exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 50 of 53 RSS Feed

Files Date: 2009-04-01 to 2009-04-02

Secunia Security Advisory 34544
Posted Apr 1, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability with an unknown impact has been reported in DB2 Content Manager.

tags | advisory
SHA-256 | af9cc14e508d20381f35e0464f71fbe236d9f7d7bd11d5539955bfd159f83a8b
Secunia Security Advisory 34550
Posted Apr 1, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Avaya has acknowledged a weakness and a vulnerability in multiple Avaya products, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a user's system.

tags | advisory, denial of service
SHA-256 | 2f21b6a7fc7353b6738a244a4f61b451ba69650108f28122170549945c8914d5
Secunia Security Advisory 33244
Posted Apr 1, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - r0ut3r has reported a vulnerability in Linksys WAG54G, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 96703076c632de87640e56d5588fa6982e2898b7a6d437057f88d2abe80fad63
Secunia Security Advisory 34558
Posted Apr 1, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Sun Solaris, which can be exploited by malicious, local users to perform certain actions with escalated privileges.

tags | advisory, local
systems | solaris
SHA-256 | 5d598c84237290fb9c430daeeabb47b0b0191d43df6b0f887114a9ddfefb623a
Secunia Security Advisory 34559
Posted Apr 1, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Will Dormann has discovered a vulnerability in SAP GUI, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 8181a7b15ef60c99cf8665e055644c6cca1284af9d2e49c9f1a88f0c5cb094db
Secunia Security Advisory 34518
Posted Apr 1, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in WebEdition, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
SHA-256 | 385fee1072811fdcc954d9afbf9b403c7c0ff03976ba770bf8a222623d04fa2c
Secunia Security Advisory 33758
Posted Apr 1, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for the kernel. This fixes some weaknesses and security issues, which can be exploited by malicious, local users to bypass certain security restrictions and cause a DoS (Denial of Service).

tags | advisory, denial of service, kernel, local
systems | linux, redhat
SHA-256 | f500365af086dd97a61fa19c120e3ff4c351aa486ab8082693ab6a3d42c1bcd8
Secunia Security Advisory 34555
Posted Apr 1, 2009
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Podcast Generator, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
SHA-256 | ae9ee8f179b102c65558742e95310770a921137c5262e5fe172515f7747d60d1
Core Security Technologies Advisory 2009.0108
Posted Apr 1, 2009
Authored by Core Security Technologies | Site coresecurity.com

Core Security Technologies Advisory - The Sun Calendar Express Web Server suffers from remote denial of service and cross site scripting vulnerabilities.

tags | exploit, remote, web, denial of service, vulnerability, xss
SHA-256 | 70c47cf0c1217dfc126f835834bf3fbffb2e26ed040905c0691ea08d84050823
PrecisionID File Overwrite
Posted Apr 1, 2009
Site dsecrg.com

The PrecisionID Active-X control suffers from an arbitrary file overwriting vulnerability.

tags | exploit, arbitrary, activex
SHA-256 | 9593b464bae7b6dd5e4e3bb54e346c6d85741d2a877d6f62aa080e82180eb56f
SAPDB Cross Site Scripting
Posted Apr 1, 2009
Site dsecrg.com

SAPDB suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 20480cc38d05637406aaeaa81ff51bd746e7dc4ecc4867b684633b225b0e20ac
IBM WebSphere Cross Site Scripting
Posted Apr 1, 2009
Site dsecrg.com

IBM WebSphere Application Server versions 7.0 and 6.1 suffer from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 4f4b7ea5a34c878402954e35424b0b14d0baca8469f28c98a9d163b1684dc0ae
webEdition 6.0.0.4 Local File Inclusion
Posted Apr 1, 2009
Authored by Salvatore Fresta

webEdition versions 6.0.0.4 and below suffer from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 58834c656aea83f86f4cd13324ad05f1cb9c4be232cb61dbebb8a926cce18b24
URLCrazy Domain Name Typo Tool 0.2
Posted Apr 1, 2009
Authored by Andrew Horton | Site morningstarsecurity.com

UrlCrazy is for the study of domainname typos and URL hijacking. It generates domainname typo permutations then tests them to learn if they are in use, estimates their popularity and more. Typo types supported are: Character Omission, Adjacent Character Swap, Adjacent Character Replacement, Adjacent Character Insertion, Missing Dot, Strip Dashes, Singular or Pluralise. Urlcrazy is written in Ruby.

tags | tool, web, ruby
SHA-256 | 0accacdc470f20231ead2b7d06716604bea1e9f5beeab45ef44e05d06c52df45
Trend Micro Internet Security Pro 2009 Privilege Escalation
Posted Apr 1, 2009
Authored by Nikita Tarakanov | Site securitylab.ru

Positive Technologies Research Team has discovered multiple privilege escalation vulnerabilities in Trend Micro products. The IOCTL handler in tmactmon.sys uses the METHOD_NEITHER communication method for IOCTLs and does not properly validate buffer data associated with the Irp object, which allows local users to gain SYSTEM privileges.

tags | advisory, local, vulnerability
advisories | CVE-2009-0686
SHA-256 | 55ea736f59fb7ae8994b65029d905f7cae968eb2e5909d99df231a466897d933
Scout Portal Toolkit 1.4 XSS / SQL Injection
Posted Apr 1, 2009
Authored by d3v1l

The Scout Portal Toolkit version 1.4 suffers from cross site scripting and SQL injection vulnerabilities. The SQL injection vulnerability was already previously discovered in May of 2008.

tags | exploit, vulnerability, xss, sql injection
SHA-256 | 14f901b8058e4c69671750adba1d4df98618baa6973d8c4082742eb36b4d3b76
Turnkey Ebook Store 1.1 Cross Site Scripting
Posted Apr 1, 2009
Authored by TEAMELITE

Turnkey Ebook Store version 1.1 suffers from cross site scripting and redirection vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 0ff858011fd581f1e4c9ee6d8b6321636d4e387d18de3a82b24c22ac51e6f2d0
OpenStego Free Steganography Solution 0.5.2
Posted Apr 1, 2009
Authored by Samir Vaidya | Site sourceforge.net

OpenStego is a tool implemented in Java for generic steganography, with support for password-based encryption of the data. It supports plugins for various steganographic algorithms (currently, only Least Significant Bit algorithm is supported for images). Both source and jar releases are in this tarball.

Changes: This release fixes a major bug where the extract action was not working for the RandomLSB plugin.
tags | java, encryption, steganography
SHA-256 | ac9166905513d6f187ba97a2d1f5459ac3e672a22c38f7888d250ba98c06613e
VSP Stats Processor 0.45 SQL Injection
Posted Apr 1, 2009
Authored by Dimi4

VSP Stats Processor version 0.45 suffers from a remote SQL injection vulnerability in gamestat.php.

tags | exploit, remote, php, sql injection
SHA-256 | 556117c98db69cf220005749c47a92a273dd63c8fd78e2d4ea4c34c996e6ede7
PHPRecipeBook 2.39 SQL Injection
Posted Apr 1, 2009
Authored by DarKdewiL | Site 1923turk.biz

PHPRecipeBook version 2.39 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 044602fcdcf98db5aea16ac5cfdeefafa0ae0d7e4c373f0074d1e393841c5864
JobHut 1.2 Password Change
Posted Apr 1, 2009
Authored by ThE g0bL!N | Site h4ckf0ru.com

JobHut versions 1.2 and below suffer from remote password change/delete/active user vulnerabilities.

tags | exploit, remote, vulnerability
SHA-256 | 1b5b781cf06654262f84fbfc10cfcbae8d8b76cb05e83761bf3bf9f0e95eb79f
aspWebCalendar Free Edition Database Disclosure
Posted Apr 1, 2009
Authored by Joseph Giron

aspWebCalendar Free Edition suffers from a database disclosure vulnerability.

tags | exploit, info disclosure
SHA-256 | c0ecbfa4fee7f3411e7ee2cdd21f32a54ae3649c1aa8949f20bc9794f0167af2
Debian Linux Security Advisory 1760-1
Posted Apr 1, 2009
Authored by Debian | Site debian.org

Debian Security Advisory 1760-1 - Two vulnerabilities have been discovered in openswan, an IPSec implementation for linux.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2008-4190, CVE-2009-0790
SHA-256 | 2c2aa3345edfeb4b31239b8671abeebadc6d458161424f2e9b565f1d82a519da
Debian Linux Security Advisory 1759-1
Posted Apr 1, 2009
Authored by Debian | Site debian.org

Debian Security Advisory 1759-1 - Gerd v. Egidy discovered that the Pluto IKE daemon in strongswan, an IPSec implementation for linux, is prone to a denial of service attack via a malicious packet.

tags | advisory, denial of service
systems | linux, debian
advisories | CVE-2009-0790
SHA-256 | e50f4c4bdee473b2d0a12ed6e6e7f625f317c6e610e2d3965a17d7d06d62af8d
VirtueMart 1.1.2 SQL Injection / RFI / LFI / XSS
Posted Apr 1, 2009
Authored by Janek Vind aka waraxe | Site waraxe.us

VirtueMart versions 1.1.2 and below suffer from cross site scripting, SQL injection, remote/local file inclusion, and code execution vulnerabilities.

tags | exploit, remote, local, vulnerability, code execution, xss, sql injection, file inclusion
SHA-256 | c1b8b1b104c5cb8ad97f285c6bcdb1512e50ac13adc92396ee282e41ac8a0bed
Page 2 of 3
Back123Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close