exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 35 RSS Feed

Files Date: 2012-11-15

Secunia Security Advisory 51291
Posted Nov 15, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Andrea Micalizzi has discovered two vulnerabilities in Novell Privileged User Manager, which can be exploited by malicious people to bypass certain security restrictions and compromise a vulnerable system.

tags | advisory, vulnerability
SHA-256 | 93baa9c57d733f717d652e35a97b4825577b1ce10e57903386cde4ed2ea5616a
Secunia Security Advisory 51311
Posted Nov 15, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for opera. This fixes multiple vulnerabilities, where some have unknown impacts and other can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's system.

tags | advisory, vulnerability, xss
systems | linux, suse
SHA-256 | 65472e4a3fd440bdcf1f3b7d647d04be041e64318873ae3705e5ec9819b7b253
Secunia Security Advisory 51308
Posted Nov 15, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for libproxy. This fixes a vulnerability, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
systems | linux, redhat
SHA-256 | f5e6e42fda0daf268a6cd23fc3164834b7f5f0e12a1f6acdff541ade78b4640e
Secunia Security Advisory 51233
Posted Nov 15, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Horde Groupware, Horde Groupware Webmail Edition, and Kronolith, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory, vulnerability
SHA-256 | 086207794dbe4557600c01d83e4fb58e3df9badcad39b270162435fcfeb3563b
Secunia Security Advisory 51273
Posted Nov 15, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in the User Read-Only module in Drupal, which can be exploited by malicious users to bypass certain security restrictions.

tags | advisory
SHA-256 | 66ef020426934de03ca3344c5b36fd1c17b73207c6e5d2a20ca6bb0c370f351e
Secunia Security Advisory 51309
Posted Nov 15, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for mysql. This fixes multiple vulnerabilities, which can be exploited by malicious users to disclose potentially sensitive information, manipulate certain data, and cause a DoS (Denial of Service) and by malicious people to disclose potentially sensitive information, manipulate certain data, cause a DoS (Denial of Service), and potentially compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
systems | linux, redhat
SHA-256 | 92bc46b5c60c57f1dff2276818fee16d9ee65ab7e1e9ca780fba12d446ce2489
Secunia Security Advisory 51259
Posted Nov 15, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Chaos tool suite module for Drupal, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory
SHA-256 | a37ddb8b2287da8fecd18ceb27bd384e1a2b4df270bc9bd9c15a2376456b8253
Secunia Security Advisory 50982
Posted Nov 15, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Charlie Eriksen has discovered a vulnerability in the post-views plugin for WordPress, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 4685603298a20769b67ea22214b670166030b852d6044bfbb3be8a669bff9670
Secunia Security Advisory 51288
Posted Nov 15, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been discovered in The FAQ Manager, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, vulnerability, sql injection
SHA-256 | a4f746a4fa3cb0d072111d7210f3e158b019b66d2b07acc066bb82cf14f4d2b3
Secunia Security Advisory 51300
Posted Nov 15, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in MantisBT, which can be exploited by malicious users to disclose potentially sensitive information.

tags | advisory
SHA-256 | 19157884a27023ffc663b18eac1e82db0a9c5857af4ed086450e61e0a9ee008d
Secunia Security Advisory 51252
Posted Nov 15, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - IBM has acknowledged multiple vulnerabilities in IBM Tivoli Monitoring, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 4de279fbeec1c5fd244c19fd737a00e6c738bec30ea0d990fe92ef6d1ac913f9
Secunia Security Advisory 51278
Posted Nov 15, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - IBM has acknowledged multiple vulnerabilities in IBM Tivoli Management Framework, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 9212180498603e1d3d64f67716a09ab7c86622ebff4a4f249e036719cc2e1b35
Secunia Security Advisory 51272
Posted Nov 15, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the RESTful Web Services module for Drupal, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, web, csrf
SHA-256 | b7397911cc68869f4884c59a846ee3770ac40ba8a0cdfa47c937fa98a0041081
Secunia Security Advisory 51297
Posted Nov 15, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Dell OpenManage Server Administrator, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | bc6de1b2ff0c841e7288465f901a30219b9b6ff29a155718c96b80885d3d9fa7
Secunia Security Advisory 51277
Posted Nov 15, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - IBM has acknowledged multiple vulnerabilities in IBM Lotus Notes and Lotus Domino, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system.

tags | advisory, vulnerability
SHA-256 | 6a3612311657899c6002bd3d213b93c1456e7719bafd7ccb4bf435312d1117fe
Secunia Security Advisory 51261
Posted Nov 15, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Smiley and Smileys modules for Drupal, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory
SHA-256 | 522fc391930cddc6f3ef8c682e18a9e131554f639099c803fa3e13801a56826c
Secunia Security Advisory 51244
Posted Nov 15, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in IBM Java, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system.

tags | advisory, java, vulnerability
SHA-256 | 47d5dd8933fbd35666521df65fde4fc6b37de58832545d67afcc83978f5b71bb
Secunia Security Advisory 49128
Posted Nov 15, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in OpenVAS Manager, which can be exploited by malicious users to compromise a vulnerable system.

tags | advisory
SHA-256 | cafe702c4ccd041ac4da34e86314de5d27ad533e9c300354fc8936af1ae99c55
Oracle Database Client System Analyzer Arbitrary File Upload
Posted Nov 15, 2012
Authored by juan vazquez, 1c239c43f521145fa8385d64a9c32243 | Site metasploit.com

This Metasploit module exploits an arbitrary file upload vulnerability on the Client Analyzer component as included in Oracle Database 11g, which allows remote attackers to upload and execute arbitrary code. This Metasploit module has been tested successfully on Oracle Database 11g 11.2.0.1.0 on Windows 2003 SP2, where execution through the Windows Management Instrumentation service has been used.

tags | exploit, remote, arbitrary, file upload
systems | windows
advisories | CVE-2010-3600, OSVDB-70546
SHA-256 | 84145a2bd1465f746c9f1fb3cb57ffe9811d8c12fa296a6bdabb07a13010b2ad
Novell NetIQ Privileged User Manager 2.3.1 ldapagnt.dll Code Execution
Posted Nov 15, 2012
Authored by rgod | Site retrogod.altervista.org

Novell NetIQ Privileged User Manager version 2.3.1 suffers from a perl code evaluation remote command execution vulnerability in ldapagnt_eval() in ldapagnt.dll. The secure web interface contains a flaw which allows, without prior authentication, to execute a Perl script with SYSTEM privileges. This can be done by sending a POST request with well formed data. Full exploit included.

tags | exploit, remote, web, perl
systems | linux
SHA-256 | f2677910b884afa12ade6e175014677e91e4db77215c215f570b78204891f70b
Novell NetIQ Privileged User Manager 2.3.1 auth.dll Code Execution
Posted Nov 15, 2012
Authored by rgod | Site retrogod.altervista.org

Novell NetIQ Privileged User Manager version 2.3.1 suffers from a remote code execution vulnerability in pa_modify_accounts() in auth.dll. The secure web interface contains a flaw which allows, without prior authentication, to change the password of the user 'admin'. A remote attacker then could login to the web interface with full privileges and trigger underlying vulnerabilities to write arbitrary files against the target system with SYSTEM privileges. Full exploit included.

tags | exploit, remote, web, arbitrary, vulnerability, code execution
systems | linux
SHA-256 | cb5b36fa91506836a8939d6ca42408814c64880b86065e5e6fb112b35bf19520
Technical Cyber Security Alert 2012-318A
Posted Nov 15, 2012
Authored by US-CERT | Site us-cert.gov

Technical Cyber Security Alert 2012-318A - Select Microsoft software products contain multiple vulnerabilities. Microsoft has released updates to address these vulnerabilities.

tags | advisory, vulnerability
SHA-256 | 3686044e826dfdc6eeaed504034372a13a46723b8035dba0c178d88e64c6b730
Drupal Table Of Contents 6.x Access Bypass
Posted Nov 15, 2012
Authored by Alexis Wilke, Erik Webb | Site drupal.org

Drupal Table of Contents third party module version 6.x suffers from an access bypass vulnerability.

tags | advisory, bypass
SHA-256 | de9d3420b8f2bb8aa45ead18120cc14b66ec3e1ee7fb7fafe60288fe5b8e9b05
Drupal Chaos Tool Suite 6.x Cross Site Scripting
Posted Nov 15, 2012
Authored by Justin C. Klein Keane, Andrey Tretyakov | Site drupal.org

Drupal Chaos Tool Suite third party module version 6.x suffers from a cross site scripting vulnerability.

tags | advisory, xss
SHA-256 | ca74e9dd5c4ee03813e94af77baad38fba13ceee4e867efaf0762dbb9e86e7b6
iDev Rentals 1.0 Cross Site Scripting
Posted Nov 15, 2012
Authored by Ibrahim El-Sayed, Vulnerability Laboratory | Site vulnerability-lab.com

iDev Rentals version 1.0 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | f49da30c25577ddf778c0ccd319f4256b0419b13ab196f1602832edc06d22abc
Page 1 of 2
Back12Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close