what you don't know can hurt you
Showing 1 - 25 of 34 RSS Feed

Files Date: 2012-01-10

Big B Trading CMS Cross Site Scripting
Posted Jan 10, 2012
Authored by Am!r, H4ckCity Security Team | Site irist.ir

Big B Trading CMS suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | ca5dcf916556c2fb68ae23dd91c21a7b
Zero Day Initiative Advisory 12-008
Posted Jan 10, 2012
Authored by Tipping Point | Site zerodayinitiative.com

Zero Day Initiative Advisory 12-08 - This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Citrix Provisioning Services. Authentication is not required to exploit this vulnerability. The specific flaw exists within the streamprocess.exe component which listens for UDP traffic on multiple ports, beginning with 6905. When handling a packet which requests a vDisk name, the user-supplied length value is not properly validated. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the SYSTEM user.

tags | advisory, remote, arbitrary, udp
MD5 | 9e185ee773dc0a9df22d413672d574ba
Mandriva Linux Security Advisory 2012-003
Posted Jan 10, 2012
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2012-003 - Integer overflow in the ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, allows local users to gain privileges via a.htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, leading to a heap-based buffer overflow. The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21, when the Revision 1179239 patch is in place, does not properly interact with use of RewriteRule and ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an \@ character and a : character in invalid positions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3368. The updated packages have been patched to correct these issues.

tags | advisory, remote, web, overflow, local
systems | linux, mandriva
advisories | CVE-2011-3607, CVE-2011-4317
MD5 | 3190f99554cbd0a8df739618e3f40718
W-CMS 2.01 Cross Site Scripting / Directory Traversal
Posted Jan 10, 2012
Authored by th3.g4m3_0v3r

W-CMS version 2.01 suffers from cross site scripting and directory traversal vulnerabilities.

tags | exploit, vulnerability, xss, file inclusion
MD5 | faebb83c3f27a25ef79763b01efcc0dc
PHP Vulnerability Hunter 1.2.0.2
Posted Jan 10, 2012
Authored by AutoSec Tools | Site autosectools.com

PHP Vulnerability Hunter is a PHP fuzzing tool that scans for several different vulnerabilities by performing dynamic program analysis. It can detect arbitrary command execution, local file inclusion, arbitrary upload, and several other types of vulnerabilities.

Changes: Fix made in relation to the error reporting.
tags | arbitrary, local, php, vulnerability, file inclusion, fuzzer
MD5 | 1e02ee78d2940ef98e05c77caf0939cd
Secunia Security Advisory 47490
Posted Jan 10, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Hitachi IT Operations Director, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | 3e1512e96451f68d7a83ca8c3ac50e01
Secunia Security Advisory 47472
Posted Jan 10, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, kernel
systems | linux
MD5 | 46f41912506d111faafe1a9a793fc62a
Secunia Security Advisory 47473
Posted Jan 10, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in IBM WebSphere Application Server Community Edition, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
MD5 | dc22f2386b54b7b6320aa3c557068d80
Secunia Security Advisory 47463
Posted Jan 10, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in libvirt, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
MD5 | 57073f7b656d2236a83afc204e87dae6
Secunia Security Advisory 47467
Posted Jan 10, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Hitachi IT Operations Analyzer, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | f1e9a1f39a1c90a5fcb9d708263e1f66
Secunia Security Advisory 47515
Posted Jan 10, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Emacs, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | cb7c4d443ee594d64945cc35c00fcdc0
Secunia Security Advisory 45189
Posted Jan 10, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Parvez Anwar has discovered a vulnerability in Microsoft Windows, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | windows
MD5 | 95e33f95c6bbd0cdbe812e44ec610948
Secunia Security Advisory 47311
Posted Jan 10, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in CEDET, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | b0078dbf0bb15623943681d6368a3f8b
Secunia Security Advisory 47483
Posted Jan 10, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in Microsoft AntiXSS Library, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
MD5 | 864538e807c77599fe4709ec141d6efe
Secunia Security Advisory 47476
Posted Jan 10, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for java-1.4.2-ibm. This fixes multiple vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information, hijack a user's session, conduct DNS cache poisoning attacks, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.

tags | advisory, java, denial of service, vulnerability
systems | linux, redhat
MD5 | 68e0aac5175739e7b3c25e30274c5c9a
Secunia Security Advisory 47466
Posted Jan 10, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in dl Download Ticket Service, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
MD5 | 9fbd7da07953c781415ace65c277fa8d
Secunia Security Advisory 47455
Posted Jan 10, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for cacti. This fixes multiple vulnerabilities, which can be exploited by malicious users to compromise a vulnerable system and by malicious people to conduct cross-site scripting and SQL injection attacks.

tags | advisory, vulnerability, xss, sql injection
systems | linux, debian
MD5 | 582401fe55f681787b9f64f89add5784
Secunia Security Advisory 46748
Posted Jan 10, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Stefan Schurtz has discovered two vulnerabilities in X3 CMS, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
MD5 | 27e9453b37f47224c02be66457e67187
Secunia Security Advisory 47485
Posted Jan 10, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
systems | windows
MD5 | 9fa7a09cf9906abea20b77b7e66fb73c
Secunia Security Advisory 47461
Posted Jan 10, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in razorCMS, which can be exploited by malicious users to bypass certain security restrictions.

tags | advisory
MD5 | 27e5ee19bd845303bf4f77224c0beaf4
Secunia Security Advisory 47492
Posted Jan 10, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Luigi Auriemma has discovered a vulnerability in SumatraPDF, which can be exploited by malicious people to potentially compromise a user's system.

tags | advisory
MD5 | dd78213551b0df5ad369249e230be927
Secunia Security Advisory 47356
Posted Jan 10, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in Microsoft Windows, which can be exploited by malicious people to bypass certain security features.

tags | advisory
systems | windows
MD5 | a41182275c5ccf8efb730c1446cf7ba2
Secunia Security Advisory 47516
Posted Jan 10, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in Microsoft AntiXSS Library, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
MD5 | 6ecac084b76c02ef2561089566cbea4c
Secunia Security Advisory 47480
Posted Jan 10, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | windows
MD5 | eb557e49c986de2d9c40271502f1ee9e
Secunia Security Advisory 47479
Posted Jan 10, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
systems | windows
MD5 | a1f0cdaac2a46dfdc0db78d810e471a3
Page 1 of 2
Back12Next

File Archive:

July 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    34 Files
  • 2
    Jul 2nd
    15 Files
  • 3
    Jul 3rd
    9 Files
  • 4
    Jul 4th
    8 Files
  • 5
    Jul 5th
    2 Files
  • 6
    Jul 6th
    3 Files
  • 7
    Jul 7th
    1 Files
  • 8
    Jul 8th
    15 Files
  • 9
    Jul 9th
    15 Files
  • 10
    Jul 10th
    20 Files
  • 11
    Jul 11th
    17 Files
  • 12
    Jul 12th
    15 Files
  • 13
    Jul 13th
    2 Files
  • 14
    Jul 14th
    1 Files
  • 15
    Jul 15th
    20 Files
  • 16
    Jul 16th
    27 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close