exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 44 of 44 RSS Feed

Files Date: 2011-10-14 to 2011-10-15

Microsoft Forefront Unified Access Gateway Remote Access Agent Code Execution
Posted Oct 14, 2011
Authored by Elisabeth Demeter | Site sec-consult.com

Microsoft Forefront Unified Access Gateway Remote Access Agent version 4.0.0.1 suffers from a remote file upload and command execution vulnerability.

tags | advisory, remote, file upload
advisories | CVE-2011-1969
SHA-256 | 3ebeabe791748805647629a3fbbecc741bc96a94f425f58d13409d7e8d83b60c
Local Session Poisoning In PHP Part 3
Posted Oct 14, 2011
Authored by Mango

This whitepaper is called Local Session Poisoning in PHP Part 3: Bypassing Suhosin's Session Encryption.

tags | paper, local, php
SHA-256 | b4c2757edc23926772d3931a43343d42a16d61a0d0eeaf402605d9c79122b967
Local Session Poisoning In PHP Part 2
Posted Oct 14, 2011
Authored by Mango

This whitepaper is called Local Session Poisoning in PHP Part 2: Promiscuous Session Files.

tags | paper, local, php
SHA-256 | a5b53f4b5bd46c66cfc9ad3a8d7d286455bc7a43f332c3b1e6ccb2290c69cb84
Local Session Poisoning In PHP Part 1
Posted Oct 14, 2011
Authored by Mango

This whitepaper is called Local Session Poisoning in PHP Part 1: The Basics of Exploitation and How to Secure a Server.

tags | paper, local, php
SHA-256 | c245f17fa9754ac7a72df98693b35929e796d3a655aeb50b5fa88d746027aa9e
PHP Session Snooping
Posted Oct 14, 2011
Authored by Mango

Brief write up with a proof of concept explaining local session snooping in PHP.

tags | exploit, local, php, proof of concept
SHA-256 | a84ca642d685d472d8bdfa3fa84d30b724025d72ebec2bae38b90f52fc241d78
PHP Session Hijacking
Posted Oct 14, 2011
Authored by Mango

Brief write up with a proof of concept explaining local session hijacking in PHP.

tags | exploit, local, php, proof of concept
SHA-256 | c5099b1e7690d5d716238987cd3fe94c2ec425e441ee4155e5d47e1f6cad678e
Daytona JBoss Exploitation Kit
Posted Oct 14, 2011
Authored by Kingcope

This is the full Daytona package that houses three remote JBoss exploits with authentication bypass. They are ported from Metasploit and beefed up with two scanners.

tags | exploit, remote
SHA-256 | 3a7c10344dc210d299bebed708f49b6d1eb9c05deab6be158b3a1745486177bf
Nabble Forums Cross Site Scripting
Posted Oct 14, 2011
Authored by Sony

Nabble Forums suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 4a5b9c32add09fed807143a9e3ea2a50bfc148b3e5b77953218cc05556fc51df
VMware Security Advisory 2011-0012
Posted Oct 14, 2011
Authored by VMware | Site vmware.com

VMware Security Advisory 2011-0012 - VMware ESXi and ESX updates to third party libraries and ESX Service Console address several security issues.

tags | advisory
advisories | CVE-2010-0296, CVE-2010-1083, CVE-2010-1323, CVE-2010-2492, CVE-2010-2798, CVE-2010-2938, CVE-2010-2942, CVE-2010-2943, CVE-2010-3015, CVE-2010-3066, CVE-2010-3067, CVE-2010-3078, CVE-2010-3086, CVE-2010-3296, CVE-2010-3432, CVE-2010-3442, CVE-2010-3477, CVE-2010-3699, CVE-2010-3858, CVE-2010-3859, CVE-2010-3865, CVE-2010-3876, CVE-2010-3877, CVE-2010-3880, CVE-2010-3904, CVE-2010-4072, CVE-2010-4073, CVE-2010-4075
SHA-256 | 7fd5e9259774393a258a0c189d667e06ba833c9fb8b0cd11fa8fb35727aecafa
Internet Explorer Code Execution
Posted Oct 14, 2011
Authored by Ivan Fratric

Two code execution vulnerabilities have been discovered in Internet Explorer. One vulnerability is caused by incorrectly validating integer parameter passed to the 'add' method of the Select HTML element. Another vulnerability is caused by a use-after-free bug triggered by accessing a previously deleted Option element.

tags | advisory, vulnerability, code execution
advisories | CVE-2011-1999, CVE-2011-1996
SHA-256 | 00ed6913fc28235fa406b329358c7b4198e80bad1be3a6a32de2641d3a1cb323
Secunia Security Advisory 46434
Posted Oct 14, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in the Contact Form plugin for WordPress, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | e13910965b5fe0c73a230ead4c79ad9b8a304108f513c9f8386a14d0146cec40
Secunia Security Advisory 46324
Posted Oct 14, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for wget. This fixes a weakness, which can be exploited by malicious people to bypass certain security features.

tags | advisory
systems | linux, gentoo
SHA-256 | e9a7bb3080a222866e28d04508428ec7cf5e8ae479709042398b42e7666302c8
Secunia Security Advisory 46430
Posted Oct 14, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Luigi Auriemma has discovered multiple vulnerabilities in PROMOTIC, which can be exploited by malicious people to disclose potentially sensitive information and compromise a user's system.

tags | advisory, vulnerability
SHA-256 | a8eef5ae5930ff13495d91b7bb700ce23fe4430979981385a99da95d3b4192a1
Secunia Security Advisory 46424
Posted Oct 14, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Sybase M-Business Anywhere, which can be exploited by malicious users to gain escalated privileges.

tags | advisory, vulnerability
SHA-256 | 0950eca9c450103550f3d22c4af4077be14217a056507198c04e47378f5d7803
Secunia Security Advisory 46353
Posted Oct 14, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for conky. This fixes a security issue, which can be exploited by malicious, local users to perform certain actions with escalated privileges.

tags | advisory, local
systems | linux, gentoo
SHA-256 | 69772d14fa3bf9fc7a06b54c704cf97712cd065d9bc51cc5d047bcf6cce09816
Secunia Security Advisory 46376
Posted Oct 14, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for pidgin. This fixes two weaknesses, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, redhat
SHA-256 | 2c6fbb03a26590bb952b95dfed3ed14159cb660624437e0e827a506896bf04bc
Secunia Security Advisory 46322
Posted Oct 14, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gentoo has issued an update for adobe-flash. This fixes multiple vulnerabilities, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to conduct cross-site scripting attacks, disclose sensitive information, bypass certain security restrictions, and compromise a user's system.

tags | advisory, local, vulnerability, xss
systems | linux, gentoo
SHA-256 | ed29ee1c0109506ad2b5423f6e227f338ea2afe0ddf7337b2a8d4e5c7e921837
Secunia Security Advisory 46445
Posted Oct 14, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for quassel. This fixes a weakness, which can be exploited by malicious, local users to disclose sensitive information.

tags | advisory, local
systems | linux, ubuntu
SHA-256 | c1ca24efde1a5fd62c38de1afcbba5440bcae6c68d8a5eb719fc3aa8b364ec50
Secunia Security Advisory 46375
Posted Oct 14, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Jose A. Vazquez has discovered a vulnerability in Opera, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 555c9af18d2654139de5de508173c015529b97e5c93f4e3569845402d25da46f
Page 2 of 2
Back12Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close