exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 794 RSS Feed

Files Date: 2011-09-01 to 2011-09-30

WordPress Mingle Forum 1.0.31 SQL Injection
Posted Sep 28, 2011
Authored by Miroslav Stampar

WordPress Mingle Forum plugin versions 1.0.31 and below suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | c654afe3a55693ffb3374390dd876112a0eb7f3eeba8ef92d756f940cf428205
Cisco Security Advisory 20110928-nat
Posted Sep 28, 2011
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - The Cisco IOS Software network address translation (NAT) feature contains multiple denial of service (DoS) vulnerabilities in the translation of multiple protocols. Cisco has released free software updates that address these vulnerabilities.

tags | advisory, denial of service, vulnerability, protocol
systems | cisco
advisories | CVE-2011-0946, CVE-2011-3276, CVE-2011-3277, CVE-2011-3278, CVE-2011-3279, CVE-2011-3280
SHA-256 | e071e8cf0c9a04c74dd457a5df6b6f75145eca329e618d38d8ba34088be76e8f
Novell GroupWise Calendar RRULE Remote Buffer Overflow
Posted Sep 28, 2011
Authored by Sebastien Renaud, VUPEN | Site vupen.com

VUPEN Vulnerability Research Team discovered a critical vulnerability in Novell GroupWise. The vulnerability is caused by a buffer overflow error in the "NgwIRecurByWeekdayParam::bywdaylist()" function within the "gwwww1.dll" component when processing a malformed "RRULE" property in a Calendar, which could be exploited by remote unauthenticated attackers to compromise a vulnerable server via a specially crafted email message. Versions 8.0.2 SP2 Hot Patch 2 and below are affected.

tags | advisory, remote, overflow
SHA-256 | e9739b7f115e53c739cde3bd056999eafde0be533a0e278ee536f5712c2718be
Novell GroupWise Calendar TZNAME Remote Buffer Overflow
Posted Sep 28, 2011
Authored by Sebastien Renaud, VUPEN | Site vupen.com

VUPEN Vulnerability Research Team discovered a critical vulnerability in Novell GroupWise. The vulnerability is caused by a buffer overflow error in the "NgwiCalVTimeZoneBody::ParseSelf()" function within the "GWWWW1.dll" component when processing an overly long "TZNAME" variable in a Calendar, which could be exploited by remote unauthenticated attackers to compromise a vulnerable server via a specially crafted email message. Versions 8.0.2 SP2 Hot Patch 2 and below are affected.

tags | advisory, remote, overflow
SHA-256 | 0fb64ec06cda7f994892c85c8e9e82d31139cb63a4a29b85ddd54be492cda0fa
Barracuda Backup 2.0 Cookie Manipulation
Posted Sep 28, 2011
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

Barracuda Backup version 2.0 suffers from multiple input validation vulnerabilities.

tags | exploit, vulnerability
SHA-256 | 74815e080856c41458ab38c7a9600a48cfcdc604c9933d1e018cd3bd6d38d315
Cisco Security Advisory 20110928-ipv6mpls
Posted Sep 28, 2011
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - Cisco IOS Software is affected by two vulnerabilities that cause a Cisco IOS device to reload when processing IP version 6 (IPv6) packets over a Multiprotocol Label Switching (MPLS) domain. Workarounds that mitigate these vulnerabilities are available.

tags | advisory, vulnerability
systems | cisco
advisories | CVE-2011-3274, CVE-2011-3282
SHA-256 | 4d36bd86f4893e9328e2c85fa20a7e72f6dc6a41ea349b91dabc9c706e9251c7
Cisco Security Advisory 20110928-ipv6
Posted Sep 28, 2011
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - Cisco IOS Software contains a vulnerability in the IP version 6 (IPv6) protocol stack implementation that could allow an unauthenticated, remote attacker to cause a reload of an affected device that has IPv6 enabled. The vulnerability may be triggered when the device processes a malformed IPv6 packet. Cisco has released free software updates that address this vulnerability. There are no workarounds to mitigate this vulnerability.

tags | advisory, remote, protocol
systems | cisco
advisories | CVE-2011-0944
SHA-256 | 74550bef25d75f770748bb38ce41e79ab4a3cb766433088ce705b8134651d431
Cisco Security Advisory 20110928-dlsw
Posted Sep 28, 2011
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - Cisco IOS Software contains a memory leak vulnerability in the Data-Link Switching (DLSw) feature that could result in a device reload when processing crafted IP Protocol 91 packets. Cisco has released free software updates that address this vulnerability.

tags | advisory, protocol, memory leak
systems | cisco
advisories | CVE-2011-0945
SHA-256 | 59dbf91a55e22df3cd1144dfc2469be522334d8fd87eeebb1da1c6ef61183583
Cisco Security Advisory 20110928-c10k
Posted Sep 28, 2011
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - The Cisco 10000 Series Router is affected by a denial of service (DoS) vulnerability that can allow an attacker to cause a device reload by sending a series of ICMP packets. Cisco has released free software updates that address this vulnerability. Workarounds that mitigate this vulnerability are also available.

tags | advisory, denial of service
systems | cisco
advisories | CVE-2011-3270
SHA-256 | 858057723ce7ca1ca4dd27076208f63f0734717b9b27b1d36e76c74eb04c6a76
Mac OS X Kernel Panic
Posted Sep 28, 2011
Authored by Chanam Park

Proof of concept Mac OS X versions prior to 10.6.7 kernel panic exploit.

tags | exploit, kernel, proof of concept
systems | apple, osx
advisories | CVE-2011-0182
SHA-256 | e05c41cc28b6403f832aa4420992cc0d5315f190a28b8c752465f30ab53163bb
TimeLive Time And Expense Tracking 4.1.1 Traversal / Disclosure
Posted Sep 28, 2011
Authored by Nathaniel Carew

TimeLive Time and Expense Tracking version 4.1.1 suffers from directory traversal, database download, and source code disclosure vulnerabilities.

tags | exploit, vulnerability, file inclusion, info disclosure
SHA-256 | 3a0b7e0af95597a6a0c5438152dc88bbecb49e50a7142bdf2bac6a51182c7018
Norman Security Suite 8 Privilege Escalation
Posted Sep 28, 2011
Authored by Xst3nZ

Norman Security Suite version 8 nprosec.sys local privilege escalation exploit.

tags | exploit, local
SHA-256 | 8df0aafe1184c7cf43771d10c41a84e3e72021a993eb8896efc956fdbba50721
European Security Services GPS 1.x SQL Injection / Bypass
Posted Sep 28, 2011
Authored by Benjamin Kunz Mejri, Vulnerability Laboratory | Site vulnerability-lab.com

European Security Services GPS version 1.x suffers from authentication bypass, input validation, and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | 56f63da45d4480d8d879e32138f87536d879bd29d41aa7c40afb745b850b9244
openEngine 2.0 Blind SQL Injection
Posted Sep 28, 2011
Authored by Stefan Schurtz

openEngine version 2.0 is vulnerable to a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 9986543107be9e358af92e25e9266f589f485c6d46751ab8e7140f02d85ff8ff
Zed Attack Proxy (ZAP) 1.3.2
Posted Sep 28, 2011
Authored by Psiinon | Site owasp.org

The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually. Mac OS X, Windows and Linux releases are all included in this file.

Changes: Various updates and enhancements.
tags | web, vulnerability
systems | linux, windows, apple, osx
SHA-256 | 318b8a7ac7957abf70378a1b16c1e6d177b97355de8922a2a727da46027d793a
HP Security Bulletin HPSBUX02702 SSRT100606 4
Posted Sep 28, 2011
Authored by HP | Site hp.com

HP Security Bulletin HPSBUX02702 SSRT100606 4 - Potential security vulnerabilities have been identified with HP-UX Apache Web Server. These vulnerabilities could be exploited remotely to create a Denial of Service (DoS). Revision 4 of this advisory.

tags | advisory, web, denial of service, vulnerability
systems | hpux
advisories | CVE-2011-0419, CVE-2011-3192
SHA-256 | f84390edda2d8182da2df382e01d723deffb2e8beb3db4539121121bcbc2bcf0
Debian Security Advisory 2311-1
Posted Sep 28, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2311-1 - Several vulnerabilities have been discovered in OpenJDK, an implementation of the Java SE platform.

tags | advisory, java, vulnerability
systems | linux, debian
advisories | CVE-2011-0862, CVE-2011-0864, CVE-2011-0865, CVE-2011-0867, CVE-2011-0868, CVE-2011-0869, CVE-2011-0871
SHA-256 | bf0335319498382c5ef979918243d2656fd101679f7698e3f2dd3467affb3a9f
iDefense Security Advisory 09.26.11 - Novell Heap Overflow
Posted Sep 28, 2011
Authored by iDefense Labs | Site idefense.com

iDefense Security Advisory 09.26.11 - Remote exploitation of a heap overflow vulnerability in Novell Inc.'s GroupWise could allow an attacker to execute arbitrary code with the privileges of the affected service. This vulnerability is present in the calendar processing code, which resides within the GroupWise Internet Agent (GWIA) process. The vulnerability occurs when parsing a malformed time zone description field (TZNAME). A heap based buffer overflow can be triggered by supplying an excessively long string when copying the time zone name. Novell GroupWise 8.0x up to (and including) 8.02HP2 are vulnerable.

tags | advisory, remote, overflow, arbitrary
advisories | CVE-2011-0333
SHA-256 | e41ab71e11203562d3548c254ffc04693eed7151c500e97d4f2b72313daa62d2
Digital College 1.1 Remote File Inclusion
Posted Sep 28, 2011
Authored by kurdish hackers team | Site kurdteam.org

Digital College version 1.1 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 11e45d99aae2ccf0c8eb855a06042ef38cb01d51bab4461466fdb1895eb22b26
MyNews 1.2 Remote File Inclusion
Posted Sep 28, 2011
Authored by kurdish hackers team | Site kurdteam.org

MyNews version 1.2 suffers from a remote file inclusion vulnerability.

tags | exploit, remote, code execution, file inclusion
SHA-256 | 98473dea15460cad189a1cb641d82abda2afcb65692491f9e52168e5282a1d7b
Secunia Security Advisory 46170
Posted Sep 28, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the jQuery Colorbox extension for TYPO3, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 73dd7f7c4d46d21bf8f54aaebf21a338f964c91a82fdb3704336ca5b36a4342c
Secunia Security Advisory 46203
Posted Sep 28, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Mozilla Firefox, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system.

tags | advisory, vulnerability
SHA-256 | f13f2b71c3fb25ecead5c46274485b0b4d30fdd12b412a2d43a99b645f47e84e
Secunia Security Advisory 46171
Posted Sep 28, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple weaknesses and vulnerabilities have been reported in Mozilla Firefox, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 933e744195dab522a0edb13c4b03aace0f333b09b9182502c664c4d33f2f4555
Secunia Security Advisory 46204
Posted Sep 28, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Mozilla SeaMonkey, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 19d931cc43e84972168072890e46b1632ee941781b9adc3006e7ff504a37b75b
Affinity New Media SQL Injection
Posted Sep 28, 2011
Authored by m3rciL3Ss

Affinity New Media suffers from multiple remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | d64260166d3ee47f93918c6b3a549696fc4d1cc0b44f1806fec6f062a521d859
Page 4 of 32
Back23456Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close