exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 20 of 20 RSS Feed

Files Date: 2012-01-26

Peel SHOPPING 2.8 / 2.9 Cross Site Scripting / SQL Injection
Posted Jan 26, 2012
Authored by Cyber-Crystal

Peel SHOPPING versions 2.8 and 2.9 suffer from cross site scripting and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection
SHA-256 | 17013c953a7f95786dfb2ecad6a020c83079109d6d36eb30367f8a13d03dee28
RSA enVision Variable Disclosure
Posted Jan 26, 2012
Site emc.com

RSA has announced security fixes to address an environmental variable disclosure vulnerability in RSA enVision 4.x.

tags | advisory
advisories | CVE-2011-4143
SHA-256 | 97f7dbd3b90747a39a85bb786df93e20edc32f71fe20d64447b9568be6609ee7
EMC NetWorker Buffer Overflow
Posted Jan 26, 2012
Authored by Tal Zeltzer | Site emc.com

EMC NetWorker Server 7.5.x and 7.6.x contain a buffer overflow vulnerability which may possibly be exploited to cause a denial of service or, possibly, arbitrary code execution.

tags | advisory, denial of service, overflow, arbitrary, code execution
advisories | CVE-2012-0395
SHA-256 | 0c2f16df9895b9a9de4b10982e56916be916e3bb0dc120e8232b516c0554f882
xClick Cart 1.0.1 / 1.0.2 Cross Site Scripting
Posted Jan 26, 2012
Authored by Sony

xClick Cart versions 1.0.1 and 1.0.2 suffer from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | bcdba6e1a2a10dc5c0b8b5f306c9a121c7949bd1b52de3780b73383a3a2e6c07
Register Plus 3.5.1 Cross Site Scripting / Code Execution
Posted Jan 26, 2012
Authored by MustLive

Register Plus versions 3.5.1 and below for WordPress suffer from code execution, cross site scripting and path disclosure vulnerabilities.

tags | exploit, vulnerability, code execution, xss
SHA-256 | 8af0748bb44a2d219bb2dab50499ab80ee471af807d2e71af2be053afca0860d
Sysax Multi Server 5.50 Create Folder Buffer Overflow
Posted Jan 26, 2012
Authored by Craig Freyman | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in the create folder function in Sysax Multi Server 5.50. This issue was fixed in 5.52. You must have valid credentials to trigger the vulnerability. Your credentials must also have the create folder permission and the HTTP option has to be enabled. This Metasploit module will log into the server, get your a SID token and then proceed to exploit the server. Successful exploits result in LOCALSYSTEM access. This exploit works on XP and 2003.

tags | exploit, web, overflow
SHA-256 | 9c89a9721eaaf34e5b28601af5c5497ccf1f5855860d05b1399eb663bcde037c
Cisco Security Advisory 20120126-ironport
Posted Jan 26, 2012
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - Cisco IronPort Email Security Appliances (ESA) and Cisco IronPort Security Management Appliances (SMA) contain a vulnerability that may allow a remote, unauthenticated attacker to execute arbitrary code with elevated privileges. Workarounds that mitigate this vulnerability are available.

tags | advisory, remote, arbitrary
systems | cisco
advisories | CVE-2011-4862, CVE-2011-4862
SHA-256 | 4864f4e17fe47b8f6178a603e1cc20bb9f967ec80c223712f14bfa2e367c5c8c
Ubuntu Security Notice USN-1349-1
Posted Jan 26, 2012
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1349-1 - It was discovered that the X wrapper incorrectly checked certain console permissions when launched by unprivileged users. An attacker connected remotely could use this flaw to start X, bypassing the console permissions check.

tags | advisory
systems | linux, ubuntu
advisories | CVE-2011-4613
SHA-256 | 1c42f23752a398bf3b5d5ac117d5bd2075e69736a4ce1f6e67c0f2e952f6da84
PHPList 2.10.9 Cross Site Request Forgery / Cross Site Scripting
Posted Jan 26, 2012
Authored by Cyber-Crystal

PHPList version 2.10.9 suffers from cross site request forgery and cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss, csrf
SHA-256 | 156406175499db29e968856e912ccff0b2c4c1aa66ff94fd3a2977ec74379288
VR GPub 4.0 Cross Site Request Forgery
Posted Jan 26, 2012
Authored by Cyber-Crystal

VR GPub version 4.0 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 5c3013cdb2082412cf2d8ba5b3215c6f53bd60379f3fd0b3342da270893d0d0d
Ubuntu Security Notice USN-1348-1
Posted Jan 26, 2012
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1348-1 - It was discovered that ICU did not properly handle invalid locale data during Unicode conversion. If an application using ICU processed crafted data, an attacker could cause it to crash or potentially execute arbitrary code with the privileges of the user invoking the program.

tags | advisory, arbitrary
systems | linux, ubuntu
advisories | CVE-2011-4599
SHA-256 | ed1d39bd80eff20f1ebd24a942fc58795fee0111ae68d13afad8db1b3fdbc5a0
Etsi.org Cross Site Scripting
Posted Jan 26, 2012
Authored by Sony

Multiple etsi.org subdomains suffer from cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | ccc5522089f8ee652b28dc209c73262d2f2707419c2bcb070a8903acfe080c52
WordPress Slideshow Gallery 2 Cross SIte Scripting
Posted Jan 26, 2012
Authored by Bret Hawk

The WordPress Slideshow Gallery 2 plugin suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 95f81ff5d5319986839d3984fe04c5f19ec6e9cb57da1a036a73eb93c22cc4ca
Ubuntu Security Notice USN-1342-1
Posted Jan 26, 2012
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1342-1 - J. Aedla discovered that the kernel incorrectly handled /proc/<pid>/mem permissions. A local attacker could exploit this and gain root privileges.

tags | advisory, kernel, local, root
systems | linux, ubuntu
advisories | CVE-2012-0056
SHA-256 | e45dfdf1bd3525fa9a4dec53277bd6a8765bd88fef7c83ac37ee4a2fc90d56f4
Joomla Products SQL Injection
Posted Jan 26, 2012
Authored by the_cyber_nuxbie

The Joomla Products component suffers from multiple remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | 16fe7260bde5adf260a7e400d2c3e713031e4353fb1630b08f7999376850f6bf
Joomla Motor SQL Injection
Posted Jan 26, 2012
Authored by the_cyber_nuxbie

The Joomla Motor component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 0cd5df780696abbfce7cdc3eb9913c71bd63775e64a0968a4cdab979e3ccb3fc
Secunia Security Advisory 47730
Posted Jan 26, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in the Drupal Commerce module for Drupal, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory, vulnerability
SHA-256 | 84f13aeb9b96c5ef7d4414b5e5fd62d16096c973d6300e2ec56a7f46e8fa0472
Secunia Security Advisory 47685
Posted Jan 26, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in NX Web Companion, which can be exploited by malicious people to compromise a user's system.

tags | advisory, web
SHA-256 | 2ff84c38143ee06b479145f52641125156d40038be92cd854053915671838d35
Secunia Security Advisory 47728
Posted Jan 26, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability with unknown impact has been reported in the JE Story Submit component for Joomla!.

tags | advisory
SHA-256 | c9afe7cb21ec2c9afa2e9a1d2b73a392dbcab83a364e32047abe8a8abb0e9da7
Secunia Security Advisory 46091
Posted Jan 26, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Parvez Anwar has discovered a vulnerability in Caminova DjVu Browser Plug-in, which can be exploited by malicious people to compromise a user's system.

tags | advisory
SHA-256 | 5611a913694324190faf161dbff038e9a0376bfe350fe2eb36a15a697044d0c9
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close