exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 46 RSS Feed

Files Date: 2012-03-15

NetDecision 4.5.1 HTTP Server Buffer Overflow
Posted Mar 15, 2012
Authored by sinn3r, Prabhu S Angadi | Site metasploit.com

This Metasploit module exploits a vulnerability found in NetDecision's HTTP service (located in C:\Program Files\NetDecision\Bin\HttpSvr.exe). By supplying a long string of data to the URL, an overflow may occur if the data gets handled by HTTP Server's active window. In other words, in order to gain remote code execution, the victim is probably looking at HttpSvr's window.

tags | exploit, remote, web, overflow, code execution
advisories | OSVDB-79651
SHA-256 | b0360c6608a9f7f825bb2a16c5e986f0705fab59b76d7d1c6e39262c2c2249bc
nginx 1.0.13 Information Leak
Posted Mar 15, 2012
Site nginx.org

nginx versions prior to 1.0.14 stable and 1.1.7 development suffer from an information leak vulnerability when receiving a malformed HTTP response.

tags | advisory, web
SHA-256 | 4a5c29ad6c7a3904436207e603d5eb2996ff11a7f07c3753916e4e8fb92b76bd
Invision Power Board 3.2.3 Cross Site Scripting
Posted Mar 15, 2012
Authored by Vasil A.

Invision Power Board version 3.2.3 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 337cc9286aab3941b0204410bfcd4c1c12a77fc832a99667e00028b7809f07a9
LivePerson Cross Site Scripting
Posted Mar 15, 2012
Authored by Sony

LivePerson.net suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | b6c55c3f09f9b1d5df48ccd43fcdb9c01586856379a4c5ecc18abc5209bf37ab
Secunia Security Advisory 48367
Posted Mar 15, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in lshell, which can be exploited by malicious, local users to bypass certain security restrictions.

tags | advisory, local
SHA-256 | 775428138f4a3c7fd83d18e350415507cd4e0323550818ce592491431fc06462
Secunia Security Advisory 48421
Posted Mar 15, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Cisco Firewall Services Module (FWSM), which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | cisco
SHA-256 | 08958539862fcc9e732cfb70676da045a3c95613c342fc221d2c9fb507f14f96
Secunia Security Advisory 48393
Posted Mar 15, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Adobe ColdFusion, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | cab1aa7969bd3e1c2f57c1d7f934eccdaf3e1adcf27b4da64c66a218a07f94d9
Secunia Security Advisory 48359
Posted Mar 15, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for thunderbird. This fixes multiple vulnerabilities, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, disclose certain sensitive information, and compromise a user's system.

tags | advisory, vulnerability, xss
systems | linux, redhat
SHA-256 | e74e4b508701e153d7ae5e91b39c421be373a681b436eef88cfd6cc84fa810d8
Secunia Security Advisory 48414
Posted Mar 15, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Mozilla Firefox and Thunderbird, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a user's system.

tags | advisory, vulnerability, xss
SHA-256 | 034274b507700a1c0fb79d95770b9d49bda0d15d1e0703c58ce019b9de590423
Secunia Security Advisory 48314
Posted Mar 15, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Niket Khosla has reported a vulnerability in Aurora WebOPAC, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 699990be26fae9dd8bf0c8bf1f346610929b109ee7003e6f840626b8c83617c1
Secunia Security Advisory 48405
Posted Mar 15, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Language Icons module for Drupal, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory
SHA-256 | 197376f0c30459774e98f443c0329999ae22c386129bc648618ca6fa8a3d7c3e
Secunia Security Advisory 48412
Posted Mar 15, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Fancy Slide module for Drupal, which can be exploited by malicious users to conduct script insertion attacks.

tags | advisory
SHA-256 | 4ff7f321d76ac2af09b7c2f44af0049473fe8ddbb285f9d157b79e6deb07bee4
Secunia Security Advisory 48385
Posted Mar 15, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in EncapsGallery, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
SHA-256 | 1f4b3e3cd51ff8bfaf3e0f78ef5ddb5616531fb285032ab3654a0b622079b1df
Secunia Security Advisory 48355
Posted Mar 15, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in the Views Language Switcher module for Drupal, which can be exploited by malicious people to conduct cross-site scripting attacks.

tags | advisory, xss
SHA-256 | 0d8fd7e21bc786fb0292f581de45aa52f900c3f30cf1986b0884263b6d6696cb
Secunia Security Advisory 48423
Posted Mar 15, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Cisco Adaptive Security Appliances (ASA), which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | cisco
SHA-256 | 04f94b5e9668c52ce3e7f50859dae731c540f71605f3dcd95f5cb07bebd47236
Secunia Security Advisory 48427
Posted Mar 15, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Barnowl, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
SHA-256 | 9615811ff37542e91191af82da763d7253dc576d265679d20761cbab41218981
Secunia Security Advisory 48340
Posted Mar 15, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Ad Management Yoga, which can be exploited by malicious people to conduct cross-site request forgery attacks.

tags | advisory, csrf
SHA-256 | f94ccf78790ab178187cf0047d4b4b05d40b63ff5f719e5df3b339bf5a33008f
Secunia Security Advisory 48422
Posted Mar 15, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Cisco Adaptive Security Appliances, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | cisco
SHA-256 | d2a4d17b2e4a22fddd19853e49d3bd37ca40b61fd337fa4af3abd1b48a7c33e2
Secunia Security Advisory 48382
Posted Mar 15, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Luigi Auriemma has discovered a vulnerability in Epson Event Manager, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
SHA-256 | 6d3c6deb1b0eafccc65a5985b341b890b42b240355058c121e8dfaa5bdd97129
Secunia Security Advisory 48380
Posted Mar 15, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Luigi Auriemma has discovered multiple vulnerabilities in Presto! PageManager, which can be exploited by malicious people to disclose potentially sensitive information, cause a DoS (Denial of Service), and compromise a vulnerable system.

tags | advisory, denial of service, vulnerability
SHA-256 | 9758a95c4503b9d5c8b4a38005a1839b574b353ab36d8c3ae774b07946333ac2
Secunia Security Advisory 48366
Posted Mar 15, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in nginx, which can be exploited by malicious people to disclose certain sensitive information.

tags | advisory
SHA-256 | 12b486887616aeba60bef80c6bd7ce4d1173691ed7169ae37a06bab1f00a8c64
Secunia Security Advisory 48435
Posted Mar 15, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in the CKEditor and FCKeditor modules for Drupal, which can be exploited by malicious users to compromise a vulnerable system and by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
SHA-256 | 70bea56e02dbc26a69e840cf0e033b69a0b2282d7355f55191fb3974c32ec641
OpenSSL Toolkit 1.0.1
Posted Mar 15, 2012
Site openssl.org

OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide.

Changes: Initial TLSv1.1 support and TLS v1.2 support were implemented. Many improvements and minor bugfixes were made.
tags | encryption, protocol
systems | unix
SHA-256 | 4d9f0a594a9a89b28e1a04a9504c04104f6508ee27ad1e0efdd17a7a6dbbeeee
Presto! PageManager 9.01 Overflow / File Download / Denial Of Service
Posted Mar 15, 2012
Authored by Luigi Auriemma | Site aluigi.org

Presto! PageManager versions 9.01 and below suffer from heap overflow, arbitrary file downloading, and denial of service vulnerabilities.

tags | exploit, denial of service, overflow, arbitrary, vulnerability
systems | linux
SHA-256 | 83a76aea3ab82f086da4968e6872b1b1c4b95fbc01ee1f522767a9d9ae1dfbfb
Sockso 1.5 Directory Traversal
Posted Mar 15, 2012
Authored by Luigi Auriemma | Site aluigi.org

Sockso versions 1.5 and below suffer from a directory traversal vulnerability.

tags | exploit
SHA-256 | 77408140ee546552e2117da9511f6d9163aadd9b1c364cf5c48df280a7970071
Page 1 of 2
Back12Next

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    18 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    13 Files
  • 17
    May 17th
    22 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    17 Files
  • 21
    May 21st
    18 Files
  • 22
    May 22nd
    7 Files
  • 23
    May 23rd
    111 Files
  • 24
    May 24th
    27 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    6 Files
  • 28
    May 28th
    12 Files
  • 29
    May 29th
    31 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close