ignore security and it'll go away
Showing 1 - 18 of 18 RSS Feed

Files Date: 2012-05-12

Free Reality 3.1-0.6 XSS / CSRF / SQL Injection
Posted May 12, 2012
Authored by the_storm | Site vulnerability-lab.com

Free Reality version 3.1-0.6 suffers from cross site request forgery, cross site scripting, and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, xss, sql injection, csrf
MD5 | 0606d4d84cc44dda399e603cbd9a2433
SSLsplit 0.4.4
Posted May 12, 2012
Site roe.ch

SSLsplit is a tool for man-in-the-middle attacks against SSL/TLS encrypted network connections. Connections are transparently intercepted through a network address translation engine and redirected to SSLsplit. SSLsplit terminates SSL/TLS and initiates a new SSL/TLS connection to the original destination address, while logging all data transmitted. SSLsplit is intended to be useful for network forensics and penetration testing.

Changes: This release adds improvements to OCSP denial and bugfixes.
tags | encryption
MD5 | db3a32e0d3bf69ac3f4d95ce540dbc75
AnvSoft Any Video Conveter 4.3.6 Unicode Buffer Overflow
Posted May 12, 2012
Authored by h1ch4m

AnvSoft Any Video Converter version 4.3.6 unicode buffer overflow exploit that creates a malicious .reg file.

tags | exploit, overflow
MD5 | e243bb08e975e3a7c339c48cd5024b26
Sockso 1.51 Cross Site Scripting
Posted May 12, 2012
Authored by Ciaran McNally

Sockso versions 1.51 and below suffer from a persistent cross site scripting vulnerability.

tags | exploit, xss
MD5 | 470c90d11e3ee52c2b36bca214e0e953
GENU CMS 2012.4 CSRF / SQL Injection
Posted May 12, 2012
Authored by Chokri Ben Achor | Site vulnerability-lab.com

GENU CMS version 2012.4 suffers from cross site request forgery and remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection, csrf
MD5 | 8c643d459b4fe2bd6ea09d4054fae0b5
The Hackers Conference 2012 Call For Papers
Posted May 12, 2012
Site thehackersconference.com

The Hackers Conference 2012 Call For Papers has been announced. It will take place in New Delhi, India on July 29th, 2012.

tags | paper, conference
MD5 | 15633bacbd7c645a614a768af85b28d4
Serendipity CMS 1.6 Cross Site Scripting
Posted May 12, 2012
Authored by Benjamin Kunz Mejri | Site vulnerability-lab.com

Serendipity CMS version 1.6 suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 109787fd9f7aeb013cae574a6c8011b8
GetSimple CMS 3.1 Cross Site Scripting
Posted May 12, 2012
Authored by Chokri Ben Achor | Site vulnerability-lab.com

GetSimple CMS version 3.1 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
MD5 | 608740f77d14a71f453bf57c86ebf126
Indexa SQL Injection
Posted May 12, 2012
Authored by Th4 MasK

Indexa suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
MD5 | 7a3db302b857149a38124da432413999
Cura 0.4.0
Posted May 12, 2012
Site github.com

Cura is a mobile phone application bundle of remote systems administration tools. It provides a personalized terminal emulator, a syslog module that allows for reading logs directly from a server, a SysMonitor module that visually graphs CPU and RAM usage percentages, access to Nmap, and Server Stats will offer general server information like its Vitals, Hardware information, Memory information, processes, and so on. A security feature will be implemented that allows users to have Cura's database completely wiped upon them sending the compromised phone a secret pattern of their choosing (e.g. send an SMS message containing "phone has been stolen!" to your Android phone to wipe Cura's database, and receive the location of the compromised phone as an SMS to your emergency phone number or as an email to your emergency email address).

Changes: Nmap is now fully functional.
tags | tool, remote, wireless
systems | unix
MD5 | af62f7e523cb90aa1162c7561bf4a44e
NEC Backdoor Administrative Account
Posted May 12, 2012
Authored by Djamshut Saarash

It appears that high performance servers from NEC suffer from a hard-coded administrative account that can manipulate memory.

tags | exploit
MD5 | ae38efc08834ad58e1cb02b52f453339
Secunia Security Advisory 49070
Posted May 12, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in the Contact Forms module for Drupal, which can be exploited by malicious users to bypass certain security restrictions.

tags | advisory
MD5 | 38337af5e933911163b01e52e381d0d3
Secunia Security Advisory 49098
Posted May 12, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for linux-2.6. This fixes a vulnerability, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
systems | linux, debian
MD5 | 60da3a52f79bd330cf9e6106a4529688
Secunia Security Advisory 49116
Posted May 12, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in OpenSSL, which can be exploited by malicious people to cause a DoS (Denial of Service) of the application using the library.

tags | advisory, denial of service
MD5 | d7f1402aa5c30b6932405574a4a85fe2
Secunia Security Advisory 49093
Posted May 12, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in IBM Rational ClearQuest, which can be exploited by malicious users to conduct SQL injection attacks.

tags | advisory, sql injection
MD5 | d418bea5a50c8b976810c36379facae3
Secunia Security Advisory 49106
Posted May 12, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been discovered in Galette, which can be exploited by malicious people to conduct SQL injection attacks.

tags | advisory, sql injection
MD5 | ec5905904cfa80cc8f7970087ad54a25
Secunia Security Advisory 49081
Posted May 12, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Opera, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | 6d92e353ae7764b2c96cd0c856233459
Secunia Security Advisory 49136
Posted May 12, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for puppet. This fixes two security issues and two vulnerabilities, which can be exploited by malicious, local users to disclose potentially sensitive information and perform certain actions with escalated privileges and by malicious users to cause a DoS (Denial of Service).

tags | advisory, denial of service, local, vulnerability
systems | linux, suse
MD5 | 3725ff823958de063fcbfde5b40f419a
Page 1 of 1
Back1Next

File Archive:

July 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    2 Files
  • 2
    Jul 2nd
    3 Files
  • 3
    Jul 3rd
    15 Files
  • 4
    Jul 4th
    4 Files
  • 5
    Jul 5th
    15 Files
  • 6
    Jul 6th
    15 Files
  • 7
    Jul 7th
    10 Files
  • 8
    Jul 8th
    2 Files
  • 9
    Jul 9th
    10 Files
  • 10
    Jul 10th
    15 Files
  • 11
    Jul 11th
    15 Files
  • 12
    Jul 12th
    19 Files
  • 13
    Jul 13th
    16 Files
  • 14
    Jul 14th
    15 Files
  • 15
    Jul 15th
    3 Files
  • 16
    Jul 16th
    2 Files
  • 17
    Jul 17th
    8 Files
  • 18
    Jul 18th
    11 Files
  • 19
    Jul 19th
    15 Files
  • 20
    Jul 20th
    15 Files
  • 21
    Jul 21st
    15 Files
  • 22
    Jul 22nd
    6 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close