exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 40 of 40 RSS Feed

Files Date: 2012-01-11 to 2012-01-12

Secunia Security Advisory 47513
Posted Jan 11, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Blue Coat has acknowledged a security issue and multiple vulnerabilities in Blue Coat PolicyCenter, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and by malicious people to disclose system and potentially sensitive information, bypass certain security restrictions, and cause a DoS (Denial of Service).

tags | advisory, denial of service, local, vulnerability
SHA-256 | 8e1bd3a951aa8e21308f695852f127ecbea84dd95fbe8aa73f91dab1c762c015
Secunia Security Advisory 47462
Posted Jan 11, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - F5 has acknowledged a vulnerability in F5 TMOS, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | f6a31286896fc007afc4e472a816a5eafc7fb8857b8f0e149826db804c9b3212
Secunia Security Advisory 47525
Posted Jan 11, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in OPC DataHub and Cascade DataHub, which can be exploited by malicious people to conduct cross-site scripting attacks and HTTP response splitting attacks.

tags | advisory, web, vulnerability, xss
SHA-256 | 3052a5d814a37992a60fb623fa36eeb1422307ca1bc690b4f49d4e4690aedc6f
Secunia Security Advisory 47501
Posted Jan 11, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Luigi Auriemma has discovered two vulnerabilities in ExpressView Browser Plug-In, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 04c842ca5a3267fa5ae4afaa58c67ce1aadb56e1dabcc687f42b7d16134b8108
Secunia Security Advisory 47531
Posted Jan 11, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - High-Tech Bridge SA has discovered a vulnerability in KnowledgeTree, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 22a413c7e3fc668237853ddb5d453533054e3c6b654dc437f343f558ed986968
Secunia Security Advisory 47496
Posted Jan 11, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Cogent DataHub, which can be exploited by malicious people to conduct cross-site scripting attacks and HTTP response splitting attacks.

tags | advisory, web, vulnerability, xss
SHA-256 | b2e2feba3178001ecacfd9d2403c86e53cada4b437bb8a7af6b0a7883a76da37
Secunia Security Advisory 47517
Posted Jan 11, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for linux-ec2. This fixes a vulnerability, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
systems | linux, ubuntu
SHA-256 | 1d5b8efbcfd80d951c9dfba0002cdf7b6168c4ca8fb51bc2ffbbaa50d1234755
AdSuck DNS Server 2.4.1
Posted Jan 11, 2012
Authored by Marco Peereboom | Site peereboom.us

adsuck is a small DNS server that spoofs blacklisted addresses and forwards all other queries. The idea is to be able to prevent connections to undesirable sites such as ad servers, crawlers, etc. It can be used locally, for the road warrior, or on the network perimeter in order to protect local machines from malicious sites.

Changes: This release updates hosts files. It has switched to git from cvs. It add additional stats. It fixes the dhclient script for OpenBSD where sometimes resolv.conf did not get updated.
tags | tool, local, spoof
systems | unix
SHA-256 | 494f4e31c23b6682f4df4b2146cd8a5076c09846f4b6e8d2192681d2bcac7ce9
razorCMS 1.2 Path Traversal
Posted Jan 11, 2012
Authored by chap0

razorCMS version 1.2 suffers from a path traversal vulnerability.

tags | exploit, file inclusion
SHA-256 | fbdb12c80c98de27931f125ae507349c1cf96ff75958e03c5bd73d20de3149d2
TFTP Server 1.4 ST RRQ Overflow
Posted Jan 11, 2012
Authored by b33f

TFTP Server version 1.4 read request packet buffer overflow exploit that spawns a reverse shell to port 9988.

tags | exploit, overflow, shell
SHA-256 | a201aaa089a6bcd7806a570bb387706be9f0b4e2056e93422d3b8acf44b2a9c1
Novell Netware XNFS caller_name xdrDecodeString Code Execution
Posted Jan 11, 2012
Authored by Francis Provencher

Novell Netware XNFS caller_name xdrDecodeString remote code execution exploit. Version 6.5 SP8 is affected.

tags | exploit, remote, code execution
SHA-256 | f31dcb88656209bf03e01102c043b25490b0a9d539a7b3674a816b9bdd0db342
Pragyan CMS 3.0 Remote File Disclosure
Posted Jan 11, 2012
Authored by Or4nG.M4N

Pragyan CMS version 3.0 suffers from a remote file disclosure vulnerability.

tags | exploit, remote, info disclosure
SHA-256 | 9ad90ad2782431ae5aba40266e0f50ca65df93fee0f2563df379ed06567acfda
OP5 license.php Remote Command Execution
Posted Jan 11, 2012
Authored by Peter Osterberg | Site metasploit.com

This Metasploit module exploits an arbitrary root command execution vulnerability in the OP5 Monitor license.php. Ekelow has confirmed that OP5 Monitor versions 5.3.5, 5.4.0, 5.4.2, 5.5.0, 5.5.1 are vulnerable.

tags | exploit, arbitrary, root, php
advisories | CVE-2012-0261, OSVDB-78064
SHA-256 | d2105e1f89c2f28bca22b1adedc6a39012c035a0e29a2b290c1600b2eb85c472
OP5 welcome Remote Command Execution
Posted Jan 11, 2012
Authored by Peter Osterberg | Site metasploit.com

This Metasploit module exploits an arbitrary root command execution vulnerability in OP5 Monitor welcome. Ekelow AB has confirmed that OP5 Monitor versions 5.3.5, 5.4.0, 5.4.2, 5.5.0, 5.5.1 are vulnerable.

tags | exploit, arbitrary, root
advisories | CVE-2012-0262, OSVDB-78065
SHA-256 | c351feb8d2465ec452647ebc76a51ac184772093b2251154fbd643ab54b4fa12
FreeBSD based telnetd encrypt_key_id brute force
Posted Jan 11, 2012
Site metasploit.com

This Metasploit module exploits a buffer overflow in the encryption option handler of the FreeBSD telnet service.

tags | exploit, overflow
systems | freebsd
advisories | CVE-2011-4862, OSVDB-78020
SHA-256 | 26a4211c976648be259b01d70ead3c15515210a76cfa2f2e831ab504568547e8
Page 2 of 2
Back12Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close