what you don't know can hurt you
Showing 1 - 25 of 29 RSS Feed

Files Date: 2011-08-04

HESK 2.2 Cross Site Scripting
Posted Aug 4, 2011
Authored by High-Tech Bridge SA | Site htbridge.com

HESK version 2.2 suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | bdb7040ae7ed89e640d080e9bf10ee83
Agnitio 2.0
Posted Aug 4, 2011
Authored by David Rook | Site sourceforge.net

Agnitio is a tool to help developers and security professionals conduct manual security code reviews in a consistent and repeatable way. Agnitio aims to replace the adhoc nature of manual security code review documentation, create an audit trail and reporting.

Changes: Addition of a basic code analysis module with rules for analyzing Android and iOS. Multiple editors added.
systems | windows
MD5 | f124dd0e2be944db4318a818a53efe4e
Apple Security Advisory 2011-08-03-1
Posted Aug 4, 2011
Authored by Apple | Site apple.com

Apple Security Advisory 2011-08-03-1 - QuickTime version 7.7 has been made available to address multiple code execution, cross-origin, integer overflow, memory corruption, and other vulnerabilities.

tags | advisory, overflow, vulnerability, code execution
systems | apple
advisories | CVE-2011-0186, CVE-2011-0187, CVE-2011-0209, CVE-2011-0210, CVE-2011-0211, CVE-2011-0213, CVE-2011-0245, CVE-2011-0246, CVE-2011-0247, CVE-2011-0248, CVE-2011-0249, CVE-2011-0250, CVE-2011-0251, CVE-2011-0252
MD5 | a9a467b609ed90612c3526ba7bda1494
ThreeDify Designer 5.0.2 Insecure Method / Buffer Overflows
Posted Aug 4, 2011
Authored by High-Tech Bridge SA | Site htbridge.com

ThreeDify Designer version 5.0.2 suffers from Active-X insecure method and buffer overflow vulnerabilities.

tags | exploit, overflow, vulnerability, activex
MD5 | 1e288e45bd917ad5eca992f43d4c8181
Etrinitee Web Worx SQL Injection
Posted Aug 4, 2011
Authored by Ehsan_Hp200

Etrinitee Web Worx suffers from a remote SQL injection vulnerability.

tags | exploit, remote, web, sql injection
MD5 | c44f667fcfc2d32bb1747da88efd722c
Sophail: A Critical Analysis Of Sophos Antivirus
Posted Aug 4, 2011
Authored by Tavis Ormandy

This paper describes the results of a thorough examination of Sophos Antivirus internals. The author presents a technical analysis of claims made by the vendor, and publishes the tools and reference material required to reproduce their results. Furthermore, they examine the product from the perspective of a vulnerability researcher, exploring the rich attack surface exposed, and demonstrating weaknesses and vulnerabilities.

tags | paper, vulnerability, virus
MD5 | 765ab9b1331b27bb4b61d2c897b3139f
Flickr.com Cross Site Scripting
Posted Aug 4, 2011
Authored by SOLVER

Flickr.com suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 5dd4880fbbc97a35f87bab86ea709792
Telligent Community Server 5.x Cross Site Scripting
Posted Aug 4, 2011
Authored by Gabriel Lima

Telligent Community Server version 5.x suffers from multiple stored and reflected cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
MD5 | 00aef8ee4ca1febc1e3d92e6243e8634
WordPress e-Commerce 3.8.5 Cross Site Scripting
Posted Aug 4, 2011
Authored by High-Tech Bridge SA | Site htbridge.com

The WordPress e-Commerce plugin version 3.8.5 suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 3493356f80d5dbe046ce508366256e5c
Freeamp 2.0.7 (FAT File) Stack Buffer Overflow
Posted Aug 4, 2011
Authored by James Fitts, Ivan Garcia Ferreira | Site metasploit.com

This Metasploit module exploits a buffer overflow vulnerability found in Freeamp 2.0.7. The overflow occurs when an overly long string is parsed in the FAT file. This Metasploit module creates a txt file that has to be used in the creation of a FAT file. The FAT file then has to be imported as a theme. To create the FAT file you need to first decompress the basic theme template, MakeTheme -d freeamp.fat. Next create the new FAT file MakeTheme crash.fat theme.xml title.txt *.bmp.

tags | exploit, overflow
MD5 | 5524eff40523bcdd11fb577a2e668208
Sun/Oracle GlassFish Server Authenticated Code Execution
Posted Aug 4, 2011
Authored by Joshua D. Abraham, sinn3r, juan vazquez | Site metasploit.com

This Metasploit module logs in to an GlassFish Server 3.1 (Open Source or Commercial) instance using a default credential, uploads, and executes commands via deploying a malicious WAR. On Glassfish 2.x, 3.0 and Sun Java System Application Server 9.x this module will try to bypass authentication instead by sending lowercase HTTP verbs.

tags | exploit, java, web
advisories | CVE-2011-0807
MD5 | 06ffb6ce20215f71d9e5d4728ef13549
ABBS Electronic Flash Cards 2.1 (FCD File) Stack Buffer Overflow
Posted Aug 4, 2011
Authored by James Fitts, h1ch4m | Site metasploit.com

This Metasploit module exploits a buffer overflow vulnerability found in ABBS Electronic Flash Cards 2.1. The overflow occurs when an overly long string is passed in the fcd file. To execute this fcd file the victim has to start to start a new "random" test.

tags | exploit, overflow
MD5 | ce864603a5425c1a221e7724fbd7d1bb
Marc Merlin BAPPA Local File Inclusion
Posted Aug 4, 2011
Authored by Kalashinkov3

Marc Merlin BAPPA suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
MD5 | 14db562e883f9ce3cada99dcc9dc479e
Designed By Mueva.edu SQL Injection
Posted Aug 4, 2011
Authored by 3spi0n

Sites designed by Mueva.edu appear to suffer from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 79cc8b3a96006ffe67c290f0249fb0d2
ABBS Audio Media Player 3.0 (LST File) Stack Buffer Overflow
Posted Aug 4, 2011
Authored by James Fitts, h1ch4m | Site metasploit.com

This Metasploit module exploits a buffer overflow vulnerability found in ABBS Audio Media Player 3.0. The overflow occurs when an overly long string is passed in the lst file.

tags | exploit, overflow
MD5 | 6b4c8bf1ab72d523a2acb3cfa7deeb7e
Secunia Security Advisory 45042
Posted Aug 4, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Secunia Research has discovered multiple vulnerabilities in Provideo ActiveX controls, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability, activex
MD5 | 8be9167577cfa7cdcecc4b384166b964
Secunia Security Advisory 45483
Posted Aug 4, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in NC LinkList, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | 40c4fd547b30034c2892f0f1ff101325
Secunia Security Advisory 45397
Posted Aug 4, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in FlexNet Publisher, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
MD5 | 551b9fbac381135b820fec6372186433
Secunia Security Advisory 45475
Posted Aug 4, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Matthew Jurczyk has reported a weakness in Microsoft Windows, which can be exploited by malicious, local users to disclose potentially sensitive information or cause a DoS (Denial of Service).

tags | advisory, denial of service, local
systems | windows
MD5 | 6238bf681fe83acea52975bd0cd93e5a
Secunia Security Advisory 45505
Posted Aug 4, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in AlphaLPD, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | be6ccd395ed3bba204378320bda594d7
Secunia Security Advisory 45464
Posted Aug 4, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Mongoose, which can be exploited by malicious people to cause a DoS (Denial of Service) or compromise a vulnerable system.

tags | advisory, denial of service
MD5 | 56d737f825b97ffef63f101e8b0fd7b9
Secunia Security Advisory 45447
Posted Aug 4, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Display Suite module for Drupal, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory
MD5 | 7645d81ca99f4d34e67c5db043c71714
Secunia Security Advisory 45472
Posted Aug 4, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the iWebkit theme for Drupal, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory
MD5 | 6988a2274c286cb40b970538a48a69fe
Secunia Security Advisory 45476
Posted Aug 4, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in Wonderware Information Server, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
MD5 | 664238e56b7e694a5e650dcafb9bbd47
Secunia Security Advisory 45502
Posted Aug 4, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Zabbix, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | 6980ed8edc9351cc708a35e99a947cf2
Page 1 of 2
Back12Next

File Archive:

January 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    8 Files
  • 2
    Jan 2nd
    11 Files
  • 3
    Jan 3rd
    11 Files
  • 4
    Jan 4th
    2 Files
  • 5
    Jan 5th
    2 Files
  • 6
    Jan 6th
    18 Files
  • 7
    Jan 7th
    15 Files
  • 8
    Jan 8th
    16 Files
  • 9
    Jan 9th
    10 Files
  • 10
    Jan 10th
    13 Files
  • 11
    Jan 11th
    2 Files
  • 12
    Jan 12th
    4 Files
  • 13
    Jan 13th
    21 Files
  • 14
    Jan 14th
    18 Files
  • 15
    Jan 15th
    12 Files
  • 16
    Jan 16th
    18 Files
  • 17
    Jan 17th
    11 Files
  • 18
    Jan 18th
    2 Files
  • 19
    Jan 19th
    0 Files
  • 20
    Jan 20th
    0 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    0 Files
  • 24
    Jan 24th
    0 Files
  • 25
    Jan 25th
    0 Files
  • 26
    Jan 26th
    0 Files
  • 27
    Jan 27th
    0 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close