exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 37 RSS Feed

Files Date: 2012-04-16 to 2012-04-17

Apache OFBiz 10.04 Code Execution
Posted Apr 16, 2012
Authored by Jacopo Cappellato

Apache OFBiz versions 10.04 and later allow remote attackers to execute arbitrary code.

tags | advisory, remote, arbitrary
SHA-256 | c37b6f9516be074f34619999dc19a6020fee9327c8600529b73e16eb302c2f24
Joomla Beatz 1.x Cross Site Scripting
Posted Apr 16, 2012
Authored by Aung Khant | Site yehg.net

Joomla Beatz component version 1.x suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | b84b94a45bc53d232a111d9bdd1d9c10c5df673197a35b8910ddb9fad3485de7
Bypassing Address Space Layout Randomization
Posted Apr 16, 2012
Authored by TheXero | Site nullsecurity.net

Most modern day Operating Systems include some form of memory protection such as DEP and ASLR. This article focuses on ASLR, its implementation, limitations and finally various techniques which can be used to circumvent the protection.

tags | paper
SHA-256 | de3faada87e1bd7b6c844f2b8479cf643993f49918b07823dfb93f24683b904d
Mathematica On Linux /tmp Vulnerability
Posted Apr 16, 2012
Authored by Paul Szabo

Mathematica on Linux uses the /tmp/MathLink directory in insecure ways that can allow for account takeover. The problem was made worse by later versions as the addendum states. As of 02/08/2013, the author has noted that this problem is still present in version 9.0.1. As of 08/27/2014, the author has noted that this problem is still present in version 10.0.0 for the GUI interface.

tags | exploit
systems | linux
SHA-256 | 7ededdbc15af7026dccd7b744315ba7216047ad69a2910c0587edbe99dab0843
Packet Fence 3.3.0
Posted Apr 16, 2012
Site packetfence.org

PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.

Changes: A major release focused on new features and enhancements. AlliedTelesis switches support. Introduction of Role-Based Access Control (RBAC) for Aruba, AeroHIVE, Meru, and Motorola equipment. Guests can now pre-register in advance or have their network access sponsored. Simplified inline enforcement. Several new configuration parameters that affects guest handling. Noteworthy fixes include a RADIUS Identity privacy fix and Captive portal look on mobile devices (smartphones and tablets). There is some polishing and translation updates.
tags | tool, remote
systems | unix
SHA-256 | 4f8b4518e51638a4a7ae0c0c2a4a8d382eca998798bac68923b88a5731cfb863
WordPress Zingiri Tickets File Disclosure
Posted Apr 16, 2012
Authored by MadLeeTs

The WordPress Zingiri Tickets plugin suffers from a file disclosure vulnerability that holds administrative username and password hashes.

tags | exploit, info disclosure
SHA-256 | 892b3d05968e8c76e93a0c032ea0704ecd6db0ee18f2a3afcc6db8d331fc0efb
Fastpath WebChat 4.0.0 Cross Site Scripting
Posted Apr 16, 2012
Authored by Aung Khant | Site yehg.net

Fastpath WebChat version 4.0.0 suffers from a cross site scripting vulnerability.

tags | advisory, xss
SHA-256 | 48d7320613198772764d8b98bc017da1932c860245b0954fdaf10d283d0b0154
RadioGraPhy Forensic Tool
Posted Apr 16, 2012
Site security-projects.com

Radiography is a forensic tool which grabs as much information as possible from a Windows system. It checks registry keys related to start up processes, registry keys with Internet Explorer settings, host file contents, taskScheduler tasks, loaded system drivers, uses WinUnhide to catch hidden processes, and does much more.

tags | tool, registry, forensics
systems | windows
SHA-256 | be7394b4ce9a474ce4d3c0d3ddd25f7e3f4940ae86f346304bfb881bc6e41ad4
Debian Security Advisory 2453-1
Posted Apr 16, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2453-1 - Several vulnerabilities have been discovered in gajim, a feature-rich jabber client.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2012-2093, CVE-2012-2086, CVE-2012-2085
SHA-256 | bd105df7fba5991e582b3c8ae56d9c2086f0b1c465a2185562b29411c942cbb9
Debian Security Advisory 2452-1
Posted Apr 16, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2452-1 - Niels Heinen noticed a security issue with the default Apache configuration on Debian if certain scripting modules like mod_php or mod_rivet are installed. The problem arises because the directory /usr/share/doc, which is mapped to the URL /doc, may contain example scripts that can be executed by requests to this URL. Although access to the URL /doc is restricted to connections from localhost, this still creates security issues in two specific configurations.

tags | advisory
systems | linux, debian
advisories | CVE-2012-0216
SHA-256 | d52b84f07d62410b49a8dd5b85aec7aeebf6d89cf4e9d3b364e93c771843b179
JavaScript Deobfuscation
Posted Apr 16, 2012
Authored by Sudeep Singh

Whitepaper called JavaScript Deobfuscation - A Manual Approach.

tags | paper, javascript
SHA-256 | f62eacd0b6de91f97b5724b5c6970f9e9ca83dcf56688802e7c335036028d5a8
Yahoo Answer Wordpress Auto Poster Cross Site Scripting
Posted Apr 16, 2012
Authored by Ryuzaki Lawlet

Yahoo Answer Wordpress Auto Poster suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 777cd7837d6a1a6dcce7a1f173be970cd97270d93e499a2e0c2e3d293e9dad75
Secunia Security Advisory 48829
Posted Apr 16, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for Red Hat Enterprise MRG. This fixes multiple vulnerabilities, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory, vulnerability
systems | linux, redhat
SHA-256 | 9dfc02085dc5e27782ace6533755637c5ba1602ddbd32c566e795e25dbffc2c0
Secunia Security Advisory 48772
Posted Apr 16, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Francis Provencher has discovered a vulnerability in the FlashPix PlugIn for IrfanView, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 621d0dd4ee0bb7549e55417521a577ee845b46b52f0875ba7da3206428ea9969
Secunia Security Advisory 48782
Posted Apr 16, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in multiple VMware products, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
SHA-256 | b30b32aba2794f37b711b352d04e4da6bf7d875c98443dea5dd953fc1cb7c25b
Secunia Security Advisory 48813
Posted Apr 16, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Dokodemo Rikunabi 2013 extension for Google Chrome, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 87d7cdc6abe479169f901593fb36f94a74cd32fd487eebf2b01b4b5f688e29d1
Secunia Security Advisory 48828
Posted Apr 16, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for php5. This fixes a security issue and multiple vulnerabilities, which can be exploited by malicious, local users to perform certain actions with escalated privileges and by malicious people to bypass certain security restrictions, disclose potentially sensitive information, cause a DoS (Denial of Service), and compromise a vulnerable system.

tags | advisory, denial of service, local, vulnerability
systems | linux, suse
SHA-256 | 9f2cb558411ca9ff4f299671b0bcc6d1201888abd9a9efddd427db039cf8f7b3
Secunia Security Advisory 48810
Posted Apr 16, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Cumin, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory, vulnerability
SHA-256 | 9e92e8eae754d328e97e87f18941dcc4549ebc08fd8836346bb1d08a8a2a0c74
Secunia Security Advisory 48820
Posted Apr 16, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for the kernel. This fixes two vulnerabilities, which can be exploited by malicious, local users and malicious, local users in a guest virtual machine to cause a DoS (Denial of Service).

tags | advisory, denial of service, kernel, local, vulnerability
systems | linux, ubuntu
SHA-256 | 1dc44fafddb48db197374a37129408cbcad063e8d08fb4c7d0502bdcf116cfab
Secunia Security Advisory 48827
Posted Apr 16, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in nginx, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 5613e84e1d6dd919763849226033b40e85e1377e8515bf0b3e9d338e1ef40133
Secunia Security Advisory 48816
Posted Apr 16, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for samba. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | linux, ubuntu
SHA-256 | 59beec18f7f484edf9eb3226dce4ca6bc84733db787a7c14fd0b570908a0809e
Secunia Security Advisory 48815
Posted Apr 16, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in the SH Slideshow plugin for WordPress, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 4415fdd7f6451f9c5a3a6b60370a3bff41cd018d53e1807050fbf74281aba5ca
Secunia Security Advisory 48796
Posted Apr 16, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in the Chat plugin for Seditio, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
SHA-256 | 5d73b3436b317dc5761f2b1484ec021a70feca8fa9b9ffa9fb69aed1fb8e865d
Secunia Security Advisory 48818
Posted Apr 16, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for samba. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | linux, debian
SHA-256 | e4cc99104ac9da2805bf959499adc517c5bdcad1f991dcd11cd9f5275b2e6da5
Secunia Security Advisory 48794
Posted Apr 16, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for gajim. This fixes a security issue and two vulnerabilities, which can be exploited by malicious, local users to perform certain actions with escalated privileges and by malicious people to conduct SQL injection attacks and compromise a user's system.

tags | advisory, local, vulnerability, sql injection
systems | linux, debian
SHA-256 | bcf85c9e2b01a3cfb0102aca214cd5218b4fb2f657cb8f3588ec299d36ec9c2b
Page 1 of 2
Back12Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close