exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 40 of 40 RSS Feed

Files Date: 2012-01-11 to 2012-01-12

Secunia Security Advisory 47513
Posted Jan 11, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Blue Coat has acknowledged a security issue and multiple vulnerabilities in Blue Coat PolicyCenter, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and by malicious people to disclose system and potentially sensitive information, bypass certain security restrictions, and cause a DoS (Denial of Service).

tags | advisory, denial of service, local, vulnerability
SHA-256 | 8e1bd3a951aa8e21308f695852f127ecbea84dd95fbe8aa73f91dab1c762c015
Secunia Security Advisory 47462
Posted Jan 11, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - F5 has acknowledged a vulnerability in F5 TMOS, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | f6a31286896fc007afc4e472a816a5eafc7fb8857b8f0e149826db804c9b3212
Secunia Security Advisory 47525
Posted Jan 11, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in OPC DataHub and Cascade DataHub, which can be exploited by malicious people to conduct cross-site scripting attacks and HTTP response splitting attacks.

tags | advisory, web, vulnerability, xss
SHA-256 | 3052a5d814a37992a60fb623fa36eeb1422307ca1bc690b4f49d4e4690aedc6f
Secunia Security Advisory 47501
Posted Jan 11, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Luigi Auriemma has discovered two vulnerabilities in ExpressView Browser Plug-In, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 04c842ca5a3267fa5ae4afaa58c67ce1aadb56e1dabcc687f42b7d16134b8108
Secunia Security Advisory 47531
Posted Jan 11, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - High-Tech Bridge SA has discovered a vulnerability in KnowledgeTree, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 22a413c7e3fc668237853ddb5d453533054e3c6b654dc437f343f558ed986968
Secunia Security Advisory 47496
Posted Jan 11, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Cogent DataHub, which can be exploited by malicious people to conduct cross-site scripting attacks and HTTP response splitting attacks.

tags | advisory, web, vulnerability, xss
SHA-256 | b2e2feba3178001ecacfd9d2403c86e53cada4b437bb8a7af6b0a7883a76da37
Secunia Security Advisory 47517
Posted Jan 11, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for linux-ec2. This fixes a vulnerability, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
systems | linux, ubuntu
SHA-256 | 1d5b8efbcfd80d951c9dfba0002cdf7b6168c4ca8fb51bc2ffbbaa50d1234755
AdSuck DNS Server 2.4.1
Posted Jan 11, 2012
Authored by Marco Peereboom | Site peereboom.us

adsuck is a small DNS server that spoofs blacklisted addresses and forwards all other queries. The idea is to be able to prevent connections to undesirable sites such as ad servers, crawlers, etc. It can be used locally, for the road warrior, or on the network perimeter in order to protect local machines from malicious sites.

Changes: This release updates hosts files. It has switched to git from cvs. It add additional stats. It fixes the dhclient script for OpenBSD where sometimes resolv.conf did not get updated.
tags | tool, local, spoof
systems | unix
SHA-256 | 494f4e31c23b6682f4df4b2146cd8a5076c09846f4b6e8d2192681d2bcac7ce9
razorCMS 1.2 Path Traversal
Posted Jan 11, 2012
Authored by chap0

razorCMS version 1.2 suffers from a path traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | fbdb12c80c98de27931f125ae507349c1cf96ff75958e03c5bd73d20de3149d2
TFTP Server 1.4 ST RRQ Overflow
Posted Jan 11, 2012
Authored by b33f

TFTP Server version 1.4 read request packet buffer overflow exploit that spawns a reverse shell to port 9988.

tags | exploit, overflow, shell
SHA-256 | a201aaa089a6bcd7806a570bb387706be9f0b4e2056e93422d3b8acf44b2a9c1
Novell Netware XNFS caller_name xdrDecodeString Code Execution
Posted Jan 11, 2012
Authored by Francis Provencher

Novell Netware XNFS caller_name xdrDecodeString remote code execution exploit. Version 6.5 SP8 is affected.

tags | exploit, remote, code execution
SHA-256 | f31dcb88656209bf03e01102c043b25490b0a9d539a7b3674a816b9bdd0db342
Pragyan CMS 3.0 Remote File Disclosure
Posted Jan 11, 2012
Authored by Or4nG.M4N

Pragyan CMS version 3.0 suffers from a remote file disclosure vulnerability.

tags | exploit, remote, info disclosure
SHA-256 | 9ad90ad2782431ae5aba40266e0f50ca65df93fee0f2563df379ed06567acfda
OP5 license.php Remote Command Execution
Posted Jan 11, 2012
Authored by Peter Osterberg | Site metasploit.com

This Metasploit module exploits an arbitrary root command execution vulnerability in the OP5 Monitor license.php. Ekelow has confirmed that OP5 Monitor versions 5.3.5, 5.4.0, 5.4.2, 5.5.0, 5.5.1 are vulnerable.

tags | exploit, arbitrary, root, php
advisories | CVE-2012-0261, OSVDB-78064
SHA-256 | d2105e1f89c2f28bca22b1adedc6a39012c035a0e29a2b290c1600b2eb85c472
OP5 welcome Remote Command Execution
Posted Jan 11, 2012
Authored by Peter Osterberg | Site metasploit.com

This Metasploit module exploits an arbitrary root command execution vulnerability in OP5 Monitor welcome. Ekelow AB has confirmed that OP5 Monitor versions 5.3.5, 5.4.0, 5.4.2, 5.5.0, 5.5.1 are vulnerable.

tags | exploit, arbitrary, root
advisories | CVE-2012-0262, OSVDB-78065
SHA-256 | c351feb8d2465ec452647ebc76a51ac184772093b2251154fbd643ab54b4fa12
FreeBSD based telnetd encrypt_key_id brute force
Posted Jan 11, 2012
Site metasploit.com

This Metasploit module exploits a buffer overflow in the encryption option handler of the FreeBSD telnet service.

tags | exploit, overflow
systems | freebsd
advisories | CVE-2011-4862, OSVDB-78020
SHA-256 | 26a4211c976648be259b01d70ead3c15515210a76cfa2f2e831ab504568547e8
Page 2 of 2
Back12Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close