what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 39 RSS Feed

Files Date: 2012-04-25

Drupal Linkit 7.x Access Bypass
Posted Apr 25, 2012
Authored by PAULAP | Site drupal.org

Drupal Linkit module version 7.x suffers from an access bypass vulnerability.

tags | advisory, bypass
SHA-256 | efc81d938cddf7b5703159d40aae904f3759e7900541b5a8edcdd9c2d8882401
Drupal Spaces 6.x Access Bypass
Posted Apr 25, 2012
Authored by hefox | Site drupal.org

Drupal Spaces module version 6.x suffers from an access bypass vulnerability.

tags | advisory, bypass
SHA-256 | 347ac91feb7acc6375b733a9114268dd653f58fb484c9eedc306f8462aec4fd9
Drupal Site Documentation 6.x Information Disclosure
Posted Apr 25, 2012
Authored by Jakub Suchy | Site drupal.org

Drupal Site Documentation version 6.x suffers from an information disclosure vulnerability.

tags | advisory, info disclosure
SHA-256 | 4deadfa9ab12cae4f4a040ed36b5884ad4ff166adbf02566eb2e9c63746223a7
Drupal Ubercart 6.x / 7.x XSS / PHP Code Execution
Posted Apr 25, 2012
Authored by Shaun Dychko, Dave Long, Lee Rowlands | Site drupal.org

Drupal Ubercart module versions 6.x and 7.x suffers from code execution and cross site scripting vulnerabilities.

tags | advisory, vulnerability, code execution, xss
SHA-256 | 8ad5e51b2e8211b46a86fd0884c4432816a13267ddf774999bf5b42ae172622a
Drupal RealName 6.x Cross Site Scripting
Posted Apr 25, 2012
Authored by Gabor Szanto, Dave Reid | Site drupal.org

Drupal RealName module version 6.x suffers from a cross site scripting vulnerability.

tags | advisory, xss
SHA-256 | ac32848d9a2bea11a8b9268c408786c21c6630e8ea7f32e8da717fb8ab2000c7
Drupal Creative Commons 6.x Cross Site Scripting
Posted Apr 25, 2012
Authored by Justin C. Klein Keane | Site drupal.org

Drupal Creative Commons module version 6.x suffers from a cross site scripting vulnerability.

tags | advisory, xss
SHA-256 | cd7543b39866fa90a05ae4e94480fc308d2a02154efdb0ede21f8750010f1192
Shadow Stream Recorder 3.0.1.7 Buffer Overflow
Posted Apr 25, 2012
Authored by AlpHaNiX, b0telh0 | Site metasploit.com

This Metasploit module exploits a buffer overflow in Shadow Stream Recorder 3.0.1.7. Using the application to open a specially crafted asx file, a buffer overflow may occur to allow arbitrary code execution under the context of the user.

tags | exploit, overflow, arbitrary, code execution
SHA-256 | 8605d6b286358f8ebce3e864c8089ee88a7cec055a12349e1618003174c8d254
MS12-027 MSCOMCTL ActiveX Buffer Overflow
Posted Apr 25, 2012
Authored by unknown, sinn3r, juan vazquez | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in MSCOMCTL.OCX. It uses a malicious RTF to embed the specially crafted MSComctlLib.ListViewCtrl.2 Control as exploited in the wild on April 2012. This Metasploit module targets Office 2007 and Office 2010 targets. The DEP/ASLR bypass on Office 2010 is done with the Ikazuchi ROP chain proposed by Abysssec. This chain uses "msgr3en.dll", which will load after office got load, so the malicious file must be loaded through "File / Open" to achieve exploitation.

tags | exploit, overflow
advisories | CVE-2012-0158, OSVDB-81125
SHA-256 | 0b684caf70084bb5bcb079447d8379464ff2e3e928ee2d84beab044161baf6bb
WordPress Organizer 1.2.1 XSS / CSRF / Shell Upload
Posted Apr 25, 2012
Authored by MustLive

WordPress Organizer version 1.2.1 suffers from cross site request forgery, cross site scripting, and shell upload vulnerabilities.

tags | exploit, shell, vulnerability, xss, csrf
SHA-256 | 5d7da27b984ced3d8195b475c086f6fa632941aa13a56de1779eb08cce7b634d
MoroccoTel Default Password
Posted Apr 25, 2012
Authored by Jerome Athias

MoroccoTel boxes suffer from an issue where there is a default password that can be used on the telnet server.

tags | exploit
SHA-256 | 15212df8a3a8d8b6ba16ec77025ef5e22d8dacfee6fd2ff769977b33b5b5fd46
Piwigo 2.3.3 Cross Site Scripting / Directory Traversal
Posted Apr 25, 2012
Authored by High-Tech Bridge SA | Site htbridge.com

Piwigo version 2.3.3 suffers from cross site scripting and directory traversal vulnerabilities.

tags | exploit, vulnerability, xss, file inclusion
advisories | CVE-2012-2208, CVE-2012-2209
SHA-256 | 170fe747de0161668180d3fcf82d6993ee1b0965b81a9d2d8dfc43b1af0b7d9e
mount.cifs chdir() File Identification
Posted Apr 25, 2012
Authored by Jesus Olmos Gonzalez

mount.cifs chdir() allows for arbitrary file identification as root. All versions prior to 5.4 are affected.

tags | exploit, arbitrary, root
SHA-256 | 1a07d210c27edc8b4cb7f1f1ad3579fd0a15fb1679968e8465902f2d88e2e7ae
Debian Security Advisory 2454-2
Posted Apr 25, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2454-2 - Tomas Hoger, Red Hat, discovered that the fix for CVE-2012-2110 for the 0.9.8 series of OpenSSL was incomplete. It has been assigned the CVE-2012-2131 identifier.

tags | advisory
systems | linux, redhat, debian
advisories | CVE-2012-2131
SHA-256 | 7e348a26b106449f52510f57388768abb0d395544cec547906f51111b437e856
Red Hat Security Advisory 2012-0523-01
Posted Apr 25, 2012
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2012-0523-01 - The libpng packages contain a library of functions for creating and manipulating PNG image format files. A heap-based buffer overflow flaw was found in the way libpng processed tEXt chunks in PNG image files. An attacker could create a specially-crafted PNG image file that, when opened, could cause an application using libpng to crash or, possibly, execute arbitrary code with the privileges of the user running the application. Users of libpng should upgrade to these updated packages, which correct this issue. For Red Hat Enterprise Linux 5, they contain a backported patch. For Red Hat Enterprise Linux 6, they upgrade libpng to version 1.2.49. All running applications using libpng must be restarted for the update to take effect.

tags | advisory, overflow, arbitrary
systems | linux, redhat
advisories | CVE-2011-3048
SHA-256 | ff4ede8dc43b0b73e973f833df2aeefc71ad1e57b3a9db116767dd97722d5999
Debian Security Advisory 2460-1
Posted Apr 25, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2460-1 - Several vulnerabilities were discovered in the Asterisk PBX and telephony toolkit.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2012-1183, CVE-2012-2414, CVE-2012-2415
SHA-256 | 90ac813962f844ca8939a8b64ac607c95c83938e1adac515d296dc2a4e24ef63
Red Hat Security Advisory 2012-0522-01
Posted Apr 25, 2012
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2012-0522-01 - OpenSSL is a toolkit that implements the Secure Sockets Layer and Transport Layer Security protocols, as well as a full-strength, general purpose cryptography library. Multiple numeric conversion errors, leading to a buffer overflow, were found in the way OpenSSL parsed ASN.1 data from BIO inputs. Specially-crafted DER encoded data read from a file or other BIO input could cause an application using the OpenSSL library to crash or, potentially, execute arbitrary code.

tags | advisory, overflow, arbitrary, protocol
systems | linux, redhat
advisories | CVE-2012-2110
SHA-256 | 51fbde2a46cf9e365819ced0a0b997025187b272c419e02e9e8719e01c4eb801
Secunia Security Advisory 48903
Posted Apr 25, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - High-Tech Bridge SA has discovered some vulnerabilities in Piwigo, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | ca4c88a696c0cc9fd89674d8023d4dcc0465f1fa33db25d5f4267583c10eacca
Secunia Security Advisory 48952
Posted Apr 25, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for thunderbird. This fixes multiple vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting and spoofing attacks, disclose certain sensitive information, and compromise a user's system.

tags | advisory, spoof, vulnerability, xss
systems | linux, redhat
SHA-256 | caef6f0fabf69a0c8cfd624e7da7b7c89a1b6a44dd1e8b8456269e3e1c959b66
Secunia Security Advisory 48967
Posted Apr 25, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities are reported in multiple IBM Rational products, which can be exploited by malicious users to disclose sensitive information and conduct session fixation and script insertion attacks and by malicious people to disclose sensitive information, overwrite arbitrary files, conduct cross-site request forgery and spoofing attacks, and compromise a vulnerable system.

tags | advisory, arbitrary, spoof, vulnerability, csrf
SHA-256 | d4a69a9fe21d523dd8643366637bfc6a3ede3833ad6dbf9a329ef970085f2649
Secunia Security Advisory 48920
Posted Apr 25, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for iceape. This fixes multiple vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting and spoofing attacks, bypass certain security restrictions, disclose certain sensitive information, and compromise a user's system.

tags | advisory, spoof, vulnerability, xss
systems | linux, debian
SHA-256 | a938d418491b6c5a61cd539da6a54633f7594a5a2d336f9651f89a77735352fc
Debian Security Advisory 2458-1
Posted Apr 25, 2012
Authored by Debian | Site debian.org

Debian Linux Security Advisory 2458-1 - Several vulnerabilities have been found in the Iceape internet suite, an unbranded version of Seamonkey.

tags | advisory, vulnerability
systems | linux, debian
advisories | CVE-2012-0455, CVE-2012-0456, CVE-2012-0458, CVE-2012-0461, CVE-2012-0467, CVE-2012-0470, CVE-2012-0471, CVE-2012-0477, CVE-2012-0479
SHA-256 | 63ce617ad4207fc9f6f56c8d68d84d9f42707e256fcf4c53016b892111eca303
Red Hat Security Advisory 2012-0519-01
Posted Apr 25, 2012
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2012-0519-01 - JBoss Enterprise Portal Platform is the open source implementation of the Java EE suite of services and Portal services running atop JBoss Enterprise Application Platform. It comprises a set of offerings for enterprise customers who are looking for pre-configured profiles of JBoss Enterprise Middleware components that have been tested and certified together to provide an integrated experience. This release of JBoss Enterprise Portal Platform 5.2.1 serves as a replacement for JBoss Enterprise Portal Platform 5.2.0, and includes bug fixes.

tags | advisory, java
systems | linux, redhat
advisories | CVE-2011-4314, CVE-2012-0818
SHA-256 | 4c2d7e867f2236c82154ad3fdca5b623e021c311c49562d7e1ef097fb83249f5
Mandriva Linux Security Advisory 2012-064
Posted Apr 25, 2012
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2012-064 - It was discovered that the fix for was not sufficient to correct the issue for OpenSSL 0.9.8. The updated packages have been upgraded to the 0.9.8w version which is not vulnerable to this issue.

tags | advisory
systems | linux, mandriva
advisories | CVE-2012-2131
SHA-256 | ec7a43232cc989e79b3501b0f69ac7ec5d682e3b543f7d254621488da11de02d
Secunia Security Advisory 48950
Posted Apr 25, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for java-1.6.0-ibm. This fixes multiple vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.

tags | advisory, java, denial of service, vulnerability
systems | linux, redhat
SHA-256 | ce3029cc85c7cb0a0c429e02786abee5b17a5d543ad773b9c2b249d2b776f72d
Secunia Security Advisory 48968
Posted Apr 25, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities are reported in multiple IBM Rational products, which can be exploited by malicious users to disclose sensitive information and conduct session fixation and script insertion attacks and by malicious people to disclose sensitive information, overwrite arbitrary files, conduct cross-site request forgery and spoofing attacks, and compromise a vulnerable system.

tags | advisory, arbitrary, spoof, vulnerability, csrf
SHA-256 | 9e76e0bd069ca2d87881f5a7f98faf35a2773ab0288cbdb484d6efa7de854e4d
Page 1 of 2
Back12Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    17 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close