exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 53 RSS Feed

Files Date: 2011-11-02 to 2011-11-03

Secunia Security Advisory 46670
Posted Nov 2, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - rgod has discovered a vulnerability in Oracle Hyperion Financial Management, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | a57be31afd818ca28e0f14d8cdd23ee3baa3a293bdf225c5e3b17c643b5ade13
Secunia Security Advisory 46133
Posted Nov 2, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for linux-2.6. This fixes multiple weaknesses and vulnerabilities, which can be exploited by malicious, local users to disclose certain system information, bypass certain security restrictions, cause a DoS (Denial of Service), and to potentially gain escalated privileges, by malicious people with physical access to potentially compromise a vulnerable system, and by malicious people to cause a DoS and potentially compromise a vulnerable system.

tags | advisory, denial of service, local, vulnerability
systems | linux, debian
SHA-256 | c35a4482547993521b65ba7ebd153eb2b40641f056437bd61c534b8647073cd7
Secunia Security Advisory 46183
Posted Nov 2, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for quassel. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, fedora
SHA-256 | ceb387ce958a3d080fbca84f15cf63f5f767f4ddf785b52fb9de1d475a447b19
Secunia Security Advisory 46154
Posted Nov 2, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in IBM WebSphere Application Server, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
SHA-256 | 1bac8b835cf3ea4658546ec5b838f3a640772c502cd854cbee371c7de9d78c14
Secunia Security Advisory 46181
Posted Nov 2, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for cherokee. This fixes a security issue and a vulnerability, which can be exploited by malicious, local users to conduct brute force attacks and by malicious people to conduct cross-site request forgery attacks.

tags | advisory, local, csrf
systems | linux, fedora
SHA-256 | c737923319d46b6ab9a24759f12abfb4c6b97d19a15539968147b62b41ccdad1
Secunia Security Advisory 46135
Posted Nov 2, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in IceWarp Server, which can be exploited by malicious people to disclose sensitive information.

tags | advisory, vulnerability
SHA-256 | 866560ee4b9f86576fb864841363ac28fa141942371c3289f61fc5cba6711a3a
Secunia Security Advisory 46162
Posted Nov 2, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Citrix Provisioning Services, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | a11f0939c350e72ce8107c4ab918a3256d8b37eaa9586499ff4155cfd58c6340
Secunia Security Advisory 46073
Posted Nov 2, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Barracuda IM Firewall, which can be exploited by malicious users to conduct script insertion attacks and by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | c982efe1fb4ab7cd19e3484d41e940289ac60c7bd6314759c5354f5ff40cf0b4
Secunia Security Advisory 46147
Posted Nov 2, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for linux and linux-ec2. This fixes two weaknesses and multiple vulnerabilities, which can be exploited by malicious, local users to disclose certain system information, bypass certain security restrictions, cause a DoS (Denial of Service), and to potentially gain escalated privileges and by malicious people to cause a DoS and potentially compromise a vulnerable system.

tags | advisory, denial of service, local, vulnerability
systems | linux, ubuntu
SHA-256 | c41de09eddd061fa478bc5856d3f9a57fa803bace21e844703ae75942655cdce
Secunia Security Advisory 46025
Posted Nov 2, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Atlassian JIRA, which can be exploited by malicious users to conduct script insertion attacks and by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | 558b81d743379f6bcc3ca349addc8859792664f9bf780b88a9230c3378221f4f
Secunia Security Advisory 46187
Posted Nov 2, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issued an update for qt. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise an application using the library.

tags | advisory, denial of service
systems | linux, fedora
SHA-256 | ae75260d2ec340f8217d931b750eeafce0bae7e70f4070f280dac5b1ecabc369
Secunia Security Advisory 46180
Posted Nov 2, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Stefan Schurtz has discovered multiple vulnerabilities in AdaptCMS. These can be exploited by malicious people to bypass certain security restrictions and conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | 26531b1ee81a4e21a8c79dabf65d713fc5cf1c8d1e508ad47a3aee4ee5874b67
Secunia Security Advisory 46702
Posted Nov 2, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Bennet-Tec TList ActiveX Control, which can be exploited by malicious people to compromise a user's system.

tags | advisory, activex
SHA-256 | 8f8a950f99e22dc7046d955be0900a1a5c15511ea3e85255d549b4b108976b03
Secunia Security Advisory 46701
Posted Nov 2, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Oracle has acknowledged some vulnerabilities in Gimp included in Solaris, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
systems | solaris
SHA-256 | c1e82a94241d4aa0f03d11ebb60d3457451ffaa63e6c0e684e4e3eb0731b0bfe
Secunia Security Advisory 46692
Posted Nov 2, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Attachmate Reflection, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | fc0eac9078ae8636564426bb3eb723c866090ab5690d649f7e949957b43bc7dc
Secunia Security Advisory 46700
Posted Nov 2, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Proficy Plant Applications, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory, vulnerability
SHA-256 | 05db262f82a3cdd3fa31007ec2712dd649c3c13f181fdc914c30bfd7f24be44e
Secunia Security Advisory 45793
Posted Nov 2, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - halfdog has discovered a vulnerability in Apache HTTP Server, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, web, local
SHA-256 | 4d9f67eed52b07a14828b2cc1d30f7f6af747ec6bd14a6142aa0e2ff3269255a
Secunia Security Advisory 46699
Posted Nov 2, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Proficy Historian, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a vulnerable system.

tags | advisory, vulnerability, xss
SHA-256 | 7567b8893bec637751aff3836f2869c12b91713aa1025c397a7f893091525eb1
NJStar Communicator 3.00 MiniSMTP Server Remote Exploit
Posted Nov 2, 2011
Authored by Dillon Beresford | Site metasploit.com

This Metasploit module exploits a stack buffer overflow vulnerability in NJStar Communicator Version 3.00 MiniSMTP server. The MiniSMTP application can be seen in multiple NJStar products, and will continue to run in the background even if the software is already shutdown. According to the vendor's testimonials, NJStar software is also used by well known companies such as Siemens, NEC, Google, Yahoo, eBay; government agencies such as the FBI, Department of Justice (HK); as well as a long list of universities such as Yale, Harvard, University of Tokyo, etc.

tags | exploit, overflow
SHA-256 | 44083d9c71272bc52555d936d0b249f9a4093505dbbca952c03e4cf194db20b3
Red Hat Security Advisory 2011-1419-01
Posted Nov 2, 2011
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2011-1419-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. The way IPv4 and IPv6 protocol sequence numbers and fragment IDs were generated could allow a man-in-the-middle attacker to inject packets and possibly hijack connections. Protocol sequence numbers and fragment IDs are now more random. A flaw was found in the Linux kernel's clock implementation on 32-bit, SMP systems. A local, unprivileged user could use this flaw to cause a divide error fault, resulting in a denial of service.

tags | advisory, denial of service, kernel, local, protocol
systems | linux, redhat
advisories | CVE-2011-3188, CVE-2011-3209
SHA-256 | 9fd2340c96e708295de471c97e645a41584ac05ff9ebae5e3262fe5257680537
Linux 2.6.37-rc1 serial_multiport_struct Local Leak
Posted Nov 2, 2011
Authored by Todor Donev

Linux kernel version 2.6.37-rc1 and below serial_multiport_struct local leak exploit.

tags | exploit, kernel, local
systems | linux
SHA-256 | 339995fa1d5103f1059305032d85f8e55df5432a09a475ad860ec38a5fb31050
Prosieben Community Code Injection
Posted Nov 2, 2011
Authored by Alexander Fuchs, Vulnerability Laboratory | Site vulnerability-lab.com

The Prosieben Community website suffers from a persistent cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | d2f3fabb5d6740362eceb9632209b4de058c8941f70df023b03b8183ad9cdbe2
Symphony CMS 2.2.3 Cross Site Scripting / SQL Injection
Posted Nov 2, 2011
Authored by Mesut Timur

Symphony CMS version 2.2.3 suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 6195436a0c57acf20bfa29f46f7c33c2142576710a4a98918dde15d9fed3ba5d
Red Hat Security Advisory 2011-1418-01
Posted Nov 2, 2011
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2011-1418-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. This update fixes the following security issue: A flaw was found in the Linux kernel's clock implementation on 32-bit, SMP systems. A local, unprivileged user could use this flaw to cause a divide error fault, resulting in a denial of service.

tags | advisory, denial of service, kernel, local
systems | linux, redhat
advisories | CVE-2011-3209
SHA-256 | 7f0efb4e0b7d15d43521f66ef1879da25af7a500b7af31e3837fee7bf3307987
eFront 3.6.10 Build 11944 Cross Site Scripting
Posted Nov 2, 2011
Authored by Canberk BOLAT

eFront version 3.6.10 build 11944 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | af6511e087d956b36cd38aa87759774e0359d29875d3fedf5b24ddb5ab7c1cc7
Page 2 of 3
Back123Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close