exploit the possibilities
Showing 1 - 25 of 40 RSS Feed

Files Date: 2012-08-28

JQuery Tooltip Cross Site Scripting
Posted Aug 28, 2012
Authored by Claudio Contin

JQuery Tooltip suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 0e56f4144065cbfeec94cf151d92981f
Mieric AddressBook 1.0 SQL Injection
Posted Aug 28, 2012
Authored by Jean Pascal Pereira

Mieric AddressBook 1.0 suffers from a remote SQL injection vulnerability.

tags | advisory, remote, sql injection
MD5 | 2ab156ea777daef079814a354a395001
ANGLER Technologies CMS Cross Site Scripting
Posted Aug 28, 2012
Authored by Am!r | Site irist.ir

ANGLER Technologies CMS suffers from a remote SQL injection vulnerability. Note that this finding houses site-specific data.

tags | exploit, remote, sql injection
MD5 | c036c87fbcbe832004ad090a426eaffe
Infinite IT Solutions CMS Cross Site Scripting
Posted Aug 28, 2012
Authored by Am!r | Site irist.ir

Infinite IT Solutions CMS suffers from a cross site scripting vulnerability. Note that this finding houses site-specific data.

tags | exploit, xss
MD5 | e9567168de7b96d326a53fd4616e5992
Distantia CMS SQL Injection
Posted Aug 28, 2012
Authored by Am!r | Site irist.ir

Distantia CMS suffers from a remote SQL injection vulnerability. Note that this finding houses site-specific data.

tags | exploit, remote, sql injection
MD5 | 4720d8d2845c4b22658b33437a427952
Secunia Security Advisory 50410
Posted Aug 28, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for python-paste-script. This fixes a weakness, which can be exploited by malicious, local users to perform certain actions with escalated privileges.

tags | advisory, local, python
systems | linux, redhat
MD5 | 54642ff49fa2be2ad0a3a1e5697d1256
Secunia Security Advisory 50422
Posted Aug 28, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Red Hat has issued an update for glibc. This fixes some weaknesses, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise an application using the library.

tags | advisory, denial of service
systems | linux, redhat
MD5 | fec6b24b62b270a9a85d1032f5c01ca1
Secunia Security Advisory 50196
Posted Aug 28, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - SUSE has issued an update for xen and libvirt. This fixes some vulnerabilities, which can be exploited by malicious, local users in a guest virtual machine to cause a DoS (Denial of Service).

tags | advisory, denial of service, local, vulnerability
systems | linux, suse
MD5 | 8fcbeda21fd4babbd93acbb1c37746bc
Secunia Security Advisory 50407
Posted Aug 28, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in RT, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory
MD5 | 1971ede540be6c20a2f1bc80a54201bc
Secunia Security Advisory 50435
Posted Aug 28, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness and multiple vulnerabilities have been reported in Symantec Messaging Gateway, which can be exploited by malicious users to bypass certain security restrictions and by malicious people to disclose certain sensitive information and conduct cross-site scripting and request forgery attacks.

tags | advisory, vulnerability, xss
MD5 | d4ae502be25f0233c2142c53375a5e15
Secunia Security Advisory 50412
Posted Aug 28, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - beford has reported multiple vulnerabilities in Chamilo, which can be exploited by malicious users to conduct script insertion attacks and bypass certain security restrictions and by malicious people to conduct cross-site scripting attacks.

tags | advisory, vulnerability, xss
MD5 | f4df7ed4dce44a36bfa9bb38c121479b
Secunia Security Advisory 50421
Posted Aug 28, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Linux Kernel, which can be exploited by malicious, local users or malicious people to cause a DoS (Denial of Service).

tags | advisory, denial of service, kernel, local, vulnerability
systems | linux
MD5 | 6bb75c4480e8cc6f34acbdbcc6139d50
Secunia Security Advisory 50361
Posted Aug 28, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Sense of Security has reported a vulnerability in elcomCMS, which can be exploited by malicious users to compromise a vulnerable system.

tags | advisory
MD5 | ac7977f4f7ed15b50564f0b1b386c909
Secunia Security Advisory 50438
Posted Aug 28, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in OpenOffice, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
MD5 | adbae56b89aa9f9a56f00955505bda97
Secunia Security Advisory 50385
Posted Aug 28, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Alcyon has reported some vulnerabilities in Conceptronic CH3ENAS devices, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory, vulnerability
MD5 | 84020976096fb91afe730e4a0ce7d6d6
Secunia Security Advisory 50439
Posted Aug 28, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Gjoko Krstic has discovered a vulnerability in Express Burn, which can be exploited by malicious people to compromise a user's system.

tags | advisory
MD5 | fc7f328ed33d72b7e5c9d27428bc862c
Secunia Security Advisory 50386
Posted Aug 28, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Alcyon has reported some vulnerabilities in Sitecom MD-253 and MD-254 devices, which can be exploited by malicious people to bypass certain security restrictions.

tags | advisory, vulnerability
MD5 | e1d6d8fb2f8b323b455943c8bdc61da0
Secunia Security Advisory 50351
Posted Aug 28, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in LetoDMS, which can be exploited by malicious users to conduct script insertion attacks and by malicious people to conduct cross-site scripting and request forgery attacks.

tags | advisory, vulnerability, xss
MD5 | 9ccaac4a8d6b376e346aa4f8896f8a74
Secunia Security Advisory 50392
Posted Aug 28, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities have been reported in the Cloudsafe365 plugin for WordPress, which can be exploited by malicious people to conduct cross-site scripting attacks and disclose potentially sensitive information.

tags | advisory, vulnerability, xss
MD5 | 2cb9e2f2ffeb785aec22946c5f109480
Secunia Security Advisory 50427
Posted Aug 28, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in Ad Manager Pro, which can be exploited by malicious people to conduct cross-site scripting and SQL injection attacks.

tags | advisory, vulnerability, xss, sql injection
MD5 | 9deb44ca52bab6e8171c860d974df24d
Secunia Security Advisory 50360
Posted Aug 28, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A vulnerability has been reported in OpenJPEG, which can be exploited by malicious people to potentially compromise an application using the library.

tags | advisory
MD5 | 756bd91e2151168983c173f79dad93b0
Secunia Security Advisory 50442
Posted Aug 28, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A security issue has been reported in Crowbar, which can be exploited by malicious, local users to gain escalated privileges.

tags | advisory, local
MD5 | c534e0e46dbdbe0866bf8855b9f27315
Tor-ramdisk i686 UClibc-based Linux Distribution x86_64 20120827
Posted Aug 28, 2012
Authored by Anthony G. Basile | Site opensource.dyc.edu

Tor-ramdisk is an i686 uClibc-based micro Linux distribution whose only purpose is to host a Tor server in an environment that maximizes security and privacy. Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. Security is enhanced by employing a monolithically compiled GRSEC/PAX patched kernel and hardened system tools. Privacy is enhanced by turning off logging at all levels so that even the Tor operator only has access to minimal information. Finally, since everything runs in ephemeral memory, no information survives a reboot, except for the Tor configuration file and the private RSA key which may be exported/imported by FTP. x86_64 version.

Changes: Tor was updated to 0.2.2.38, BusyBox to 1.20.2, and the kernel to 3.4.5 plus Gentoo's hardened-patches-3.4.5-1.extras.
tags | tool, kernel, peer2peer
systems | linux
MD5 | 65ab541de30cd83a422cafff0a121bb9
Tor-ramdisk i686 UClibc-based Linux Distribution x86 20120827
Posted Aug 28, 2012
Authored by Anthony G. Basile | Site opensource.dyc.edu

Tor-ramdisk is an i686 uClibc-based micro Linux distribution whose only purpose is to host a Tor server in an environment that maximizes security and privacy. Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. Security is enhanced by employing a monolithically compiled GRSEC/PAX patched kernel and hardened system tools. Privacy is enhanced by turning off logging at all levels so that even the Tor operator only has access to minimal information. Finally, since everything runs in ephemeral memory, no information survives a reboot, except for the Tor configuration file and the private RSA key which may be exported/imported by FTP. x86 version.

Changes: Tor was updated to 0.2.2.38, BusyBox to 1.20.2, and the kernel to 3.4.5 plus Gentoo's hardened-patches-3.4.5-1.extras.
tags | tool, x86, kernel, peer2peer
systems | linux
MD5 | 272ced2ca7fe7ddde30a487bc7df14be
CA SiteMinder Cross Site Scripting
Posted Aug 28, 2012
Authored by Ken Williams | Site www3.ca.com

CA Technologies Support is alerting customers to a potential risk in CA SiteMinder, CA Federation Manager, CA SOA Security Manager, CA SiteMinder Secure Proxy Server, and CA SiteMinder SharePoint Agent. A vulnerability exists that can allow a malicious user to execute a reflected cross site scripting (XSS) attack. CA Technologies has issued patches to address the vulnerability. The vulnerability occurs due to insufficient validation of postpreservationdata parameter input utilized in the login.fcc form. A malicious user can submit a specially crafted request to effectively hijack a victim's browser.

tags | advisory, xss
advisories | CVE-2011-4054
MD5 | 1886e054d2dd6edc825527c893bea3d2
Page 1 of 2
Back12Next

File Archive:

October 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    25 Files
  • 2
    Oct 2nd
    13 Files
  • 3
    Oct 3rd
    1 Files
  • 4
    Oct 4th
    1 Files
  • 5
    Oct 5th
    15 Files
  • 6
    Oct 6th
    15 Files
  • 7
    Oct 7th
    15 Files
  • 8
    Oct 8th
    11 Files
  • 9
    Oct 9th
    3 Files
  • 10
    Oct 10th
    1 Files
  • 11
    Oct 11th
    1 Files
  • 12
    Oct 12th
    8 Files
  • 13
    Oct 13th
    12 Files
  • 14
    Oct 14th
    23 Files
  • 15
    Oct 15th
    4 Files
  • 16
    Oct 16th
    13 Files
  • 17
    Oct 17th
    1 Files
  • 18
    Oct 18th
    1 Files
  • 19
    Oct 19th
    27 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close