 7eb5576a3be0f85defad90eee90369257be958aab1ad079f0c1a53e5a63a033e
Secunia Security Advisory 39461
Posted Apr 20, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for openssl. This fixes some vulnerabilities, where one has unknown impacts while others can be exploited by malicious people to manipulate certain data and cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | linux, fedora
SHA-256 | 804c6e13bb3ec5f95274898d3e2f75ee6075546f4b342cbd3ef1852b4d21a247
Secunia Security Advisory 39489
Posted Apr 20, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in AgentX++, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
SHA-256 | fb34f14423a0eb13479ff52b8773e9b0b8ac3836fe1de3f6c8ad439d49765773
Secunia Security Advisory 39483
Posted Apr 20, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for kdebase. This fixes a security issue, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | linux, fedora
SHA-256 | 7502eb06b99d0dfeb6bcb0e3bca59f762deb77442376149b4a7cb26cbea8e54c
Secunia Security Advisory 39520
Posted Apr 20, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Valentin Hoebel has reported a vulnerability in the JoltCard component for Joomla, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | e3400a155f888100f9955b1def61e3da44a2009028631e406fed277d74913a95
Joomla GBU Facebook SQL Injection
Posted Apr 20, 2010
Authored by kaMtiEz | Site indonesiancoder.com

The Joomla GBU Facebook component version 1.0.5 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | d9cfb90388cc56dba60fd7eb6a09c8b3e44303637719ffe14aaf5f340b3812ac
Sudo 1.7.2p5 Local Privilege Escalation
Posted Apr 20, 2010
Authored by Maurizio Agazzini, Valerio Costamagna | Site lab.mediaservice.net

sudoedit as found in sudo versions 1.7.2p5 and below fails to verify the path of the executable and therefore allows for an easy to exploit local privilege escalation vulnerability.

tags | exploit, local
advisories | CVE-2010-1163
SHA-256 | a12883304c4dce1e37de911cb644e89a0c117cf64d9679955b98211211bdd18a
Ubuntu Security Notice 932-1
Posted Apr 20, 2010
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 932-1 - Sebastian Krahmer discovered a race condition in the KDE Display Manager (KDM). A local attacker could exploit this to change the permissions on arbitrary files, thus allowing privilege escalation.

tags | advisory, arbitrary, local
systems | linux, ubuntu
advisories | CVE-2010-0436
SHA-256 | 4372a4aff4c5766652268cb33f145075be19e371399eba24f8aed1555bfe6f26
TweakFS 1.0 Stack Buffer Overflow
Posted Apr 20, 2010
Authored by corelanc0d3r

TweakFS version 1.0 stack buffer overflow exploit that creates a malicious .zip file.

tags | exploit, overflow
SHA-256 | 905ad02a613f983dda9eaae9bab76456411f4e51d7ef6ac4c81902c6d115408a
ReFrameworker 1.1
Posted Apr 20, 2010
Authored by Erez Metula

ReFrameworker is a general purpose Framework modifier, used to reconstruct framework Runtimes by creating modified versions from the original implementation that was provided by the framework vendor. ReFrameworker performs the required steps of runtime manipulation by tampering with the binaries containing the framework's classes, in order to produce modified binaries that can replace the original ones. This tarball includes both the binary and source code releases.

SHA-256 | 0150edfe2da9666ab255444c54509fb5f54575c6e51ee5e18f42df461e8bee05
e107 Avatar/Photograph Image File Upload
Posted Apr 20, 2010
Site secunia.com

Secunia Research has discovered a vulnerability in e107, which can be exploited by malicious users to compromise a vulnerable system. An error exists in the handling of file uploads for avatar and photograph images. This can be exploited to upload and execute arbitrary PHP code via a specially crafted image file with a ".php.filetypesphp" extension. Successful exploitation requires that "Public Uploads" are disabled (default), but uploads for avatar or photograph images for users are enabled, and a certain server configuration (e.g. an Apache server with the "mod_mime" module installed).e107 version 0.7.19 is affected.

tags | advisory, arbitrary, php, file upload
advisories | CVE-2010-0996
SHA-256 | 45428821d57d683fe1349074f3b121de28a05956ea85e81aa8b952bc93652c39
Joomla iF surfALERT Local File Inclusion
Posted Apr 20, 2010
Authored by AntiSecurity

The Joomla iF surfALERT component version 1.2 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 8991125b0c29e0b5e4fffbc1226069b29359aab85e2b985e261fc55240e30f52
Mandriva Linux Security Advisory 2010-082
Posted Apr 20, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-082 - ClamAV before 0.96 does not properly handle the (1) CAB and (2) 7z file formats, which allows remote attackers to bypass virus detection via a crafted archive that is compatible with standard archive utilities. The qtm_decompress function in libclamav/mspack.c in ClamAV before 0.96 allows remote attackers to cause a denial of service (memory corruption and application crash) via a crafted CAB archive that uses the Quantum (aka.Q) compression format. NOTE: some of these details are obtained from third party information. Packages for 2008.0 are provided for Corporate Desktop 2008.0 customers This update provides clamav 0.96, which is not vulnerable to these issues.

tags | advisory, remote, denial of service, virus
systems | linux, mandriva
advisories | CVE-2010-0098, CVE-2010-1311
SHA-256 | eb840d0860c67dd281facb646f931facd1346a2f4f7d2636f450384c9134a3b0
Mandriva Linux Security Advisory 2010-081
Posted Apr 20, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-081 - A race condition was found in the way mod_auth_shadow used an external helper binary to validate user credentials (username / password pairs). A remote attacker could use this flaw to bypass intended access restrictions, resulting in ability to view and potentially alter resources, which should be otherwise protected by authentication. Packages for 2008.0 are provided for Corporate Desktop 2008.0 customers. The updated packages have been patched to correct this issue.

tags | advisory, remote
systems | linux, mandriva
advisories | CVE-2010-1151
SHA-256 | 9728cb8ba5f7338d78acd40572d815abe86c8eecb05818ae0a772387c321b136
Page 3 of 3
Back123Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close