what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 66 RSS Feed

Files Date: 2010-11-09 to 2010-11-10

Secunia Security Advisory 42195
Posted Nov 9, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - John Leitch has discovered a vulnerability in the Vodpod Video Gallery plugin for WordPress, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 051cd549cef7a05c964ea63af0ab44697a4c1d621aaeba0d4987f0dba70bc7cd
Secunia Security Advisory 42146
Posted Nov 9, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Cisco Intelligent Contact Manager Setup Manager, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
systems | cisco
SHA-256 | 08f8e03141348c1cbdfaec5aa6ae8a38ee3e46750e3cc43b05f794c3f4a38279
Secunia Security Advisory 42130
Posted Nov 9, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Novell ZENworks Handheld Management, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | d255f283901bef06dff181f6e6f3b24911e95b89daa1b6e61530e4c3e96eedc8
Secunia Security Advisory 42183
Posted Nov 9, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for flash-plugin. This fixes multiple vulnerabilities, which can be exploited by malicious people to disclose sensitive information, bypass certain security restrictions, or compromise a user's system.

tags | advisory, vulnerability
systems | linux, redhat
SHA-256 | d467e0a8bcb680d22cadd6c39e319c22a2a6c3365d445a52b60fe6cec5439941
Secunia Security Advisory 42192
Posted Nov 9, 2010
Authored by Secunia | Site secunia.com

Secunia Security Advisory - John Leitch has discovered a security issue in the DB Toolkit plugin for WordPress, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 1f5aab1ea01d45b4f0710d0adad054625fa46e9426769b12b991c2172b954be4
DeluxeBB 1.3 Information Disclosure
Posted Nov 9, 2010
Authored by Vis Intelligendi | Site vis-intelligendi.co.cc

DeluxeBB versions 1.3 and below remote information disclosure exploit.

tags | exploit, remote, info disclosure
SHA-256 | 39b87b4fb943d3ac274fad0d68ed1f22d928fd80c87570b1ecf6fb18525b0af3
Zero Day Initiative Advisory 10-243
Posted Nov 9, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-243 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell GroupWise. Authentication is not required to exploit this vulnerability. The specific flaw exists within the gwwww1.dll module responsible for parsing VCALENDAR data within e-mail messages. When the code encounters a TZNAME variable it allocates up to 0xFFFF bytes for the variable's value. It then proceeds to copy the value into the fixed-length buffer without checking if it will fit. By specifying a large enough string in the e-mail, an attacker can overflow the buffer and execute arbitrary code under the context of the SYSTEM user.

tags | advisory, remote, overflow, arbitrary
SHA-256 | cf2b8c1eee1a4fba2455796399aba75a36ea4a100654d7ff0cee9383f67f47c8
Core Security Technologies Advisory 2010.0825
Posted Nov 9, 2010
Authored by Core Security Technologies, Anibal Sacco, Matias Eissler | Site coresecurity.com

Core Security Technologies Advisory - The Apple Type Services is prone to memory corruption due a sign mismatch vulnerability when handling the last offset value of the CharStrings INDEX structure. This vulnerability could be used by a remote attacker to execute arbitrary code, by enticing the user of Mac OS X v10.5.x to view or download a PDF document containing a embedded malicious CFF font.

tags | advisory, remote, arbitrary
systems | apple, osx
advisories | CVE-2010-1797
SHA-256 | 68f4efdb58f840ab80355a23048b12dea182facc85054b76571b1964d5254a0e
WeBid 0.8.5P1 Local File Inclusion
Posted Nov 9, 2010
Authored by AutoSec Tools

WeBid version 0.8.5P1 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 5bc0d49ec850e74c752eee1d6ab9e07d79d914d2a7decdf09e963cddad3f65c3
WeBid 0.8.5P1 Cross Site Scripting
Posted Nov 9, 2010
Authored by AutoSec Tools

WeBid version 0.8.5P1 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | f0ff17211f2f42b8ea38d8389d38335766bf84651af3a0a89477ffa0754f600f
Hackito Ergo Sum 2011 Call For Papers
Posted Nov 9, 2010
Authored by Hackito Ergo Sum 2011 | Site hackitoergosum.org

The Hackito Ergo Sum 2011 Call For Papers has been announced. It will be held from April 7th to the 9th, 2011 in Paris, France. HES2011 will be a bigger event with even more talks, focusing on hardcore computer and network security, insecurity, vulnerability analysis, reverse engineering, research and hacking, and will try to keep the high quality content.

tags | paper, conference
SHA-256 | 3a31eaa1a7e5a71ea5cdfb8dd7302060a3f7b5f54ecf368cc3e210593d0d91e4
Mandriva Linux Security Advisory 2010-155
Posted Nov 9, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-155 - MySQL before 5.1.48 allows remote authenticated users with alter database privileges to cause a denial of service. Additionally many security issues noted in the 5.1.49 release notes have been addressed with this advisory as well.

tags | advisory, remote, denial of service
systems | linux, mandriva
advisories | CVE-2010-2008, CVE-2010-3683, CVE-2010-3682, CVE-2010-3681, CVE-2010-3679, CVE-2010-3678, CVE-2010-3677, CVE-2010-3680
SHA-256 | a524f186d307832209245b071d7daa4a471c629263fcd6fbfbd50ae724e67063
Zero Day Initiative Advisory 10-242
Posted Nov 9, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-242 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell Groupwise Internet Agent. Authentication is not required to exploit this vulnerability. The flaw exists within the IMAP server component which listens by default on TCP port 143. When handling an IMAP LIST command with a large parameter the process attempts to free the same memory twice. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the IMAP server.

tags | advisory, remote, arbitrary, tcp, imap
SHA-256 | 8b3616827ef624bddd373c340926e11f477a73ae12a6be8397a3813eddbcc3dc
Zero Day Initiative Advisory 10-241
Posted Nov 9, 2010
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 10-241 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell GroupWise. Authentication is not required to exploit this vulnerability. The specific flaw exists within the gwia.exe module responsible for parsing e-mail messages received by the server. When the code encounters a Content-Type header it proceeds to parse out the numbers within its contents. The process does not properly check for signed integers and if it encounters one, it loops excessively while writing to the stack. This can be abused by a remote attacker to execute arbitrary code under the context of the SYSTEM user.

tags | advisory, remote, arbitrary
SHA-256 | 701c3c81c0adea6cbcff461a0e580d8b36f476d7aa30ec65c427dde7e963d52e
osTicket Local File Inclusion
Posted Nov 9, 2010
Authored by d3v1l

osTicket (Open Source Support Ticket System) suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 3797f8f72deb5008eacc5270ae34a4b3d06f0deb3a795a8e932645e5592353e2
Bypass Cross Site Scripting Filters
Posted Nov 9, 2010
Authored by k3nz0

Whitepaper called Bypass Cross Site Scripting Filters.

tags | paper, xss
SHA-256 | 98c54230f673a494f3e75cc0498f1ac15a1c3d915dc49325d4d8a69e7a1150c9
Seo Panel 2.1.0 File Disclosure
Posted Nov 9, 2010
Authored by MaXe

Seo Panel version 2.1.0 suffers from a file disclosure vulnerability.

tags | exploit, info disclosure
SHA-256 | e9cb9ff3fe6d43db7750582807b27f23a216be0ec5249db3d990a282940a61f4
Nevercenter Silo 2.1.1 DLL Hijacking
Posted Nov 9, 2010
Authored by LiquidWorm | Site zeroscience.mk

Nevercenter Silo version 2.1.1 suffers from an insecure library loading vulnerability.

tags | exploit
SHA-256 | a8efe6fae5684a04b324c1c5767de49ec3e6db985ea14cf607c89df68bc2a109
Spree e-commerce JSON Hijacking
Posted Nov 9, 2010
Authored by Rodrigo Rubira Branco

There are multiple JSON hijacking vulnerabilities in Spree e-commerce and as a result, an attacker can steal confidential information such as: product costs, price and quantities and users email, encrypted passwords, tokens, OpenID identifier, phone and address as well as orders count and values by period.

tags | advisory, vulnerability
advisories | CVE-2010-3978
SHA-256 | 129fcbe0112190916cc1826e1e039917100d9c116fdf4c0f538a86a5ca357a91
WordPress Database Interface Toolkit 0.1.7 Shell Upload
Posted Nov 9, 2010
Authored by AutoSec Tools

WordPress Database Interface Toolkit version 0.1.7 shell upload exploit.

tags | exploit, shell
SHA-256 | e4df5996e48942d71f56bd825fdb96d3f3440d9bb868b5f67874a9a64e1a4720
WordPress SEO Tools 3.0 Local File Inclusion
Posted Nov 9, 2010
Authored by AutoSec Tools

WordPress SEO Tools by SEO Automatic version 3.0 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | bab6ce96a2e22b4b4b250d991550bb85f2fe4d13922cc55fac0bb96d9f5d8b30
WordPress jRSS Widget 1.1.1 Local File Inclusion
Posted Nov 9, 2010
Authored by AutoSec Tools

WordPress jRSS Widget version 1.1.1 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 03d89c24ef473b925996d94e22ff0c00945e9766ea481380a99e4dc1e21f8055
WordPress Vodpod Video Gallery 3.1.5 Cross Site Scripting
Posted Nov 9, 2010
Authored by AutoSec Tools

WordPress Vodpod Video Gallery version 3.1.5 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 0e14073e4f5fd1df8a00560c1568756bd32ae2e41573a960d65b958eee9f427d
WordPress Survery And Quiz Tool 1.2.1 Cross Site Scripting
Posted Nov 9, 2010
Authored by AutoSec Tools

WordPress Survery and Quiz Tool version 1.2.1 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 1dc424c16ca8c8a6794ac98e586404cdd5bdb63bbbaa59235441734d6d8ef79b
WordPress Feed List 2.61.01 Cross Site Scripting
Posted Nov 9, 2010
Authored by AutoSec Tools

WordPress Feed List version 2.61.01 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | d84dcfc5e1082526511f3082194886e8dc819c85d60c653c1a4d30f713a15c40
Page 2 of 3
Back123Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close