exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 7 of 7 RSS Feed

Files Date: 2012-11-03

Joomla Parcoauto SQL Injection
Posted Nov 3, 2012
Authored by Andrea Bocchetti

The Joomla Parcoauto component suffers from a remote SQL injection vulnerability.

tags | exploit, remote, sql injection
SHA-256 | 7ee1ffcee96f5c755f777a3f26f33fd8f270f72a6431ce800ceca27b2c2fcd87
ICS-CERT Advisory - C3-ILEX EOSCADA DoS / Leakage
Posted Nov 3, 2012
Authored by ICS-CERT, Dale Peterson | Site ics-cert.org

ICS-CERT Advisory 12-271-01 - This Advisory is a follow-up release to the original Advisory which was posted to the US-CERT secure Portal library October 08, 2012. Dale Peterson of Digital Bond has identified multiple vulnerabilities in the C3-ilex's EOScada application that can result in data leakage and a denial-of-service (DoS) condition. C3-ilex has produced a patch that resolves these vulnerabilities.

tags | advisory, vulnerability
advisories | CVE-2012-1810, CVE-2012-1811, CVE-2012-1812, CVE-2012-1813
SHA-256 | 2dbc28bc1abdae2611ac393447f9f3c191203496af620601f16a8d74aa1efb70
Pebble Open Redirection
Posted Nov 3, 2012
Authored by Takahisa Kishiya | Site jvndb.jvn.jp

Pebble versions prior to 2.6.4 suffer from an open redirection vulnerability.

tags | advisory
advisories | CVE-2012-5170
SHA-256 | 32719a02967e07d9ca2ff8d4aff8805e9c9a5ec0815afca86e925c05c19289e7
Secunia Security Advisory 51157
Posted Nov 3, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Two vulnerabilities have been reported in Apple Safari, which can be exploited by malicious people to compromise a user's system.

tags | advisory, vulnerability
systems | apple
SHA-256 | 1ba8115c5a31f29457cf9438aa0590dff8ac5889c06705eabf1f52d63d4a494f
Secunia Security Advisory 51162
Posted Nov 3, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness and multiple vulnerabilities have been reported in Apple iOS, which can be exploited by malicious people with physical access to bypass certain security restrictions and by malicious people to disclose certain system information and compromise a vulnerable device.

tags | advisory, vulnerability
systems | cisco, apple
SHA-256 | e25387d7b7a6b810d95fa6745c1439a0d9f77041115255d972b0b78b71a8cbe5
Secunia Security Advisory 51102
Posted Nov 3, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - A weakness has been reported in Pebble, which can be exploited by malicious people to conduct spoofing attacks.

tags | advisory, spoof
SHA-256 | 2e03d52ea7e3bd693f084f87eab203b61b15676d4b7e4f208d6ffbed35679978
Secunia Security Advisory 51171
Posted Nov 3, 2012
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Multiple vulnerabilities have been reported in EOScada, which can be exploited by malicious people to disclose potentially sensitive information and cause a DoS (Denial of Service).

tags | advisory, denial of service, vulnerability
SHA-256 | 737dc38e3f5fa5c9302f194d97dc133fd330dfa2ec08ac9a2f06640030e6fc3f
Page 1 of 1
Back1Next

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    28 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close