exploit the possibilities
Showing 1 - 18 of 18 RSS Feed

Files Date: 2011-12-11

FCMS 2.7.2 Cross Site Request Forgery
Posted Dec 11, 2011
Authored by Ahmed Elhady Mohamed

FCMS versions 2.7.2 and below suffer from multiple cross site request forgery vulnerabilities.

tags | exploit, vulnerability, csrf
MD5 | 11f812c94f3773740733c6cb6fc7322c
Xoops 2.5.4 Blind SQL Injection
Posted Dec 11, 2011
Authored by blkhtc0rp

Xoops version 2.5.4 suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 09d53f38d83896759bd25f5418522982
Digital Scribe 1.5 Cross Site Request Forgery
Posted Dec 11, 2011
Authored by Muhammet Cagri Tepebasili

Digital Scribe version 1.5 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
MD5 | ba1e696b586856e387ca002d9533230a
Pixie 1.04 Cross Site Request Forgery
Posted Dec 11, 2011
Authored by hackme

Pixie version 1.04 suffers from a blog post cross site request forgery vulnerability.

tags | exploit, csrf
MD5 | 9d83992a1981fd1cc5428c38d4a8e53a
D-Link DSL-500T ADSL XSRF / Brute Force
Posted Dec 11, 2011
Authored by MustLive

The D-Link DSL-500T ADSL router suffers from cross site request forgery, brute force and predictable resource location vulnerabilities.

tags | advisory, cracker, vulnerability, csrf
MD5 | a6f8c801108029d04f0b0c1a66fe59d4
2B.COM sprl SQL Injection
Posted Dec 11, 2011
Authored by Metropolis

2B.COM sprl suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | ade8d2c6f35e9158ae041cb4b01f4615
Babylon Cross Site Scripting
Posted Dec 11, 2011
Authored by Abhinav Singh

The search engine at search.babylon.com suffers from a reflective cross site scripting vulnerability.

tags | exploit, xss
MD5 | 956d03f80946159578767cb998720c5d
Anti-Virus Evasion Techniques
Posted Dec 11, 2011
Authored by Abhinav Singh

Whitepaper called Anti-Virus Evasion Techniques. Some of the techniques discussed are binding and splitting, converting exe to executable client side scripts, and performing code obfuscation/morphing.

tags | paper, virus
MD5 | 237fb3a0b67c7a4a85044e46e2aa993a
WordPress UPM-POLLS 1.0.4 Blind SQL Injection
Posted Dec 11, 2011
Authored by Saif El-Sherei

WordPress UPM-POLLS plugin version 1.0.4 suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 39885d3e87d8877f2d93d97915aee945
Google reCAPTCHA WordPress Cross Site Scripting
Posted Dec 11, 2011
Authored by d3v1l, RandomStorm

The Google reCAPTCHA WordPress plugin suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | e7646d93af7f77b16ab8c3b763b79498
Mandriva Linux Security Advisory 2011-183
Posted Dec 11, 2011
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2011-183 - When receiving various stanzas related to voice and video chat, the XMPP protocol plugin failed to ensure that the incoming message contained all required fields, and would crash if certain fields were missing. When receiving various messages related to requesting or receiving authorization for adding a buddy to a buddy list, the oscar protocol plugin failed to validate that a piece of text was UTF-8. In some cases invalid UTF-8 data would lead to a crash. When receiving various incoming messages, the SILC protocol plugin failed to validate that a piece of text was UTF-8. In some cases invalid UTF-8 data would lead to a crash. This update provides pidgin 2.10.1, which is not vulnerable to these issues.

tags | advisory, protocol
systems | linux, mandriva
advisories | CVE-2011-4601, CVE-2011-3594
MD5 | 840f87defa7272b084b49e27fa52a89a
Secunia Security Advisory 47147
Posted Dec 11, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for libxml2. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise an application using the library.

tags | advisory, denial of service, vulnerability
systems | linux, redhat
MD5 | 213e4f6c6be7308e545959cd9004a5a4
Secunia Security Advisory 47133
Posted Dec 11, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Adobe Reader and Adobe Acrobat, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | 6c61c5658f0773e59006359f90f56991
Secunia Security Advisory 47109
Posted Dec 11, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in Apache Struts, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
MD5 | 453575c37df14529e0dd0b17bdc03fa3
Secunia Security Advisory 47121
Posted Dec 11, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in the Pretty Link plugin for WordPress, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | fda4638fae5f35835f5c4acb3269add8
Secunia Security Advisory 47124
Posted Dec 11, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Kerberos, which can be exploited by malicious users to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | 464aab41ef3d6cebf48646bceb85638f
Secunia Security Advisory 47150
Posted Dec 11, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for cups. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a vulnerable system.

tags | advisory
systems | linux, redhat
MD5 | 1b0388630c38ba6136019a2649ef8ab1
Secunia Security Advisory 47142
Posted Dec 11, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for krb5. This fixes a vulnerability, which can be exploited by malicious users to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, redhat
MD5 | 4686f74c8bbb45921359637d7209cb4f
Page 1 of 1
Back1Next

File Archive:

October 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    24 Files
  • 2
    Oct 2nd
    15 Files
  • 3
    Oct 3rd
    7 Files
  • 4
    Oct 4th
    4 Files
  • 5
    Oct 5th
    10 Files
  • 6
    Oct 6th
    1 Files
  • 7
    Oct 7th
    21 Files
  • 8
    Oct 8th
    19 Files
  • 9
    Oct 9th
    5 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    17 Files
  • 12
    Oct 12th
    4 Files
  • 13
    Oct 13th
    4 Files
  • 14
    Oct 14th
    15 Files
  • 15
    Oct 15th
    19 Files
  • 16
    Oct 16th
    19 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close