what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 62 RSS Feed

Files Date: 2010-11-02 to 2010-11-03

Secunia Security Advisory 42058
Posted Nov 2, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in XWiki Enterprise, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks.

tags | advisory, vulnerability, xss, sql injection
SHA-256 | cdf67dedb37d2cc263be57fa2396f2e96004988a5c8a8954a5ff5071869752d5
DotDotPwn - The Directory Traversal Fuzzer 2.1
Posted Nov 2, 2010
Authored by nitr0us, chr1x

DotDotPwn is a very flexible intelligent fuzzer to discover directory traversal vulnerabilities in software such as Web/FTP/TFTP servers, Web platforms such as CMSs, ERPs,Blogs, etc. Also, it has a protocol-independent module to send the desired payload to the host and port specified. On the other hand, it also could be used in a scripting way using the STDOUT module.

tags | web, vulnerability, protocol, fuzzer
SHA-256 | dc08b1efa2acdffd376cece72189cb8862611ee023be690fd9a155d4b30878b6
Project Jug Directory Traversal
Posted Nov 2, 2010
Authored by AutoSec Tools

Project Jug suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | 79006997172966b54b187c9df26903a9b90e01cf14bbbdb15c5506e62367756c
Mandriva Linux Security Advisory 2010-218
Posted Nov 2, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-218 - Stack consumption vulnerability in the filter_var function in PHP 5.2.x through 5.2.14 and 5.3.x through 5.3.3, when FILTER_VALIDATE_EMAIL mode is used, allows remote attackers to cause a denial of service via a long e-mail address string. A NULL pointer dereference was discovered in ZipArchive::getArchiveComment. A possible flaw was discovered in open_basedir.

tags | advisory, remote, denial of service, php
systems | linux, mandriva
advisories | CVE-2010-3710, CVE-2010-3709, CVE-2010-3436
SHA-256 | 37d3774ae0de303318f0471adca3f67d29f0f7aa433586ad23ec8e9b8b0107b3
Elastix Cross Site Scripting
Posted Nov 2, 2010
Authored by dave b

The Elastix interface for Asterisk suffers from cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 3a094259a8cded44e43a66f5413a8ac6d7f4d9e204648efb752b610bda664c55
cforms WordPress Plugin Cross Site Scripting
Posted Nov 2, 2010
Authored by Rodrigo Rubira Branco

The cforms WordPress plugin suffers from a cross site scripting vulnerability. Version 11.5 is affected.

tags | exploit, xss
advisories | CVE-2010-3977
SHA-256 | 1e73fd19bd42e9d6d569ea3750b2bfb41338b03125cfcacefd4f28b8adc31117
Joomla 1.5.20 SQL Injection
Posted Nov 2, 2010
Site yehg.net

Joomla! CMS version 1.5.20 suffers from remote SQL injection vulnerabilities.

tags | advisory, remote, vulnerability, sql injection
SHA-256 | c1a8027c02a7904543d3c4f495068510f261e40d351a5a4ca5cdf5ea614044bf
WebDM CMS SQL Injection
Posted Nov 2, 2010
Authored by Cru3l.b0y

WebDM CMS suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 21069ec0eafb5e19f8171c8a800288657d183d7c9de707d294acf9f50370a9ec
Mandriva Linux Security Advisory 2010-217
Posted Nov 2, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-217 - Dovecot 1.2.x before 1.2.15 and 2.0.x before 2.0.beta2 grants the admin permission to the owner of each mailbox in a non-public namespace, which might allow remote authenticated users to bypass intended access restrictions by changing the ACL of a mailbox, as demonstrated by a symlinked shared mailbox. Dovecot 1.2.x before 1.2.15 allows remote authenticated users to cause a denial of service by simultaneously disconnecting many POP3 sessions. Various other issues have also been addressed.

tags | advisory, remote, denial of service
systems | linux, mandriva
advisories | CVE-2010-3779, CVE-2010-3780, CVE-2010-3304, CVE-2010-3706, CVE-2010-3707
SHA-256 | 595ff091e6aa58234bddf6c637804c9a21aa3bffabdfb1bf41b586ca1b7c28a7
SSLstrip - Hijacking SSH Sessions
Posted Nov 2, 2010
Authored by Sam Bowne | Site samsclass.info

Whitepaper called SSLstrip - Hijacking SSH Sessions.

tags | paper
SHA-256 | 5745beeb039acdae1c1b52c5abaee2fc2df00243c3d75c72b00be26bbf9dc7ec
HP Security Bulletin HPSBMA02598 SSRT100314 2
Posted Nov 2, 2010
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin HPSBMA02598 SSRT100314 2 - Potential security vulnerabilities have been identified in HP Insight Control virtual machine management for Windows. The vulnerabilities could be exploited remotely resulting in cross site scripting (XSS), Denial of Service (DoS), or cross site request forgery (CSRF). Revision 2 of this advisory.

tags | advisory, denial of service, vulnerability, xss, csrf
systems | windows
advisories | CVE-2010-3987, CVE-2010-3988, CVE-2010-3989
SHA-256 | 8f5634d0fde0a1ad0b01cf4f0be355b4c8a0e89cd402bbb6c45fae9ab16bfdc3
Binding The Daemon - FreeBSD Kernel Stack and Heap Exploitation
Posted Nov 2, 2010
Authored by Patroklos Argyroudis | Site census-labs.com

Whitepaper call Binding the Daemon: FreeBSD Kernel Stack and Heap Exploitation.

tags | paper, kernel
systems | freebsd
SHA-256 | 731108acfa98e373bcbbecc7bde0ae45936a7487deb43212ee1c90225166071d
Linux IPTables Firewall 1.4.10
Posted Nov 2, 2010
Site iptables.org

iptables is built on top of netfilter, the packet alteration framework for Linux 2.4.x and 2.6.x. It is a major rewrite of its predecessor ipchains, and is used to control packet filtering, Network Address Translation (masquerading, portforwarding, transparent proxying), and special effects such as packet mangling.

Changes: This release contains support for the new features in kernel 2.6.36, documentation updates, and bugfixes.
tags | tool, firewall
systems | linux
SHA-256 | 7544e437d2222078b15e6cd063b521c6f1ec4dac49e6af9ba3bfece2a6a93445
Bluelog Bluetooth Scanner/Logger 0.9.7
Posted Nov 2, 2010
Authored by Tom Nardi | Site digifail.com

Bluelog is a Bluetooth scanner/logger written with speed in mind. It is intended to be used as a site survey tool, concerned more about accurately detecting the number of discoverable Bluetooth devices than individual device specifics. Bluelog also includes the unique "Bluelog Live" mode, which puts discovered devices into a constantly updating live webpage which you can serve up with your HTTP daemon of choice.

Changes: Major changes include the introduction of a proper daemon mode, logging to syslog, and use of PID files to control simultaneous running instances. Minor changes include a large reworking and fleshing out of the documentation and man page.
tags | tool, web, wireless
SHA-256 | d90002b0e8944f4180373523d324d99075e30a5b373cf66771f1f9c1da3283c6
Scannedonly Samba VFS Module 0.21
Posted Nov 2, 2010
Authored by Olivier Sessink | Site olivier.sessink.nl

Scannedonly is a samba VFS module that ensures that only files that have been scanned for viruses are visible and accessible to the end user. Scannedonly was developed because of scalability problems with samba-vscan. Scannedonly comes in two parts: a Samba VFS module and (one or more) daemons. The daemon scans files and marks them when they are known to be clean. The samba module simply filters out files that aren't marked clean.

Changes: ctime is now used instead of mtime, which provides a more reliable timestamp. The clamav daemon now cleans the queue if duplicate file names are requested.
tags | tool, scanner
systems | unix
SHA-256 | 20601c0466034cc250ded1a16d737451cfbe05fbcaf4f667ff25fe004bd1340e
Oracle Penetration Testing Using The Metasploit Framework
Posted Nov 2, 2010
Authored by Chris Gates, Mario Ceballos

Whitepaper called Oracle Penetration Testing Using the Metasploit Framework.

tags | paper
SHA-256 | 5f83e34bb9fafd4e3e942567202ceb11434ef372ffb87749583ed54f98922e90
Front Accounting Multiple Cross Site Scripting
Posted Nov 2, 2010
Authored by Juan Manuel Garcia | Site cybsec.com

CYBSEC Security Advisory - Front Accounting version 2.3RC2 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | efa6ac5b099063be47c0cd241b664a1a44b372f719388710cb7a20410e240299
Weaponizing Wireless Networks
Posted Nov 2, 2010
Authored by Neeli R. Prasad, Tassos Dimitriou, Thanassis Giannetsos

Whitepaper called Weaponizing Wireless Networks: An Attack Tool For Launching Attacks Against Sensor Networks.

tags | paper
SHA-256 | c859b76bf4708da35aa34cb42017fa87e93cd3b846c3c42a7bbf3454cc857b6e
DTrace - The Reverse Engineer's Unexpected Swiss Army Knife
Posted Nov 2, 2010
Authored by David Weston, Tiller Beauchamp

Whitepaper called DTrace: The Reverse Engineer's Unexpected Swiss Army Knife.

tags | paper
SHA-256 | 968e7ac92d1f5d154cc3f91794a6fb1b8e8e6e0ea781452fa6204c52a857407a
Enough With Default Allow In Web Applications!
Posted Nov 2, 2010
Authored by Ofer Shezaf, Ivan Ristic

Whitepaper called Enough With Default Allow in Web Applications.

tags | paper, web
SHA-256 | a402c62a351e33f918d7dc2a7fee65724f61d30dba91b99ef72c34678f7e283f
Intelligent Debugging and In-Memory Fuzzers
Posted Nov 2, 2010
Authored by Amandeep Bharti, Pratik Agarwal, Vishwas Sharma

Whitepaper called Intelligent Debugging and In-Memory Fuzzers.

tags | paper, fuzzer
SHA-256 | cfc1b0b99e77a91f3c6b2cd9dcbb873fb94901080b19135447424e67b0a48446
Software Fuzzing With Wireplay
Posted Nov 2, 2010
Authored by Abhisek Datta

Whitepaper called Software Fuzzing with Wireplay.

tags | paper
SHA-256 | cb44053cdc8d9fc90df948d6e5bd037aa99b3e841a178cf7781cf006a23c4dd8
XAMPP 1.7.3 Cross Site Scripting / File Disclosure
Posted Nov 2, 2010
Authored by TheLeader

XAMPP versions 1.7.3 and below suffer from cross site scripting and file disclosure vulnerabilities.

tags | exploit, vulnerability, xss, info disclosure
SHA-256 | 5074d9a88205305ade7bae520a91f91ef678952b22e07c1a77236a103c0faf43
HP Security Bulletin HPSBMA02607 SSRT100214
Posted Nov 2, 2010
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin HPSBMA02607 SSRT100214 - A potential security vulnerabilities has been identified in HP Insight Control for Linux. The vulnerability could be exploited remotely to allow cross site request forgery (CSRF). Revision 1 of this advisory.

tags | advisory, vulnerability, csrf
systems | linux
advisories | CVE-2010-4106
SHA-256 | 33f22963c0e27499e6f436f7c38c4463582cb0cd03bbccbe536a2a3596d8de2d
strongSwan IPsec / IKEv1 / IKEv2 Implementation For Linux 4.5.0
Posted Nov 2, 2010
Authored by Andreas Steffen | Site strongswan.org

strongSwan is a complete IPsec and IKEv1 implementation for Linux 2.4 and 2.6 kernels. It interoperates with most other IPsec-based VPN products. It is a descendant of the discontinued FreeS/WAN project. The focus of the strongSwan project is on strong authentication mechanisms using X.509 public key certificates and optional secure storage of private keys on smartcards through a standardized PKCS#11 interface. A unique feature is the use of X.509 attribute certificates to implement advanced access control schemes based on group memberships.

Changes: IKEv2 is now the default key exchange mode. IKEv2 EAP-TLS, EAP-TTLS, and EAP-TNC (Trusted Network Connect) authentication modes terminated either on a strongSwan gateway or a remote AAA server are supported. PKCS#11 smartcards are supported for IKEv2.
tags | kernel, encryption
systems | linux
SHA-256 | 0b3e461e185dea0e9e029574a0d97f44bc82fad91e8a5cfb3112cdc1879bad57
Page 2 of 3
Back123Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close