exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 62 RSS Feed

Files Date: 2011-02-22

Debian Security Advisory 2172-1
Posted Feb 22, 2011
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2172-1 - Several vulnerabilities have been discovered in phpCAS, a CAS client library for PHP. The Moodle course management system includes a copy of phpCAS.

tags | advisory, php, vulnerability
systems | linux, debian
advisories | CVE-2010-2795, CVE-2010-2796, CVE-2010-3690, CVE-2010-3691, CVE-2010-3692
SHA-256 | 267dc10fad0c03e578ad3123414ea64b6e23736b2369d3414a6709c24c575ada
Ubuntu Security Notice USN-1069-1
Posted Feb 22, 2011
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1069-1 - It was discovered that Mailman did not properly sanitize certain fields, resulting in cross-site scripting (XSS) vulnerabilities. With cross-site scripting vulnerabilities, if a user were tricked into viewing server output during a crafted server request, a remote attacker could exploit this to modify the contents, or steal confidential data, within the same domain.

tags | advisory, remote, vulnerability, xss
systems | linux, ubuntu
advisories | CVE-2010-3089, CVE-2011-0707
SHA-256 | fdba9a23075e131a564baf3270fe1ab05ec54aef3f93be54371d55937b4d212a
Z-Vote 1.1 SQL Injection
Posted Feb 22, 2011
Authored by High-Tech Bridge SA | Site htbridge.com

Z-Vote Wordpress plugin version 1.1 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 13d791ffcb1a9c96a5776d7f982764f873a591de1d238678b632b3c6d2a793e9
Batavi 1.0 Local File Inclusion
Posted Feb 22, 2011
Authored by AutoSec Tools | Site autosectools.com

A local file inclusion vulnerability in Batavi 1.0 can be exploited to include arbitrary files.

tags | exploit, arbitrary, local, file inclusion
SHA-256 | a038abd8026754cc3126eea68dfc655608815ea18b91adbf83dd2ace60b299b6
ProQuiz 2 Shell Upload
Posted Feb 22, 2011
Authored by AutoSec Tools | Site autosectools.com

ProQuiz version 2 suffers from a shell upload vulnerability.

tags | exploit, shell
SHA-256 | 211e8e13a88448d6d56d0bf2a3f94f1ea198056585e5027ab24034d66219c16d
CDNVote 0.4.1 SQL Injection
Posted Feb 22, 2011
Authored by High-Tech Bridge SA | Site htbridge.com

CDNVote Wordpress plugin version 0.4.1 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | d34e005a0bd7606c9f77ff724fd460c5f3c2c37c8a2d28a01cef678abe4f1ad8
Levering XSRF With Apache Web Server And Java Applet
Posted Feb 22, 2011
Authored by Roberto Suggi Liverani | Site security-assessment.com

Whitepaper called Leveraging XSRF with Apache Web Server "Compatibility with older browser" feature and Java Applet.

tags | paper, java, web, csrf
SHA-256 | 6541c1bf7d0873dfe88bb40e9d6326ebbe5842f6cded8e94a2222c6165df8dc0
Ubuntu Security Notice USN-1068-1
Posted Feb 22, 2011
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1068-1 - Sergey Nizovtsev discovered that Aptdaemon incorrectly filtered certain arguments when using its D-Bus interface. A local attacker could use this flaw to bypass security restrictions and view sensitive information by reading arbitrary files.

tags | advisory, arbitrary, local
systems | linux, ubuntu
advisories | CVE-2011-0725
SHA-256 | f936186c43ebc1ba3469742c7385b9e594e2d6a9049351c7ba02874a13de402a
Vanilla Forums 2.0.17.1 - 2.0.17.5 Cross Site Scripting
Posted Feb 22, 2011
Authored by Aung Khant | Site yehg.net

Vanilla Forums versions 2.0.17.1 through 2.0.17.5 suffer from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 131274da1d8e516db815dd66f46168667b50d7ca29818157c75c7d269c880cd9
Mandriva Linux Security Advisory 2011-035
Posted Feb 22, 2011
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2011-035 - The tomboy-panel scripts in GNOME Tomboy 1.5.2 and earlier place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory. NOTE: vector 1 exists because of an incorrect fix for CVE-2005-4790.2. The updated packages have been patched to correct this issue.

tags | advisory, local, trojan
systems | linux, mandriva
advisories | CVE-2010-4005
SHA-256 | bc3061e7437994cfa1e698306aec56aba5922b6fc005b13d7fec917c016f2077
Creepy Geolocation Gathering Tool 0.1.8
Posted Feb 22, 2011
Authored by Yiannis Kakavas | Site ilektrojohn.github.com

creepy is an application that allows you to gather geolocation related information about users from social networking platforms and image hosting services. The information is presented in a map inside the application where all the retrieved data is shown, accompanied with relevant information (i.e. what was posted from that specific location) to provide context to the presentation.

Changes: This release adds a feature to export retrieved locations as kmz files (opens in Google Earth and Google Maps). It adds a progress bar for the retrieval process. It adds a help menu.
tags | tool
systems | unix
SHA-256 | 2a259b7a5fd401a38f81f8acb78327e378cd52ad47e8d01d4308642fa9bcea94
Batavi 1.0 Cross Site Scripting
Posted Feb 22, 2011
Authored by AutoSec Tools | Site autosectools.com

Batavi version 1.0 suffers from a reflective cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | a08f8fbbcd702d34c02dc4327ee8bceecdb86b5324dadd5f09a343df84e1dbbb
GD Star Rating 1.9.7 Cross Site Scripting / Path Disclosure
Posted Feb 22, 2011
Authored by High-Tech Bridge SA | Site htbridge.com

GD Star Rating version 1.9.7 suffers from cross site scripting and path disclosure vulnerabilities.

tags | exploit, vulnerability, xss, info disclosure
SHA-256 | f317ba56bcfbe1dc8ad82983c22418ee06a8a56d68db97d325a5712c0561491b
Comment Rating 2.9.23 Path Disclosure / SQL Injection
Posted Feb 22, 2011
Authored by High-Tech Bridge SA | Site htbridge.com

Comment Rating version 2.9.23 suffers from path disclosure and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection, info disclosure
SHA-256 | 729b2c251d993f050f0c291a3f198b00aec6b88a21c81465cedade6605f7c847
Starbox 2.0.4 Path Disclosure
Posted Feb 22, 2011
Authored by High-Tech Bridge SA | Site htbridge.com

Starbox version 2.0.4 suffers from a path disclosure vulnerability.

tags | exploit, info disclosure
SHA-256 | 8466134ce1786590d051964a653bfd425f8b2db934be65292f7734d1bae3aaa0
Vote It Up 1.2.2 Path Disclosure
Posted Feb 22, 2011
Authored by High-Tech Bridge SA | Site htbridge.com

Vote It Up version 1.2.2 suffers from a path disclosure vulnerability.

tags | exploit, info disclosure
SHA-256 | 9b73f7cb1e4470396b11ae5bed226c28fae20958c03297330f007d7645a76fbb
OWASP AppSec USA 2011 Announcement
Posted Feb 22, 2011
Site appsecusa.org

OWASP AppSec USA 2011 has been announced. The Call For Trainers is now open and the Call For Papers opens March 15, 2011. This event will be held from September 20th through the 21st, 2011 in Minneapolis, Minnesota.

tags | paper, conference
SHA-256 | 3177758f0b4cc56ec56c993aae415f5c9edad873e552ec89324dced831e58310
Asterisk Project Security Advisory - AST-2011-002
Posted Feb 22, 2011
Authored by Matthew Nicholson | Site asterisk.org

Asterisk Project Security Advisory - When decoding UDPTL packets, multiple stack and heap based arrays can be made to overflow by specially crafted packets. Systems doing T.38 pass through or termination are vulnerable.

tags | advisory, overflow
SHA-256 | 9b947dd4fce8b8d4d6dc7c6bc47a02bc75f6c9d8097ebaa822eda51e67ad2705
C++ Elliptic Curve Cryptography Library 0.14.0
Posted Feb 22, 2011
Site libecc.sourceforge.net

Libecc is a C++ elliptic curve cryptography library that supports fixed-size keys for maximum speed. The goal of this project is to become the first free Open Source library providing the means to generate safe elliptic curves, and to provide an important source of information for anyone with general interest in ECC.

Changes: An anti-aliasing bug was fixed, which is needed when compiling this library with g++ 4.4 or higher. asm clobber bugs were fixed for 32-bit assembly.
tags | library
systems | unix
SHA-256 | 17a214e35a5a633f9c56af83eb96ee5160646a056909756f3ceec28711398774
WinMerge 2.12.4 Stack Overflow
Posted Feb 22, 2011
Authored by LiquidWorm | Site zeroscience.mk

WinMerge version 2.12.4 project file handling stack overflow exploit.

tags | exploit, overflow
SHA-256 | a90d518f4b58a2d90381a86b1328947e877d00adeda5abb3f18c2dbec603cfa5
ICCGI 2011 Call For Papers
Posted Feb 22, 2011
Site iaria.org

ICCGI 2011 Call For Papers - The topics suggested by the conference can be discussed in term of concepts, state of the art, research, standards, implementations, running experiments, applications, and industrial case studies. Authors are invited to submit complete unpublished papers, which are not under review in any other conference or journal in the following, but not limited to, topic areas. This event will be held from June 20th through the 24th, 2011 in Luxembourg.

tags | paper, conference
SHA-256 | ce24c5b6536c58725997f34456f57ea0cdf52ccd86ac32d074b1401174cead18
WordPress Uploadify 1.0 Shell Upload
Posted Feb 22, 2011
Authored by b0telh0 | Site gotgeek.com.br

WordPress Uploadify plugin version 1.0 suffers from a shell upload vulnerability.

tags | exploit, shell
SHA-256 | 8f08b19c3d93727e4ee785ef51ff1e7e2e001c090da9144ce38ac7b2b09b4c01
Greeklog CMS Blind SQL Injection
Posted Feb 22, 2011
Authored by H3X

Greeklog CMS suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 12097a9a3575a918dc8f872c873f828c62588881b307322532a3adc6df584aa5
Course MS 2.1 Local File Inclusion
Posted Feb 22, 2011
Authored by AutoSec Tools | Site autosectools.com

Course MS version 2.1 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | b564b1dd81d56827c757a64356c59dc9e9a36978a56472bee76f312d3f2f6736
Dotproject 2.1.5 SQL Injection / Cross Site Scripting
Posted Feb 22, 2011
Authored by lemlajt

Dotproject version 2.1.5 suffers from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 52f04fcb03efb43e7f685918ed0b0470b61f4c4f98e2e1b12f3227191e51d96b
Page 1 of 3
Back123Next

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    25 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close