exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 40 RSS Feed

Files Date: 2012-01-09 to 2012-01-10

Debian Security Advisory 2384-1
Posted Jan 9, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2384-1 - Several vulnerabilities have been discovered in cacti, a graphing tool for monitoring data. Multiple cross site scripting issues allow remote attackers to inject arbitrary web script or HTML. An SQL injection vulnerability allows remote attackers to execute arbitrary SQL commands.

tags | advisory, remote, web, arbitrary, vulnerability, xss, sql injection
systems | linux, debian
advisories | CVE-2010-1644, CVE-2010-1645, CVE-2010-2543, CVE-2010-2545, CVE-2011-4824
SHA-256 | 97112ae8aa4be514e6406bc346306ae8f043357bb2bc5dd99ba8f00aab17fbc8
Red Hat Security Advisory 2012-0006-01
Posted Jan 9, 2012
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2012-0006-01 - This update fixes several vulnerabilities in the IBM Java 1.4.2 Runtime Environment and the IBM Java 1.4.2 Software Development Kit. All users of java-1.4.2-ibm are advised to upgrade to these updated packages, which contain the IBM Java 1.4.2 SR13-FP11 release. All running instances of IBM Java must be restarted for this update to take effect.

tags | advisory, java, vulnerability
systems | linux, redhat
advisories | CVE-2011-3389, CVE-2011-3545, CVE-2011-3547, CVE-2011-3548, CVE-2011-3549, CVE-2011-3552, CVE-2011-3556, CVE-2011-3557, CVE-2011-3560
SHA-256 | 17f7562de05b87b1a1f2c53ed3389559fa6bbee33d0daa3c326cd1eb786381ca
HP JetDirect Device Page Directory Traversal
Posted Jan 9, 2012
Authored by Digital Defense, r@b13$, sxkeebler | Site digitaldefense.net

The HP-ChaiSOE/1.0 embedded web server on certain HP JetDirect printers allows a potential attacker to gain read only access to directories and files outside of the web root, different from CVE-2008-4419. An attacker can leverage this flaw to read arbitrary system configuration files, cached documents, etc. Information obtained from an affected host may facilitate further attacks against the host. Exploitation of this flaw is trivial using common web server directory traversal techniques.

tags | advisory, web, arbitrary, root
advisories | CVE-2011-4785
SHA-256 | bbf0ce50d3dd4baeccc1f6cadb25ebbc0f6568943c21f1edc2430eb89eeed216
HP Security Bulletin HPSBPI02733 SSRT100646
Posted Jan 9, 2012
Authored by HP | Site hp.com

HP Security Bulletin HPSBPI02733 SSRT100646 - A potential security vulnerability has been identified with certain HP LaserJet printers. The vulnerability could be exploited remotely to gain unauthorized access to files. Revision 1 of this advisory.

tags | advisory
advisories | CVE-2011-4785
SHA-256 | 8f193cff3feaf772b99d88920c3ec49384f7c8442c29c41e0d9c5501289181b6
PHP Vulnerability Hunter 1.2.0.1
Posted Jan 9, 2012
Authored by AutoSec Tools | Site autosectools.com

PHP Vulnerability Hunter is a PHP fuzzing tool that scans for several different vulnerabilities by performing dynamic program analysis. It can detect arbitrary command execution, local file inclusion, arbitrary upload, and several other types of vulnerabilities.

Changes: Added tooltips to GUI, input map report, automatic error reporting, port setting, static analysis phase, and a ton more. Minor CLI tweaks. Code annotation improvements and updated help menu shortcut.
tags | arbitrary, local, php, vulnerability, file inclusion, fuzzer
SHA-256 | 9518133a3f1021b40158214497372d472d196b47de6a8109d45d82f46f801c50
Cisco Template Manager 0.3.2
Posted Jan 9, 2012
Authored by Pavol Krigler | Site gelogic.net

Cisco Template Manager (CTM) is a set of tools that make it easy to manage Cisco configurations over a whole network based on your self-defined templates. Templates support regular expressions. It works with the C760x, C730x, C37xx, C35xx, C29xx, C28xx, C18xx, and C17xx series.

Changes: A new reporting mode called "copy-and-paste". Support has been added for "object-group". ACL counters and checking ACLs defined as symbolic links have been fixed.
tags | tool, intrusion detection
systems | cisco, unix
SHA-256 | a2edc67b9136623c3274110d3d2fb937a2a89a14614fc9f94637d0732bad9e9f
Mandos Encrypted File System Unattended Reboot Utility 1.5.2
Posted Jan 9, 2012
Authored by Teddy | Site fukt.bsnet.se

The Mandos system allows computers to have encrypted root file systems and at the same time be capable of remote or unattended reboots. The computers run a small client program in the initial RAM disk environment which will communicate with a server over a network. All network communication is encrypted using TLS. The clients are identified by the server using an OpenPGP key that is unique to each client. The server sends the clients an encrypted password. The encrypted password is decrypted by the clients using the same OpenPGP key, and the password is then used to unlock the root file system.

Changes: This release removes the recently added D-Bus signal "se.recompile.Mandos.NewRequest"; its implementation was buggy and its utility questionable.
tags | tool, remote, root
systems | linux, unix
SHA-256 | 419a31558410996d0ddc10f2db9af168c33801bfb01ae3b243653d5cfaab867e
Clip Bucket 2.6 Cross Site Scripting / SQL Injection
Posted Jan 9, 2012
Authored by YaDoY666

Clip Bucket version 2.6 suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | f560fa56449644d6fa13d79ace64425fe5b0e87dd9843a1bdcafa7fc170914fd
Dreambox DM800 Path Traversal
Posted Jan 9, 2012
Authored by Neusbeer

Dreambox DM800 suffers from a directory traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | 3ccbcbaf309a1ca4ffccae6f228d6647
HP Security Bulletin HPSBPI02728 SSRT100692 3
Posted Jan 9, 2012
Authored by HP | Site hp.com

HP Security Bulletin HPSBPI02728 SSRT100692 3 - A potential security vulnerability has been identified with certain HP printers and HP digital senders. The vulnerability could be exploited remotely to install unauthorized printer firmware. Revision 3 of this advisory.

tags | advisory
advisories | CVE-2011-4161
SHA-256 | dd5e56f566ad2ca9b114239aba459968b740fd1b964f71a9074e028284d0c8a1
AirTies-4450 Unauthorized Remote Reboot
Posted Jan 9, 2012
Authored by rigan

AirTies-4450 suffers from an unauthorized remote reboot vulnerability.

tags | exploit, remote
SHA-256 | 24bbd158e500893c476af676d155912d8555eac877171d84f569ef369e19dde1
Enigma2 Webinterface Remote File Disclosure
Posted Jan 9, 2012
Authored by Todor Donev

Enigma2 Webinterface versions 1.5.x, 1.6.x and 1.7.x suffers from a remote file disclosure vulnerability.

tags | exploit, remote, info disclosure
SHA-256 | fc9bbc6820fa00c3414e7ddd9289efbd8460427518afafafd0bb63131d292e51
Paddelberg Topsite Script Insecure Cookie
Posted Jan 9, 2012
Authored by Christian Inci

Paddelberg Topsite Script version 1.2.3 suffers from an authentication bypass vulnerability due to insecure cookie handling.

tags | exploit, bypass, insecure cookie handling
SHA-256 | 01a4d20a678fdeeadd7b1e958b70c5cb9c259861d031adfc774c469e7bab3b37
Debian Security Advisory 2383-1
Posted Jan 9, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2383-1 - Robert Luberda discovered a buffer overflow in the syslog logging code of Super, a tool to execute scripts (or other commands) as if they were root. The default Debian configuration is not affected.

tags | advisory, overflow, root
systems | linux, debian
advisories | CVE-2011-2776
SHA-256 | 943c069686b5dc0a065f3bd42c1180381b67663aa09db76a40527eee87e0e0a0
Microsoft Security Bulletin Advance Notification For January 2012
Posted Jan 9, 2012
Site microsoft.com

This is an advance notification of 7 security bulletins that Microsoft is intending to release on January 10, 2012.

tags | advisory
SHA-256 | b26002ac326092cb1611e39a7037f254165347f24804aacc6a2bf66c81efd413
Gregarius 0.x.x Cross Site Scripting / SQL Injection
Posted Jan 9, 2012
Authored by Sony

Gregarius version 0.x.x suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 9054aea688453bef3f43a6d161d88952fdacc2f4af2acd00c089b4951b12cc40
Gentoo Linux Security Advisory 201201-03
Posted Jan 9, 2012
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201201-3 - Multiple vulnerabilities have been reported in Chromium and V8, some of which may allow execution of arbitrary code. Versions less than 16.0.912.75 are affected.

tags | advisory, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2011-3903, CVE-2011-3904, CVE-2011-3906, CVE-2011-3907, CVE-2011-3908, CVE-2011-3909, CVE-2011-3910, CVE-2011-3912, CVE-2011-3913, CVE-2011-3914, CVE-2011-3917, CVE-2011-3921, CVE-2011-3922
SHA-256 | b0886c59913a1ce7f8669e0fd481d47aa19f0e8b93818fc6ef3a35df2499d55c
Marinet CMS SQL Injection
Posted Jan 9, 2012
Authored by Farbod Mahini, H4ckCity Security Team | Site h4ckcity.org

Marinet CMS, which has been reported multiple times for having remote SQL injection vulnerabilities, appears to still suffer from a few more.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | 26aa64ebb12aac3418fc76d5453fb515684cf46f88b24a5718c6c301683a1dc8
Twoja Witryna CMS SQL Injection
Posted Jan 9, 2012
Authored by Farbod Mahini, H4ckCity Security Team | Site h4ckcity.org

Twoja Witryna CMS suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 619035c2569dd7baa75d01eb53201863a55804db273f7ce04e62966fe1c68a63
Luxun CMS SQL Injection
Posted Jan 9, 2012
Authored by Farbod Mahini, H4ckCity Security Team | Site h4ckcity.org

Luxun CMS suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 57ac164aafa399427afb2ce810408cd69cae7ac6bf8ef81d5c885122f82bbd43
AiDesign SQL Injection
Posted Jan 9, 2012
Authored by Farbod Mahini, H4ckCity Security Team | Site h4ckcity.org

AiDesign suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 7eafdb23259045c84ec22e3fe7606b9d8e1e990addd9e8d9fd3f6628b4c8565e
WordPress Yousaytoo Auto Publishing Cross Site Scripting
Posted Jan 9, 2012
Authored by Am!r, H4ckCity Security Team | Site irist.ir

The WordPress Yousaytoo-auto-publishing plugin suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 9faf938437e740a4fa3cd5e61f632fc5e0a284038d0bbc7f6a0a5fc9a9258b25
phpMyDirectory 1.3.3 SQL Injection
Posted Jan 9, 2012
Authored by Serseri

phpMyDirectory version 1.3.3 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | affd58c029a3fa3bd13f6458452653483ec3fad7a6b772c755805931cb277a5c
Debian Security Advisory 2382-1
Posted Jan 9, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2382-1 - Several problems have been discovered in ecryptfs-utils, a cryptographic filesystem for Linux.

tags | advisory
systems | linux, debian
advisories | CVE-2011-1831, CVE-2011-1832, CVE-2011-1834, CVE-2011-1835, CVE-2011-1837, CVE-2011-3145
SHA-256 | 7f3fba9fb2a1cbc606e25d39de03a150254f1845a6b7f75e8a065d1aa8c34661
OP5 Command Execution / Information Disclosure
Posted Jan 9, 2012
Authored by Peter Osterberg

OP5 suffers from poor session management, credential leakage and multiple remote root command execution vulnerabilities.

tags | exploit, remote, root, vulnerability
advisories | CVE-2012-0261, CVE-2012-0262, CVE-2012-0263, CVE-2012-0264
SHA-256 | 2da3429a912610984fa7c1f7306b7c0ae2a0a2ae5db72bdf33c2b822f10a3258
Page 1 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close