exploit the possibilities
Showing 1 - 23 of 23 RSS Feed

Files Date: 2012-03-05

11in1 CMS 1.2.1 SQL Injection
Posted Mar 5, 2012
Authored by Chokri Ben Achor | Site vulnerability-lab.com

11in1 CMS version 1.2.1 suffers from multiple remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
MD5 | b27b123391a63469687fbb08d7a1a9f3
Open Compute Project Cross Site Scripting
Posted Mar 5, 2012
Authored by Mr.PaPaRoSSe

Open Compute Project suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 3bac49d09d99380a098c60179d3fba05
Etano 1.x Cross Site Scripting
Posted Mar 5, 2012
Authored by Aung Khant | Site yehg.net

Etano version 1.x suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
MD5 | c77ca5ddd059e52ab40e6ed00df443d9
ZB Block Cross Site Scripting
Posted Mar 5, 2012
Authored by Akastep

ZB Block version 0.4.9 Final suffers from cross site scripting vulnerabilities in the User-Agent and Referer headers.

tags | exploit, vulnerability, xss
MD5 | 07d19ce6891ce85491fece545fe4f413
Dej CMS SQL Injection
Posted Mar 5, 2012
Authored by Expl0its

Dej CMS suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 4312f450fac2bcb6f6612d61bde97dc8
Symfony 2 Unauthenticated Information Disclosure
Posted Mar 5, 2012
Authored by Phil Taylor | Site senseofsecurity.com.au

The XMLEncoder component of Symfony version 2.0.x fails to disable external entities when parsing XML. In the Symfony2 framework the XML class may be used to deserialize objects or as part of a client/server API. By using external entities it is possible to include arbitrary files from the file system. Any application written in Symfony2 that parses user supplied XML is affected.

tags | exploit, arbitrary
MD5 | 25422ac3ad1a1e33468748e7c50a4469
Ubuntu Security Notice USN-1382-1
Posted Mar 5, 2012
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 1382-1 - Austin Clements discovered that Light Display Manager incorrectly leaked file descriptors to child processes. A local attacker can use this to bypass intended permissions and write to the log file, cause a denial of service, or possibly have another unknown impact.

tags | advisory, denial of service, local
systems | linux, ubuntu
MD5 | 615d605ce92769f3d2adfad078ce0a74
Polycom Web Management Interface Command Injection
Posted Mar 5, 2012
Authored by Heyder Andrade, Joao Paulo Caldas Campello | Site tempest.com.br

The Polycom web management interface on model G3/HDX 8000 HD suffers from a remote command injection vulnerability.

tags | exploit, remote, web
MD5 | 9168599a30269df0cf080fbd1e6eb6bd
Polycom Web Management Interface Directory Traversal
Posted Mar 5, 2012
Authored by Heyder Andrade, Joao Paulo Caldas Campello | Site tempest.com.br

The Polycom web management interface on model G3/HDX 8000 HD suffers from a directory traversal vulnerability.

tags | exploit, web
MD5 | 39fa5254f3d7885d7982bd48771e9a2f
Open-Realty 2.5.8 Local File Inclusion
Posted Mar 5, 2012
Authored by Aung Khant | Site yehg.net

Open-Realty versions 2.5.8 and below suffer from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
MD5 | 7cfb12764fa5e63709745491141be059
Lizard Cart SQL Injection
Posted Mar 5, 2012
Authored by Number 7

Lizard Cart suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 8a31eb0826193b8527cf5b0f3b7741f7
Sysax 5.53 SSH Username Buffer Overflow
Posted Mar 5, 2012
Authored by sinn3r, Craig Freyman | Site metasploit.com

This Metasploit module exploits a vulnerability found in Sysax's SSH service. By supplying a long username, the SSH server will copy that data on the stack without any proper bounds checking, therefore allowing remote code execution under the context of the user. Please note that previous versions (before 5.53) are also affected by this bug.

tags | exploit, remote, code execution
advisories | OSVDB-79689
MD5 | 2e6c4b3c09156f6867a5e4b79066ef1d
Secunia Security Advisory 48217
Posted Mar 5, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for plib. This fixes a vulnerability, which can be exploited by malicious people to compromise an application using the library.

tags | advisory
systems | linux, debian
MD5 | 472e17235884cede0bce7200b77ef84b
Secunia Security Advisory 48255
Posted Mar 5, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Refinery CMS, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
MD5 | fd84cd8702ec0a4997a8f77ec47f3c92
Secunia Security Advisory 48225
Posted Mar 5, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for movabletype-opensource. This fixes multiple vulnerabilities, which can be exploited by malicious users to disclose sensitive information and compromise a vulnerable system and by malicious people to conduct session hijacking, cross-site scripting, and cross-site request forgery attacks.

tags | advisory, vulnerability, xss, csrf
systems | linux, debian
MD5 | 54fd136eda1b4fb8246716efbc354dc1
Secunia Security Advisory 48262
Posted Mar 5, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Parallels Plesk Panel, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
MD5 | 8b775b5d2ff2866e95d880884a71ce6f
Secunia Security Advisory 48233
Posted Mar 5, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Witze addon for deV!L'z Clanportal, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
MD5 | 0e2c2364b5e04bfa356bfc4b744b8777
Toronto Web Design Cross Site Scripting
Posted Mar 5, 2012
Authored by Am!r | Site irist.ir

Toronto Web Design suffers from a cross site scripting vulnerability.

tags | exploit, web, xss
MD5 | f030fa97647ce335f4d885c5d67804ad
Jhwebstudio Cross Site Scripting
Posted Mar 5, 2012
Authored by Am!r | Site irist.ir

Jhwebstudio suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 9a46a39c41faf7bf648c1d4932843d08
Secunia Security Advisory 48245
Posted Mar 5, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been discovered in RivetTracker, which can be exploited by malicious users and malicious people to conduct SQL injection attacks.

tags | advisory, vulnerability, sql injection
MD5 | e1f34d9ab8b0e41033fc611a415d1fa1
Secunia Security Advisory 48224
Posted Mar 5, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for libxml-atom-perl. This fixes a vulnerability, which can be exploited by malicious people to potentially disclose sensitive information.

tags | advisory, perl
systems | linux, debian
MD5 | f7e5eef42217a299cb59f5e66d1f1b6d
Secunia Security Advisory 48226
Posted Mar 5, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been discovered in AjaXplorer, which can be exploited by malicious people to disclose potentially sensitive information.

tags | advisory, vulnerability
MD5 | 958f09e4c76ef0b7b3c3da24d4785078
Secunia Security Advisory 47952
Posted Mar 5, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability with unknown impact has been reported in Novell ZENworks Configuration Management.

tags | advisory
MD5 | fefe4e0bdb98684a95ba9fd73b39f3a8
Page 1 of 1
Back1Next

File Archive:

October 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    25 Files
  • 2
    Oct 2nd
    13 Files
  • 3
    Oct 3rd
    1 Files
  • 4
    Oct 4th
    1 Files
  • 5
    Oct 5th
    15 Files
  • 6
    Oct 6th
    15 Files
  • 7
    Oct 7th
    15 Files
  • 8
    Oct 8th
    11 Files
  • 9
    Oct 9th
    3 Files
  • 10
    Oct 10th
    1 Files
  • 11
    Oct 11th
    1 Files
  • 12
    Oct 12th
    8 Files
  • 13
    Oct 13th
    12 Files
  • 14
    Oct 14th
    23 Files
  • 15
    Oct 15th
    4 Files
  • 16
    Oct 16th
    13 Files
  • 17
    Oct 17th
    1 Files
  • 18
    Oct 18th
    1 Files
  • 19
    Oct 19th
    27 Files
  • 20
    Oct 20th
    41 Files
  • 21
    Oct 21st
    15 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close