exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 23 of 23 RSS Feed

Files Date: 2012-07-29

Scrutinizer NetFlow / sFlow Analyzer 9.0.1 XSS / Bypass / File Upload
Posted Jul 29, 2012
Authored by Mario Ceballos, Jonathan Claudius | Site trustwave.com

Scrutinizer NetFlow and sFlow Analyzer versions 9.0.1 and below suffer from bypass, cross site scripting, and remote file upload vulnerabilities. It also has undocumented MySQL admin users.

tags | exploit, remote, vulnerability, xss, file upload
advisories | CVE-2012-2626, CVE-2012-2627, CVE-2012-3848, CVE-2012-3951
SHA-256 | 5bbd69706e38d6f70c41925cdab4681651c0862b6cc58df5c29389f62daf07d3
eNdonesia 8.5 SQL Injection
Posted Jul 29, 2012
Authored by Crim3R

eNdonesia version 8.5 suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 54948b906dd600af3a708bf80769f8374d8ced6d49fdaf2b016551b8718fa031
Digital Whisper Electronic Magazine #33
Posted Jul 29, 2012
Authored by cp77fk4r, digitalwhisper

Digital Whisper Electronic Magazine issue 33. Written in Hebrew.

tags | magazine
SHA-256 | 898ab75c2711bfe8e8abd417a1269dd1d1ac0fa80fb98094663cd263eb0ceac5
httpdx 1.5.4 Heap Overflow
Posted Jul 29, 2012
Authored by st3n

httpdx versions 1.5.4 and below suffer from a heap overflow vulnerability.

tags | exploit, overflow
SHA-256 | 418b2d4fcc760866c7a677f04fa2344dd4f3cb2e1e8f863757935f0943065894
Transferable State Attack On Iterated Hashing Functions
Posted Jul 29, 2012
Authored by bwall

This paper describes an attack of the iterated use of hashing functions used as key stretching algorithms where the state of a hash can be transferred to the next hash function.

tags | paper
SHA-256 | 52f96766730e53dd9b718a0a0d0d999d36d38002c0a17023db1db12a5d4196c7
SC DHCP 4.1.2 Denial Of Service
Posted Jul 29, 2012
Authored by K1P0D

Proof of concept denial of service exploit for the zero length client id infinite loop vulnerability in DHCP version 4.1.2.

tags | exploit, denial of service, proof of concept
advisories | CVE-2012-3571
SHA-256 | 866407d6a01490397a0a69ab14d8818f3272133757b74cb32940ac7e6d151ada
ocPortal CMS 7.1.5 Open Redirect
Posted Jul 29, 2012
Authored by Aung Khant | Site yehg.net

ocPortal CMS versions 7.1.5 and below are vulnerable to open URL redirection.

tags | exploit
SHA-256 | 353cd4c439e094016caa438e0e165cbccde2fc29c1d867a80b2e7e755c9e4333
JW Player / SVFP / Poodll / RokBox Cross Site Scripting
Posted Jul 29, 2012
Authored by MustLive

Various flash players, such as JWPlayer for MODx, Simple video flash player for Joomla, Poodll for Moodle, RokBox for Joomla, and RokBox for WordPress all suffer from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 260067c1b6a7935399c21b2621857237ac79808b7df319270dbb7fa906648b17
Secunia Security Advisory 50071
Posted Jul 29, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue and a vulnerability have been reported in IBM Scale Out Network Attached Storage, which can be exploited by malicious users to bypass certain security restrictions and compromise a vulnerable system.

tags | advisory
SHA-256 | 612ae804f58501d41c14fe6eae7544dc15aba0521ddaf657ff4f2aa08f3279a4
Secunia Security Advisory 50061
Posted Jul 29, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for bind9. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | linux, ubuntu
SHA-256 | 93f985ca145939716df202f79a58bb5ebc662295122d2159d1ad610a1d2fc0e9
Secunia Security Advisory 49789
Posted Jul 29, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Xen, which can be exploited by malicious, local users in a guest virtual machine to cause a DoS (Denial of Service).

tags | advisory, denial of service, local
SHA-256 | 00ab85bf37b7204bd7e370f3dc8242daee4b81fde5c36bee33fb8ab631bb497b
Secunia Security Advisory 50003
Posted Jul 29, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in IBM AIX and IBM Virtual I/O Server, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service
systems | aix
SHA-256 | 05db2f194fac4186b61b0697f82fa748125ca84a804683f97d042e75ea82a31a
Secunia Security Advisory 50027
Posted Jul 29, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Justin C. Klein Keane has discovered two vulnerabilities in Transmission, which can be exploited by malicious people to conduct script insertion attacks.

tags | advisory, vulnerability
SHA-256 | 4b6d6aee454fd0db779a266bd84d34add725b93908d2d349708b61274a626faf
Secunia Security Advisory 50072
Posted Jul 29, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - IBM has acknowledged a vulnerability in IBM WebSphere DataPower SOA Appliances, which can be exploited by malicious people to potentially compromise a vulnerable system.

tags | advisory
SHA-256 | 17cbef896fca04580b6f564fd63c9176795cf37920d71602358744012253b898
Secunia Security Advisory 50059
Posted Jul 29, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Ubuntu has issued an update for isc-dhcp. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | linux, ubuntu
SHA-256 | 99ea89a3b66646066036db57d55bd3f73a6dd48b7d89561501166b54e3f98b2d
Secunia Security Advisory 50017
Posted Jul 29, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Debian has issued an update for isc-dhcp. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
systems | linux, debian
SHA-256 | 7c537b9263b2ef07c9244bbc6dcabc6539b2e8f5efd3f10a7f26ab17d564636a
Secunia Security Advisory 48682
Posted Jul 29, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Ruby on Rails, which can be exploited by malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, ruby
SHA-256 | 7b66b4443e66c3a81fa3859f0d0b198b56152a05192d8a0b392421aecb13b00e
Secunia Security Advisory 50047
Posted Jul 29, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in Ganglia, which can be exploited by malicious people to compromise a vulnerable system.

tags | advisory
SHA-256 | 8f1c5dcd0c3c88331e5c0f337c0ba0000d6281d7bef24b4569d159be9cbb66bb
Secunia Security Advisory 50035
Posted Jul 29, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for MozillaThunderbird. This fixes multiple vulnerabilities, which can be exploited by malicious people to conduct spoofing and cross-site scripting attacks, disclose certain sensitive information, bypass certain security restrictions, and compromise a user's system.

tags | advisory, spoof, vulnerability, xss
systems | linux, suse
SHA-256 | 87561362d0ba22674b96b0bf47bad970349edf63dc04dcc4c128235089f44a6b
Secunia Security Advisory 50040
Posted Jul 29, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two security issues have been reported in Bugzilla, which can be exploited by malicious people to disclose potentially sensitive information.

tags | advisory
SHA-256 | d96cbc0a4f6aea200f65e32c16b2aebdc5ca8e04a32a6dc584f082e4633e88d2
Secunia Security Advisory 50032
Posted Jul 29, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Caucho Resin, where one has an unknown impact and the other can be exploited by malicious people to disclose potentially sensitive information.

tags | advisory, vulnerability
SHA-256 | a1e4a045832ec9edebf3b9f9669bcebfc6701a9648d071839fee2e3f242b8173
eNdonesia Katalog 8.5 Cross Site Scripting
Posted Jul 29, 2012
Authored by Crim3R

eNdonesia katalog module version 8.5 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | aa87de6d3861fc8e0e457c276446c4b1de520503f1eaac7f766e6852cb512158
Sysax Multi Server 5.64 Buffer Overflow
Posted Jul 29, 2012
Authored by Craig Freyman, Matt Andreko | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in the create folder function in Sysax Multi Server 5.64. This issue was fixed in 5.66. You must have valid credentials to trigger the vulnerability. Your credentials must also have the create folder permission and the HTTP option has to be enabled. This Metasploit module will log into the server, get your a SID token and then proceed to exploit the server. Successful exploits result in LOCALSYSTEM access. This exploit works on XP SP3, and Server 2003 SP1-SP2.

tags | exploit, web, overflow
SHA-256 | 121e5304fc0c68efcbe91a4bd17f067fad4fef74c609ee089fb5929981de2e57
Page 1 of 1
Back1Next

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close