what you don't know can hurt you
Showing 1 - 25 of 53 RSS Feed

Files Date: 2011-09-13

Microsoft WINS Service 5.2.3790.4520 Memory Corruption
Posted Sep 13, 2011
Authored by Luigi Auriemma | Site aluigi.org

Microsoft WINS service versions 5.2.3790.4520 and below suffer from a memory corruption vulnerability.

tags | exploit
MD5 | 86c277e52c1b7e62e71e4a9de6da268a
FortiMail Messaging Security Appliance 4.0 Cross Site Scripting
Posted Sep 13, 2011
Authored by Stefan Schurtz

FortiMail Messaging Security Appliance version 4.0 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
MD5 | 01a829c4f453f0191a7086ff522f316c
Core Security Technologies Advisory 2011.0526
Posted Sep 13, 2011
Authored by Core Security Technologies, Nicolas A. Economou | Site coresecurity.com

Core Security Technologies Advisory - A security vulnerability was discovered in the Windows Internet Name Service (WINS). The vulnerability could allow elevation of privilege if a user receives a specially crafted WINS replication packet on an affected system running the WINS service. An attacker must have valid logon credentials and be able to log on locally in order to exploit this vulnerability.

tags | exploit
systems | windows
advisories | CVE-2011-1984
MD5 | f4c207b4130dd7921424dff69fcd2964
Red Hat Security Advisory 2011-1282-01
Posted Sep 13, 2011
Authored by Red Hat | Site access.redhat.com

Red Hat Security Advisory 2011-1282-01 - Network Security Services is a set of libraries designed to support the cross-platform development of security-enabled client and server applications. Netscape Portable Runtime provides platform independence for non-GUI operating system facilities. It was found that a Certificate Authority issued fraudulent HTTPS certificates. This update renders any HTTPS certificates signed by that CA as untrusted. This covers all uses of the certificates, including SSL, S/MIME, and code signing.

tags | advisory, web
systems | linux, redhat
MD5 | f1437eec02b92f1d9b4434e2ca3bf815
Procyon Core Server HMI 1.13 Buffer Overflow
Posted Sep 13, 2011
Authored by Knud Erik Hojgaard, mr_me | Site metasploit.com

This Metasploit module exploits a vulnerability in the coreservice.exe component of Proycon Core Server versions 1.13 and below. While processing a password, the application fails to do proper bounds checking before copying data into a small buffer on the stack. This causes a buffer overflow and allows it to overwrite a structured exception handling record on the stack, allowing for unauthenticated remote code execution. Also, after the payload exits, Coreservice.exe should automatically recover.

tags | exploit, remote, overflow, code execution
advisories | CVE-2011-3322, OSVDB-75371
MD5 | e20f70a94d94013038daa9d62df79866
La Poste FR Website Local File Inclusion
Posted Sep 13, 2011
Authored by Alexander Fuchs | Site vulnerability-lab.com

La Poste FR Website suffers from a local file inclusion vulnerability.

tags | advisory, local, file inclusion
MD5 | 033b97ac2d113cbd87f4c9c53ad61264
La Poste FR Website SQL Injection
Posted Sep 13, 2011
Authored by Alexander Fuchs, Chokri Ben Achor | Site vulnerability-lab.com

La Poste FR Website suffers from multiple remote SQL injection vulnerabilities.

tags | advisory, remote, vulnerability, sql injection
MD5 | 4935c4293489e0baba29cfe3bb3b8124
Barack Obama Website Service Mail Spoof
Posted Sep 13, 2011
Site vulnerability-lab.com

Barack Obama Website Service suffers from an input validation vulnerability that allows for manipulation of mails from info@barackobama.com.

tags | advisory
MD5 | 503654a5a8b9894d8fca44f25aab9bd8
FBI Jobs Center Website Cross Site Scripting
Posted Sep 13, 2011
Authored by Benjamin Kunz Mejri | Site vulnerability-lab.com

FBI Jobs Center Website suffers from a cross site scripting vulnerability.

tags | advisory, xss
MD5 | e1f7a36c46d5fcbe464c1695b2669d5d
FortiAnalyzer Appliance Cross Site Scripting
Posted Sep 13, 2011
Authored by Benjamin Kunz Mejri | Site vulnerability-lab.com

FortiAnalyzer Appliance suffers from cross site scripting vulnerabilities.

tags | advisory, vulnerability, xss
MD5 | 57a35ea9e2dd409567b78393f5bd695e
GeoVision DVR Remote View Session Fixation
Posted Sep 13, 2011
Authored by Benjamin Kunz Mejri | Site vulnerability-lab.com

GeoVision DVR Remote View suffers from a session fixation vulnerability.

tags | advisory, remote
MD5 | 27199bb8192afb39260d91ca6077d5fa
Argus Surveillance DVR 2.3 / 4.x Cross Site Scripting
Posted Sep 13, 2011
Authored by Benjamin Kunz Mejri | Site vulnerability-lab.com

Argus Surveillance DVR versions 2.3 and 4.x suffer from a cross site scripting vulnerability.

tags | advisory, xss
MD5 | 2eaf7c1b5a0f54b44c13754a1e3920f8
Google SketchUp 8.x Memory Corruption
Posted Sep 13, 2011
Authored by Benjamin Kunz Mejri | Site vulnerability-lab.com

Google SketchUp version 8.x suffers from a memory corruption vulnerability when processing malformed DAE files.

tags | advisory
MD5 | 9553bb4fc6890f979aaf621d667057fe
Using QR Tags To Attack Smart Phones
Posted Sep 13, 2011
Authored by Augusto Pereyra

Whitepaper called Using QR Tags to Attack Smart Phones (Attaging). It discusses the threatscape related to arbitrary scanning of these tags and using Metasploit to exploit them.

tags | paper, arbitrary
MD5 | ce00114a7c73e17018ca82de018b612b
YouGetSignal.com Cross Site Scripting
Posted Sep 13, 2011
Authored by Silic0n

YouGetSignal.com suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 9dca51b368fe73d6bd4e2e343a188cf2
Hook Analyser Malware Tool
Posted Sep 13, 2011
Authored by Beenu Arora | Site hookanalyser.blogspot.com

Hook analyser is a hook tool which can be potentially helpful in reversing applications and analysing malware. It can hook to an API in a process and search for a pattern in memory or dump the buffer.

MD5 | bc78ac6d40faa08d49968d3d88abc10f
dotProject 2.1.5 SQL Injection
Posted Sep 13, 2011
Authored by sherl0ck_

dotProject version 2.1.5 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | acb089eb6bfbcd6c132a02752b602d02
Secunia Security Advisory 45975
Posted Sep 13, 2011
Site secunia.com

Secunia Security Advisory - SUSE has issued an update for cyrus-imapd. This fixes a vulnerability, which can be exploited by malicious users to compromise a vulnerable system.

MD5 | d9dc515e6452954b3b8fb083ef4d3e2f
Secunia Security Advisory 45950
Posted Sep 13, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in ScadaTec ModbusTagServer and ScadaTec ScadaPhone, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | a0292ccd6fb9b811def4fb7acdf21c19
Secunia Security Advisory 45980
Posted Sep 13, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Luigi Auriemma has discovered a vulnerability in PlantVisor Enhanced, which can be exploited by malicious people to disclose sensitive information.

tags | advisory
MD5 | dd1f11a3063d88ef398870eedb6d8a88
Secunia Security Advisory 45988
Posted Sep 13, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in EMC Avamar, which can be exploited by malicious users to bypass certain security restrictions.

tags | advisory
MD5 | 3fdf5dea5a54c882363bf11e22d0251d
Secunia Security Advisory 45998
Posted Sep 13, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - MustLive has discovered a vulnerability in the HB-Cumulus plugin for Habari, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | b42b3b4345e2175ee5530cdd0c0d48a7
Secunia Security Advisory 45961
Posted Sep 13, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for mantis. This fixes some vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks and disclose potentially sensitive information and by malicious users to compromise a vulnerable system.

tags | advisory, vulnerability, xss
systems | linux, debian
MD5 | a76df560c2c88ae47ad138e88c9eea16
Secunia Security Advisory 45969
Posted Sep 13, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been discovered in Movicon, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
MD5 | 87668e0676d215c9673057cea48bd816
Secunia Security Advisory 45975
Posted Sep 13, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for cyrus-imapd. This fixes a vulnerability, which can be exploited by malicious users to compromise a vulnerable system.

tags | advisory
systems | linux, suse
MD5 | d9dc515e6452954b3b8fb083ef4d3e2f
Page 1 of 3
Back123Next

File Archive:

October 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    24 Files
  • 2
    Oct 2nd
    15 Files
  • 3
    Oct 3rd
    7 Files
  • 4
    Oct 4th
    4 Files
  • 5
    Oct 5th
    10 Files
  • 6
    Oct 6th
    1 Files
  • 7
    Oct 7th
    21 Files
  • 8
    Oct 8th
    19 Files
  • 9
    Oct 9th
    5 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    17 Files
  • 12
    Oct 12th
    4 Files
  • 13
    Oct 13th
    4 Files
  • 14
    Oct 14th
    15 Files
  • 15
    Oct 15th
    19 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close