what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 23 of 23 RSS Feed

Files Date: 2011-06-06 to 2011-06-07

Tele Data Contact Management Server Directory Traversal
Posted Jun 6, 2011
Authored by AutoSec Tools | Site autosectools.com

A directory traversal vulnerability in Tele Data Contact Management Server can be exploited to read files outside of the web root.

tags | exploit, web, root, file inclusion
SHA-256 | 1be46bf8d70514e8501795687aea6acf007a515827d9ff4a5421815fb6998163
Simple Web-Server 1.2 Directory Traversal
Posted Jun 6, 2011
Authored by AutoSec Tools | Site autosectools.com

A directory traversal vulnerability in Simple web-server version 1.2 can be exploited to read files outside of the web root.

tags | exploit, web, root
SHA-256 | 63fb45045d2f2f3690e8e0ba41a9d136bae12b88aa1997f3d7d4b5b700bc1571
Nakid CMS 1.0.2 Cross Site Scripting
Posted Jun 6, 2011
Authored by AutoSec Tools | Site autosectools.com

A reflected cross site scripting vulnerability in Nakid CMS version 1.0.2 can be exploited to execute arbitrary JavaScript.

tags | exploit, arbitrary, javascript, xss
SHA-256 | 62cd6ea41bb8a4bce46b604ae2797ae53ab6bc8cec88a777b99a3892b007766b
Angora Guestbook 1.5 Local File Inclusion
Posted Jun 6, 2011
Authored by AutoSec Tools | Site autosectools.com

A local file inclusion vulnerability in Angora Guestbook version 1.5 can be exploited to include arbitrary files.

tags | exploit, arbitrary, local, file inclusion
SHA-256 | c2b1b1a09c426d65d7e299068e5008f7176f6ac92fba87dddddbb0421a2c7f8c
Debian Security Advisory 2254-1
Posted Jun 6, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2254-1 - OProfile is a performance profiling tool which is configurable by opcontrol, its control utility. Stephane Chauveau reported several ways to inject arbitrary commands in the arguments of this utility. If a local unprivileged user is authorized by sudoers file to run opcontrol as root, this user could use the flaw to escalate his privileges.

tags | advisory, arbitrary, local, root
systems | linux, debian
advisories | CVE-2011-1760
SHA-256 | 671345505987507bee20f85a66a16b5e05e7a18ee3074325ae62c6cc5ea515bf
OpenDrive 1.3.141 Local Password Disclosure
Posted Jun 6, 2011
Authored by Glafkos Charalambous, George Nicolaou

OpenDrive versions 1.3.141 and below local password disclosure exploit.

tags | exploit, local
SHA-256 | 505c98c457c01bf717e455493f3ba56a0610d9acd07aa365213dd13b85002310
Multiple WordPress Themes Cross Site Scripting
Posted Jun 6, 2011
Authored by MustLive

Multiple WordPress themes suffer from cross site scripting and information disclosure vulnerabilities. Themes affected include Live Wire (all three themes from Live Wire series), Gotham News, Typebased, Blogtheme, VibrantCMS, Fresh News, The Gazette Edition, NewsPress, The Station, The Original Premium News, Flash News, Busy Bee, and Geometric.

tags | exploit, vulnerability, xss, info disclosure
SHA-256 | 1a955659244778d9058139f1fa6493227ce6506d22be3379a1d102a1fa381170
Checkpoint FW Cleanup Tool-2
Posted Jun 6, 2011
Authored by Cem Uluyazi, Peter Kuchar

This shell script is to find unused service objects in objects_5_0.C and rulebases_5_0.fws files on Checkpoint Firewalls. It searches for unused services both in service groups and the rulebase, then generates the output list as a text file. If you have the copies of files objects_5_0.C and rulebases_5_0.fws, you can run the script in a bash environment.

tags | tool, shell, firewall, bash
systems | unix
SHA-256 | f364e2e1c181a703d1339e2b608e9304e51fd8f57b139fc754785772749f7da3
Checkpoint FW Cleanup Tool-1
Posted Jun 6, 2011
Authored by Cem Uluyazi, Peter Kuchar

This shell script is to find unused objects in objects_5_0.C and rulebases_5_0.fws files on Checkpoint Firewalls. It searches for unused objects both in object groups and the rulebase, then generates the output list as a text file. If you have the copies of files objects_5_0.C and rulebases_5_0.fws, you can also run the script in a bash environment.

tags | tool, shell, firewall, bash
systems | unix
SHA-256 | 3f04eebb14bcb24142a45260f523afa2976af233ae6bfa598b42a59b3e34c637
Secunia Security Advisory 44861
Posted Jun 6, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for apr. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | linux, fedora
SHA-256 | 84213e6cf0ef05cd383e0b1caaff1410b3a93afe22497a840abb3a621c2c6559
Secunia Security Advisory 44847
Posted Jun 6, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Google Chrome, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 5d916ea2da9927e031bc010d1410c05eb4942033127aff0e1dedee29aad3cdc6
Secunia Security Advisory 44804
Posted Jun 6, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for fontforge. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | linux, debian
SHA-256 | 16183dbfdcdb27bb826dde1546e4730a26cefc0d6f99fcd99f4393945bd89d32
Secunia Security Advisory 44777
Posted Jun 6, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for drupal7. This fixes a vulnerability and a security issue, which can be exploited by malicious users to conduct script insertion attacks and by malicious people to bypass certain security restrictions.

tags | advisory
systems | linux, fedora
SHA-256 | 53e88b9eb98631ad605bd00c510e9ad65edc013ff7d7d9d8a5645349242a10f7
Secunia Security Advisory 44864
Posted Jun 6, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Novell Data Synchronizer, which can be exploited by malicious users to bypass certain security restrictions.

tags | advisory
SHA-256 | 657967cadbcd974bcf9976ada6b31accc992fbc6684f05caa90d80dd0a604bbe
Secunia Security Advisory 44863
Posted Jun 6, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Kolab Server, which can be exploited by malicious people to cause a DoS (Denial of Service), manipulate certain data, and potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
SHA-256 | e1db87a3b57dbdcf176b07ced691a62f4a37b55b4b78adabefc19e441be43a65
Secunia Security Advisory 44860
Posted Jun 6, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for drupal. This fixes two vulnerabilities, which can be exploited by malicious users to conduct script insertion attacks and by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
systems | linux, fedora
SHA-256 | 5822ab1bab1104555a32db6c2138006043aa30b2c8d82cb965efe3de9a745d91
Secunia Security Advisory 44846
Posted Jun 6, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Adobe Flash Player, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 0204b536357e8faf9d174cf7a5b057039aba240172ffeec9519f8016d2ba3187
Secunia Security Advisory 44806
Posted Jun 6, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the vBExperience module for vBulletin, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 2e679b74fe0b17b291cd3200cc0ee3bd3ba68cdfb0724fcd3cdba921e723f941
Secunia Security Advisory 44703
Posted Jun 6, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - rgod has discovered a vulnerability in WebSVN, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | c10bfe658ad4ea8ec088166235e1b2d8d10e1d594032c7dd1eb04315303dc5f7
Secunia Security Advisory 44830
Posted Jun 6, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in vBulletin, which can be exploited by malicious people to conduct spoofing attacks.

tags | advisory, spoof
SHA-256 | 4bacd401ce9f10a5cd777a0e0c28211620c0e05c1ca27e9736b38eeada837af2
Secunia Security Advisory 44855
Posted Jun 6, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - AutoSec Tools has discovered a vulnerability in Nakid CMS, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 99497462ecabdadf12cc086c0e01d0c0960bf2a4d3233df5ecbf43e8474bb8ce
Secunia Security Advisory 44856
Posted Jun 6, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - AutoSec Tools has discovered a vulnerability in Storecalc Simple web-server, which can be exploited by malicious people to disclose sensitive information.

tags | advisory, web
SHA-256 | 4975de85f0eebd9d97f98ee56ea6d68a5b0ea455e5c1d03543e7d83a0b388368
Secunia Security Advisory 44854
Posted Jun 6, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - AutoSec Tools has discovered a vulnerability in TeleData Contact Management Server, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
SHA-256 | 31ebac8d31157ca0a10ee8e5bec760284b1b15497a205df73ddf8d2dc30a44d3
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close