exploit the possibilities
Showing 1 - 18 of 18 RSS Feed

Files Date: 2011-12-11

FCMS 2.7.2 Cross Site Request Forgery
Posted Dec 11, 2011
Authored by Ahmed Elhady Mohamed

FCMS versions 2.7.2 and below suffer from multiple cross site request forgery vulnerabilities.

tags | exploit, vulnerability, csrf
MD5 | 11f812c94f3773740733c6cb6fc7322c
Xoops 2.5.4 Blind SQL Injection
Posted Dec 11, 2011
Authored by blkhtc0rp

Xoops version 2.5.4 suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 09d53f38d83896759bd25f5418522982
Digital Scribe 1.5 Cross Site Request Forgery
Posted Dec 11, 2011
Authored by Muhammet Cagri Tepebasili

Digital Scribe version 1.5 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
MD5 | ba1e696b586856e387ca002d9533230a
Pixie 1.04 Cross Site Request Forgery
Posted Dec 11, 2011
Authored by hackme

Pixie version 1.04 suffers from a blog post cross site request forgery vulnerability.

tags | exploit, csrf
MD5 | 9d83992a1981fd1cc5428c38d4a8e53a
D-Link DSL-500T ADSL XSRF / Brute Force
Posted Dec 11, 2011
Authored by MustLive

The D-Link DSL-500T ADSL router suffers from cross site request forgery, brute force and predictable resource location vulnerabilities.

tags | advisory, cracker, vulnerability, csrf
MD5 | a6f8c801108029d04f0b0c1a66fe59d4
2B.COM sprl SQL Injection
Posted Dec 11, 2011
Authored by Metropolis

2B.COM sprl suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | ade8d2c6f35e9158ae041cb4b01f4615
Babylon Cross Site Scripting
Posted Dec 11, 2011
Authored by Abhinav Singh

The search engine at search.babylon.com suffers from a reflective cross site scripting vulnerability.

tags | exploit, xss
MD5 | 956d03f80946159578767cb998720c5d
Anti-Virus Evasion Techniques
Posted Dec 11, 2011
Authored by Abhinav Singh

Whitepaper called Anti-Virus Evasion Techniques. Some of the techniques discussed are binding and splitting, converting exe to executable client side scripts, and performing code obfuscation/morphing.

tags | paper, virus
MD5 | 237fb3a0b67c7a4a85044e46e2aa993a
WordPress UPM-POLLS 1.0.4 Blind SQL Injection
Posted Dec 11, 2011
Authored by Saif El-Sherei

WordPress UPM-POLLS plugin version 1.0.4 suffers from a remote blind SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 39885d3e87d8877f2d93d97915aee945
Google reCAPTCHA WordPress Cross Site Scripting
Posted Dec 11, 2011
Authored by d3v1l, RandomStorm

The Google reCAPTCHA WordPress plugin suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | e7646d93af7f77b16ab8c3b763b79498
Mandriva Linux Security Advisory 2011-183
Posted Dec 11, 2011
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2011-183 - When receiving various stanzas related to voice and video chat, the XMPP protocol plugin failed to ensure that the incoming message contained all required fields, and would crash if certain fields were missing. When receiving various messages related to requesting or receiving authorization for adding a buddy to a buddy list, the oscar protocol plugin failed to validate that a piece of text was UTF-8. In some cases invalid UTF-8 data would lead to a crash. When receiving various incoming messages, the SILC protocol plugin failed to validate that a piece of text was UTF-8. In some cases invalid UTF-8 data would lead to a crash. This update provides pidgin 2.10.1, which is not vulnerable to these issues.

tags | advisory, protocol
systems | linux, mandriva
advisories | CVE-2011-4601, CVE-2011-3594
MD5 | 840f87defa7272b084b49e27fa52a89a
Secunia Security Advisory 47147
Posted Dec 11, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for libxml2. This fixes multiple vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise an application using the library.

tags | advisory, denial of service, vulnerability
systems | linux, redhat
MD5 | 213e4f6c6be7308e545959cd9004a5a4
Secunia Security Advisory 47133
Posted Dec 11, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Adobe Reader and Adobe Acrobat, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | 6c61c5658f0773e59006359f90f56991
Secunia Security Advisory 47109
Posted Dec 11, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in Apache Struts, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
MD5 | 453575c37df14529e0dd0b17bdc03fa3
Secunia Security Advisory 47121
Posted Dec 11, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in the Pretty Link plugin for WordPress, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | fda4638fae5f35835f5c4acb3269add8
Secunia Security Advisory 47124
Posted Dec 11, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Kerberos, which can be exploited by malicious users to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | 464aab41ef3d6cebf48646bceb85638f
Secunia Security Advisory 47150
Posted Dec 11, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for cups. This fixes a vulnerability, which can be exploited by malicious people to potentially compromise a vulnerable system.

tags | advisory
systems | linux, redhat
MD5 | 1b0388630c38ba6136019a2649ef8ab1
Secunia Security Advisory 47142
Posted Dec 11, 2011
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for krb5. This fixes a vulnerability, which can be exploited by malicious users to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, redhat
MD5 | 4686f74c8bbb45921359637d7209cb4f
Page 1 of 1
Back1Next

File Archive:

August 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    3 Files
  • 2
    Aug 2nd
    2 Files
  • 3
    Aug 3rd
    32 Files
  • 4
    Aug 4th
    22 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    19 Files
  • 7
    Aug 7th
    0 Files
  • 8
    Aug 8th
    0 Files
  • 9
    Aug 9th
    0 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close